JDP_6_00_CIS
JDP_6_00_CIS
Joint Doctrine Publication 6-00 (JDP 6-00) (3rd Edition) dated January 2008
is promulgated as directed by the Chiefs of Staff
CONDITIONS OF RELEASE
AUTHORISATION
The Development, Concepts and Doctrine Centre (DCDC) is responsible for
publishing Joint Doctrine Publications (JDPs) within a hierarchy of similar
publications. Readers wishing to quote JDPs as reference material in other work
should confirm with the DCDC Doctrine Editor whether the particular
publication and amendment state remains authoritative. Comments on factual
accuracy or proposals for amendment are welcomed by the Doctrine Editor at:
DISTRIBUTION
Distribution of JDPs is managed by the Forms and Publications Section, DSDA
Operations Centre, C16 Site, Ploughley Road, Arncott, Bicester, OX25 1LP. Requests
for issue of this publication, or amendments to its distribution, should be referred to
the DSDA Operations Centre. All other DCDC publications, including a regularly
updated CD ‘Joint Doctrine Disk’ (containing both JDPs and Allied Joint Publications
(AJPs)), can also be demanded from the DSDA Operations Centre.
All publications (including drafts) are available to view and download at:
www.dcdc.dii.r.mil.uk. This publication is available on the internet at:
www.mod.uk/dcdc.
UK doctrine is, as far as practicable and sensible, consistent with that of NATO. The
development of national doctrine addresses those areas not covered adequately by
NATO; it also influences the evolution of NATO doctrine in accordance with national
thinking and experience.
Urgent requirements for doctrine are addressed in Joint Doctrine Notes (JDNs). JDNs
do not represent an agreed or fully staffed position, but are raised in short order by the
Development, Concepts and Doctrine Centre (DCDC) to establish and disseminate
current best practice. They also provide the basis for further development and
experimentation, and a doctrinal basis for operations and exercises.
Details of the Joint Doctrine development process and the associated hierarchy of
JDPs are to be found in JDP 0-00 Joint Doctrine Development Handbook.
1
Formerly named Joint Warfare Publications (JWPs).
RECORD OF AMENDMENTS
Amendment Number Date of Insertion Initials
Change 1 December 2011 DCDC
Change 1 to JDP 6-00 CIS Support to Joint Operations was promulgated in December
2011 and comprised a complete rewrite of Chapters 3 and 4. Change 1 provides
updated or new doctrine on:
PREFACE
1. Purpose. Joint Doctrine Publication (JDP) 6-00 Communications and
Information Systems Support to Joint Operations provides guidance for the planning
and execution of Communications and Information Systems (CIS) support to Joint
operations. This edition is intended primarily for personnel employed within the
Defence Crisis Management Organisation (DCMO) including the Permanent Joint
Headquarters (PJHQ), a Joint Task Force Headquarters (JTFHQ), Joint Force CIS
(JFCIS) staff, Front Line Commands (FLCs), the Directorate General Information
Systems and Services (DG ISS) and the wider CIS community. In any operation, it is
essential that staff understand the Commander’s information needs and support them
with CIS; all staff branches have an important role in CIS planning, and all officers
engaged in Joint operations should be familiar with this publication.
2. Context. This 3rd Edition of JDP 6-00 builds upon previous editions, and
includes updated processes and procedures developed for the ongoing evolution of
CIS. Although this document is based on the deployment of a JTFHQ, it is equally
valid under other operational constructs and different scales of operations. The
generic principles contained within this document should be adapted for specific
operations.
4. Linkages. To satisfy an urgent need for CIS doctrine, JDP 6-00 was drafted ahead
of the 4th Edition of JDP 0-01 British Defence Doctrine and the revised editions of
JDPs 01 Campaigning, 3-00 Campaign Execution and 5-00 Campaign Planning,
which together will provide the updated overarching context.
(INTENTIONALLY BLANK)
CONTENTS
Page No
Title Page i
Authorisation and Distribution ii
Joint Doctrine Publications iii
Record of Amendments iv
Preface v
Contents vii
Chapter 1 Introduction
Annex 1A – Information Management
Lexicon
CHAPTER 1 – INTRODUCTION
101. Successful Communications and Information Systems (CIS) support to
operations combines the fundamentals of the Information Exchange Requirement
(IER), CIS capability and Information Management (IM) to achieve operational
advantage. After describing these fundamentals in detail, this Chapter introduces
enduring CIS principles of prioritisation, agility, capacity, interoperability and security
that are applied to operational CIS planning and execution. It then outlines the
operational context for CIS support.
Fundamentals
102. Communications and Information Systems. CIS are ‘the assembly of
equipment, methods and procedures, and if necessary personnel, organised so as to
accomplish specific information, conveyance and processing functions’. 1 In the
modern battlespace, effective IM and subsequent information superiority is only
achieved with properly deployed and managed CIS. CIS are an essential part of
military operations and provide commanders at all levels with the means to exercise
Command and Control (C2) and disseminate vital information. CIS are also an
essential prerequisite for Network Enabled Capability (NEC), 2 which allows increased
situational awareness, supports better decision making and greater operational agility
for an Effects-based Approach (EBA). 3 The role of J6 staff is to ensure that CIS
delivers robust and flexible solutions to meet this requirement.
1
AAP-6 ‘NATO Glossary of Terms and Definitions’. Note that CIS represents a capability; the term Information and
Communication Services (ICS) describes the services available.
2
Strategic Defence Review New Chapter (July 2004) defined NEC as ‘encompassing the elements required to deliver
controlled and precise military effect rapidly and reliably’.
3
UK EBA embodies a way of thinking and specific processes that together enable the effective use of military capability,
usually as part of a Comprehensive Approach (CA), to achieve favourable outcomes. (See JDP 01 (2nd Edition) ‘Joint
Operations’ – programmed for promulgation early 2008).
4
New term developed for this publication and future UK doctrine – see Annex 1A2.
105. Battlespace Spectrum Management. The use of and reliance upon the
Electromagnetic Spectrum (EMS), by both military and commercial users, has
increased significantly in recent years and shows no signs of abating. Effective use of
the Electromagnetic Environment (EME) 5 is a prerequisite for successful operations,
and the ability to manoeuvre within it is enabled by Battlespace Spectrum
Management (BSM). 6
5
Electromagnetic Environment is ‘the totality of electromagnetic phenomena existing at a given location’. (JDP 0-01.1)
Also see CDS 01/06 ‘UK Joint EW Policy’.
6
Battlespace Spectrum Management (BSM) is defined as ‘the planning, coordination and management of the
electromagnetic spectrum through operational, engineering and administrative procedures’. (ACP 190(B))
The BSM function and process is covered in Chapter 3.
Principles of CIS
107. Throughout all stages of operational CIS planning and execution, a number of
enduring principles are applied to ensure that the most effective and efficient CIS
solution emerges to accommodate the Commander’s Intent. These principles are:
8
Interoperability of systems is defined as ‘the ability of systems to provide services and information to (or accept
services and information from) other systems’. (AAP-31)
9
A Comprehensive Approach is ‘an approach that responds effectively to complex, contemporary crises by the
orchestration, coordination or de-confliction of military, OGD, and (where possible) IO and NGO activity’. (See JDP 01
(2nd Edition) for detail – programmed for promulgation early 2008).
10
OPSEC is ‘the process which gives a military operation or exercise appropriate security, using passive or active means,
to deny an adversary knowledge of the dispositions, capabilities and intentions of friendly forces’. (AAP-6)
11
Security is dealt with in detail in Chapter 3.
108. Security principles are interrelated and should be considered together, noting
that some appear to act in opposition; for example, the need for security versus the
need for interoperability. The overriding premise throughout is to understand and
meet the commander’s requirements.
Operational Level
109. JDP 6-00 ‘Communications and Information Systems Support to Joint
Operations’ primarily addresses the provision of CIS at the Operational level; 12 that is,
providing CIS capability spanning strategic to tactical assets and at all scales of
operation to enable C2 between the Permanent Joint Headquarters (PJHQ), the
JTFHQ 13 and Component HQs. 14 A simplified diagram showing the principal HQ
engaged at this level of command is at Figure 1.2. Operating with other nations and
IOs may generate a more complex C2 structure than that shown at Figure 1.2; the
detail is considered in later chapters.
