Atp3-01-8 - Techniques For Combined Arms For Air Defense
Atp3-01-8 - Techniques For Combined Arms For Air Defense
Atp3-01-8 - Techniques For Combined Arms For Air Defense
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited
Contents
Page
PREFACE..............................................................................................................iii
INTRODUCTION ...................................................................................................iv
SUMMARY OF CHANGES .................................................................................... v
Chapter 1 AERIAL THREATS AND DEFENSIVE PLANNING .......................................... 1-1
Anticipate Aerial Threats .................................................................................... 1-1
Analyze Air Threat Capabilities .......................................................................... 1-4
Threat Application ............................................................................................... 1-7
Defensive Planning ............................................................................................. 1-9
Chapter 2 TECHNIQUES FOR WARNING AND CONTROL ............................................. 2-1
Overview ............................................................................................................. 2-1
Chapter 3 PASSIVE AIR DEFENSE TECHNIQUES .......................................................... 3-1
Passive Air Defense ........................................................................................... 3-1
Chapter 4 ACTIVE AIR DEFENSE MEASURES ................................................................ 4-1
Active Air Defense .............................................................................................. 4-1
Appendix A ASSET PROTECTION ....................................................................................... A-1
Appendix B UNIT TRAINING ................................................................................................. B-1
GLOSSARY .......................................................................................... Glossary-1
REFERENCES .................................................................................. References-1
INDEX .......................................................................................................... Index-1
i
Contents
Figures
Figure 1-1. Pop-up and launch technique (Rotary Wing) ...................................................... 1-7
Figure 3-1. Attack avoidance ................................................................................................. 3-2
Figure 3-2. Detection avoidance. ........................................................................................... 3-3
Figure 3-3. Eliminate Glare. ................................................................................................... 3-4
Figure 3-4. Selecting natural cover. ....................................................................................... 3-5
Figure 3-5. Vehicle dispersion. .............................................................................................. 3-6
Figure 3-6. Estimating 20 degrees technique. ....................................................................... 3-7
Figure 3-7. Herringbone technique. ....................................................................................... 3-8
Figure 3-8. Small arms convoy coverage. ............................................................................. 3-9
Figure 3-9. UAS surveillance role ........................................................................................ 3-10
Figure 3-10. UAS indirect attack role ................................................................................... 3-11
Figure 3-11. UAS direct attack role ...................................................................................... 3-12
Figure 3-12. UAS swarm attack role .................................................................................... 3-13
Figure 3-13. Find, Detect, Identify UAS ............................................................................... 3-14
Figure 4-1. UAS groups 1 – 5 Mission Areas......................................................................... 4-4
Figure 4-2. Volume fire........................................................................................................... 4-6
Figure 4-3. Football Field Technique: Jet aiming points. ....................................................... 4-7
Figure 4-4. Football Field Technique: Helicopter aiming points............................................. 4-8
Figure 4-5. Firing positions. ................................................................................................... 4-9
Figure 4-6. Reference-point technique. ............................................................................... 4-10
Figure A-1. AMD planning process ........................................................................................ A-4
Figure A-2. Example CAL and DAL development. ................................................................ A-6
Tables
Table 3-1. Recommended Threat UAS Reporting Format .................................................. 3-15
Table 4-1. Aiming Points. ....................................................................................................... 4-8
Table B-1: Example Passive Air Defense Training Checklist ................................................ B-2
ii ATP 3-01.8
Preface
Army Techniques Publication (ATP) 3-01.8 provides guidance to combined arms commanders on how to defend
against air defense threats. Its focus is to assist in understanding the possible air and missile threats combined
arms forces may encounter, providing techniques to counter the air threat while placing the threat in its proper
perspective including passive and active air defense measures that that ground commanders can utilize in order
to protect their units from air attack.
The principal audience for ATP 3-01.8 is commanders, leaders, and staff who employ combined arms air defense
planning within their operations. Trainers and educators will also use this publication to support the employment
of combined arms air defense into their curricula.
Commanders, staffs and subordinates ensure their decisions and actions comply with applicable United States,
international, and in some cases host-nation laws and regulations. Commanders at all levels must ensure their
Soldiers operate in accordance with the law of war and the rules of engagement (ROE) (see FM 27-10).
