Skip to main content

Contribute to the Digital Deskbook!

Submit your comments here for evaluation by the TJAGLCS National Security Law Department and possible fast-track inclusion in the Digital Deskbook!

Chapter 10: INFORMATION OPERATIONS


Chapter 10

Information Operations

I.     Introduction

A.   Overview. Statutory and doctrinal changes in the area of information operations necessitate a careful and detailed practice in this area. Practitioners should resolve to be diligent in their research and appreciate the myriad aspects of information operations. Congressional action on information operations is in response to the challenges of the current security environment where strategic competitors pursue national objectives and advantage through the information environment. The threat posed by strategic competitors demands an integrated response that considers a military option. Judge advocates practicing in this area should stay abreast of new laws (codified in 10 U.S.C. § 397 (notes)[1]) and new doctrine (new Joint Publication 3-04, Information in Joint Operations (2022)[2]), which will continue to change and update to address the challenges posed by threats and activities in this area.

In military operations, information plays a critical role. Formerly, Information Operations (IO) were “the integrated employment, during military operations, of information related capabilities (IRCs) in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.”[3] The term “IRC” referred to those tools, techniques, or activities that are inherently information-based or primarily focused on affecting the information environment.[4]

Prior IO doctrine  proved too narrow and often times lacked sufficient prioritization in planning and operations (which brought about the changes contained in JP 3-04).[5] Operations in the information environment are “[m]ilitary actions involving the integrated employment of multiple information forces to affect drivers of behavior.”[6] Practitioners in this area should also read up on other U.S. Government Agencies such as Department of State and understand the roles and responsibilities of the U.S. Country Team. This chapter provides an overview of common information activities and the supporting information forces, along with potential legal issues.

Potentially as important as the references in this area may be the framework to address legal issues in this area. Judge advocates practicing in this area need to be diligent about ascertaining the background of the activity through a common set of baseline questions (for example see list of questions in Chapter 9). 

B.    Information Activities (formerly Information -Related Capabilities[7])

1.    Public Affairs (PA): “Communication activities with external and internal audiences.”[8]

a.    Discussion: “PA activities and IO support JFC objectives; counter adversary propaganda, misinformation and disinformation; and deter adversary actions.  Although both PA and IO staffs plan public information activities and conduct media analysis, IO differs with respect to their authorities regarding domestic and international populations, scope, and intent.”[9] PA provides truthful and accurate information regarding U.S. intentions and actions both to U.S. and foreign audiences.[10]  PA aims exist in tension with OPSEC (restrict disclosure), MILDEC (deceive the adversary), and to an extent MISO (provide select information to influence, not merely inform).  At the same time, PA and IO must maintain sufficient distance within the staff to avoid any appearance of propagandizing U.S. audiences or undermining the command’s credibility.[11]

b.    Potential Legal Issues: Requirement that information be truthful; Prohibitions on use of funds for publicity or propaganda purposes within the United States or to influence U.S. public opinion.[12]

c.    Operational Guidance: Annex F to the OPLAN addresses Public Affairs.[13]

2.    Civil Affairs (CA):  “Joint forces conduct [civil military operations (CMO)] and civil affairs operations (CAO) to enable unified action.”[14]  CMO are “[a]ctivities of a commander performed by designated military forces that establish, maintain, influence, or exploit relations between military forces and indigenous populations and institutions by directly supporting the achievement of objectives relating to the reestablishment or maintenance of stability within a region or host nation.”[15]  CAO are “[a]ctions planned, coordinated, executed, and assessed to enhance awareness of, and manage the interaction with, the civil component of the operational environment; identify and mitigate underlying causes of instability within civil society; and/or involve the application of functional specialty skills normally the responsibility of civil government.”[16]  While CA is the primary coordinators and synchronizers of CMO and CAO, other joint forces, including legal support, “play major roles in supporting CMO.”[17]

a.    Discussion: “The joint force conducts CMO to facilitate military operations by establishing, maintaining, influencing, or exploiting relationships between military forces and the civilian populace.”[18]