12
The Operational level is ‘that at which campaigns and major operations are planned, conducted and sustained to
accomplish strategic objectives within theatres or areas of operations’. (JDP 0-01.1)
13
A JTFHQ is ‘a purely national deployable joint headquarters of variable size commanded at the operational level by a
Joint Task Force Commander’. (JDP 0-01.1)
14
Components are ‘force elements grouped under one or more component commanders subordinate to the operational
level commander.’ (JDP 0-01.1)
staffs. Figure 1A.1 demonstrates the IM bridge between the infrastructure, upon
which the bulk of information resides, and its exploitation. Exploitation leads to
situational understanding that, when combined with experience and culture, results in
intuitive or reasoned risk assessment and decision-making. IM comprises:
c. Administering information.
5
R3 provide information to meet Campaign Rhythm decision-making requirements. They are directed by the chain of
command and may be automated or achieved through the maintenance of common databases or publishing to the web.
information needs are standard and are captured in SOPs/SOIs, but others are
operation-dependent and specifically identified.
a. The content, format and timeliness of outputs to deliver the effect, from
formal directives through R3 to the Joint Operations Picture (JOP).
Maintaining output currency is a prime consideration, in which case
modularity or use of databases is preferable to single long documents.
6
The Senior Information Officer (SIO) owns the information within the organisation, sets policy and culture and is
accountable for the quality, and provenance of the information produced. The SIO leads the organisation’s staff work
and is likely to be the Chief of Staff (COS) or equivalent.
203. Whilst the DCMO does not have dedicated CIS staff, it receives advice on J6
issues from Director Command and Battlespace Management/J6 (D CBM/J6). Within
a Comprehensive Approach (CA), the DCMO is responsible for integrating
Information Management (IM) techniques, infrastructure and connectivity with Other
Government Departments (OGDs), Non-Governmental Organisations (NGOs) and
International Organisations (IOs).
204. D CBM/J6 is the MOD’s Joint Customer for J6 strategic systems and Joint CIS
capabilities. A principal role of D CBM/J6 is to provide military strategic CIS
guidance, and advice on relevant CIS freedoms and constraints, leading up to and
during the formulation of any Joint CIS plan. The primary planning output from D
CBM/J6 is the CIS Annex to Chief of Defence Staff’s (CDS’) Directive. This Annex
nominates the supported and supporting commands, confirms the contribution of
Directorate General Information Systems and Services (DG ISS) as a supporting
1
JDP 01 ‘Joint Operations’ explains the principles that underpin the planning and conduct of campaigns and operations
by the UK’s Armed Forces. JDP 5-00 ‘Joint Operations Planning’ flows directly from JDP 01, and together with JDP 3-
00 ‘Joint Operations Execution’, form the UK authority on the conduct of deployed Joint operations.
agency, and provides high-level CIS direction to the Joint Commander (Jt Comd). It is
produced with input from DG ISS and in consultation with PJHQ.
205. From an early stage of crisis management and preparation for operations, D
CBM/J6 liaises with PJHQ J6 and DG ISS, and coordinates activity with Director
Special Forces (DSF) J6 staff. D CBM/J6 allocates military satellite terminal
equipment and satellite channels and sets high-level service restoration priorities. If
there is insufficient military bandwidth available, D CBM/J6, through DG ISS,
arranges support from other nations via a Memorandum of Understanding (MOU) or
uses other methods to secure services from another country or commercial provider.
206. D CBM/J6 also acts as the focal point for Computer Network Defence (CND)
and works with the Joint Security Coordination Centre (JSyCC) to ensure that any
Computer Network Attack (CNA) on CIS inside or outside the Joint Operations Area
(JOA) does not disrupt the Global Information Infrastructure (GII) supporting the
operation. Additional responsibilities include the provision of secure voice equipment
for Defence Attaches, and Foreign and Commonwealth Office (FCO) Posts at a time
of crisis.
209. DG ISS and FLCs satisfy Information Exchange Requirements (IER) for PJHQ
in order to meet the Commander’s Intent, and DG ISS provides end-to-end service
assurance for Defence CIS. DG ISS is engaged in operational planning with PJHQ J6,
Joint Force CIS (JFCIS) staff, DSF and FLCs from the earliest opportunity; the
210. Joint Commander. The Jt Comd, appointed by CDS, is usually the Chief of
Joint Operations (CJO) and he commands assigned UK forces on most deployed
operations. He also provides military advice to CDS and is responsible for liaison
with the MOD, allies, coalition partners and OGDs.
2
PJHQ or Commander JFCIS lead the Joint CIS Estimate, see Chapter 3.
3
The role of Design Authority is defined by JSP 440 ‘Defence Manual of Security’ as ‘A Single Point or Committee that
has the knowledge and the authority to ensure that technical decisions relating to the end-to-end Service delivery
architecture are informed and coherent with wider plans and future projections.’
4
This Section should be read in conjunction with JDP 3-00 (3rd Edition) ‘Joint Operations Execution’, programmed for
promulgation early 2008.
coordinates the CIS support required. The deployed SF J6 staff, signal unit, or
detachment commanders coordinate Joint Force CIS with Joint Task Force
Headquarters (JTFHQ) J6.
Terms of Reference at Annex 2B. When CDS’ Directive does not stipulate the need
for a dedicated Comd JFCIS, in a small-scale operation for example, then a post
should be nominated within JFHQ J6 or the J6 Division at PJHQ to fulfil the role. In
the case of concurrent operations, when more than one Comd JFCIS is required, they
are likely to be provided from 1 and 11 Signal Brigade (Sig Bde).
218. Joint Network Centre. An integral element of the JFCIS staff is the Joint
Network Centre (Jt NETCEN), which has responsibility for the management,
coordination, control and delivery of CIS across the JOA. The Jt NETCEN’s role is to
provide technical advice, undertake service, network and asset management, identify
risks to the required CIS capability, liaise with OGDs and implement Comd JFCIS’
direction. In a Joint Rapid Reaction Force (JRRF) deployment, a cadre of staff from
11 Signal Sig Bde form the core of the Jt NETCEN, augmented by personnel held at
graduated readiness in FLCs and DG ISS. In operations without a significant JRRF
contribution, the Jt NETCEN function is provided by the lead FLC. DG ISS acts in
support of the GOSCC to manage the operational network. Dependent on the CIS
design and the scale and nature of the operation, further augmentation may be required
from the Defence Computer Incident Response Team (DCIRT) and the Joint Data Link
Management Organisation (JDLMO).
Components
219. The UK’s JTF uses 5 Tactical-level Components whose individual size and
shape are determined by the operation. 7 These are the Joint Force Maritime, Land,
Air, Special Forces and Logistic Components (JFMC, JFLC, JFAC, JFSFC and
JFLogC).
221. Land Component. The Joint Force Land Component Commander (JFLCC)
and his staff may come from any Field Army formation. The JFLC HQ may be
augmented with strategic communication bearers and information systems to allow
integration into a Joint Force, but there is no standing JFLC J6 staff branch.
7
For more detail see JDP 3-00 (3rd Edition) – programmed for promulgation in early 2008.
8
These are: at the 2* level, COMUKAMPHIBFOR and COMUKMARFOR and, at the 1* level, COMUKTG,
COMATG and Commander 3 Commando Brigade. The commander of a smaller Task Group (TG) may also be
appointed the MCC, if appropriate.
Consequently, the planning, execution and integration of Land CIS capability relies
heavily on liaison between PJHQ, Comd JFCIS staff and HQ LAND.
222. Air Component. The standing Joint Force Air Component Headquarters
(JFACHQ) provides the Joint Force Air Component Commander (JFACC) and core
staff. Like the JFHQ, it is fully resourced and supported with CIS capability, elements
of which are held at very high readiness.
Note: All of the organisations shown, from the Strategic to Tactical level, either liaise or
work directly with civilian partner companies to deliver operational Communications and
Information Systems (CIS) capability. Paradigm Services is the Directorate General
Information Systems and Services’ (DG ISS) Private Finance Initiative (PFI) partner in
delivering an array of Information and Communications Services (ICS) for Defence,
including SKYNET Satellite Communications (SATCOM) and the ‘Welcome’ welfare
package for deployed personnel. Similarly, current and future Defence Information
Infrastructure (DII) is being delivered in partnership between the DG ISS and the
ATLAS consortium.
(INTENTIONALLY BLANK)
2B2. Comd JFCIS is appointed by the Joint Commander (Jt Comd), as detailed in
the CIS Annex of the Jt Comd’s Directive to the JTFC. The rank of the Comd JFCIS
is determined by the scale of the operation, the quantity and complexity of the CIS
support required, and by any representational considerations arising in multinational
operations.
e. Leading the CIS capability audit for the operation, facilitating the agreed
design of the CIS solution, and staffing Urgent Statements of User
Requirement (USUR) to PJHQ so that existing capability can be generated or
Urgent Operational Requirements (UORs) can be staffed.
g. Informing PJHQ J6 of all CIS issues and risks that may have impact at
the operational level, including the Alerting, Warning and Reporting of
1
Freedoms and constraints are derived from the Operational Estimate, and other sources such as doctrine and SOPs.
