SECRET FOR TRAINING ONLY Return to Index HEADQUARTERS, CFC 9518 Seoul, ROK 1June 19XX ANNEX K TO CFC OPLAN (KOREA) 9518X-XX COMMAND, CONTROL, AND COMMUNICATIONS SYSTEMS REFERENCES: a. Basic Plan. b. JCS Pub 0-2, 24, “Unified Action Armed Forces,” February 1995. c. Joint Pub 6-0, 30, “Doctrine for C4 Systems Support to Joint Operation,” May 1995. d. Maps, WGS-84, series L654, KOREA, sheets 3118,3119, 3120, 3121, 3122, 3218, 3219, 3220, 3221, 3222, 3318, 3319, 3320, 3321, 3322, 3418, 3419, 3420, 3421, 3422, 3515, 3516, 3517,3518, 3519, 3520, 3521, 3615, 3616, 3617, 3715, 3716, 3717, 3815, 3816,and 3817, 3915, 3916, 3917, 4016, 4017, edition 001-KAMC, scale 1:100,000. e. Map, WGS-84, series L654, sheet reference d, scale 1:1,000,000. 1. General a. Purpose. To specify joint command, control, and communications systems. b. Situation. (1) General. Reference a. (2) Enemy. Annex B. (3) Friendly. Annex A. (4) Assumptions. See Basic Plan. 2. Mission. When directed, CFC deploys signal forces to provide communications connectivity from the USSOUTHCOM Headquarters to JTF Korea, and supporting commands. 3. Execution a. Guiding Principles (1) Plan for communications systems to support the COMJTF for all five phases of the OPLAN to provide positive command and control over assigned forces. K-1 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY (2) During each phase plans should provide for system redundancy, circuit diversity, and physical protection. (3) All Service Component Commanders and supporting organizations must identify communications equipment and personnel shortfalls to the CFC, CJG-6. b. Operational Concept (1) References a, b, and c. (2) C3 forces will install, operate, and maintain (IOM) command and control connectivity between JTF Korea and CFC and the Service Components. The communications systems will be installed to support a five phased plan. Communications at the intermediate staging base will be maintained throughout all phases of the operations. The C3 forces will move forward to JTF Korea headquarters. Maximum flexibility will be maintained by employing commercial communications means when practicable. Service Components are responsible to provide internal communications networks. Architecture design will focus on creating multiple access in and out of the JOA. The JTF Korea staff will accomplish integration of South Koea forces communications links. (3) Phase I, Prehostilities: Alert and Staging (a) The priority of communications effort during this phase is to establish capabilities that permit out-of-country reporting. Additionally, limited internal communications capabilities should be established to control execution of Phase II operations with primary emphasis on commercial capabilities. (b) Communications elements are with the initial deployments to the staging bases. (4) Phase II, Establish Intermediate Staging Bases (a) Priority of effort for this phase is establishment of initial external command, control, and communications systems from the Intermediate Staging Base to lodgment(s) areas. (b) In addition to the satellite communications during this phase, the following space based systems priority is intel/recon, weather, multispectral imagery (MSI), and global positioning systems (GPS). (5) Phase III, Decisive Combat. The priority of effort during this phase is the maintenance of communications systems and circuits required for CINCKorea and COMJTF Korea command and control, intelligence reporting and dissemination, and positive airspace control to support both ground and air hot-pursuit operations of 50 miles and 200 miles respectively. (6) Phase IV, Lodgment and Follow-Through. The priority of communications effort is CFC and JTF Korea command and control, intelligence, air operations, and possibly stabilization assistance in the capital area. (7) Phase V, Posthostilities and Redeployment. K-2 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY Priority of effort is the maintenance C2 systems, intelligence, and systems supporting the redeployment of forces. C. Tasks and Responsibilities. CFC J-6 publishes separate correspondence for tasks and responsibilities. See also Appendixes for this Annex. D. Intelligence and Reconnaissance. See Annex B. E. Special Measures. No special measures are planned. 