b.    Potential Legal Issues: Mission overlap with other USG agencies and at operational and tactical levels, legal advisors must ensure support does not undercut USG and command objectives, as defined in theater or operational orders, plans, and other guidance. Legal advisors must also ensure that the DoD uses its appropriated funds for the correct missions. There are several statutory and policy requirements and limitations for CMO.[19]  “[R]estraints on CMO will exist during [security cooperation] based upon bilateral agreements the [United States] has with given countries.  Most agreements prevent interference with HN internal affairs.”[20]  “Within the realm of [Defense Support to Civil Authorities], CMO is limited to the support rendered by DOD to domestic civilian authority.”[21] Practitioners should also avail themselves of Chapters pertaining to Operational Funding and the Fiscal Law Deskbook.

c.    Operational Guidance: Annex G to the OPLAN addresses Civil-Military Operations.[22]

3.    Military Information Support Operations (MISO): “[P]lanned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals in a manner favorable to the originator’s objectives.”[23] Judge advocates should start with the positive law for the conduct of MISO by citing to 10 U.S.C. §§ 164 and 167, and also be aware of congressional oversight procedures enacted in December 2022 contained in 10 U.S.C. § 398 and 399. For other service legal publications referencing MISO, practitioners should examine relevant sections from The Commander’s Handbook on the Law of Naval Operations[24] and The Air Force Cyber Law Primer.[25]

a.    Potential Legal Issues: U.N. Charter (jus ad bellum analysis whether an action or message constitutes a threat of force under Article 2(4)); Law of Armed Conflict (jus in bello compliance with treaties and customary norms, e.g., rules on treachery and perfidy,[26] as well as prisoner of war and detainee treatment[27]); Communications Law (international law prohibiting harmful interference with radio broadcasts, and domestic or foreign laws regulating broadcasting); Law of the Sea (restricting pirate radio broadcasts and delineating territorial boundaries); Intelligence, Privacy, and Free Speech Laws (primarily domestic, restricting the state’s use of certain methods, targets, or actors to gather information, and preserving freedom of expression); Other U.S. domestic law restrictions (e.g., attribution vs. covert action,[28] copyright and trademark restrictions, and prohibition on propaganda directed at U.S. audiences,[29] State Department public diplomacy mission); and international agreements (e.g., on status of forces) or foreign domestic law, which may place limits on activities of military information support units.

b.    Operational Guidance: Generally contained in Appendix 3 to Annex C of the OPORD or OPLAN.[30]  MISO generally proceeds under approved MISO programs.  A MISO series is nested under a MISO program.  In creating a MISO series, PSYOP planners must conduct research and analysis of critical information, develop themes and messages, and recommend methods of production and dissemination of the MISO product. When planning dissemination to an approved target audience, the staff must consider the most effective type of MISO product for a particular area; for example, leaflets, radio broadcasts, TV broadcasts, SMS messages, and/or internet-based products may each work better as delivery platforms in certain areas of the world than they would in others.  Furthermore, MISO products must not be directed at domestic (i.e., U.S.) audiences.  Legal advisors assist both in developing programs and series and in ensuring products compliance.

4.    Military Deception (MILDEC): “[A]ctions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission.”[31]

a.    Discussion: “MILDEC has been an aspect of warfare since antiquity.”[32]  Military Deception operations have been used throughout history.  Famous examples include the Trojan Horse and World War II efforts to divert attention from Normandy for the D-Day invasion.  The focus of MILDEC is desired behavior—not merely to mislead, but to cause adversaries to behave in a manner advantageous to the friendly mission, such as misallocating resources, attacking at a time and place advantageous to friendly forces, or avoiding action at all.[33] MILDEC is unique from other information activities, and is controlled on a strict need-to-know basis due to the sensitive nature of its plans, goals, and objectives.[34]