Where constraints are not specified, Comd JFCIS allows components the freedom to configure and operate CIS assets
provided they are not part of a wider network or Joint Force Command and Control integration.
incidents, including those from the Joint Network Centre (Jt NETCEN), as the
sub-Warning and Reporting Point (WARP).
1
PJHQ J5 should provide detailed guidance on the status of any UK force.
2
JSP 440 ‘Defence Manual of Security’.
3
The Component HQs for combined maritime, land, air, logistics and Special Forces (SF) operations.
4
For example, Non-combatant Evacuation Operations (NEOs) in Africa with France and Belgium, Op LANGER in East
Timor with Australia.
a. Availability. The ability of Host Nation (HN) civil and allied military
communications to support military operations, including peacekeeping
operations, depends upon the local situation. The lack of HN commercial
services usually requires the deployment of an alternative CIS solution to cater
for the majority of Information Exchange Requirements (IERs).
Communications support is often central to broader HNS, and this should be
coordinated centrally through J4 for inclusion in any Memorandum of
Understanding (MOU) or other agreements between the UK and the HN. It
will be necessary to obtain the appropriate clearances for spectrum use from
the HN as detailed in Annex 3B.
(INTENTIONALLY BLANK)
exploitation is a function for all the staff branches because it gets the most value out of
the information we have. The key is the common sharing, usage and re-usage of
information to support the provision of staff situational awareness and understanding,
planning, decision-making and the co-ordination of desired effects.
304. Risk Management. Managing the risk of single points of failure requires that
the planning process considers the primary, alternative, contingent and emergency
modes of working. This will require the allocation of sufficient resources to each
mode and that training in using these reversionary modes is conducted by both
specialist J6 and the wider staff. The risk must also be considered when assessing the
balance between information-rich static headquarters and the more limited
connectivity available to agile manoeuvring or mobile headquarters. The Joint Task
Force Commander (JTFC) owns these risks and mitigates them by balancing the
resilience of the information flow across the battlespace against the availability of
resources; requiring him to prioritise mission critical services. To manage the risk
requires a clear appreciation of the commander’s information needs and how they both
enhance his understanding and support his decision-making process. This
appreciation must inform and guide the development of staff processes and provision
of applications. Only through a combination of process and technology can effective
information management be achieved that delivers the right information, on time, in
the right place and in the correct format in order to exploit it.
306. While many of the commander’s information needs can be explicitly drawn
out of his statement of information needs and the operational estimate, others may be
implied or not immediately identifiable. The information services planning process
must test the completeness of the requirement by running a set of standard mission
threads against the proposed concept of operations, using the intended command and
control structure; identifying the totality of information flows required across the
battlespace. The combination of specified, implied and derived information needs
provide the foundation for developing the required information and communications
services architecture and eventual network design.
307. The rest of this Chapter describes the information services planning process
and explains how it contributes to the overall operational planning process. 3 It
emphasises the key deliverables and highlights the fundamental elements that are
required to fully enable, exploit and support information services on operations
SECTION II – LIFECYCLE
308. Planning and execution of information services are broken down into 4 phases
of prepare (discussed in this Chapter), deploy, operate and recover (discussed in
Chapter 4). These sub-headings derived from the High-Level Operational Concept are
broadly aligned with the information services lifecycle known as the Joint Information
Communications Services Operating Framework 4 (JICSOF). In outline these phases
are:
3
See JDP 5-00, Campaign Planning, (Edition 2).
4
The JICSOF is derived from Information Technology Infrastructure Library (ITIL) version 3. ITIL version 3 was
developed by the UK Office of Government Commerce and industry and is the most widely accepted approach to
information services management. The lifecycle consists of Strategy, Design, Transition, Operation and Continual
Service Improvement. The information services lifecycle can be mapped against the sub-headings used in this Chapter.
The strategy and design phases of the JICSOF aligned with the key elements of prepare. The operation phase in the
JICSOF is aligned with sustain. JICSOF transition appears twice; first, as the final part of the prepare continuing
through to deploy, and secondly, as part of recover. This is because both provisioning and retiring an information service
are both transitional activities. For an expeditionary operation the lifecycles align but during the sustain phase of an
enduring campaign the information services lifecycle will be continuously followed as new or updated services are
provisioned or old services are retired.
5
DISS is the Network Authority for all defence information architectures. It does this through its role as the Network
Capability Authority (NCA), Network Technical Authority (NTA) and Network Operating Authority (NOA) – See
paragraph 404 for more details.
6
The CIS Directive forms the J6 element of the JTFC Mission Directive.
issues that may affect delivery within the timelines prescribed in the CIS
Directive. Once full operating capability has been achieved for all the Joint
staff and components then Comd JFCIS will declare this to the commander and
PJHQ.
310. The information services planning process is shown at Figure 3.1. It should
start as early as possible; recognising that in the early stages of planning, key political
decisions may not have been made. The commander must clearly articulate his
information needs to achieve an effective and appropriate plan. Information services
planners will also require a full understanding of the information needs of staff
branches, components, subordinate levels of command, and other supported actors 9
7
C4ISR: C4 Intelligence Surveillance and Reconnaissance or Command, Control, Communications and Computation
Intelligence Surveillance and Reconnaissance. C4 ISR is the more common usage.
8
Intelligence, surveillance and reconnaissance.
9
Within a integrated approach military information services may require to support, or interact with, other government
departments, host nation and multinational partners. In addition the Special Forces (SF) component will be supported.
involved in the operation. This ensures that any limitations in delivering the required
information services can be used to inform the commander’s operational estimate.
Strategy
Information Problem
Needs Analysis
Transition
Comd’s
Build Network
Intent
Iterative
Prepare
Prepare
Feedback
Process IER 3 Stage Test and
Process Commission All
Services Prior to
Deployment
IS Plan
Operational Estimate
Design
Comd Jt
Development of NetCen/Ready
IS Estimate
Solutions to Deploy
Deploy
Provision
Services (T&C
Transition Continues)
Delivery and
Assurance Jt NetCen/
Information GOSCC
Services Agree In-Service
Approved
Directive
Operations
Operate Operate
Transition
Controlled Close
Down of Services
Recovery
Controlled Draw
Down of Network
Recover
312. The CIS Directive articulates the types and quantity of equipment that will be
needed to deliver the required information services. The designed solution, when fully
resourced, will meet the commander’s information needs. These include, for example
ISR dissemination and the reach of logistics services across extended lines of
communication both within theatre, inter-theatre and back to the UK, while throughout
continuing to enable effective C2. The final element of the prepare phase will be the
testing and commissioning of the PJHQ J6 endorsed information services solution
prior to deployment.
10
The information exchange requirement addresses the JTFC’s C4ISR requirements for the Joint Task Force, the
interaction of components and agencies as well as tasks required to enact the Campaign plan.
11
Output of Step 2a of the Operational Estimate.
12
Output of Step 2b of the Operational Estimate.
13
The information services requirement identifies the applications and core services (namely applications, e-mail, voice,
and so on) to meet the Users’ information needs.
14
The communication services requirement identifies the network systems (for example trunk (FALCON), satellite
(REACHER)) and infrastructure systems (for example DII (Future Deployed) and JPA) that deliver the applications and
core services identified in the information services requirement.
316. Mission Directive. The Joint Commander issues a Mission Directive to the
JTFC, expanding upon the military strategic direction in CDS’ Directive. The Joint
Commander is responsible for: giving further direction and advising the JTFC as
necessary; deploying, sustaining and recovering the force; and for monitoring and
reporting the progress of the campaign to CDS. The Joint Commander’s Mission
Directive normally includes a CIS Directive as an annex to the main document. 17
PJHQ J6 staff usually form the core elements of the JFCIS staff early in the
operational planning cycle to provide continuity throughout the operation.
15
For the purposes of this publication Comd JFCIS will be used to refer to the senior J6 representative deployed.
16
Normally, the SO1 J6 post within the standing Joint Task Force Headquarters (JTFHQ) will routinely fulfil the role of
Comd JFCIS for Disaster Relief Operations (DRO), Non-combatant Evacuation Operations (NEO) or during the early
stages of a larger operation. Alternatively, the SO2 G6 within a Spearhead Lead Element (SLE) force elements may
assume the role if the JTFHQ is not mobilised.
17
Small scale tasks often do not require a separate information services Annex; therefore IS will be covered under a
separate entry within the main body of the Mission Directive.