ATP 3-01.8 uses joint terms where applicable. Selected joint and Army terms and definitions appear in the
glossary and the text. For definitions shown in the text, the term is italicized and the number of the proponent
publication follows the definition. This publication is not the proponent for any Army terms.
Unless this manual states otherwise, masculine nouns and pronouns do not refer exclusively to men.
ATP 3-01.8 applies to the Active Army, Army National Guard/Army National Guard of the United States, and
United States Army Reserve unless otherwise stated.
The proponent of ATP 3-01.8 is the United States Army Fires Center of Excellence. The preparing agency is the
Directorate of training and Doctrine, Air Defense Artillery (ADA) Branch. Send written comments and
recommendations on a DA form 2028 (Recommended Changes to Publication and Blank Forms) to, United States
Army ADA School, Fires Center of Excellence, ATTN: ATSF-DD, 700 McNair Avenue, Suite 128, Fort Sill,
OK 73505; by email to usarmy.sill.fcoe.mbx.dotd-doctrine-inbox@mail.mil; or submit an electronic DA Form
2028.
iv ATP 3-01.8
Introduction
Summary of Changes
This publication addresses a holistic approach to training, planning, preparing, and
implementing combined arms defense techniques against the full range of air threats.
Changes include recent measures captured from lessons learned when countering
unmanned air threats. It also discusses asset protection considerations in the form of
area and point defense protection in Appendix A.
Chapter 1 discusses air and missile threats. It further describes, in general,
defensive active and passive measures units must implement in order to defeat
aerial attacks.
Chapter 2 provides details on each type of adversarial aerial threat that may be
encountered, how the enemy may employ them and measures units must plan for,
and implement in order to defeat them.
Chapter 3 discusses active and passive air defense techniques all units must
employ within their organic capabilities. It further discusses available support from
external sources including Aviation and ADA units as well as other service
capabilities to protect personnel and equipment from enemy aerial reconnaissance
and aerial attack.
Chapter 4 discusses unit security and intelligence operations planning to include
reconnaissance and counter reconnaissance activities.
Appendix A discusses integration of aerial threats and combined arms training as
a component of unit combined arms training strategy. It also describes methods
for unit training as it pertains to its preparation to implement active and passive air
defense measures.
Appendix B discusses asset protection considerations.
ATP 3-01.8 v
This page intentionally left blank.
Chapter 1
AERIAL THREATS AND DEFENSIVE PLANNING
This chapter defines aerial threats and lays the foundation for basic air and missile
defense (AMD) planning in support of combined arms operations. Commanders must
understand the circumstances that shape the operational environment and the potential
threats in order to preserve combat power. This chapter also outlines potential negative
effects on combat power to include collecting and analyzing data in order for the
commander to destroy or counter these air threats.
These attacks were normally made against massed forces in convoys or within built up areas using strike
aircraft or fighter bombers.
Modern types of hybrid threats (for example, unmanned remote piloted) differ in their capabilities and
in the manner in which they are employed. These systems can be configured to perform or support other
tactical operations presenting a distinctly different threat profiles. Locating the smaller UAS groups, their
launch points or operators is often difficult using air defense radars and other sensors.
AIRCRAFT
What are the enemy’s capabilities regarding aircraft:
Coordination of air-to-ground attacks?
Coordination of air and artillery operations?
Forward air controllers?
Suppression of friendly air defense?
Performance (speed, altitude, airfield restrictions, troop and weapon load capacity)?
Endurance and range (ingress and egress altitudes and speeds)?
Levels of combat readiness and sortie generation rate?
Ability to conduct pop-up maneuvers. What is the standoff range?
Target acquisition capability, night and adverse-weather capability, and identification ranges?
Standoff ranges for cruise and tactical air-to-surface missiles?
Ordnance load (maximum weight, type, load mixture, and level of sophistication)?
Combat personnel load?
Navigational capability (type of radar; can it fly at night or in adverse conditions)?
Combat radius (with or without external tanks, ordnance, and location of staging bases)?
Loiter time (how long will it have on station over the target area)?
Countermeasures. For example, will standoff jammers, ground-based jammers, reconnaissance or
chaff laying UAS, or aircraft degrade friendly air defense systems?
Type, quantity, and quality of pilot training?
Do they follow their doctrine?
Do they execute centralized engagements tied to pre-briefed routes, targeting, tactics, and
doctrine?