b.    Potential Legal Issues: U.N. Charter (jus ad bellum analysis whether actions constitute a threat or use of force under Article 2(4), or an armed attack under Article 51 that justifies actions in self-defense); Law of Armed Conflict (jus in bello compliance with treaties and customary norms, particularly those governing ruses and perfidy and protection of civilians and civilian property);[35] Neutrality Law (including both a sovereign nation’s right to remain neutral in armed conflicts and its obligation to prevent use of its territory to stage attacks); Communications Law (requiring, in peacetime, non-interference with certain state infrastructures and broadcasts); Intelligence, Privacy, and Free Speech Laws (primarily domestic, restricting the state’s use of certain methods, targets, or actors to gather information and preserving freedom of expression). For purposes of 50 U.S.C. § 3093, military deception techniques constitute a traditional military activity.[36]  Military Deception actions cannot intentionally target or mislead the U.S. public, Congress, or the U.S. media.[37]

c.    Operational Guidance: Generally contained in Appendix 3 to Annex C of the OPORD or OPLAN.[38]

5.    Operations Security (OPSEC): “OPSEC is a standardized process designed to meet operational needs by mitigating risks associated with specific vulnerabilities in order to deny adversaries critical information and observable indicators. OPSEC identifies critical information and actions attendant to friendly military operations to deny observables to adversary intelligence systems.”[39]

a.    Discussion: OPSEC facilitates IO’s mission to ‘protect our own’ information and decision-making.  Beyond information, the OPSEC process also serves to protect personnel and physical assets. Other IRCs and non-IO communities frequently satisfy OPSEC requirements to mitigate vulnerabilities.[40]

b.    Potential Legal Issues: Counter Intelligence investigations; Freedom of Information Act (FOIA); Unauthorized disclosures of information. “OPSEC practices must balance the responsibility to account to the American public with the need to protect critical information. The need to practice OPSEC should not be used as an excuse to deny noncritical information to the public.”[41]

c.    Operational Guidance: May be contained in Appendix 3 to Annex C of the OPORD or OPLAN, though other sections or annexes of the OPLAN may also discuss OPSEC.[42]

6.    Joint Electromagnetic Spectrum Operations (JEMSO):  “JEMSO are military actions undertaken by a joint force to exploit, attack, protect, and manage the electromagnetic operational environment (EMOE)” to achieve the commander’s objectives.[43]

a.    Discussion: EW may utilize technologies such as jamming equipment that have an effect in the physical domain, and JEMSO must consider international, foreign, and domestic rules allocating and protecting frequencies in the EMS. “All nations have a sovereign right to allocate the EMS as needed to support their national interests.”[44] The successful conduct of operations requires the JFC to work with the nation at issue to balance these rights with the need to maintain security of United States and multinational forces.”[45]

b.    Electromagnetic Warfare: EW refers to any military action involving the use of electromagnetic (EM) and directed energy to control the EM spectrum or to attack the adversary. It includes three major subdivisions: Electromagnetic Attack (EA), Electromagnetic Protection (EP), and Electromagnetic Warfare Support (ES).[46] EW contributes to the success of IO by using offensive and defensive tactics and techniques in a variety of combinations to shape, disrupt, and exploit adversarial use of the EM spectrum while protecting friendly freedom of action in that spectrum.[47]

(1)  Electromagnetic Attack (EA): The use of EM energy, directed energy, or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying adversary combat capability. It is considered a form of fires.  EA platforms may also be used to deliver MISO messages in inaccessible terrain; rather than jamming a frequency with static, the platform broadcasts an approved MISO message to an approved target audience.

(2)  Electromagnetic Protection (EP): Actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of EM spectrum that degrade, neutralize, or destroy friendly combat capability.

(3)  Electromagnetic Warfare Support (EWS): Actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated EM energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations.

c.    Potential Legal Issues: Particularly for EW, U.N. Charter (jus ad bellum analysis whether act constitutes a threat or use of force under Article 2(4), or an armed attack under Article 51 that justifies actions in self-defense); Law of Armed Conflict (jus in bello compliance with treaties and customary norms governing weapons, tactics, targeting, and protection of civilians and civilian property); Neutrality Law (including both a sovereign nation’s right to remain neutral in armed conflicts and its obligation to prevent use of its territory to stage attacks).  For all aspects of JEMSO, Communications Law (international, foreign, and domestic, regulating the EMS and requiring, in peacetime, no harmful interference with certain state infrastructures and broadcasts);[48] Law of the Sea (delineating territorial boundaries); Free Speech Laws (primarily domestic, preserving freedom of expression); Criminal Law (primarily domestic or foreign, prohibiting certain interferences with broadcasts); and National Security Law (attribution vs. covert action). Due to the continued expansion of wireless networking and the integration of computers and radio frequency communications, there will be operations and capabilities that blur the line between CO, signals intelligence (SIGINT), and EW and that may require case-by-case determination whether the activity is SIGINT and, when EW and CO are assigned separate release authorities.