18
If a Comd JFCIS is not deployed because the scale of the operation does not require one or the nominated Comd JFCIS
is not available within the planning timelines; either SO1 J6 within the JTFHQ will subsume this role (if the JTFHQ is to
be deployed) or ACOS J6 at PJHQ will retain the responsibility.
key deductions, tasks and risks developed in the information services estimate must
feed the development of Courses of Action (CoA)s and the subsequent campaign plan
to ensure that they properly reflect the information exchange requirement and specific
information services considerations and limitations. This iterative process is the basis
for the detailed design, delivery and assurance of the information services plan. The
end product is promulgated in the J6 CIS Directive. The directive states how
information services will be deployed and managed within the JOA.
318. Capability deficiencies, identified during the information services estimate, are
addressed by CIO/J6-Ops, PJHQ or FLCs through the reallocation of assets or,
alternatively, through the UOR process. 19
320. The first and most important stage of the information exchange requirement
process is the analysis of the commander’s information needs to establish the
requirements of all organisations that are supported by information services during the
operation. The second stage, scaling analysis, derives the number of users for
individual information services. The third stage is the production of the information
service requirement and communications service requirement. The information
services requirement identifies the capability to access and manipulate the
information. When combined with the scaling requirements this starts to identify
discrete capabilities. The communications service requirement provides a broad
operational architecture and details how the network elements will be delivered to
meet the commander’s information needs. The information exchange requirement
process is at Annex 3B and is the baseline from which the solution is designed,
developed and delivered. The chosen solution balances the requirement for service
19
In accordance with Defence urgent operational requirement procedures.
20
If a Jt NETCEN is not deployed because the scale of the operation does not require one; either the Officer
Commanding (OC) of the Signal Squadron deployed in support of the JTFHQ (if they are deployed), or OC of the
Spearhead Lead Element (SLE) Signal Detachment or the Global Operations Security and Communications Centre
(GOSCC) will subsume the responsibility. For the purposes of this publication, Jt NETCEN will be used to cover all
these eventualities.
assurance and availability against acceptable cost, timescales for delivery and other
risks.
321. As the Network Authority, DISS leads the detailed design, delivery and service
assurance of the information services solution. DISS is supported by the Jt NETCEN
and other external stakeholders, such as: FLCs, Level 3 and 4 Support Organisations
and other military and commercial service providers. The objective of this process is
to deliver PJHQ with detailed planning guidance on the timeline and costs of service
delivery options to develop potential solutions. These potential solutions, which also
identify initial operating capability and full operating capability targets to support the
commander’s plan, are prioritised and endorsed by PJHQ J6/Comd JFCIS. Gap
analysis, conducted by DISS and front line commands against the overall requirement,
may identify capability shortfalls which are submitted as candidate urgent operational
requirements in accordance with extant procedures. As the planning progresses,
DISS’s focus shifts towards the fulfilment and delivery of the end-to-end services to
meet the information exchange requirement. DISS provides end-to-end assurance of
service delivery for systems under the organisation’s responsibility, including the
coherence of delivery between service providers.
Implementation
322. Comd JFCIS sets out the tasks and timelines required to implement the
information services solution. This includes dates for the achievement of initial
operating capability and full operating capability for particular information services
resources and detailing the priority services that will initially be required upon
deployment. Comd JFCIS continuously reviews the progress of design, its
implementation and any risks identified.
323. The CIS Directive, issued by Comd JFCIS, details the selected information
services solution, the information exchange requirement, information services
requirement, communication services requirement, freedoms and constraints and the
associated Reports, Requests and Returns required from J6 formations across the JOA.
It will also give the desired order of arrival. The CIS Directive is subject to
configuration control and is regularly updated to ensure the information services
solution continues to satisfy the operational requirement. The framework for the CIS
Directive format is at Annex 3C and forms the J6 Annex to the JTFC Mission
Directive.
SECTION V – CONSIDERATIONS
324. There are important planning considerations that complement the principles of
CIS. 21 These considerations cover operational, technical and personnel factors.
Additionally they inform the information services estimate.
326. Security. Two factors to consider are the ability of an opponent to disrupt
friendly information services and the prevention of inadvertent disclosure of
information. Operations Security (OPSEC) protects essential elements of friendly
information against disclosure to an opponent. OPSEC is tailored to specific threats
on individual operations and seeks to strike an appropriate balance between need to
know and duty to share information. 23 Information Assurance (IA) considers
protecting information and information services by ensuring their availability,
integrity, authentication and confidentiality, and includes measures to ensure physical
security. Information security covers technical security measures to protect
information while in electronic form, and includes computer security, communications
security and radiation security. 24 Details of specific considerations for the planning
process are at Annex D.
327. Warning Time. Warning time influences the depth and scope of information
services planning as well as force elements held at readiness. Short warning tends to
limit the ability of industry to deliver urgent operational requirements or other
capabilities. Contributions from FLCs may be limited to that held at extremely high
readiness or very high readiness. Conversely, long lead times allow the development
of in-depth solutions, with enhanced resilience, encompassing the broader application
of commercial information services solutions.
21
See Chapter 1
22
Permanent Joint Headquarters (PJHQ) J5 should provide detailed guidance on the status of any UK force.
23
JDP 3-80.1, OPSEC, Deception and PSYOPS.
24
Authoritative CIS Security Policy is detailed in Joint Service Publication (JSP) 440, Defence Manual of Security.
331. Host-Nation Support. Information services planning must take account of the
availability of host nation support across the JOA, as well as an understanding of the
interfaces required with the host government and its agencies. 27 Analysis includes
consideration of technical capabilities, the co-ordination of the Electromagnetic
Spectrum (EMS) between participating nations, arrangements for network (including
satellite communications) usage, and the potential use of other information services
provided by other government departments, international organisations and non-
governmental organisations. 28
332. Integrated Approach. It is important that commanders at all levels are able to
share information with non-military organisations. The information requirements of
other government departments, non-governmental organisations and international
organisations need to be captured as they are potential users of military information
services. The subsequent information services plan should facilitate a layered or
sectioned network to achieve interoperability within national and other government
departments. Although constrained by security considerations, this approach is
necessary to establish information flows across cultural divides, security gateways and
other barriers.
25
Equipment Programme (EP) funded equipment will be capable of working within adverse conditions.
26
If these cannot be provided or guaranteed, the resulting network will be less resilient and robust, which subsequently
leads to an increase in the number of personnel required to maintain the delivery of the CIS or the requirement for beyond
line of sight technology to be used at an increased cost to the operation.
27
PJHQ J4 should be consulted at an early stage and throughout planning when considering host nation support issues.
28
See Annex 2C for host nation support CIS matters; however, it should be noted that interoperability with outside
organisations is currently limited.
29
An austere information services environment (for example, limited in resilience and robustness due to force protection
issues) will require a larger support envelope than a rich information services environment where sufficient resilience and
robustness exists such that some loss of services can be tolerated.
interoperability with partners will have been included in the initial equipment
programme requirement although this may not provide a complete solution for a
specific operation. Therefore Comd JFCIS, PJHQ J6 or DISS must consider the
interoperability standards required during the planning process. Specifically the
planning process must consider: applications and databases and their associated data
standards; agreed technical protocols, configuration control, gateway management,
service management procedures, security and national caveats and common standard
operating procedures. Often a less capable solution that is interoperable with partners
is preferable to a more capable UK only solution. If a technical solution is not
available then information management and staff processes will need to be developed
to mitigate the risk.
32
Potential interference in the EMS that could impact radar, telemetry, Unmanned Aerial Systems (UAS) and radio
frequency capabilities.
33
Annex 1A provides a detailed insight into how Information Management (IM) is used to determine the information
needs and outputs of an operation.
References:
MISSION ANALYSIS
MISSION: (from Jt Comd’s Directive)
(When known, JTFC Planning Guidance, outline Concept of Operations and Main Effort can be included here.)
(The text included in the Considerations/Deductions and Tasks/Constraints is included for guidance purposes only)
Test the completeness of the requirements set by Information services issues not for JTFHQ
running a set of standard mission threads against must be briefed to components.
the CONOPS, using the intended C2 structure,
ORBAT and scheme of manoeuvre to identify the JTFC Main Effort must be reflected in
totality of information flows required across the information services Main Effort.
battlespace (and back into the business space where
applicable).
3. Constraints. Detail on constraints will be derived as part of the
Operational Estimate. Consider also constraints
already identified in JPG/JCP and doctrine (JDP)
or SOP.
a. Time. Disseminate information services planning
timeline.
(1) Time available for planning. Long lead times may be required if there is a Include Op Timeline and deductions in
requirement to generate commercial information Warning Order to Permanent Joint
(2) Operation timelines. Consider implications for PJHQ, Commands & Constraints relating to:
Units. Remember 1/3, 2/3 Rule (1/3 time to
conduct your planning – 2/3 time to conduct their - JTFHQ & Force deployment.
planning). - Operation Phases & Activities.
