没有合适的资源?快使用搜索试试~ 我知道了~
3-12-AFDP-CYBERSPACE-OPS.pdf
需积分: 1 0 下载量 55 浏览量
2024-05-22
11:32:19
上传
评论
收藏 1.35MB PDF 举报
温馨提示
![preview](https://dl-preview.csdnimg.cn/89338876/0001-4b1f1ba75b8e94c0dcddd5034f30ba16_thumbnail.jpeg)
![preview-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/scale.ab9e0183.png)
试读
42页
这份文件是《AIR FORCE DOCTRINE PUBLICATION 3-12: CYBERSPACE OPERATIONS》,即美国空军教义出版物3-12,关于网络空间作战。 该文件详细阐述了美国空军在网络空间领域的组织、规划、执行、评估以及相关的政策、角色和责任。
资源推荐
资源详情
资源评论
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![azw3](https://img-home.csdnimg.cn/images/20210720083646.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![7z](https://img-home.csdnimg.cn/images/20210720083312.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pptx](https://img-home.csdnimg.cn/images/20210720083543.png)
![zip](https://img-home.csdnimg.cn/images/20210720083736.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![pdf](https://img-home.csdnimg.cn/images/20210720083512.png)
![](https://csdnimg.cn/release/download_crawler_static/89338876/bg1.jpg)
XX Month 2021
AIR FORCE DOCTRINE PUBLICATION 3-12
CYBERSPACE OPERATIONS
1 February 2023
![](https://csdnimg.cn/release/download_crawler_static/89338876/bg2.jpg)
Air Force Doctrine Publication 3-12, Cyberspace Operations
Air Force Doctrine Publication 3-12,
Cyberspace Operations
Table of Contents
Chapter 1: AIR FORCE CYBERSPACE OPERATIONS ............................................... 1
UNDERSTANDING CYBERSPACE ............................................................................ 2
CYBERSPACE OPERATIONS ................................................................................... 6
CYBERSPACE OPERATIONS CHALLENGES .......................................................... 9
THREATS TO CYBERSPACE OPERATIONS .......................................................... 10
U.S. NATIONAL CYBERSPACE POLICY ................................................................ 11
Chapter 2: ORGANIZATION, ROLES, AND RESPONSIBILITIES .............................. 13
DOD CYBERSPACE OPERATIONS FORCES ......................................................... 13
FORCE PRESENTATION AND EMPLOYMENT ...................................................... 15
COMMAND AND CONTROL OF CYBERSPACE FORCES ..................................... 17
Chapter 3: PLANNING, EXECUTION, AND ASSESSMENT ....................................... 21
CYBERSPACE OPERATIONS CONSIDERATIONS ACROSS THE COMPETITION
CONTINUUM ............................................................................................................. 21
CONSIDERATIONS FOR OCO, DCO, AND DODIN OPERATIONS ........................ 23
COORDINATING INTERAGENCY CYBERSPACE OPERATIONS .......................... 26
THREAT RESPONSE AND TARGETING ................................................................. 27
ASSESSMENT OF CYBERSPACE OPERATIONS .................................................. 28
Appendix A: POLICY, DOCTRINE, AND AUTHORITIES RELATED TO
CYBERSPACE OPERATIONS ..................................................................................... 30
Appendix B: ADDITIONAL AIR FORCE CYBERSPACE ROLES AND
RESPONSIBILITIES ..................................................................................................... 36
REFERENCES .............................................................................................................. 39
![](https://csdnimg.cn/release/download_crawler_static/89338876/bg3.jpg)
Air Force Doctrine Publication 3-12, Cyberspace Operations
“The Air Force organizes, trains, and equips forces to be an air component to a
joint force commander (JFC). As part of the joint force’s air component, our
forces must be prepared to accomplish JFC objectives. The air component com-
mander’s administrative authorities are derived from Title 10, U.S. Code, and
exercised as the commander, Air Force forces (COMAFFOR). The air compo-
nent commander’s operational authorities are delegated from the JFC and exer-
cised as both the COMAFFOR, over Air Force Forces, and as the functional joint
force air component commander (JFACC), over joint air forces made available
for tasking. Thus, the air component commander leads Air Force forces as the
COMAFFOR and the JFC’s joint air operations as the JFACC. This duality of
authorities is expressed in the axiom: Airmen work for Airmen and the senior
Airman works for the JFC.”
-- Air Force Doctrine Publication (AFDP) 1, The Air Force
For simplicity, the Air Force service component commander (COMAFFOR)
to the Joint Force Headquarters-Cyber (JFHQ-C) will be referred to as the
“cyberspace air component commander” throughout this AFDP.
![](https://csdnimg.cn/release/download_crawler_static/89338876/bg4.jpg)
Air Force Doctrine Publication 3-12, Cyberspace Operations
1
CHAPTER 1: AIR FORCE CYBERSPACE OPERATIONS
Cyberspace is a global domain within the information environment (IE) consisting of the
interdependent networks of information technology infrastructures and resident data, in-
cluding the internet, telecommunications networks, computer systems, and embedded
processors and controllers. Joint Publication (JP) 3-12, Joint Cyberspace Operations de-
scribes cyberspace operations as the employment of cyberspace capabilities where the
primary purpose is to achieve objectives in or through cyberspace. Whether enabling
peaceful military activities during cooperation, supporting Air Force information capabili-
ties during competition, or used during armed conflict to gain operational advantage, cy-
berspace operations are conducted across the competition continuum to achieve as-
signed objectives and secure US national interests.