4. Administration and Logistics. See Annex D. 5. Command and Signal. a. Command Relationships. See Annex J. b. Command, Control, and Communications Systems. See Appendixes 3, 4, and 5. JIM R. RILEY General, USA Commander in Chief Appendixes: 1 - Information Systems Security (INFOSEC) 2 - Defensive Information Warfare (IW-D) 3 - Communications Planning 4 - Satellite Communications Planning (Omitted) 5 - Defense Courier Service 6 - Communications Reporting OFFICIAL: /s/ LEWIS R. BALLARD Brigadier General, USAF Director, J-6 K-3 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY HEADQUARTERS, CFC 9518 Seoul, ROK 1June 19XX APPENDIX 1 TO ANNEX K TO CFC (KOREA) 9518X-XX INFORMATION SYSTEMS SECURITY (INFOSEC) 1. Purpose. To establish policies, procedures, keying material and requirements necessary to support CFC secure communications in support of OPLAN 9518X-XX. 2. General a. The overall CFC INFOSEC objective is to provide CFC components and supporting commands the methods and capabilities necessary to implement transmission security, cryptological security, and physical security measures required for the protection of classified information during the execution of this OPLAN. b. CFC communications security objectives will be achieved through specific actions designed to: (1) Protect CFC communications from hostile interception and exploitation. (2) Ensure the proper use of technically sound, approved code and cipher systems for all sensitive communications. (3) Ensure the use of approved physical safeguards to protect classified equipment, material, and documents from access or observation by unauthorized persons. 3. Execution a. Concept of INFOSEC Support Operations. JTF Korea’s Service Components and supporting commands will achieve INFOSEC objectives by: (1) Maximizing use of secure communications systems. (2) Using only authorized machine-produced codes and authentication systems distributed through proper COMSEC logistic channels. (3) Using bulk-encrypted transmission paths, thereby reducing vulnerability to interception. (4) Establishing procedures to reduce electromagnetic emissions. (5) Maintaining communications transmission security procedures and circuit discipline in accordance with appropriate directives. (6) Practicing sound electronic protection (EP). b. Tasks K-1-1 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY (1) CFC. phases of this OPLAN. Develop INFOSEC procedures for use within the AOR for use during all (2) COMJTF Korea and SERVICE COMPONENT COMMANDERS: (a) Develop plans for maximum employment of INFOSEC procedures and practices in support of this plan. (b) Coordinate with supporting commands for cryptographic/INFOSEC material requirements and distribution. c. Coordinating Instructions (1) Coordinate INFOSEC plans with other components and supporting commands. (2) Establish, as needed, COMSEC accounts for subordinate elements. (3) Coordinate with South Korea forces for points of contact and locations for possible deployment of liaison teams. 4. Administration and Logistics a. Cryptographic material will be obtained through normal logistics distribution channels. b. Effective editions of the COMSEC materials to be used in support of this plan will be as specified by the controlling authority and subsequent FRAGOs. c. Only codes and authentication systems distributed through COMSEC channels are authorized for use within the command. d. Control and reporting of COMSEC material compromises/losses will be according to appropriate directives. Information copies will be provided to CFC, CJG-6 and JTF Korea J-6. e. Report incidents of suspected meaconing, intrusions, jamming, and interference (MIJI) immediately according to Appendix 6 (Reports). 5. COMMAND AND CONTROL. See Annex J. K-1-2 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY HEADQUARTERS, CFC 9518 Seoul, ROK 1June 19XX APPENDIX 2 TO ANNEX K TO CFC OPLAN (KOREA) 9518X-XX DEFENSIVE INFORMATION WARFARE (IW-D) REFERENCES: a. JP 3-54, “Joint Doctrine for Operations Security,” 27 January 1997. b. JP 3-58, “Joint Doctrine for Military Deception,” 31 May 1996. c. JP 3-13, (Draft) “Joint Doctrine for Information Operations,” 28 February 1998. d.JP 3-13.1, “Joint Doctrine for Command and Control Warfare (C2W) Operations,” 7 February 1996. e.JP 3-51, “Electronic Warfare in Joint Military Operations,” 30 June 1991. 