- Recovery or Relief.
b. Space.
(2) Jt force elements locations. How does the Joint Operations Area (JOA) and the
lines of communication (loc) of the deployed force
constrain or influence the information services
CONOPS?
Consider JTFHQ/National Contingent
Commander (NCC), Component HQs, Joint
Force Elements (JFEs), National Support
Element (NSE), Forward Mounting Base
(FMB), Airport of Disembarkation (APOD),
Seaport of Disembarkation (SPOD), Deployment
Operation Base (DOB), etc.
c. INFORMATION SERVICES Are there requirements for data separation,
Resources. closed user groups, compartmented information,
etc.?
(3) Host Nation (HN) information What is Global System for Mobile communications
services. (GSM) coverage?
e. CANNEL Alert State. What additional steps will be required to reach the
desired Information Security posture?
4. Has the Operational Environment Changed? (Since the Jt Comd’s Directive was received or the estimate completed.)
5. Commander’s Direction.
a. JTFC Planning Guidance. What planning guidance must be passed to PJHQ Complete Warning Order to PJHQ and
J6 & Components at this stage? Front Line Commands (FLCs).
b. CCIR/RFI. Are there information services related Ensure information services related CCIRs
Commander’s Critical and RFI are addressed.
Information Requirements (CCIR)/ Requests for
information (RFI)?
What CCIR/RFI will impact on the information
services CoA
and how? What are the J6 RFI?
e. Spectrum Utilistion. Determine the current usage of the spectrum in the Generate RFI – What is the usage of the
JOA.. spectrum in the JOA?
7. Adversary Forces. How do adversaries’ CoAs affect the information Task J2 to provide a specific electronic
services plan? threat assessment.
a. UK Joint Force. (JTFHQ, Mar, Land, Consideration must be given to inter-component Remember:
Air, Special Forces (SF), Logistics co-ordination staff. 1. Force C2 ((Combined (C)) JTFHQ, C2
(Log). Structure, coalition partners, allies).
2. Joint (and Coalition) activities.
3. Co-ordination & interoperability with
Allies.
b. Coalition. (Lead Nation, information
services
Framework Nation, UK NCC, UK NSE,
UK MAR/LAND/AIR/SF/Log).
c. Allies.
d. International, National and Non- Consideration should be given to the use of
Governmental Organisations. information services by such agencies as well as
the need for communications to and from them.
9. Information Operations.
a. Security – Protecting UK
Information and Network
Infrastructure.
(1) Electronic protection measures. In addition to considering the enemy threat,
consider issues relating to working alongside
coalition partners and allies.
(5) Information Security. Does the JTF require a Force INFOSEC Team A FIT would normally be deployed if the
(FIT)? JTFHQ were deployed and would work
alongside the deployed Computer Network
Is there a need for a deployed Monitoring and Defence (CND) effort, based in the
Reporting Centre (MRC)? NETCEN for Comd JFCIS.
b. Deception.
12. C2 of information services. What augmentation of the JTFHQ J6 or JFCIS/Jt Determine C2 arrangements for Joint,
NETCEN staff is required? operational level information services,
including relationship with ISS/GOSCC.
What Level 3 Support provision is required?
a. Command and control
arrangements.
All tasks should be identified as essential or optional. In addition, it may be helpful to prioritise essential tasks.
What tasks, advantages or disadvantage are common to all information services CoAs?
This can only be done when the JTFC has made his decision as to the CoA for the JTF.
An outline information services CONOPS, including Main Effort, is produced now.
The J6 officer on an Operation Liaison and Reconnaissance (OLRT) or advance party could answer many of them.
1. What limitations - physical or financial - are there on the JTF’s use of the Electromagnetic Spectrum (EMS)
Electromagnetic across the JOA?
Environment
Who and where is the local spectrum management authority?
What extant agreements exist for our use of the spectrum?
4. Other Agencies What information services do OGDs (including British Missions), NGOs and IOs have in the JOA?
5. Is a Force INFOSEC Team (FIT) survey required, and, if so, what capabilities will they need?
Request deployed CND capability commensurate with information services vulnerability report.
Security What are the accreditation requirements for the desired equipment?
Does the JTF require a Theatre Cryptographic Distribution Agency?
Is there suitable crypto available for coalition use?
6. What is the SATCOM footprint for all likely friendly military and civil satellites to be used (SKYNET,
INMARSAT etc)?
What cellular phone coverage is there in the JOA?
How reliable are the cellular networks?
What cellular protocols are used in the JOA (that is, GSM, DAMPS, analogue, WAP, GPRS, 3G) and in what
band?
Host nation Who are the main suppliers of cellular services in the JOA?
information Are cellular handsets readily available, what is the cost to hire and who are the best local suppliers?
services
How is the local telephone network provided and controlled?
What is the HN telephone socket format?
Who is our point of contact for local telephone network service provision?
Who are the main suppliers of PTT services in the JOA?
How reliable is the local telephone network?
What are the local telephone network call response times (International)?
What are the local telephone network call charges (international and local)?
What are the local telephone network engineering response times?
Is ISDN available and if so what type of ISDN protocols are used?
How are international trunks accessed, is it direct (IDD) or through an exchange?
What Local Internet Service Providers (ISPs) are available and are they reliable?
Host nation
information Which major International ISPs (CompuServe/AOL, etc..) are available?
services (continued) What are the host nation domestic electrical power standards and normal wall socket and plug formats?
What are the host nation frequency clearance procedures?
Do any MOUs or other agreements exist for SATCOM access?
Are there any bandwidth limitations/special baseband requirements?
Are there any local microwave interference issues?
SECTION I – INTRODUCTION
3B1. The information exchange requirement translates the commander’s information
needs (ends) through the development of an appropriate architecture of core services
and applications known as the information services requirement (ways). This provides
the foundation for developing the network design that is articulated in the
communications service requirement (means). This process, supported by the output
from the information services estimate, develops the detail required by information
services staff to provide robust and capable operational capability throughout all
phases of the campaign. To ensure maximum flexibility with limited capability and
within resources, the JTFC and his staff should articulate their information needs
rather than the process or systems they may already be familiar with.
J5 Led CPT
(with J6 Advice)
ISR
J6 Staff Support (Owned by J5,
and Advice developed by J6)
Gap Analysis
(J6 Lead)
CSR
(J6 Lead)
No
PJHQ J6
Review and Endorse
Yes
IS Solution
3B2. The 3-Stage information exchange requirement process ensures that all staff
branches contribute the necessary information at the appropriate time, as shown in
Figure 3B.1. 1
3B3. Analysis of Information Needs. The analysis of the information needs is the
first and most important stage of the information exchange requirement process and
aims to identify the ways of working required between the organisations supporting an
operation. This requires the identification of: what information the commander needs,
in what timeframe (real-time, near real-time or higher latency); how is it presented, to
what level of depth or detail, how accurate does it need it to be; and who does it need
to be shared with (multinational, host nation, other governmental departments and so
on)? This analysis defines the transfer and sharing of information between staff
branches within the JTFHQ and components, including special forces, headquarters
and other formations both inside and outside the JOA. It should include other
government departments, coalition partners, international organisations and non-
governmental organisations. While many of the commander’s information needs can
be explicitly drawn out of his statement of information needs as well as the operational
and information services estimate, others may be implied or not immediately
identifiable. The analysis provides the foundation for developing the required
architecture and eventual network design, and constitutes the rationale for all
information services requirements. J1-9 staffs must provide the underpinning
information required for the analysis with J6 staff providing support and advice as
required.
3B4. Scaling Analysis. Scaling Analysis is the second stage in the information
exchange requirement process. It details the number of personnel associated with each
formation and how many of them require concurrent access, grouped against generic
information services. Again, staff branches must provide the appropriate information,
with the support of J6/JFCIS staff.
3B5. Components. Component commands conduct their own analysis and ensure
that the resulting information exchange requirement for their information services is
incorporated in a timely manner into the overall campaign information exchange
requirement and is passed through their front line commands into the J5-led
contingency planning team.
and infrastructure equipment. Any gaps in capability can then be fed back to the
commander to prioritise his information needs or request that additional capability is
provided; often this is will require a urgent operational requirement process.
Representative examples of a completed information services requirement and
communication services requirement are at Appendices 3B1 and 3B2 respectively.
