Related Books
The Joint Forces Operations & Doctrine SMARTbook, 2nd Rev. Ed. (PREVIOUS EDITION)
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1)
OPFOR SMARTbook 3 - Russian Military, 3rd Ed. (OPFOR 3-3)
JFODS6: The Joint Forces Operations & Doctrine SMARTbook, 6th Ed.
BSS7-1: The Battle Staff SMARTbook, 7th Ed. (w/SMARTupdate 1)
INFO2 SMARTbook: Information Advantage, 2nd Ed.
The Joint Forces Operations & Doctrine SMARTbook, 2nd Rev. Ed. (PREVIOUS EDITION)

Release Date :Mar 1st, 2009
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:336

A NEW edition of this book is available!
JFODS6: The Joint Forces Operations & Doctrine SMARTbook, 6th Ed.
Upgrade/update to the NEW 6th Edition (JFODS6)!
Upgrade/update to the NEW edition! The Joint Forces Operations & Doctrine SMARTbook, 2nd Rev. Ed. (Mar 2009) is out-of-date and has been superseded by a newer 5th edition JFODS5 (Jan 2018).
Click "View Book" above to browse the new edition!
JFODS5 is the fifth revised edition of The Joint Forces Operations & Doctrine SMARTbook, incorporating the full scope of new material from the latest editions of JP 3-0 Joint Operations (Jan ‘17), JP 5-0 Joint Planning (Jun ’17), JP 1 Doctrine for the Armed Forces of the United States (Change 1, Jul ‘17), and JP 3-08 Interorganizational Cooperation (Oct ‘16). Additional chapters and topics include Joint Task Force Headquarters (Jun ‘12), JP 4-0 Joint Logistics (Oct ‘13), JDN 2-13 Commander’s Communication Synchronization (Dec ‘13), JP 3-13 Information Operations (Nov ‘14), and JP 3-16 Multinational Operations (Jul ‘13).
Always check our website for the most current and up-to-date SMARTbook edition! The Lightning Press is committed to providing the best and most relevant doctrinal material to our readers and are vigilant in reviewing new publications, anticipating upcoming doctrinal releases, and incorporating the updated material into our SMARTbook series!
Related Books
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
ISBN-10 :1935886436
Release Date :May 19th, 2016
Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:384
UPGRADE / CONVERT this book to premium GBC Plastic-Comb binding!


Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Guide to Terrorism, Hybrid and Emerging Threats
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook topics and chapters include: the terrorist threat (characteristics, goals & objectives, organization, state-sponsored, international, and domestic), hybrid and future threats (forces, organization, operations & tactics), forms of terrorism (tactics, techniques, & procedures), counterterrorism (strategy, fundamentals, command, planning, and operations) critical infrastructure (identifying weaknesses, risk management, and cyber threats), protection (warfighting function, supporting tasks, and planning), countering WMD (WMD weapons, planning, and execution), and consequence management (all hazards response, domestic, international and DoD-led CM).
* This is the second printing of CTS1 (Jul 2017), incorporating an updated DNI World Threat Assessment and additional materials from START/GTD. An asterisk marks changed pages.
Terrorism has evolved as a preferred tactic for ideological extremists around the world, directly or indirectly affecting millions of people. Terrorists use many forms of unlawful violence or threats of violence to instill fear and coerce governments or societies to further a variety of political, social, criminal, economic, and religious ideologies. Terrorists threaten the national power, sovereignty, and interests of the United States and our allies. Terrorists organize and operate in a number of ways. Some operate within transnational networks, others operate as small independent groups, and others operate alone.
A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, and/or criminal elements all unified to achieve mutually-benefiting effects. Hybrid threats are innovative, adaptive, globally connected, networked, and embedded in the clutter of local populations. They can operate conventionally and unconventionally, employing adaptive and asymmetric combinations of traditional, irregular, and criminal tactics and using traditional military capabilities in old and new ways.
Counterterrorism activities and operations are taken to neutralize terrorists, their organizations, and networks in order to render them incapable of using violence to instill fear and coerce governments or societies to achieve their goals. The purpose of CT is to disrupt, isolate, and dismantle terrorist organizations and networks to render them incapable of striking the homeland, US facilities and personnel, or US interests abroad. CT also includes crisis response operations to respond to imminent terrorist threats or incidents when preemption and preclusion are not successful. In addition to increasing law enforcement capabilities for counterterrorism, the United States, like many nations, has developed specialized, but limited, military CT capabilities.
Weapons of mass destruction (WMD) are chemical, biological, radiological, or nuclear (CBRN) weapons or devices capable of a high order of destruction and/or causing mass casualties. The terrorist threat is amplified by the proliferation of WMD and their potential use by terrorists. The existence of these materials and the potential for use by actors of concern precipitates the need to plan, prepare for, and counter their use.
Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society and economy - the infrastructure. Protection is the preservation of the effectiveness and survivability of mission-related military and nonmilitary personnel, equipment, facilities, information, and infrastructure deployed or located within or outside the boundaries of a given operational area.
Consequence management refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism. Incidents involving CBRN material produce a chaotic and hazardous environment requiring immediate response to minimize pain and suffering, reduce casualties, and restore essential infrastructure. Responders at the local, state, and federal levels may be overwhelmed by the magnitude of the incident, and U.S. DoD forces may be requested to provide additional support through the national response framework (NRF).
Related Books
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1)
ISBN-10 :1935886711
Release Note :Base CYBER1 released Oct '19 (New CYBER1-1 w/SMARTupdate 1 released 22 Sept 21.)
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:344

Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Multi-Domain Guide to Offensive/Defensive CEMA and CO
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1*) (Multi-Domain Guide to Offensive/Defensive CEMA and CO) topics and chapters include cyber intro (global threat, contemporary operating environment, information as a joint function), joint cyberspace operations (CO), cyberspace operations (OCO/DCO/DODIN), electromagnetic warfare (EW) operations, cyber & EW (CEMA) planning, spectrum management operations (SMO/JEMSO), DoD information network (DODIN) operations, acronyms/abbreviations, and a cross-referenced glossary of cyber terms.
*SMARTupdate 1 to CYBER1 (Aug ‘21) updates the first printing of CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook (Oct ‘19) by incorporating new material from FM 3-12, Cyberspace Operations and Electromagnetic Warfare (Aug ‘21), ATP 3-12.3, Electronic Warfare Techniques (Jul ‘19), ATP 6-02.70, Techniques for Spectrum Management Operations (Oct ‘19), JP 3-85, Joint Electromagnetic Spectrum Management Operations (May ‘20) and adding a new section on Cyberspace IPB (ATP 2-01.3, Jul ‘19). (Readers of the original/base CYBER1 can obtain SMARTupdate 1 at www.thelightningpress.com/smartupdates/)
United States armed forces operate in an increasingly network-based world. The proliferation of information technologies is changing the way humans interact with each other and their environment, including interactions during military operations. This broad and rapidly changing operational environment requires that today’s armed forces must operate in cyberspace and leverage an electromagnetic spectrum that is increasingly competitive, congested, and contested.
Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Operations in cyberspace contribute to gaining a significant operational advantage for achieving military objectives.
Cyber electromagnetic activities (CEMA) are activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system (ADRP 3-0). CEMA consist of cyberspace operations, electronic warfare, and spectrum management operations.
Cyberspace operations (CO) are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). Cyberspace operations consist of three functions: offensive cyberspace operations, defensive cyberspace operations, and Department of Defense information network operations.
Electromagnetic Warfare (EW) (formerly "electronic" warfare) is military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. EW consists of three functions: electromagnetic attack, electromagnetic protection, and electromagnetic support.
Spectrum management operations (SMO) are the interrelated functions of spectrum management, frequency assignment, host-nation coordination, and policy that enable the planning, management, and execution of operations within the electromagnetic operational environment during all phases of military operations. SMO are the management portions of electromagnetic spectrum operations (EMSO). EMSO also include electronic warfare.
Department of Defense information network (DODIN) operations are operations to secure, configure, operate, extend, maintain, and sustain DOD cyberspace.
Cybersecurity ensures the confidentiality, integrity, availability, authentication, and nonrepudiation of friendly information and information systems while denying adversaries access to the same information and information systems. Cybersecurity incorporates actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity on DOD information systems and computer networks.
Related Books
Discount sets with this book
OPFOR SMARTbook 3 - Russian Military, 3rd Ed. (OPFOR 3-3)
ISBN-10 :1-935886-44-4
Release Date :Nov 27th, 2024
Cover Type:Gloss U.V. Coating
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:320
UPGRADE / CONVERT this book to premium GBC Plastic-Comb binding!


Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Russian Military Forces, Operations & Tactics
Whereas previous editions were an examination of historical Soviet-era forces, OPFOR SMARTbook 3: Russian Military, 3rd Ed. (OPFOR 3-3) is completely updated for 2025 focusing instead on present-day Russian Federation forces as observed in their third year of war on the battlefields of Ukraine. As such, OPFOR 3-3 represents perhaps the most comprehensive, up-to-date examination and analysis of Russian forces, operations and tactics available today.
At 320 pages, OPFOR 3-3 chapters include the strategic environment (Russian strategic overview, Euro-Atlantic security environment, Russian threat assessment, Russia’s war on Ukraine, NATO enlargement), Russian military forces (historical overview, modern Russian military, joint strategic commands), Russian (SV) ground forces (organization, planning, command posts, control measures), reconnaissance and security, Russian “strike” actions (indirect fires, antitank fires, radio-electromagnetic battle, aerospace support, NBC), offensive actions (attack formations, subunit actions, large-scale combat, local wars & armed conflict), defensive actions (fundamentals, brigade/battalion defensives), and Russian equipment & capabilities.
From the time of Peter the Great in the 17th and early 18th centuries to the present day, Russia has sought what it perceives is its rightful place as a world power.
The United States faces a combination of challenges and threats in the Euro-Atlantic area that we have not seen in more than thirty years. Russia is waging a full-scale war in Europe and shows no signs of stopping.
The Russian Armed Forces are the world’s fifth largest military force, with 1.15 million active-duty personnel and close to two million reservists. The Russian military, while much smaller than its Soviet predecessor, has significantly expanded its capabilities.
The Soviet view of the battlefield was linear with forces connected on both flanks. The new Russian assessment is that, because of the devastating effects of precision weapons, battlefields will be dispersed and nonlinear with brigades and divisions defending in separate actions or launching attacks on separate avenues. Russian tactics are a result of a combination of innovations and a continuation of past Soviet practices.
Russian reconnaissance and security are ongoing actions regardless of the type of competition, crisis, or conflict. The SV uses all forces and means available to conduct reconnaissance to gain information on the battlefield as well as security actions to deny an aggressor information and understanding of the SV’s forces.
Russia places strike as the leading function in its joint and tactical actions, with all other forces and means enabling it to set the conditions for successful land operations. Strike involves engaging all lethal and nonlethal forces and means to attack an aggressor at a planned location and time on the battlefield.
Although Russia announced a new military doctrine in 2014 that emphasizes defensive preparations and actions, the military and the SV still consider the offensive as the decisive battlefield action and the ultimate means of defeating an aggressor.
The SV is not the ground force of World War II or the Cold War, which involved massive armies and millions of soldiers in a linear, cohesive, side-by-side defense. Indeed, contemporary Russian military writers suggest that the future conventional battlefield under nuclear-threatened conditions and precision weapons will be fragmented. The SV will fight with open flanks protected by fires, counterattacks, strong points, difficult terrain, and obstacles.
Related Books
Discount sets with this book
JFODS6: The Joint Forces Operations & Doctrine SMARTbook, 6th Ed.
ISBN-10 :1-935886-96-7
Release Date :Dec 11th, 2023
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:368
UPGRADE / CONVERT this book to premium GBC Plastic-Comb binding!


Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Guide to Joint Warfighting, Operations & Planning
JFODS6 is the sixth revised edition of The Joint Forces Operations & Doctrine SMARTbook. JFODS6 is completely updated for 2023 with new/updated material from the latest editions of JP 3-0 Joint Campaigns and Operations (Jun ‘22), JP 5-0 Joint Planning (Dec ‘20), JP 3-33 Joint Force Headquarters (Jun ‘22), and JP 1 Volumes I and II Joint Warfighting and the Joint Force (Jun ‘20), Additional topics and references include Joint Air, Land, Maritime and Special Operations (JPs 3-30, 3-31, 3-32 & 3-05).
The ultimate purpose of the Armed Forces of the United States is to defend the homeland and win the nation’s wars. The four strategic uses of the military instrument of national power - assurance; both forms of coercion, deterrence and compellence; and forcible action - are implemented through campaigns, operations, and activities that vary in purpose, scale, risk, and intensity, and occur across a competition continuum.
The competition continuum describes a world of enduring competition conducted through a mixture of cooperation, competition, and armed conflict. Competition is a fundamental aspect of international relations; as state and non-state actors seek to protect and advance their interests in pursuit of influence, advantage, and leverage, they continually compete over incompatible aims. Armed conflict occurs when a state or non-state actor uses lethal force as the primary means to satisfy its interests. Armed conflict varies in intensity and ranges from crisis response and limited contingency operations to large-scale combat operations.
The capability of the Armed Forces of the United States to operate as a cohesive joint force is a key advantage in any operational environment. Integrating Service components’ forces under a single joint force commander (JFC) maximizes the effectiveness and efficiency of the joint force. The joint force conducts campaigns and operations in a complex, volatile, security environment characterized by contested norms and persistent disorder. National security threats are transregional, all-domain, and multifunctional.
Joint planning is the deliberate process of determining how (the ways) to use military capabilities (the means) in time and space to achieve objectives (the ends) while considering the associated risks. Joint planning ties the military instrument of national power to the achievement of national security objectives and transforms national strategic objectives into operational design/approaches, lines of operation, and operational objectives, which in turn are carried out through tactical actions.
A joint task force (JTF) is the most common command and control option for conducting joint operations. A JTF may be established when the scope, complexity, or other factors of the operation require capabilities of Services from at least two MILDEPs operating under a single JFC. Commanders must integrate the capabilities and synchronize the operations of air, land, maritime, space, special operations, and cyberspace forces to defeat peer enemies.
Related Books
Discount sets with this book
BSS7-1: The Battle Staff SMARTbook, 7th Ed. (w/SMARTupdate 1)
ISBN-10 :1-935886-94-0
Release Date :Feb 1st, 2025
Norman M. Wade
Binding Type:Plastic Comb
Total Pages:360

Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Planning & Conducting Multidomain Operations
BSS7-1: The Battle Staff SMARTbook, 7th Ed (w/SMARTupdate 1*) is completely updated for 2024 to include FM 5-0 w/C1, Planning and Orders Production (2022); FM 6-0, Commander and Staff Organization and Operations (2022), FMs 1-02.1/.2, Military Terms & Symbols (2024); and more!
* SMARTupdate 1 (ATP 2-01.3 (C2)/FM 1-02.2) to BSS7 updates the first printing of the BSS7 SMARTbook (Oct ‘23) by incorporating terminology changes from ATP 2-01.3 (C2), Intelligence Preparation of the Operational Environment (Jan ‘24) and changed material from FM 1-02.2 Military Symbols (Feb ‘24), along with minor pen-and-ink changes. An asterisk marks changed pages. (Learn more at www.thelightningpress.com/smartupdates/)
Focusing on planning and conducting multidomain operations (FM 3-0 Operations, 2022), BSS7-1 covers the operations process; commander and staff activities; the five Army planning methodologies - Army Design Methodology (ADM), Military Decision-making Process (MDMP), Troop Leading Procedures (TLP), Rapid Decision-Making and Synchronization Process (RDSP), & Army Problem Solving; integrating processes (intelligence preparation of the operational environment (IPOE), information collection, targeting, risk management, and knowledge management); plans and orders; mission command, C2 warfighting function tasks, command posts, liaison; rehearsals & after action reviews; and operational terms and military symbols.
The Army’s framework for organizing and putting command and control into action is the operations process—the major command and control activities performed during operations: planning, preparing, executing, and continuously assessing the operation. Commanders use the operations process to drive the conceptual and detailed planning necessary to understand their operational environment (OE); visualize and describe the operation’s end state and operational approach; make and articulate decisions; and direct, lead, and assess operations.
Commanders, staffs, and subordinate headquarters employ the operations process to organize efforts, integrate the warfighting functions across multiple domains, and synchronize forces to accomplish missions. This includes integrating numerous processes and activities within the headquarters and with higher, subordinate, supporting, and supported units. Key integrating processes that occur throughout the operations process include intelligence preparation of the battlefield, information collection, targeting, risk management, and knowledge management.
Planning requires the integration of both conceptual thinking and detailed analysis. Army leaders employ several methodologies for planning, determining the appropriate mix based on the scope and understanding of the problem, time available, and availability of a staff. Army planning methodologies include the Army design methodology (ADM), military decision-making process (MDMP), Troop leading procedures (TLP), rapid decision-making and synchronization process (RDSP),and Army problem solving.
Commanders and staffs integrate the warfighting functions and synchronize the force to adapt to changing circumstances throughout the operations process. They use several integrating processes to do this. An integrating process consists of a series of steps that incorporate multiple disciplines to achieve a specific end. For example, during planning, the military decision-making process (MDMP) integrates the commander and staff in a series of steps to produce a plan or order. Key integrating processes that occur throughout the operations process include intelligence preparation of the battlefield, information collection, targeting, risk management, and knowledge management.