d.    Operational Guidance: Generally contained in Appendix 3 to Annex C of the OPORD or OPLAN.[49] 

7.    Key Leader Engagement (KLE): “KLEs are deliberate, planned engagements between US military leaders and the leaders of foreign audiences that have defined objectives, such as a change in policy or supporting the JFC’s objectives.”[50]

a.    Discussion: “These engagements can be used to shape and influence foreign leaders at the strategic, operational, and tactical levels, and may also be directed toward specific groups such as religious leaders, academic leaders, and tribal leaders; e.g., to solidify trust and confidence in US forces.  At the tactical level, such engagements may be referred to as “Soldier and leader engagements.” KLEs may be applicable to a wide range of operations such as stability operations, counterinsurgency operations, noncombatant evacuation operations, security cooperation activities, and humanitarian operations. When fully integrated with other IRCs into operations, KLEs can effectively shape and influence the leaders of foreign audiences.”[51]

b.    Potential Legal Issues: Vary according to the engagement. Watch for overpromising or making promises that cannot legally, ethically, or fiscally be fulfilled; or accidentally concluding international agreements without authorization. Consult the relevant chapters in this Handbook on these subjects. Regarding IO specifically, U.S. forces must observe the U.N. Charter and Law of Armed Conflict obligations, including those regarding threats, ruses, and perfidy.

c.    Operational Guidance: No specific annex is currently dedicated to key leader engagements.  

8.    Combat Camera (COMCAM):  “(COMCAM) provides operational imagery; supports combat, information, humanitarian, special force intelligence, engineering, legal, and public affairs requirements; provides imagery that supports strategic, operational, and tactical levels of war; speeds decision making; and facilitates the vertical and horizontal flow of information.”[52]

a.    Discussion:  COMCAM provides unique benefits at all levels of military operations.  Some of these benefits include recording “engagements for historical purposes,” preparing “future public affairs or MISO products,” and countering “threat propaganda.”[53] As a general precaution, units should avoid using the same footage for both MISO and public affairs products, as it can blur the distinction between the two. “If combat camera assets are not available, units can designate one or more Soldiers to use unit-issued or personal cameras.”[54]

b.    Potential Legal Issues:  The most common legal issues with COMCAM are related to how the unit chooses to use the footage.  Footage of captured, wounded, or deceased personnel should not be used in a manner that would constitute humiliating or degrading treatment.[55]  Additionally, units “must have a procedure in place for the review, clearance, and disposition of any images taken.”[56]

c.            Operational Guidance:  No specific annex is currently dedicated

 

[1] 10 U.S.C. § 397 (containing a section on “Conducting of Military Operations in the Information Environment” which provides new language expressly exempting information operations as a traditional military activity from the Covert Action statute in 50 U.S.C. § 3094).

[2] Chairman, Joint Chiefs of Staff, Joint Pub. 3-04, Information in Joint Operations (14 Sept. 2022, [hereinafter Joint Pub. 3-04] (available on JEL+). This new issued doctrine establishes information as a seventh joint function (finally incorporating GEN Dunford’s 2017 change to Joint Publication 1) and also supersedes terms such as information related capabilities.

[3] Chairman, Joint Chiefs of Staff, Joint Pub. 3-13, Information Operations at x (27 Nov. 2012, Incorporating Change 1, 20 Nov. 2014) (rescinded) [hereinafter Joint Pub. 3-13]. These terms used in the previous publication should not be discarded because of the use in statute of undefined terms that may be linked to these terms and may be useful to practitioners.

[4] U.S. Dep’t of Army, Field Manual 3-13, Information Operations, para. 1-14 (6 Dec. 2016) [hereinafter FM 3-13].