(INTENTIONALLY BLANK)
a. Area. The group name of the working area, i.e. J1 within the JTFHQ or A1
within the Air Component Headquarters.
c. Core Services. 2 These are the core tools that users will require on a daily
basis that will be delivered on every operation. The number represents how many
users, by each area, require access.
d. Application Services. This area captures the generic application set that the
user will require access to. For example, Human Resources (HR) will result in
delivery of the most appropriate HR application, not necessarily a specific one.
This information enables J6 to deliver the CIS that can meet the operational
requirement, while maintaining the integrity of the system, delivering services with
in-built resilience and reducing pre-deployment training overheads. The cells
should be completed with either yes (Y) or no (N) to identify each area’s access
requirements.
e. Locations. The location boxes will enable J6 to identify who the users need
to communicate with most and how best to enable those services. The locations
should be broken down by order of priority, for example component commands may
be their highest priority, then UK, then NATO headquarters, etc.
3B1.2. J6 staff will advise and support all staff branches during completion of the
information services requirement, to ensure all users’ information needs have been captured
and accurately articulated. Upon completion, the information services requirement will
form the basis of identifying any gaps in capability, which could result in urgent operational
requirement action, and used to develop the communications services requirement which is
covered in detail at Appendix 3B2.
1
Generic term to identify a coalition system specifically designed for the operation.
2
Services those are normally available through the appropriate service catalogue.
File Reference:
Other time zones in which elements of the Force are located should also be detailed.
SITUATION
1. Situation. [Detail as required to set the context for CIS staff required to satisfy
the IXR.]
2. Mission. The Joint Task Force (JTF) is to….[a clear, concise statement of the
task of the command and its purpose].
b. Scheme of Manoeuvre. [This should describe how the JTFC sees the
Campaign Plan unfolding. The JTFC should explain where, when and how the
JTF will achieve its purpose, so that subordinates can understand what their
particular role is in the overall plan and the effects they are to achieve.]
which a JTFC makes his overall intent clear to his subordinates and will usually
be supported by the allocation of resources in order to give substance to that
which he considers crucial to the success of his mission.]
INFORMATION SERVICES
7. Threat to CIS. A clear articulation of the threat to CIS in the JOA is essential
from the outset to ensure that all the security factors are considered, safeguards
established and information appropriately assured. The threat statement includes the
opponent’s ISTAR threat (for example, SIGINT) and Cyber Threat within the JOA
and globally as it applies to the operation.
JFCIS MISSION
EXECUTION
END-STATE
9.
1
Described in Annex 3B to this publication.
10. Intent.
11. SoM.
14. Comd JFCIS is delegated OPCON of all information services within the JOA,
with the exception of the following (for example SF CIS 2 and SATCOM 3 ), to support
the JTFC’s Intent and Main Effort. To achieve this, Comd JFCIS directs the
disposition and usage of CIS within the JTF, regardless of origin or ownership.
15. Key Principle. Where constraints have not been specified by the Network
Operating Authority or PJHQ, Comd JFCIS allows components the freedom to
configure and operate information services to support local Comds, but this only
applies to capability which is not part of a wider network or Joint Force C2
integration.
2
The reallocation of SF CIS requires Director SF approval.
3
Strategic satellite communications (SATCOM) capability remains OPCOM with CIO/J6-Ops and CJO retains OPCON.
It cannot be delegated.
a. Point-to-point service.
c. Air-to-ground.
d. Shore-ship.
e. Ship-ship.
28. This section covers both Joint and multinational interoperability of systems and
services at all levels of command (Strategic, Operational and Tactical). A detailed
Interoperability Matrix is included at Annex G.
TASKS
29. Jt NETCEN.
30. JTFHQ.
31. All Component Commands. To remove repetition, tasks that apply equally to
all CCs should be described here.
32. MCC.
33. LCC.
34. ACC.
35. JFLogCC.
CO-ORDINATING INSTRUCTIONS
38. Timings.
SUSTAINABILITY PLAN
50. CSO.
56. EMCON.
Ack: Authenticate:
NAME NAME
Rank Rank
JTFC Comd JFCIS
Annexes:
A. JTF C2.
B. JTF Liaison Matrix.
C. Task Organisation.
D. IXR.
E. Core Information Services Architecture.
F. Services Delivery Plan.
G. Interoperability Matrix.
H. JFCIS Risks.
I. Restoration Priorities.
J. Engineering Recovery Plan.
K. Formal Messaging Plan.
L. Jt Mission Essential and Critical Equipment.
Distribution:
JFMCC AmphibFor
JFLCC 11 Sig Bde
JFACC 90 SU
JFLogCC J3 Ops Sp
Jt NETCEN
JFEngr
Copy to:
CIO/J6-Ops
PJHQ
JTFHQ
FLCs (via PJHQ)
HQ DSF
ISS
(INTENTIONALLY BLANK)
3D5. Risk Management. The Joint Task Force Commander (JTFC), advised by
Comd JFCIS, balances the implications of reduced IA against the required operational
tempo. The establishment of an IA Officer enables Comd JFCIS to provide
appropriate risk management advice. Effective Security Risk Management (SRM)
ensures that risk owners are aware of the level of risk they are holding and the impact
should an incident occur.
1
OPSEC is the process which gives a military operation or exercise appropriate security, using passive or active means,
to deny an enemy knowledge of the dispositions, capabilities and intentions of friendly forces. (AAP-6).
2
A formal statement confirming that the use of a system meets extant security requirements and that its use does not
present any unacceptable risk. (JSP 440, Defence Manual of Security).
3D-1
JDP 6-00
3D7. Allied and Coalition Communications. When UK and allied forces operate
together, secure communications are usually provided in accordance with Allied
Communications Publications (ACPs). For coalition operations, the lead nation
generally determines appropriate INFOSEC. National CIS remains subject to national
CIS Security Policy.
3D9. Operations Security. OPSEC is a J3 lead, but has close ties to J6:
3
Depending on the risks identified and the prevalent threat to CIS, Comd JFCIS may request a Force INFOSEC Team
(FIT) to deploy as part of the JTFHQ J6/JFCIS for all or part of an operation.
4
An IA technique formerly known as ‘COMSEC Monitoring’.
3D-2
JDP 6-00
d. Force Entry. Radio silence is often appropriate during force entry and
compliance with the Emission Control (EMCON) plan is essential.
3D-3
JDP 6-00
Computer Security
3D-4
JDP 6-00
Communications Security
3D13. Communications Security (COMSEC) measures are specialised protective
security measures taken to ensure the confidentiality, authentication, non-repudiation
and integrity of information in communications channels. On operations, COMSEC
procedures are designed and issued as JTF-level instructions, particularly if they differ
from Standard Operating Procedures (SOPs). Most COMSEC procedures are detailed
in the CIS Directive, but it may be appropriate to produce a specific instruction on
COMSEC depending on the scale and classification of the operation. Such an
instruction covers the duties and responsibilities for COMSEC, but emphasises:
3D14. Measures that indicate the levels of information leakage and that help deny an
opponent the opportunity to electronically eavesdrop include:
6
For example, 591 Signals Unit at RAF Digby and ISS DE3A EST at Blandford.
3D-5
JDP 6-00
Cryptographic Security
3D16. Specially devised methods or processes, usually called cryptosystems, are used
to protect information in communications channels. Cryptosystems are used to
conceal the content of communications and their effectiveness depends on the strength
of the cryptologist used, the overall protection given to the cryptosystem and the
correct use of operating procedures. Specific guidance on cryptographic security is
published in BMD/0001/0001 the Defence Cryptosecurity Operating Instructions and
JSP 440. UK national instructions are compatible with the corresponding NATO
Cryptographic Security Instructions published in Allied Military Security General
(AMSG) 293 and Allied instructions contained in ACP 122(E) Information Assurance
for Allied Communications and Information Systems.
Radiation Security
3D18. RADSEC manages the risk associated with radio signals, both intentional and
unintentional. Compromising emanations, when intercepted and analysed, may
disclose protectively marked information. An essential element of RADSEC is
TEMPEST, the investigation and study of unintentional emanations. In addition, it is
important to conceal the radio frequencies to be used by UK forces, normally
conducted in conjunction with the Battlespace Spectrum Management (BSM) Plan.
3D-6
JDP 6-00
3D20. Networks are susceptible to attack from a wide range of opponents: directly
from individuals, terrorists and Foreign Intelligence Services (FIS); and indirectly
from malicious code such as viruses. The risk of attack becomes more acute as
frontline capability becomes increasingly network enabled.