Related Books
Discount sets with this book
INFO2 SMARTbook: Information Advantage, 2nd Ed.
ISBN-10 :1935886975
Release Date :May 1st, 2024
Norman M. Wade
Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:344
UPGRADE / CONVERT this book to premium GBC Plastic-Comb binding!


Paperback Edition
Price: $42.95 $36.95

Bundle & Save (Paperback + Digital)
Price: $85.90 $49.95
Activities, Tasks & Capabilities
INFO2 SMARTbook: Information Advantage (Activities, Tasks & Capabilities) is the second edition of our INFO SMARTbook, completely updated for 2024 to include ADP 3-13, Information (Nov '23) and JP 3-04, Information in Joint Operations (Sep '22). At 344 pages, INFO2 chapters and topics include information advantage (enable, protect, inform, influence, attack), information in joint operations (information joint function & OIE: operations in the information environment), information capabilities (PA, CA, MILDEC, MISO, OPSEC, CO, EW, Space, STO), information planning (information environment analysis, IPB, MDMP, JPP), information preparation, information execution, fires & targeting, and information assessment.
Information is central to everything we do—it is the basis of intelligence, a fundamental element of command and control, and the foundation for communicating thoughts, opinions, and ideas. Information is the building block for intelligence and is the basis for situational understanding, decision making, and actions across all warfighting functions. As a critical resource, Army forces fight for, defend, and fight with information while attacking a threat’s (adversary or enemy) ability to do the same.
We no longer regard information as a separate consideration or the sole purview of technical specialists. Instead, we view information as a resource that is integrated into operations with all available capabilities in a combined arms approach to enable command and control; protect data, information, and networks; inform audiences; influence threats and foreign relevant actors; and attack the threat’s ability to exercise command and control.
Army forces create and exploit informational power similarly to the joint force through five information activities (enable, protect, inform, influence, and attack). Army forces also consider information as a dynamic of combat power employed with mobility, firepower, survivability, and leadership to achieve objectives during armed conflict. As a dynamic of combat power, Army forces fight for, defend, and fight with information to create and exploit information advantages—the use, protection, and exploitation of information to achieve objectives more effectively than enemies and adversaries do.
The joint force uses information to perform many simultaneous and integrated activities. The joint force employment of information is of central importance because it may provide an operational advantage.
The elevation of information as a joint function impacts all operations and signals a fundamental appreciation for the military role of information at the strategic, operational, and tactical levels within today’s complex operational environment (OE).
Operations in the information environment (OIE) are military actions involving the integrated employment of multiple information forces to affect drivers of behavior by informing audiences; influencing foreign relevant actors; attacking and exploiting relevant actor information, information networks, and information systems; and by protecting friendly information, information networks, and information systems.
Related Books
Discount sets with this book