From the Director U. S. Army Capabilities Integration Center


Appendix C Relationship of CWMD Required Capabilities to Alternative Taxonomies



Download 0.5 Mb.
Page18/19
Date05.08.2017
Size0.5 Mb.
#26528
1   ...   11   12   13   14   15   16   17   18   19

Appendix C

Relationship of CWMD Required Capabilities to Alternative Taxonomies



C-1. Future required capabilities

Future required capabilitites listed in chapter 5 bin into the taxonomies found in three other sources: The NMSCWMD, JICCWMD, and TRADOC Pam 525-3-5. Each of these sources significantly influenced CCP analysis, and they describe CWMD from different perspectives. The bins in the selected taxonomies include:


a. The eight mission areas in the NMSCWMD.
b. The four lines of operation (LOOs) defined in the JICCWMD (fight for intelligence, shape and assure, impose cost, and deny benefits).
c. The five protection tasks identified in TRADOC Pam 525-3-5 (detect, assess, decide, act, and recover).
(1) A description of the NMSCWMD mission areas was discussed earlier. Descriptions of taxonomy elements in the other two sources follow. This information, taken from the source documents, helped support assignment of required capabilities into the various structure elements.
(2) The JICCWMD uses LOOs to help visualize the intended progress of the joint force toward achieving operational and strategic objectives. LOOs define the orientation of the force in time and space or purpose in relation to an adversary or objective. One way the JFC might consider designing his LOOs is through application of the central idea of this JIC, that being to impose costs or deny benefits or to influence the perception of costs, benefits, and value of restraint for any WMD related course of action. In this construct, the JFC would derive four LOOs.
(a) Fight for intelligence. These directed military and nonmilitary actions seek to obtain detailed knowledge about WMD actors, their actions, intentions, and their enabling networks. This fight for intelligence activities complement DOD and National intelligence campaigns and may require the JFC to conduct overt, covert or clandestine actions specifically designed to provoke a response that illuminates the adversaries’ networks, intentions, support activities, and personalities. These actions also seek overall SA of all potential WMD actors, state or non-state, known, anticipated or unknown.
(b) Shape and assure. These actions prepare the operational environment for future operations by shaping the perceptions, influencing the behavior of WMD actors and promoting cooperation with CWMD allies in order to assure combating WMD success. The effects of singular actions or cumulative effects of multiple actions may be decisive, causing the WMD actor to forgo development, acquisition, or employment, or they may establish conditions with partners and allies that enable other LOOs to be decisive.
(c) Impose cost. These actions apply, or demonstrate the ability to apply, destructive and disruptive military capabilities against a WMD actor under conditions that range from uncertain to hostile. These actions produce both kinetic and non-kinetic effects and increase the political and resource costs to WMD actors. The JFC designs these actions to defeat a hostile actor’s attempts to proliferate, gain, deploy, or employ WMD and to dissuade these hostile actors from future WMD related activities. The demonstrated ability to execute these actions may influence WMD actors’ perception of potential costs for pursuing a particular course of action and thus may have a deterrent effect.
(d) Deny benefits. These are activities to defend, respond, and recover from WMD use or demonstrate the capability to do so. They include coordination, integration, synchronization and execution actions that reduce U.S., allied, and partner vulnerabilities to WMD attack and that minimize the effects (for example, physical and functional) of WMD use. This LOO denies or threatens to deny political or military benefits for WMD possession or use. The demonstrated ability to execute these actions may have a deterrent effect on WMD actors.
(3) TRADOC Pam 525-3-5 defines the five protection tasks as:
(a) Detect. Detect includes an ability to sense the full range of friendly and hostile air, ground, CBRN, electronic and intelligence activities to provide real time SA enabling 360° hemispherical protection. To detect, military forces must collect timely, unambiguous, and accurate data on adversary capabilities and actions planned or employed against friendly personnel, assets, or information.
(b) Assess. Assess includes the ability to recognize, classify, and identify data and information upon detection to correctly formulate procedures and drive courses of action, enabling the ability to decide. Protection assessment will include the ability to share friendly and adversary information relevant to the operational environment, in order to facilitate SU.
(c) Decide. Decide is the ability to reach an appropriate judgment after planning and analyzing courses of action. The decide function also includes the ability to task, monitor, and change an action after a decision has been made.
(d) Act. Act includes the capability to execute the subtasks of active and passive measures to protect the force, and may include both offensive and defensive operations. These measures can be proactive or reactive, and include the ability to execute warning of both friendly and enemy actions.
(e) Recover. Recover includes actions taken during or after an event to restore, in a minimum amount of time, all capabilities that protect personnel, assets, and information. When directed, recovery includes support to interagency and multinational partners, domestic and foreign civilians, and their infrastructure.

C-2. Cross Cutting Relationships

The cross cutting relationships of the required capability statements from table 5-1 to NMSCWMD mission areas, JICCWMD LOOs, and TRADOC Pam 525-3-5 protection tasks are provided in table C-1.



Table C-1

CWMD Required Capabilities Crosswalk







Download 0.5 Mb.

Share with your friends:
1   ...   11   12   13   14   15   16   17   18   19




The database is protected by copyright ©ininet.org 2024
send message

    Main page