3D21. The most likely method of electronic attack against information services is
through gateways with other systems. Access could be made via the information
systems of third parties, such as allies, industry or other government departments,
which are connected to military systems. Indirect attacks may be made against
services upon which military activities depend. CND is used to counter attacks and is
defined as actions taken within an overall IA framework to deter, protect from, react
to and recover from a CNA or CNE on MOD’s computer networks. Threats to
information hosted on the MOD’s computer networks are categorised in Figure 3D.2:
3D22. Although CND can detect and respond to threats from the lower 3 categories in
Figure 3B.2, its operational focus is on the top 2 categories of FIS and elite hackers. A
balanced and cost-effective mix of CND measures is deployed to counter these threats
to provide credible defence against CNA. These measures are:
3D-7
JDP 6-00
3D-8
JDP 6-00
3D25. EMCON is complex, given the plethora of CIS involved. A JTF depends
heavily on the EMS for communications, surveillance, target acquisition and weapons
guidance. The benefits of radio silence are balanced against the need for effective
Command and Control (C2).
3D-9
JDP 6-00
(INTENTIONALLY BLANK)
3D-10
JDP 6-00
3E2. BSM is primarily a J3 function 2 and the process through which the EMS,
within the Electromagnetic Environment (EME), is controlled. BSM is discussed in
JDP 3-70 Joint Battlespace Management 3 and supporting Joint Force Operating
Procedures (JFOPS) for Joint (Jt) BM. The following information relates to BSM
within the context of Joint Force Communications and Information Services (JFCIS)
and Frequency Management.
e. Tactical Data Links Authority (TDLA), for example Links 11 and 16.
1
Allied Communications Publication (ACP) 190(B) Guide to Spectrum Management in Military Operations.
2
J5 or J6 can also undertake the BSM role depending on the operation in hand.
3
Programmed for promulgation in early 2008.
3E-1
JDP 6-00
3E4. Additionally, there may be a requirement to liaise and co-ordinate with Non-
Governmental Organisations (NGOs), International Organisations (IOs) or Private
Military Security Companies (PMSCs), who characteristically use radio
communications and commercially available ECM(FP) equipment.
3E6. Initial planning for a Joint Force identifies the information exploitation
requirement. Those elements of the information exchange requirement that require
EMS allocation are co-ordinated and consolidated into the force spectrum bill or EMS
resource requirement. This requirement is passed to the BSM Cell to consolidate all
spectrum requirements and liaise with the host nation (HN) civil spectrum
management authority to gain approval. In a multinational operation, consolidation of
all multinational force spectrum requirements and liaison with host nation is done by
CBSMC on behalf of all participating nations’ military forces.
3E8. Once a host nation issues spectrum assignments or allotments, they are sub-
issued to the appropriate requesting authority. For example, assignments and
4
Such as the Foreign and Commonwealth Office or Department for International Development may be deployed with a
JTFHQ, separately, or as an Inter-agency Planning Team (IAPT), as part of an integrated approach.
3E-2
JDP 6-00
3E9. The BSM organisation depends on the size and scale of each operation;
however, Figure 3C.1 offers generic guidance on the BSM organisational structure
within a medium or large scale JTFHQ. BSM is based on interpretation of the
Commander’s Intent, operational priorities and an intelligence assessment of the EME.
BSM, therefore, requires significant coordination with the J2, J3 and J6 staff branches.
In this example, the Joint Task Force Commander (JTFC), through Jt BM staff and
BSM Spectrum Working Group (SWG), empowers the BSM Cell to manage the EMS
throughout the JOA in order to ensure minimal restrictions are applied to friendly
forces. BSM SWG composition and BSM Command and Control (C2) structure
diagrams are at Figures 3E.2 and 3E.3 respectively.
Defence Spectrum
Centre
J3 Ops SP
BSM / EWCC / ECM(FP)
(Spectrum Use, Planning
and De-confliction)
Coordination with Coordination with
Non-military users Civil Authorities
J2 - Intelligence Coordinated
Navigation
Collection Plan use of the EME
Warfare
and ISTAR coord by the force
J3 - EWCC
(EA,ES,ED)
J3 - Targeting J6 - CIS
Coordination with Other spectrum Coordination with
Coalition Partners stakeholders TDLA, GCO, Lead Nation
OGD, Media Ops, Info Ops
3E-3
JDP 6-00
3E-4
JDP 6-00
403. Command and Control. The command states of all information service
assets are detailed in the CIS Directive. Normally Comd JFCIS assumes operational
command of all strategic assets 2 and theatre information services capabilities assigned
to the operation (SF excluded 3 ). Tactical information services assets usually remain
under operational command of their assigned formations. In effect Comd JFCIS acts
as a service provider of strategic and operational level information services to a range
of customers; who may then have their own bespoke tactical systems. The key
1
IOC will be the minimum CIS required for the headquarters to commence work. FOC will be the fully resilient solution
identified within the information exchange requirement to meet the JTFC’s requirements.
2
With the exception of strategic satellite communications (SATCOM) capability remaining OPCOM with CIO/J6-Ops
and CJO retaining OPCON.
3
However, Special Forces (SF) and other government departments requirements will be investigated during the planning
stages to identify if consolidation of IS is feasible. There will be a requirement to deliver SF LO specific VOICE and
DATA capability within the Joint Task Force Headquarters (JTFHQ).
principle for discharging this responsibility is that unless Comd JFCIS specifically
issues any constraints, subordinate commanders have the freedom to configure and
operate information services to meet their local needs (provided that the capability is
not part of a wider network or forms part of the joint force information exploitation
effort). It should also be noted that maritime-based operations will be supported in a
different way due to the additional limitations associated with maritime platforms;
however, the principles outlined throughout the deploy, operate and recover phases
should be adhered to.
404. Governance. The Network Authority (NA) is responsible for the coherence,
performance and integrity of all aspects of the Defence network, and the information
flows it enables, to support the operational and business needs of Defence. The
Network Authority comprises the following three sub-authorities:
4
The intention is for the NCA to engage with other capability sponsors on a ‘green card’ basis i.e. collaboratively
account for information needs from the outset. The NCA reserves the right to adopt a ‘Red Card’ approach in the event
of wilful non-conformity by which it will articulate risks present in a particular course of action or programme/project
through its relationship with the scrutiny group and Secretariat Equipment Capability.
408. Service Management. Service providers should be clear about how to apply
technical direction and escalate issues. Comd JFCIS is responsible for producing
service management and assurance concept of operations (CONOPS) for the operation
in line with standing ISS publications. The CONOPS will be outlined in the CIS
Directive that will assign specific service management and assurance responsibilities
in the JOA for the Jt NETCEN and Component J6 staffs. Service assurance policy and
direction is provided by DISS, via the Network Operating Authority (NOA) issued by
CIO/J6-Ops, and is reflected in DISS Publications. Information service users are
provided with procedures to report faults and service providers should have
instructions on how to manage and report service delivery.
411. Reports, Requests and Returns. The requirement for Reports, Requests and
Returns (R3) is articulated in directives and instructions issued by headquarters at
every level of command, with Comd JFCIS’ requirements set out in the CIS
Directive. 7 JFCIS R3 should be fully aligned with the theatre battle rhythm. Comd
JFCIS’ staff should pay particular attention to the information services contributions to
the JTFHQ Assessment Report and JTFHQ Down Report.
412. Situational Awareness. During the campaign, Comd JFCIS seeks to gain and
maintain the situational awareness 8 required to react rapidly to changing situations,
which should include a detailed view of the information services situation and of the
campaign as a whole. Integration into the JTFHQ Campaign Rhythm, as well as the
reports and returns process, augmented by other tools and techniques, serves to
improve Comd JFCIS’ staff’s situational awareness. Additional tools include:
(4) A summary of key events and tasks over the next 24 hours.
7
ASSESSREPS, DOWNREPS, Logistics Reports, Personnel Reports, Operational Record Reports, Serious Incidents
Reports.
8
Situational Awareness is the understanding of the operational environment in the context of a commander’s (or staff
officer’s) mission (or task). (JDP 0-01.1, UK Supplement to the NATO Terminology Database, 8th Edition)
(5) Comd JFCIS’ intent and guidance for the next 96 hours.
Enduring Campaigns
414. Planning During an Operation. Under the direction of Comd JFCIS his staff
conducts planning throughout a campaign; a planning process that follows the same
stages described in Chapter 3. The commander’s information needs are continually
reviewed. If required Comd JFCIS will direct a review of the information services
estimate to deliver an updated information exchange requirement thereby ensuring that
changes to the JTFC’s scheme of manoeuvre, main effort and force laydown are
supported by an appropriate information services plan. Comd JFCIS and his staff
within the JOA lead the planning in consultation with PJHQ J6, FLCs and DISS,
supported by the service providers and their staff. DISS, as the Network Authority, in
consultation with Comd JFCIS, approves the information services solution’s design,
although PJHQ retains ownership of the requirement and associated risk. DISS, as the
design authority, is then responsible for assuring E2E connectivity and service
delivery. This condensed information services planning environment requires close
coordination and active risk management to underpin operational success.