Have they conducted decentralized engagements supporting independent operations and
engagement adjustments?
Is the attacker operationally linked to a ground controller?
Ability of pilots to fly at night or perform contour flying? During peacetime, did the pilot conduct
wartime mission profiles?
Is the attacker working with a ground controller?
How long can each type of aircraft loiter within the directed area of operations?
Type of threat ordnance evaluated as follows:
Range: Assume engagement at maximum range
Accuracy
Release altitude: How high or low must the aircraft fly?
Reload and fire time: What is the missile basic load?
Warhead type (for example, mass casualty, conventional, and sub munitions). Guidance
systems? How does the pilot acquire and engage?
lethality by employing CBRN capabilities. CM’s are generally perceived as less provocative than ballistic
missiles and may result in lower export or technology control standards.
What are the capabilities of threat CM regarding:
Performance (flight time, speed, altitude, and launch restrictions)?
Maximum and minimum ranges?
Circular error of probability?
Targeting capabilities and type?
Contour flying capability?
Vulnerability to countermeasures?
Guidance modes?
Warhead type and size?
Launch platform: fixed, mobile; time to set up/ launch/move?
ROTARY-WING AIRCRAFT
RW aircraft versatility and survivability make it ideal for troop and equipment transportation, logistics
resupply, air assault, and serve as heavily armed weapons platforms for attack roles. RW aircraft currently
exist in every potential theater that forces may enter. Many countries around the world possess attack
helicopters and have the ability to inflict heavy casualties on the force and destroy critical assets.
Threat helicopter forces supporting ground operations operate nearly the same as a friendly helicopter
force. Helicopters are agile and make good use of cover and concealment offered by folds in the earth and
trees. Their armament may include antitank guided missiles, free-flight air-to-air missiles, and radar-directed
machines- or Gatling-type guns. Antitank guided missiles can be electronically controlled or laser-guided to
engage and destroy armored vehicle at standoff ranges of more than three kilometers.
Using pop-up and launch techniques (Figure 1-1, page 1-7), attack helicopters can deliver a devastating
blow against exposed maneuver units. Their lethality is somewhat softened by practical considerations. They
must detect a target to engage it and remain in the open long enough to aim and fire their weapons. For some
antitank guided missiles, attack helicopters must maintain track on both the missile and target throughout the
missile's flight, which leaves the helicopter exposed for up to 23.2 seconds. The 57-millimeter Folding Fin
Aerial Rocket is an area weapon and is effective against exposed troops and lightly armored vehicles at ranges
greater than 1,000 meters.
FIXED-WING AIRCRAFT
Although missile threats have taken the place of FW aircraft as the principal air threat to ground forces.
The enemy against friendly forces may employ the following types of FW aircraft; bombers, fighter-bombers,
fighters, and close air support aircraft. Any of the FW family may carry tactical air-to-surface missiles while
only the larger ones will carry CMs. Improvements to FW aircraft will include increased survivability
measures and improved fire control accuracy.
High-performance aircraft, operating in a ground attack role, attack at relatively high speeds. They
normally operate under centralized control and are directed against preplanned targets. These aircraft target
areas where ordnance delivery optimizes destructive effects. If they have ordnance remaining after
completing their primary mission, the aircraft may be released to attack targets of opportunity on their return
flight. Whether against preselected targets or against targets of opportunity, the attack will usually include a
high-speed, low-level penetration run to a point near the target area to avoid low and medium-altitude air
defenses. Ground attack aircraft are effective against preplanned targets. The pilot will carry the correct
ordnance for the target location. Effectiveness decreases against targets of opportunity. Pilots must locate
their targets, plan their attack, and deliver their ordnance in a short time. As a result, accuracy and
effectiveness are degraded. The use of area type weapons such as cluster bombs or folding fin aerial rockets
can be expected on the initial attack run, while cannon and machine-gun fire will likely be used in the follow-
on attack.
THREAT APPLICATION
Air threat employment against ground forces may vary from country to country. Threat equipment,
capabilities, organizational structures, and military political goals will drive this employment. By
understanding air threat capabilities, the commander can make assumptions on how a threat may employ air
assets to interdict operations. The following information describes the type of threat that can be countered
with each stage of warfighting function operations.