[5] See Joint Pub. 3-04, supra note 2 at I-9.

[6] Chairman, Joint Chiefs of Staff, Joint Concept for Competing, 66 (10 Feb. 2023).

[7] Cyberspace Operations and Space Operations are two common information activities that are addressed more completely elsewhere in this handbook. However, judge advocates should be aware of the potential crossover between cyberspace operations, space operations, and information operations. Because of the crossover, judge advocates should be particularly attuned to properly characterizing the operation, the authority to conduct the type of operation, and the potential for information fratricide. Judge advocates should also be aware of the term cyberspace electromagnetic activities (CEMA). CEMA “is the process of planning, integrating, and synchronizing cyberspace and electronic warfare operations in support of unified land operations.” U.S. Dep’t of Army, Techniques Pub. 3-13.1, The Conduct of Information Operations para. 3-14 (Oct. 2018).  CEMA is “not an IRC in and of itself; cyberspace operations and EW operations are IRCs. Through CEMA, the Army plans, integrates, and synchronizes these missions, supports and enables the mission command system, and provides an interrelated capability for information and intelligence operations.” Id.

[8] Chairman, Joint Chiefs of Staff, Joint Pub. 3-61, Public Affairs at GL-6 (17 Nov. 2015, incorporating Change 1, 19 Aug. 2016) [hereinafter Joint Pub. 3-61].

[9] Joint Pub. 3-61, supra note 16 at II-7–8.

[10] See id. at I-7 to I-9.

[11] See Joint Pub. 3-61, supra note 16 at II-9 (noting PA and IO “are separate functional areas.”).

[12] 10 U.S.C. § 2241a, “Funds available to the Department of Defense may not be obligated or expended for publicity or propaganda purposes within the United States not otherwise specifically authorized by law;” see, e.g. U.S. Dep’t of Army, Field Manual 3-61, Communications Strategy and Public Affairs Operations, para. 7-72 (25 Feb. 2022).

[13] Joint Chiefs of Staff, Joint  Publication 5-0, Joint Planning, at A-8 (Dec. 2020) [hereinafter Joint Pub. 5-0].

[14] Chairman, Joint Chiefs of Staff, Joint Pub. 3-57, Civil-Military Operations at I-3 (9 Jul. 2018) [hereinafter Joint Pub. 3-57].

[15] Id. at GL-6.

[16] Id.

[17] Id. at I-17.

[18] Id. at I-9.

[19] See, e.g., U.S. Dep’t of Def., Directive 5132.03, DOD Policy and Responsibilities Relating to Security Cooperation (29 Dec. 2016); U.S. Dep’t of Def., Directive S-3321.1, (U) Overt Psychological Operations Conducted by the Military Services in Peacetime and in Contingencies Short of Declared War; Chairman, Joint Chiefs of Staff, Instr. 3214.01E, Defense Support for Chemical, Biological, Radiological, and Nuclear Incidents on Foreign Territory (28 May 2015); U.S. Dep’t of Def., Directive 3000.07, Irregular Warfare (IW) (28 Aug. 2014, incorporating Change I, 12 May 2017); CJCSI 3210.06A, Irregular Warfare (25 Sep. 2015); Chairman, Joint Chiefs of Staff, Instr. 3710.01B, DOD Counterdrug Support 26 Jan. 2007); U.S. Dep’t of Def., Directive 3600.01, Information Operations (2 May 2013, incorporating Change I, 4 May 2017).

[20] Joint Pub. 3-57, supra note 24 at I-4.

[21] Id.

[22] Joint Pub. 5-0, supra note  at A-8.

[23] Chairman, Joint Chiefs of Staff, Joint Pub. 3-13.2, Military Information Support Operations, at GL-4 (21 Nov. 2014).

[24] U.S. Dep’t of the Navy, The Commander’s Handbook on the Law of Naval Operations, 4.4.9.1 (Mar. 2022) [hereinafter NWP].

[25] Royal A. Davis III, et.al., Air Force Cyber Law Primer, Air University Press 89 (Nov. 2022).

