1. Identify the four major tasks that make up the IEW
Electronic warfare (EW).
2. Determine the role of situation development.
Locate enemy forces.
capabilities, vulnerabilities, and
Identify the enemy main
Determine how weather and
terrain will affect friendly and
Detect opportunities to
exploit enemy weaknesses and seize
or retain the initiative.
3. Determine the role of target development.
Provide targeting data.
4. Determine the role of EW.
EW is the means through
which commanders protect their own
electronic systems while attacking
those of the enemy.
EW exploits, disrupts,
and deceives enemy command and
control while protecting friendly
use of communications and
On the battlefield, EW
is divided into two categories:
offensive and defensive.
Define electronic attack
Offensive EW is
referred to as EA.
EA is the transmission
of electronic jamming signals that
disrupt the enemy’s communications
and other signal emitter systems.
It also transmits false
communications that deceive enemy
forces through their own
information collection systems.
EW assets are targeted
in much the same way as artillery
and other weapon systems.
EA includes jamming and
Define electronic warfare
Enemy sources of
radiated electromagnetic energy
are searched for, located, and
identified through a process
ES focuses on the
immediate requirements of the
ES includes the efforts
to search, identify, intercept,
and locate electronic emitters.
Defensive EW seeks to
protect friendly use of the
electromagnetic spectrum by
(2) EP is the actions
taken to protect friendly command,
control, and communication (C3)
from enemy collection and
EP is planned around
the commander’s mission and
concept of operations, and is the
responsibility of the operations
Based on the mission, those
communications and electronic
systems that must be protected are
identified and their vulnerability
to enemy EA is assessed.
The operation of these
systems is then planned and
monitored to ensure that the
times, frequencies, duration, and
location of their emissions
provide the greatest possible
security from enemy collection and
Note. FM 34-10
and FM 34-25 have not been updated to
reflect current IEW terminology.
These manuals refer to
electronic attack (EA) as electronic
countermeasures (ECM), electronic
warfare support (ES) as electronic
warfare support measures (ESM) and
electronic protection (EP) as
electronic counter-countermeasures (ECCM).
5. Determine the role of counterintelligence (CI).
Counters the hostile
Safeguards the command
Deceives the enemy.
Counters enemy sabotage,
subversion, and terrorism.
6. Identify the major intelligence disciplines.
Human intelligence (HUMINT)
includes all information derived
through human sources not accessible
to other collection assets.
HUMINT employs overt, covert,
and clandestine operations to
achieve worldwide collection
Imagery intelligence (IMINT).
IMINT can be obtained from
land, sea, air, and space platforms
(radar, photographic, infrared, and
Signals intelligence (SIGINT)
is the products resulting from the
collection, evaluation, analysis,
integration, and interpretation of
information derived from intercepted
Measurement and signature
intelligence (MASINT) is scientific
and technical intelligence obtained
by quantitative and qualitative
analysis of data derived from
technical sensors for the purpose of
identifying any distinctive features
associated with the source, emitter,
or sender and to facilitate
subsequent identification or
7. Recognize how IEW supports the battlefield
Collect information on
Provide targeting data to
fire and maneuver elements.
integrate, and interpret collected
information to produce intelligence.
intelligence product to the
Conduct EW operations.
security (OPSEC) and deception.
8. Identify the staff responsibilities for IEW.
The G2 coordinates the
He identifies intelligence
requirements based on the
commander’s guidance and concept of
The G3 has staff
responsibility for planning and
directing the jamming and deception
operations of the command.
He directs EA actions needed
to support planned and ongoing
He identifies, in
coordination with the G2, ES
requirements to support EW.
The military intelligence
(MI) unit commander manages the MI
assets to accomplish the assigned EW
He exercises command and
control (C2) over all organic and
attached MI elements and operational
control (OPCON) over supporting MI
9. Identify how IEW is integrated into the combined
operations center support element (DTOCSE)
augments the G2 and G3. Part of this element, the electronic warfare section (EWS),
is the principle mission manager for
The EWS is also involved with
the fire support element in the
The analysis and control
element (ACE), formerly referred to
as the technical control and
analysis element (TCAE), is part of
the MI battalion tactical operations
center (TOC) and is the asset
manager for all ES and EA missions
tasked to the MI battalion.
electronic warfare support element (IEWSE)
is attached to the maneuver brigade
TOC from the MI battalion.
This element serves as an
interface between MI assets in the
brigade area and the brigade S2 and
The G2, G3, fire support
officer coordinate and direct IEW
operations. They obtain the information required to answer the
commander’s requirements concerning
both enemy forces and friendly
They integrate EA with
maneuver and fire and plan and
coordinate OPSEC measures and
defensive EP measures to protect
from enemy intelligence collections