ENTRY PHASE
Entering forces may be required to deploy into hostile environments where enemy forces possess equal
or less air power capabilities. We can expect the threat to use his entire aerial assets against lucrative targets
in the areas of debarkation. Low-altitude aerial threats will probably be employed in attack operations against
ports of debarkation (air or sea), assembly areas, lodgments and supply points.
OPERATIONS
We can expect continued activity from threat forces throughout the range of combat operations. It is
also probable threat forces will attempt to counter our defensive actions and offensive air operations using
any combination of threat platforms and tactics available. The threat commander will seize any opportunity
to capture information determining friendly unit locations, movements, and objectives. Aerial and artillery
strikes can be generated from the intelligence gathered against the following targets:
Maneuver forces.
Forward arming and refueling points.
Forward Operations Bases.
Command posts.
Reserve troop concentrations.
Logistical support areas.
Terrain features.
Obstacles constricting unit movements as forces advance to close with the enemy forces.
UAS can be effective in disabling or interrupting the conduct of military operations, their
communications networks, information related activities, or destruction of equipment and facilities. Group 1
UAS can assist in coordinating complex attacks or used like an improvised explosive device to degrade,
delay, and disrupt friendly movement. Group 5 is highly suitable to conduct drone strikes. Tactical UASs
and CMs will probably be used against logistical concentrations, command posts, or paired with sub-
munitions for anti-access and area denial. RW aircraft will be used to attack forward elements and the flanks
of the advancing maneuver force to slow their tempo, cause confusion and, thereby, inflict maximum
casualties. These armed attack helicopters constitute the most widespread and capable air threats to friendly
ground forces in the battle.
Defensive Considerations
Friendly forces may be the most vulnerable to threat actions from enemy aerial platforms when
conducting everyday operational tasks supporting the defense. The enemy will attempt to use aerial platforms
to monitor friendly forces for targeting. We can expect the enemy to use UAS, RW, and FW aircraft, to
determine locations of friendly forces, command centers and sensor locations. Once these sites are located,
threat forces will likely disrupt operations or destroy these sites with artillery and rocket fire, air attacks, air
insertion or a combined approach. Electronic attack capabilities may also be employed in an attempt to
counter an attack, especially against UAS threats adding to an already congested air environment.
The enemy's preferred weapons against air defense weapon systems and forces may be artillery and
rocket attacks. Most artillery and rocket systems are plentiful, inexpensive, highly mobile and survivable,
adaptable, and highly effective. UAS will be employed to attack or provide targeting data during this phase
of the operation. UAS are extremely effective in this role due to their small size, small radar cross section,
and standoff capability. RW and FW attacks are less likely during this phase due to the poor survivability of
these systems. In most cases, they are limited to daylight operations. These attacks will be supported with
pre-attack and post attack reconnaissance.
Enemy forces may conduct air insertion operations with either FW or RW assets during the hours of
limited visibility. The enemy will likely conduct daytime reconnaissance of landing sites and target areas
within 24 hours prior to an attack. These operations will fly at low levels attempting to avoid detection from
sensors and infiltrate into friendly unoccupied areas.
Offensive Considerations
While conducting offensive actions, enemy forces will likely attempt to use maneuver and fire support
assets to gain the initiative. Threat air activity will most likely support their own combined arms operations.
UAS are best suited for these types of operations, especially if enemy forces have developed effective mission
command capabilities. RW assets can be used in attack, air insertion, or reconnaissance. RW in the
reconnaissance role will operate in the same manner as UAS to support artillery targeting and maneuver. In
the attack, the unit can expect spoiling attacks that usually consist of at least two or more helicopters to
disrupt friendly operations.
FW assets may be limited and countered in their offensive role by the employment of friendly FW
aircraft. The enemy’s use of FW aircraft to stall or stop friendly forces advances cannot be entirely ruled out
since the ground commander may see limited aircraft used during a spoiling attack. An air attack may be
non-coordinated with enemy forces given the number of aircraft involved.
DEFENSIVE PLANNING
Combined arms forces must create a defensive plan that provides the most flexibility for all elements
operating within the area of operations. Planning a defense must also be coordinated with higher and lower
echelons operating in areas that may be impacted during operations. Collaboration assists units during
planning and development by sharing information and intelligence collection products. Collaboration also
directs the commander’s intent and objectives amongst echelons. Defense plans and rehearsals enforce
training standards and likely result in suitable counter responses to most situations encountered. Defensive
planning identifies the commander’s priorities. For example; threat sets, assigned levels of protection of
assets, required actions the unit must take to defend itself in the event of attack and allows for reassessment
and possible reengagement coordination.