[26] Examples of MISO-related conduct violating the prohibitions on treachery and perfidy include advertising a bounty for an enemy’s death, broadcasting to an enemy that an armistice has been agreed upon when such is not the case, feigning surrender to facilitate an attack, or threatening an enemy that no survivors will be taken. See Convention Respecting the Laws and Customs of War on Land and its Annex: Regulations Respecting the Laws and Customs of War on Land, arts. 23–24, Oct. 18, 1907, 36 Stat. 2277, 205 Consol. T.S. 277, entered into force and for the United States 26 Jan. 1910 (permitting ruses of war but forbidding treacherous conduct or improper use of the Red Cross emblem) [hereinafter Hague IV for the Convention, Hague Regulations for the Annex]; Dep’t Def., Law of War Manual § 5.26.1.3 (Dec. 2016) [hereinafter Law of War Manual] (discussing types of prohibited propaganda); see also Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts [hereinafter AP I], Geneva, June 8, 1977, arts. 37–38, 40 (expanding the rules on perfidy, improper use, and threatening an enemy).  All references to AP I and AP II in this handbook, unless specifically stated otherwise, are either: (1) considered CIL by the U.S., or are (2) consistent with U.S. practice or policy (though not necessarily followed out of a sense of legal obligation).

[27] The Geneva Conventions and Army Regulation 190-8 forbid publishing photographic images of enemy prisoners of war, or subjecting prisoners of war or others (including detainees or internees) to outrages upon personal dignity, such as humiliating or degrading treatment. See Convention Relative to the Treatment of Prisoners of War, arts. 3, 13, Aug. 12, 1949, 6 U.S.T. 3316, T.I.A.S. 3364, 75 U.N.T.S. 135, entered into force Oct. 21, 1950, for the United States Feb. 2, 1956 (forbidding outrages upon personal dignity, including humiliation or degrading treatment; protecting prisoners of war against insults and public curiosity; art. 3 is common to all four Geneva Conventions); AP I, supra note 37, art. 75 (similar protection for civilian detainees); U.S. Dep’t of Army, Reg. 190-8, Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees, paras. 1.5.d., 1.9 (1 Oct. 1997) (restricting photographing, filming, and video taping of such persons).

[28] See 50 U.S.C. § 3093(e) (defining covert action as “activity or activities of the [USG] to influence political, economic, or military conditions abroad, where it is intended that the role of the [USG] will not be apparent or acknowledged publicly”, and requiring Presidential approval for such actions, unless one of four exceptions applies, including “traditional . . . military activities [TMA] or routine support to such activities”); 10 U.S.C. § 397 (“Congress affirms that the Secretary of Defense is authorized to conduct military operations, including clandestine operations, in the information environment to defend the United States, allies of the United States, and interests of the United States, including in response to malicious influence activities carried out against the United States or a United States person by a foreign power.”).  Legal advisors should consult operational guidance governing attribution, and ensure MISO (TMA) are military operations, distinct from U.S. State Department public diplomacy efforts.  See, e.g. U.S. Dep’t of Def. Instr. O-3607.02 Military Information Support Operations (MISO) (2016) (FOUO); Chairmen, Joint Chiefs of Staff. Instr. (CJCSI) 3110.05F, Military Information Support Operations Supplement to the Joint Strategic Capabilities Plan (2017) (FOUO); Chairman, Joint Chiefs of Staff, Joint Pub. 3-13.2, Military Information Support Operations (2014) (available on JEL+).

[29] U.S. military forces have long observed this restriction by policy, motivated by a statute applicable to the U.S. State Department public diplomacy mission (22 U.S.C § 1461-1a, part of the Smith-Mundt Act).  See DoDD 3600.01, supra note 29 at para. 3(k) (“DoD IO activities will not be directed at or intended to manipulate audiences, public actions, or opinions in the United States.”).  Furthermore, Congress has limited the use of funds obligated for propaganda purposes.  10 U.S.C. 2241a (“Funds available to the [DoD] may not be obligated or expended for publicity or propaganda purposes within the United States not otherwise specifically authorized by law.”)

[30] See Joint Pub. 5-0, supra note 15 at A-8.