1. Situation a. General. Defensive information warfare (IW-D) is comprised of counter command and control (C2) and C2 protection. C2 protection is comprised of a variety of approaches, both defensive and offensive, with the common goal of ensuring the effectiveness of friendly command and control systems. The primary objective of C2 protection is the preservation of friendly C2 forces despite the enemy’s efforts to deny information to , disrupt, deceive, or destroy these capabilities. The operational objective of counter C2 operations is to achieve C2 superiority by monitoring, destroying, impeding, and/or deceiving enemy C2. b. Enemy. See Annex B (1) General Enemy Capabilities to Conduct IO. Because of its defective economic power and access to international arms market, North Korea has the capability to conduct offensive information operations. Their capabilities consist of very rudimentary direction finding, tactical radio intercept, HUMINT, terrorism, jamming, subversion, and sabotage. (2) IO Target Biases and Predisposition. The North Korea forces will have effective control of much of South Korea territory and will tend to focus military efforts on the US Government’s radar sites, the Government, and South Korea’s extensive telephone, television, and radio networks. c. Friendly (1) General Vulnerabilities. The friendly forces vulnerability includes limited protection for US radar sites. (2) General Capabilities. US forces have sophisticated IW equipment, techniques, and procedures capable EW, EP, and EA. The use of these facets of electronic warfare operations combined K-2-1 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY with vigorous use of operations security (OPSEC), psychological operations (PYSOP), and physical destruction of Cartel telecommunications facilities enhance friendly capacity for victory. 2. Mission. When directed, CFC conducts defensive information warfare to protect information and defend information systems of the US and assist the Government of South Korea. 3. Execution a. Concept of Operations. See Appendix 3 (IW) to Annex 3 (Operations). (1) General. Since it is not practical to defend all aspects of the infrastructure and every information process, each phase of this OPLAN requires assessment of vulnerabilities. The priorities will be developed based upon the assessed threat developed during each and integrated into the priorities established in the overall information operations CONOP of this plan. (2) Phase I, Prehostilities: Alert and Staging As the Forces Prepare for Operation in Latin America. (a) Identify information, information systems, information-based processes, and infrastructure critical for execution of OPLAN. (b) Identify and analyze threats to systems critical for execution of OPLAN. (c) Determine vulnerabilities of critical information, information systems, information-based process, and infrastructure by the following IW categories: propaganda, military deception, EW, physical destruction, media (PAO), OPSEC, and computer network attack (CNA). (d) Analyze, assess level of risk. (e) Implement appropriate defensive measures. (f) Determine and monitor indications and warning (I&W). (g) Establish IO Threatcons. (h) Develop supporting IW-D plans using counter-propaganda, EP, ES, information assurance, physical protection, OPSEC, and special information operations (3) Phases II – V: Deployment, Employment, and Redeployment Activities. (a) Continue Phase I operations as appropriate. (b) Execute related threatcon tasks. (c) Continually assess the changing information environment and recommend changes to hostile IO. (d) Continually perform IW damage assessments. K-2-2 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY b. Tasks (a) CFC. IO Cell provides support to the COMJTF Korea external IW-D effort. (b) COMJTF Korea 1 Establish IO cell to provide continuous planning guidance, coordination, integration, and recurring assessment of the defensive information situation. 2 Develop IW-D plans for the JTF Korea, Service Components, and supporting commands and agencies. c. Coordinating Instructions (1) Integration. The JTF Korea IO Cell is responsible for the integration of supporting commands and agencies IW-D requirements. CFC integrates those measures external to JTF Korea’s Joint Operations Area. (2) Coordination (a) CFC approves JTF Korea initial IW-D plan and subsequent changes. (b) CFC coordinates JTF Korea requirements external its AOR. (c) DIRLAUTH for JTF Korea with supporting commands and agencies (d) Defensive IO is employed IAW established principles of warfare and rule of engagement. (3) Security. Normal security measures and handling procedures are applicable for (4) Reports. Appendix 6, Annex K applies. planning IW-D. 4. Administration and Logistics a. Personnel. N/A b. Supply. N/A c. Reports. See Annex D. 5. Command and Control. See basic order and Annex J, Command Relationships. K-2-3 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY HEADQUARTERS, CFC 9518 Seoul, ROK 1June 19XX APPENDIX 3 TO ANNEX K TO CFC OPLAN (KOREA) 9518X-XX COMMUNICATIONS PLANNING REFERENCES: a. CJCS MOP 3 “Requesting JCSE Support.” b. CJCS MOP 178: “Military Satellite Communications Systems.” c. ACP 190: “Guide to Frequency Planning.” d. CJCS MOP 43: “Military Telecommunications Agreements and Arrangements Between the US and Regional Defense Organizations or Friendly Nations.” e. CJCSM 6231 Series 1. Purpose. To provide communications planning guidance to CFC forces. 