Aircraft Considerations
Cloud cover restricts aircraft operations providing low operational ceilings and restricting visibility
and target engagement. Low ceilings, overcast, and clouds may restrict visually directed combined arms air
defense detection and acquisition ranges. Extreme temperatures and humidity may have a severe effect on
aircraft and UAS continuous operations by decreasing combat range, altitude, and ordnance loads. Cloud
cover, heavy foliage, and built up urban areas provide ideal cover and concealment from tactical UASs. RW
UAS can go undetected against a dark cloud or tree line while providing ideal surveillance, target location
information and unit intelligence collection.
OVERVIEW
U.S. forces have predominantly achieved air superiority and fought on battlefields with little
apprehension towards enemy surveillance or attack from the air. However, in future operations we could face
a significant air threat challenge where potential enemies could have significant air capabilities.
We can expect that friendly units operating within a threats capability will be targeted attacked from
the air and the ground. Due to limited air defense resources and defended asset priorities, many Army units
and facilities may not receive adequate levels of dedicated air defense protection. These units and facilities
must be prepared to protect themselves. All units must reduce their vulnerability to air action by
implementing passive and active air defense measures.
down units for rest or maintenance. Alert states and readiness conditions are implemented locally and
coordinated with guidance from the deputy AADC and designated controlling authorities. The Combined
arms force should understand ADA brigade commanders establish and control the alert state for their
subordinate units operating in support of maneuver areas of operation. Actual timelines and manning
requirements are determined by theater or joint operations area plans. Alert state and readiness condition
information is normally found in the unit’s tactical standard operating procedures which also takes into
account the factors of mission, enemy, terrain and weather, troops and support available, time available, and
civil considerations (METT-TC).
RULES OF ENGAGEMENT
ROE at all echelons are positive and procedural directives that specify the circumstances and
limitations under which forces will initiate or continue combat engagements with enemy forces. The joint
force commander approves the theater ROE. These established ROE enable the air defense commanders to
delegate the authority to execute air defense operations. The ROE also permit the senior air defense
commander to retain control of an air battle by prescribing the exact conditions under which engagements
may take place. ROE are a direct reflection of the centralized control with decentralized execution principles
of air defense. ROE apply to all warfare participants in the theater and disseminated to all echelons of air,
land, and sea forces. Commanders have the responsibility to take whatever action is necessary to protect their
forces and equipment against air or missile attack. When under attack, the right of self-defense takes
precedence over any other established rules and procedures, which normally govern engagement. There are
seven ROE categories. The first three ROE are applicable to all air defense contributors. The others are
primarily for ADA forces.
Right of self-defense.
Hostile / Identification criteria.
WCS.
Level of control.
Modes of control.
Autonomous operations.
Fire control orders.
Right of Self-Defense
Commanders have the responsibility to use all necessary means available and to take all appropriate
actions in self-defense of their unit and other forces in their vicinity in response to a hostile act or
demonstrated hostile intent. Self-defense operations allow friendly units to defend themselves against direct
attacks or threats of attack with the use of organic weapons and systems. The right of self-defense is inherent
in all ROE and weapons control procedures.
flight path, and possible battle effects. Ballistic missiles have a distinct flight profile and specific ROE for
immediate engagement. While the ROE for aircraft may allow additional time before engagement.
Hostile criteria are basic rules that assist in the identification process of friendly or hostile air platforms.
These rules are promulgated through subordinate commanders from the joint force commander or AADC
when so authorized. The commander who establishes hostile criteria parameters may consider the factors of
speed, altitude, and heading or other requirements within specified volumes of airspace. The local
commander may also consider specific enemy threat characteristics or hostile acts.
Echelons having engagement authority use hostile criteria to determine the identification of detected
air targets. The highest echelon capable of managing engagement operations normally retains identification
and engagement authority. Upon target detection, fire units and sensors with real time and near-real-time data
transmission capability assist controlling authority by forwarding targeting information. The controlling
authority makes final target identification and delegates’ engagement authority. Engagement authority
centrally controlled with decentralized execution given to lower echelon units in coordination with higher
echelon.