[31]Chairman of the Joint Chiefs of Staff, Joint Pub. 3-13.4, Military Deception, GL-4 (14 February 2017); see also FM 3-13.4, supra note 31 at Glossary-3; NWP, supra note 24 at 4.4.9.2.

[32] Joint Pub. 3-13.4, supra note 50 at I-1.

[33] Id. at I-1 – I-2.

[34] See Id. at I-7. .

[35] See Law of War Manual, supra note 37 at § 5.25; Chairman, Joint Chiefs of Staff, Joint Pub. 3-13.4, Military Deception (14 Feb. 2017) (available on JEL+); U.S. Dep’t of Army, Field Manual 3-13.4, Army Support to Military Deception, para. 2-91 (Feb. 2019) [hereinafter FM 3-13.4] (“Certain deception activities or techniques are prohibited because they violate the law of war, including killing or wounding the enemy by resorting to perfidy. Acts of perfidy are acts that, by design, invite the confidence of an enemy to lead it to believe that the enemy is entitled to, or obliged to accord, protection under the law of war, with intent to betray that confidence. Moreover, the law of war prohibits misusing certain protected signs such as the Red Cross or Red Crescent, fighting in the enemy’s uniform, and feigning non-hostile relations in order to seek a military advantage.”).

[36] See 10 U.S.C. § 397 (statutory notes).

[37] FM 3-13.4, supra note 48 at 2-93.

[38] Joint Pub. 5-0, supra note 15 at A-8.

[39] NWP, supra note 24 at 4.4.9.7..

[40] U.S. Dep’t of Def., Directive 5205.02E, Operations Security Program 11 (20 June 2012, incorporating Ch. 2, 20 August 2020); ; see also Joint Chiefs of Staff, Joint Pub. 3-13.3, Operations Security (6 Jan. 2016) (available on JEL+).

[41] Joint Pub. 3-13, supra note 2 at II-12.

[42] Joint Pub. 5-0, supra note 15 at A-8.

[43] Joint Chiefs of Staff, Joint Pub. 3-85, Joint Electromagnetic Spectrum Operations at I-1 (22 May 2020) [hereinafter Joint Pub. 3-85.  Electromagnetic operational environment (EMOE) includes the existing background radiation (i.e., electromagnetic environment) as well as the friendly, neutral, adversary, and enemy electromagnetic systems able to radiate with the electromagnetic area of influence. See U.S. Dep’t of Def., Electromagnetic Spectrum Superiority Strategy (Oct. 2020).

[44] Joint Pub. 3-85, supra note 56 at A-1.

[45] Id.

[46] Joint Pub. 3-85, supra note 55 at I-5. See also U.S. Dep’t of Def., Directive 3222.04, Electronic Warfare (EW) Policy, para 1 (26 Mar. 2014, incorporating Change 2 31 Aug. 2018).

[47] Id.

[48] The domestic communications law issues presented by EW may be particularly complex and regulation dependent, because the DoD “shall comply with U.S. and host nation (HN) spectrum regulations and obtain applicable authorizations before operating [spectrum-dependent] systems.” U.S. Dep’t of Def. Instr. 4650.01, Policy and Procedures for Management and Use of the Electromagnetic Spectrum para. 4(c) (9 Jan. 2009, incorporating Change 1 17 Oct. 2017) (citations omitted), citing Nat’l Telecomm. and Info. ADMIN, Manual of Regulations and Procedures for Federal Radio Frequency Management (Sep. 2017) (NTIA Redbook).

[49] Joint Pub. 5-0, supra note 15 at A-8.

[50] Id. at II-13.  Key Leader Engagements are sometimes referred to as Soldier-leader Engagements.

[51] Id.

[52] ATP 3-13.1, supra note 5.

[53] FM 3-13, supra note 3 at para. 9-17.

[54] Id.

[55] See GC III, supra note 45 at Arts. 3 and 13; see also Law of War Manual, para. 8.2.2.

[56] See Law of War Manual, para. 8.2.2.



Contribute to the Digital Deskbook!

Submit your comments here for evaluation by the National Security Law Department and possible fast-track inclusion in the Digital Deskbook!