Cyberspace operations create effects along lines of operation and lines of effort con-
sistent with combatant command (CCMD) and service priorities. Cyberspace operations
can be executed independently, or integrated with operations in other domains, to achieve
primary, complementary, or enabling effects. Additionally, cyberspace operations ensure
the confidentiality, integrity, and availability of vital command and control (C2) networks
and the Department of Defense (DOD) Information Network (DODIN). Military operations
in cyberspace are organized into missions, through a combination of actions, that create
effects to achieve a commander’s objectives. Air Force cyberspace forces support these
objectives through the conduct of offensive cyberspace operations (OCO), defensive cy-
berspace operations (DCO), and DOD information network (DODIN) operations.
All Air Force operations rely on cyberspace, a domain that is increasingly challenged and
contested. Like control of the air, control in cyberspace provides the joint force freedom
of action and reduces vulnerability to enemy attacks, both within the cyberspace domain
and across other domains. Achieving and maintaining advantage in cyberspace is a foun-
dational component of overall operational and strategic advantage, especially for opera-
tions against peer and near-peer adversaries. Because of cyberspace’s complexity,
global superiority is not achievable. In some cases, even localized superiority may be
impractical. To ensure success in joint all-domain operations (JADO), commanders
should expect contested cyberspace operations and account for anticipated capabilities
degradation.
We must train Airmen to bring air, space, and cyber capabilities
together with all the other elements of a strategic military cam-
paign…cyber forces protect the nation every day…and the Air
Force is central to the way the nation operates relative to defend-
ing the networks and having those capabilities available to a
president.
-- General David Goldfein,
21st Chief of Staff,
United States Air Force
![](https://csdnimg.cn/release/download_crawler_static/89338876/bg5.jpg)
Air Force Doctrine Publication 3-12, Cyberspace Operations
2
UNDERSTANDING CYBERSPACE
Cyberspace is unlike the naturally-bounded domains of air, land, maritime, and space. To
persist, cyberspace requires continued attention from humans. Cyberspace is a man-
made domain, wholly contained within the IE, and encompasses the features of specific-
ity, global scope, and an emphasis on the electromagnetic spectrum (EMS). Cyberspace
segments are connected and supported by physical infrastructure, electronic systems,
and portions of the EMS. Physical cyberspace nodes reside in every domain. Generally,
cyberspace networks are interdependent. However, parts of these networks are isolated
via protocols, firewalls, encryption, and physical separation from other networks.
Activities in cyberspace can enable freedom of action for activities in the other domains,
and activities in the other domains can create effects in and through cyberspace. As new
systems and capabilities are developed, they may use increasing portions of the EMS,
have higher data processing capacity, and speed, and leverage greater bandwidth. Sys-
tems may also be designed to change frequencies (the places where they operate within
the EMS) as they manipulate data. Thus, physical maneuver space exists in cyberspace.
1
Cyberspace-enabled capabilities are essential elements of military operations—critical
enablers of all-domain synergistic effects.
CYBERSPACE OPERATIONS, THE INFORMATION ENVIRONMENT, AND
INFORMATION WARFARE
For the USAF, cyberspace operations are considered one of six principle information war-
fare (IW) capabilities presented to the joint force to conduct and support operations in the
information environment (OIE)
2
. Because cyberspace is defined as wholly contained
within the IE, cyberspace operations are often conflated with OIE. Rather, OIE combines
cyberspace operations and other information activities and capabilities to create effects
in support of joint operations throughout the operating environment. Cyberspace opera-
tions can be conducted independently or synchronized, integrated, and deconflicted with
other information capabilities and activities for more effective OIE.
3
1
For additional information on the “Physical, Syntactic, and Semantic layers of Cyberspace” see Con-
quest in Cyberspace,” Libicki, Martin C., RAND Corporation, Cambridge University Press, 2007.
2
Per JP 3-04, Information in Joint Operations, OIE are military actions involving the integrated employ-
ment of multiple information forces to affect drivers of behavior.
3
JP 3-12. Joint Cyberspace Operations.
Cyber-enabled OIE Against ISIS
Integrating cyberspace operations with the employment of other information capa-
bilities enables scalable effects against targets commanders may otherwise lack
options for. Joint Task Force Ares achieved this against the Islamic State of Iraq
and Syria (ISIS) during Operation GLOWING SYMPHONY by integrating multiple
disciplines to create confusion and distrust within ISIS and working closely with
mission partners to dismantle its web-based operations.
剩余41页未读,继续阅读
资源评论
![avatar-default](https://csdnimg.cn/release/downloadcmsfe/public/img/lazyLogo2.1882d7f4.png)
![avatar](https://profile-avatar.csdnimg.cn/c7c91d301515410a8a3a0934d147c0ef_qq_29607687.jpg!1)
网络研究观
- 粉丝: 7349
- 资源: 2314
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助
![voice](https://csdnimg.cn/release/downloadcmsfe/public/img/voice.245cc511.png)
![center-task](https://csdnimg.cn/release/downloadcmsfe/public/img/center-task.c2eda91a.png)
安全验证
文档复制为VIP权益,开通VIP直接复制
![dialog-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/green-success.6a4acb44.png)