421. Handover of Responsibility. As the campaign develops, the JTFC may need
to transition responsibilities to an indigenous force or multinational follow-on force.
Careful planning and co-ordination with the incoming nation’s information services
staff will ensure capability is sustained during the transition phase. CIO/J6-Ops and
PJHQ J6 should assess whether it is appropriate to leave UK CIS equipment in place
to assist the follow-on force, which may require gifting policy direction from PJHQ
and MOD.
422. Recovery. The recovery of forces from theatre involves significant logistic
effort, changes to information services capability, potential contractorisation or
commercialisation and the drawdown or cessation of services. Comd JFCIS’ staff
require early and close engagement with J4 staff to achieve a full appreciation of the
JTFC’s recovery plan to ensure that capability is maintained at the appropriate level
throughout. Areas that should be considered are:
Concept of Operations
A clear and concise statement of the line of action chosen by a commander in order to
accomplish his mission. (AAP-6)
Control
That authority exercised by a commander over part of the activities of subordinate
organisations, or other organisations not normally under his command, which
encompasses the responsibility for implementing orders or directions. All or part of
this authority may be transferred or delegated. (AAP-6)
Coordinating Authority
The authority granted to a commander or individual assigned responsibility for co-
ordinating specific functions or activities involving forces of two or more countries or
commands, or two or more services, or two or more forces of the same service. He
has the authority to require consultation between the agencies involved or their
representatives, but does not have the authority to compel agreement. In case of
disagreement between the agencies involved, he should attempt to obtain essential
agreement by discussion. In the event he is unable to obtain essential agreement he
shall refer the matter to the appropriate authority. (AAP-6)
Host Nation
A nation which, by agreement:
a. Receives forces and materiel of NATO or other nations operating on/from or
transiting through its territory;
b. Allows materiel and/or NATO organizations to be located on its territory;
and/or
c. Provides support for these purposes. (AAP-6)
1
JDP 0-01.1 ‘United Kingdom Glossary of Joint and Multinational Terms and Definitions’, AAP-6 ‘NATO Glossary of
Terms and Definitions’.
Host-Nation Support
Civil and military assistance rendered in peace, crisis or war by a host nation to NATO
and/or other forces and NATO organizations which are located on, operating on/from,
or in transit through the host nation’s territory. (AAP-6)
Information
Information is the meaning that an individual associates with data, presented in
context. Information combined with experience, interpretation and reflection,
generates knowledge and thereby enables effective us of the information, in decision-
making for example. (JDP 6-00)
Information Assurance
The confidence that the information within the Defence Community is maintained
reliably, accurately, securely and is available when required. (JSP 440)
Information Exploitation
The use of information to gain advantage and improve situational awareness to enable
effective planning, decision-making, and coordination of those activities required to
realise effects. (JDP 6-00)
Information Management
Integrated management processes and services that provide exploitable information on
time, in the right place and format, to maximise freedom of action. (JDP 6-00)
Information Superiority
Possessing a greater degree of information about the battlespace, being able to exploit
the information more rapidly and preventing the adversary from obtaining or
exploiting information which could give combat advantage. (JDP 0-01.1)
Integration
In CIS usage, the act of putting together, as a final item, various components of a
system in such a way that the combination of separate systems, capabilities and
functions can operate effectively, singly or in concert, without adversely affecting the
other elements. (JDP 6-00)
Intelligence
The product resulting from the processing of information concerning foreign nations,
hostile or potentially hostile forces or elements, or areas of actual or potential
operations. The term is also applied to the activity which results in the product and to
the organization engaged in such activity. (AAP-6)
Interoperability
The ability to operate in synergy in the execution of assigned tasks. (AAP-6)
Joint Commander
The Joint Commander (Jt Comd), appointed by CDS, exercises the highest level of
operational command (OPCOM) of forces assigned with specific responsibility for
deployment, sustainment and recovery. (JDP 0-01.1)
Mission
A clear, concise statement of the task of a commander and its purpose. (AAP-6)
Operation
A military action or the carrying out of a strategic, tactical, service, training, or
administrative military mission; the process of carrying on combat, including
movement, supply, attack, defence and manoeuvres needed to gain the objectives of
any battle or campaign. (AAP-6)
Operational Command
The authority granted to a commander to assign missions or tasks to subordinate
commanders, to deploy units, to reassign forces, and to retain or delegate operational
and/or tactical control as the commander deems necessary. Note: It does not include
responsibility for administration. (AAP-6)
Operational Control
The authority delegated to a commander to direct forces assigned so that the
commander may accomplish specific missions or tasks which are usually limited by
function, time or location; to deploy units concerned, and to retain or assign tactical
control of those units. It does not include authority to assign separate employment of
components of the units concerned. Neither does it, of itself, include administrative or
logistic control. (AAP-6)
Operations Security
The process which gives a military operation or exercise appropriate security, using
passive or active means to deny the enemy knowledge of the dispositions, capabilities
and intentions of friendly forces. (AAP-6)
Situational Awareness
The understanding of the operational environment in the context of a commander’s (or
staff officer’s) mission (or task). (JDP 0-01.1)
Standardisation
The development and implementation of concepts, doctrines, procedures and designs
in order to achieve and maintain the compatibility, interchangeability or commonality
which are necessary to attain the required level of interoperability, or to optimise the
use of resources, in the fields of operations. (AAP-6)
Tactical Command
The authority delegated to a commander to assign tasks to forces under his command
for the accomplishment of the mission assigned by higher authority. (AAP-6)
Tactical Control
The detailed and, usually, local direction and control of movements or manoeuvres
necessary to accomplish missions or tasks assigned. (AAP-6)
TEMPEST
The investigation and study of unintentional emanations from classified systems.
(JSP 440)
(INTENTIONALLY BLANK)
LEXICON OF ABBREVIATIONS
ACP Allied Communications Publication
ACPT Agency Contingency Planning Team
APOD Airport of Disembarkation
ASSESSREP Assessment Report
AWR Alert Warning and Response
BM Battlespace Management
BSM Battlespace Spectrum Management
DA Design Authority
D CBM Director(ate) Command and Battlespace Management
DCDS(C) Deputy Chief of Defence Staff (Commitments)
DCDS(EC) Deputy Chief of Defence Staff (Equipment Capability)
DCIRT Defence Computer Incident Response Team
DCMC Defence Crisis Management Centre
DCMO Defence Crisis Management Organisation
DCN Defence Communication Network
DCM Defence Crisis Management
DEC Directorate of Equipment Capability
DE&S Defence Equipment & Support
DFID Department for International Development
DG Info Director General Information
DG ISS Director(ate) General Information Systems and Services
DG ISSP DG ISS Publication
DIS Defence Intelligence Staff
DM Defensive Monitoring
DOA Desired Order of Arrival
DOAST Desired Order of Arrival Staff table
DOP Defence and Overseas Policy
D Ops Director Operations
DOWNREP Down Report
DSF Director Special Forces
D Strat Plans Director Strategic Plans
EA Electronic Attack
EBA Effects-Based Approach
ECM Electronic Counter Measure
ECM(FP) Force Protection Electronic Counter Measure
ED Electronic Defence
EEFI Essential Elements Friendly Information
ELINT Electronic Intelligence
EMCON Emission Control
EME Electromagnetic Environment
EMS Electromagnetic Spectrum
EP Electronic Protection
EPM Electronic Protection Measure
ES Electronic Support
ESM Electronic Support Measure
EU European Union
EW Electronic Warfare
EWCC Electronic Warfare Coordination Cell
HF High Frequency
HN Host Nation
HNS Host-nation Support
HQ Headquarters
IA Information Assurance
ICS Information and Communications Services
IDS Intrusion Detection System
IER Information Exchange Requirement
IFA Information Flow Analysis
IM Information Management
INFOSEC Information Security
Info Ops Information Operations
IO International Organisation
IOC Initial Operational Capability
IP Internet Protocol
IPT Integrated Project Team
IS Information Systems
KV Key Variable
LO Liaison Officer
SA Situational Awareness
SATCOM Satellite Communications
SF Special Forces
SFCC Special Forces Component Commander
Sig Bde Signal Brigade
SIGINT Signals Intelligence
SIO Senior Information Officer
SOFA Status of Forces Act
SOI Standing Operating Instructions
SoM Scheme of Manoeuvre
SOP Standard Operating Procedure
SOR Statement of Requirement
SofS Secretary of State
SPG Strategic Planning Group
SPOD Seaport of Disembarkation
SRM Security Risk Management