Military Deception in Support of Joint Operations
Total Page:16
File Type:pdf, Size:1020Kb
PREFACE l. Scope Thi-; publication provides joint doctrine co plan. r.=xecute. and assess military deception in support of joint operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of StaiT {CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations. and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces. and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders {JFCs). and prescribes joint doctrine for operations and training. lt provides military guidance for use b)· the Armed Forces in preparing and executing their plans and order~. It is not the intent of this publication to n:striclthe authority of the JFC from organizing the force and executing the mission in a manner the JfC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant wmmands. subordinate unified commands, joint task forces. subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumst<Jnces dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS. normally in coordination with the other members of the Joint Chiefs of Staff. has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedure~ ratified by the United States. For doctrine and procedures not ratified hy the US, commanders should evaluate and follow the multinational command's doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: KEVJN D. SCOTT Vice Admiral, US:'\! Director, Joint Force Development Preface lnrentionally H:lank 11 JP 3-13.4 ------- SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 3-13.4 DATED 26 J~'IUARY 2012 • Consolidated multiple general information paragraphs into an introduction section. • Clarified that military or other mlid decision makers may he the deception target. • Added a figure outlinin~ a sample information pathway to sl10w how information can mo,·e through a conduit to a decision maker. • Added a figure to illuslrate various leadership styles planners should consider when evaluating the deliberative process a decision maker or body uses to reach a conclusion. • Added a section to reinforce the linkage between operations security and military deception. • Added a more expansive analysis of prohibited military deception in accordance with DOD Law of War Manual. • Added a section on cyberspace contributions to military deception in the classified appendix. • l(xpandcd tbc discussion on military deception and irregular warfare in the classified appendix. • Expanded the discussion on violent extremist organization susceptibility to deception operations in the classiflcd appendix. • Expanded the discussion on human intelligence support to operations in the classified appendix. • Modifies, adds, and removes terms and definitions from the DOD Dictionary of Military and Associated Terms. Ill Summary of Changes Intentionally Blank JP 3-13.4 TABLE OF CONTENTS PAGE EXECUTIVE SU'v!MARY .................................. .......... ., ................ viii CHAPTER I GE'IERAL • Introduction.............................................................................................................. 1-1 • The Functions and Role of .\1ilitary Deception ......................................................... I-1 • Military Deception and Information Quality ............................................................. l-3 • \•lilitary Deception Planning Methodology............... ................... 1-4 • :Vlilitat)' De!.:eption Overview .................................................................................... 1-4 • Tenets of Military Deception......... ....................... ................. ........................ I-7 • \tfilitary Deception Types, Techniques, Tactics, and Means ..................................... I-8 • Assessment ........................................................................................................... 1-12 CHAPTER II ~IILIT ARY DECEPTION A'ID INFORMATION OPERATIONS • Information Operations..................................................... ............................ II-1 • :vtilitary Deception as an Information-Related Capability ....... .,.............. ...II-I • Military Deception's Relationship co Information-Related Capabilities .................. ll-1 • Military Deception and Physical Attack ................................................................ .11-8 • Information Operations Planning ............................................................... ll-10 • ~1ilitary Deception and Camoutlage, Concealment, and Decoys ........................... ll-10 • Legal Support to Military Deception ..................................................................... 11-10 • Military Deception and Personnel Recovery ......................................................... .11-11 CHAPTER III ROLES, COORD!l\ATIOI', A'ID CO'ISIDERATIO'IS fOR MILITARY DECEPTIOI' • Roles and Responsibilities of Military Deception Planners ................................... 111- 1 • Coordination Requirements .................................................................................. Ill-5 CHAPTER IV INTELLIGENCE SUPPORT TO MILITARY DECt:PTIO"' • Gcncrai .................................................................................................................... IV-1 • The Deception Intelligence Estimate ........................................ ,........................... IV-1 • Military Deception RequestS for Information ...................................................... IV -7 • ConduitAnalysis ................................................................................................... IV-7 • Support to Military Deception Assessment ........................................................ ,... TV -9 v Table of Contents CHAPTER V V!IUTAR Y DEC:EPTIO\J Pl. A \JNII\G • \1ilitary Deception Planning and Joint Planning Processes ........................ , .......... V -1 • \tlilitary Deception Planning Basics ...................................................................... V-2 • The Military Deception Planning Process .......................................................... V-3 CHAPTER VI EXECUTION Of MILITARY DECEPTION OPERATIONS • Execution of Military Deception Events and Actions .......................................... VI- I • Deception Execution Coordination ..................................................................... VJ-1 • Terminating Military Deception Operations .............................................. VI-4 CHAPTER VII COUNTERDECEPTIOI\ • Counterdeception as an F.lementofMilitru·y Deception ....................................... VII-I • Detecting Adversary Deception ............................................................................. \/11-2 • Confirming Adversary Deception .......................................................................... Vli-2 • Countering or Exploiting Adversary Deception ................................................. Vll-3 APPr.NOIX A Military Deception Maxims ...................................................................... A-1 B Suggested Background Readings......... ............... .................. R-1 C Supplemental Guidance .............................................................................. C-1 D Referen;;es ................................................................................................. D-1 E Administrative Instructions .................................................................... E-1 GLOSSARY Part I Abbreviations. Acronyms, and lnitialisms ............................................. GL-1 Part II Terms and Definitions ............................................................................ GL-3 FIGURE Military Deception Methodology ............................................................... 1-5 Tenets of Military Deception ......................................... , .......................... 1-R Observe, Orient. Decide, Act Loop Intent of Operations Security and Military Deception_ ........................................... U-3 11-2 Elements Affecting Decision Making ........................................................ IT-4 IV-I Sample Information Pathways Diagram .................................................. IV-3 IV-2 Leadership Styles ..................................................................................... l\r'-5 IV-3 ~otional Conduit Analysis ..................................................................... 1\/-10 V-1 Military Deception Planning Process and Joint Planning Process ........... V-4 V-2 DcccptiDn Mission Analysis .................................................................... V-5 V~3 Sample Military Deception Goals and Objectives .................................... V -6 VI