Electronic warfare Edit
|“||the use of physical properties; operational tactics, techniques, and procedures; and planning and employment processes to ensure friendly use of the electromagnetic spectrum.||”|
Protection refers to
|“||actions or measures taken to cover or shield from exposure, injury, or destruction. In the context of the National Infrastructure Protection Plan, protection includes actions to deter the threat, mitigate the vulnerabilities, or minimize the consequences associated with a terrorist attack or other incident.||”|
Overview (Electronic warfare) Edit
"Protection includes ensuring that offensive EW activities do not electronically destroy or degrade friendly intelligence sensors or communications systems. Forces achieve protection by component hardening, emission control, and frequency management and deconfliction. Frequency management and deconfliction include the capability to detect, characterize, geolocate, and mitigate electromagnetic interference that affects operations. Protection includes other means to counterattack and defeat enemy attempts to control the electromagnetic spectrum. Additionally, organizations — such as a joint force commander's EW staff or a joint EW coordination cell — enhance electronic protection by deconflicting EW efforts."
Overview (Terrorism) Edit
Protection can include a wide range of activities, such as hardening facilities, building resiliency and redundancy, incorporating hazard resistance into initial facility design, initiating active or passive countermeasures, installing security systems, promoting workforce surety, training and exercises, and implementing cybersecurity measures, among various others.
Protection also includes continuity of government and operations planning; awareness elevation and understanding of threats and vulnerabilities to their critical facilities, systems, and functions; identification and promotion of effective sector-specific protection practices and methodologies; and expansion of voluntary security-related information sharing among private entities within the sector as well as between government and private entities.
- ↑ FM 3-36, at 1-11.
- ↑ Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise, Glossary, at D-4.
- ↑ FM 3-36, at 1-11.