2. Execution a. General (1) Communications capabilities within JOA South Korea are very limited and require extensive satellite links for USPACCOM, JTF Korea, its Service Components, ISB, and supporting commands. CFC and JTF Korea will jointly build an architecture for the use of a single channel UHF. (2) CFC will support communications requirements of JTF Korea with in theater assets or through the Joint Communications Support Element using MOP 3 procedures. (3) Defense Information Systems Agency (DISA) has coordinated the approval of frequency, bandwidths, and circuits necessary to support the installation and operation of SHF satellite terminals throughout the JOA. (4) The Governments of South Korea and Japan have approved the use of US owned communications equipment necessary to support the ISB and follow-on operations. b. Means of Communications (1) Global Command and Control System (GCCS). The major US theater-level system applicable to CFC. The GCCS has workstations located at USPACCOM headquartered in Hawaill , with Naval staffs embarked in the JOA. The USPACCOM GCCS provides Automatic Digital Network (AUTODIN) message transfer capability. K-3-1 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY (2) Television/Radio. The Government of South Korea has available for use upon execution of this OPLAN television and AM radio systems as well as a sophisticated telephone network throughout the country. (3) Satellite Systems. Planning for SATCOM systems should include all Government controlled and most commercial systems. South Korea has earth stations that are available to include two Pacific Ocean INTELSAT earth stations and 11 domestic stations. See reference b above. (4) Commercial telephone systems within South Korea are very limited and require organizations operating within the country to establish their own. c. Frequency Management (1) CFC performs the following functions: (a) Assigns and controls frequencies within CFC. (b) Coordinates all frequency requiring full protection from harmful interference with foreign Governments, components, and supporting commands. (c) Prepares and processes interference reports. (d) Maintains and administers frequency records and files for support of peacetime and contingency operations. (2) Coordinating Instruction (a) Requesters must identify which nets or individual frequencies that, when assigned, will be considered “TABOO.” “TABOO” frequencies are those supporting safety-of-life missions that cannot be jammed by friendly forces. (b) Frequency requests supporting multiple pieces of equipment such as HF nets, VHF/FM nets must be accompanied by a net description of some manner. (c) JTF Korea will consolidate frequency requirements prior to submission to CFC. 3. Administration and Logistics a. Communications Reporting. See Appendix 6. b. Communications Supply and Repair. Equipment supply and repair is a Service Component responsibility. 4. Communications Security a. All communications systems will be fully encrypted with NSA approved equipment and key materials. K-3-2 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY b. Maintenance of equipment will be through service channels. c. Changing of call signs and keying material will be in accordance with the controlling authority specifications. K-3-3 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY HEADQUARTERS, CFC 9518 Seoul, ROK 1 June 19XX APPENDIX 4 TO ANNEX K TO CFC OPLAN (KOREA) 9518X-XX SATELLITE COMMUNICATIONS PLANNING (Omitted) K-4-1 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY HEADQUARTERS, CFC 9518 Seoul, ROK 1June 19XX APPENDIX 5 TO ANNEX K TO CFC OPLAN (KOREA) 9518X-XX DEFENSE COURIER SERVICE REFERENCES: a. DOD Directive 5200.33, “Defense Courier Service,” 30 September 1987. b. DOD Regulation 5200.33R, “Defense Courier Service Regulation,” January 1989. c. “Defense Courier Service Users Manual,” 1 February 1990. 1. Purpose. This Appendix provides guidance for Defense Courier Service (DCS) operations in support of CFC operations. 2. General. The formation of JTF Korea and establishment of a JOA increases the need for DCS support in CFC operations. The DCS will continue to provide courier support within CFC for movement of qualified material to the JTF HQs, Component Commands, and supporting commands. Existing DCS channels will be modified to transport material between CONUS, the CFC theater, JOA South Korea, and other worldwide locations. The use of DCS is restricted to highly classified material according to reference a. 3. Concept of Defense Courier Service Support Operations. DCS Station Japan will remain operational. Augmentation DCS personnel will deploy to the ISB and establish temporary DCS sub-station to support JTF Korea. a. Tasks (1) CFC coordinates DCS support for JTF Korea. Plan for the establishment of a substation at the ISB and possible follow-on within South Korea. (2) Primary account plans for receiving and receipt of material to include material destined for subordinate organizations. Coordinate delivery and dispatch of material to subordinate organizations. b. Transportation Policies (1) On execution of this OPLAN, the entry of material into CFC theater will be restricted to that considered essential to CFC and JTF Korea. This restriction will be lifted once a DCS sub-station is established. (2) Commands using the DCS are responsible for providing vehicles suitable for transporting material. c. Courier Operations K-5-1 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY (1) Direct DCS service in support of CFC will be restricted HQs, CFC, HQs JTF Korea, JTF Service Component Commands, supporting commands, and collocated elements. DCS couriers will exchange material with Top Secret Control Officers or properly cleared command messengers who will be responsible for distribution and dispatch of material to subordinate activities. DCS Station Panama will act as the focal point for the dispatch and receipt of DCS material until a DCS sub-station in the ISB is established. (2) All DCS courier activities will be coordinated through the USPACCOM Control Center, Hawaii. d. Coordinating Instruction (1) DCS provides two levels of service for movement of qualified material. The DCS priority movement system establishes precedence and subsequent order of movement for material handled within the DCS. (2) The responsibility for determining priority of material rests with originator of the material. (3) CINCKorea may designate specific categories of material requiring priority movement. K-5-2 SECRET FOR TRAINING ONLY SECRET FOR TRAINING ONLY HEADQUARTERS, CFC 9518 Seoul, ROK 1 June 19XX APPENDIX 6 TO ANNEX K TO CFC OPLAN (KOREA) 9518X-XX COMMUNICATIONS REPORTING REFERENCE: Basic Plan 1. General. This appendix specifies communications reporting and procedures for CFC. These requirements and procedures are applicable to CFC, JTF Korea and its Service Components, and supporting commands. 2. Reporting Requirements. The three basic communications reports, which will be used, are Communications Spot Report (COMSPOT), the Meaconing, Intrusion, Jamming and Interference Report (MIJI), and the Communications Status Report (COMSTAT). a. COMSPOT. The COMSPOT is used to report actual or forecast communications outages, including relocation and emission control (EMCON). This message includes the communications event; the effective time; the system, circuit, or facility affected; the location of the event; and the event of a relocation, the old and new locations. COMSPOT reports will be sent to the USPACCOM Operations Center, Hawaii. b. MIJI. The MIJI report is used as primary means of sharing MIJI incidents promptly and provides for joint exchange of tactical MIJI information, including electro-optical interference. This message includes the MIJI victim unit name and location, electronic attack (EA) type, time period of event, operator position and/or equipment affected, symptoms of MIJI, effectiveness of EA, electronic protection (EP) actions, enemy responses to electronic protection, frequency and bandwidth affected, and signal strength. (1) MIJI reports will be sent as soon as possible and transmitted using electronic means. (2) MIJI reports will be sent to HQs CFC operations center attention J-2, J-3, and J-6. c. COMSTAT. COMSTAT reports will be submitted by the JTF for its subordinate commands with supporting commands reporting directly. The COMSTAT will be submitted by secure means NLT 0100Z daily with a 2300Z status. (1) COMSTAT updates will be submitted at 0500Z and 1200Z on an exception basis. (2) The following systems will be reported: fixed telephone, fixed teletype, special C2 systems, intelligence systems, leased circuits, weather, and other items as deemed appropriate. K-6-1 SECRET FOR TRAINING ONLY