Level of Control
Level of control describes the ADA echelon at which positive management of the air battle is
conducted. This can be an AADC, regional air defense command, sector air defense commander, ADA
brigade, battalion, or the individual unit. Different levels of control are normally established for engagements
of FW aircraft, RW aircraft, UASs, CM and ballistic missiles. The AADC will specify the level of control in
the AADP, which may change over the course of an operation.
Modes of Control
Combined arms forces must be familiar with the overall area ADP that specifies the modes of control,
trigger events and when they should be changed, and who has the authority to change them. The mode of
control selected may depend upon the capabilities of the communications system, the weapons systems
employed, and both the friendly and enemy air situations. There are two modes of control, centralized and
decentralized refer to FM 3-01 for more information.
Autonomous Operations
A unit assumes autonomous operations after it has lost all communications with higher and adjacent
echelons. The unit commander assumes full responsibility for control of weapons and engagement of hostile
targets. Normally, the ROE and supplemental fire control measures in effect at the time of communications
loss remain in effect until communications are regained. Changes to ROE and supplemental fire control
measures scheduled to go into effect after communications are lost will be implemented as scheduled.
Concealment
3-6. There are three concealment principles employed (site, discipline, and construction) to eliminate the
factors of recognition. Site refers to positioning your unit in the most advantageous area in which to hide a
man, equipment or an activity. Discipline success in any attack avoidance effort is the strict maintenance of
concealment discipline by both the unit and by the individual Soldier. All activities should be avoided that
change the appearance of an area or reveal the presence of military equipment. Laxness and carelessness will
undoubtedly reveal a position. Tracks, spoil, and debris are the most common signs of military activity, which
indicate concealed objects. Ensuring wheeled/track/foot movement follows existing paths, roads, fences, or
natural lines in the terrain pattern. Do not end exposed routes at a position, but extend them to another logical
termination. If practical, tracks should be brushed out, camouflaged, or covered. Spoil and debris must be
covered or placed to blend with the surroundings. Artificial camouflage is added when the terrain and natural
vegetation are such that natural concealment is not possible.
3-7. While concealing a position it is best to use natural construction materials to blend-in with the
surrounding terrain, which augments this type of concealment. Concealment techniques are hiding; blending,
and disguising:
Hiding. Hiding is the concealment of an object by some form of natural or man-made screening.
For example, sod over mines in a minefield hides the mines; the overhead canopy of trees hides
the objects beneath from aerial observation; a camouflage net hides an object beneath it; a defilade
position hides objects from ground observation. In some cases, the screen itself may be invisible.
In other instances, the screen may be visible, but it hides the activity or object underneath it.
Blending. Blending is the arrangement or application of camouflage materials on, over, and around
the object so that it appears to be part of the background. For example, applying face paint to the
exposed areas of skin; adding burlap, paint, and live vegetation to helmets and clothing to closely
resemble or blend into the background. The same technique can be applied for equipment or
structures.
Disguising. Clever disguises can often mislead the enemy concerning identity, strength, and
intention, and may draw fire away from real assets. Therefore, the simulation of objects, pieces of
equipment, or activities may have a worthwhile military significance. Rubber tanks, placard tents
and buildings and other decoys, as seen from the air may appear natural or real to an aerial
observer.
A high probability of attack must be assumed in planning convoy operations. Not all convoys will be provided
dedicated air defense assets and must be prepared to employ organic passive and active air defense measures
for protection.
Attack Avoidance
3-11. The enemy may find it difficult to locate a convoy that takes precautions to reduce its visible signature.
While it is not possible to become totally undetectable, the convoy commander must take every measure to
decrease the likelihood of being spotted. Examples of effective passive measures are:
Change the profile or shape of vehicles. Can it be accomplished by rigging tarps and bows over
the cargo compartment?
Train operators, as they disperse, to look for a bush, tree, or some other means of concealment to
break their vehicles' shapes as seen from the air
If vehicles are not already painted in a pattern to blend with the terrain and to break the outline,
use mud, camouflage nets, or vegetation to achieve this effect.
Try to reduce the dust clouds that usually accompany a convoy. If possible, try to avoid unpaved
secondary roads. Reduce speed to reduce dust on unpaved roads.
Try to eliminate glare by using mud, tape, cardboard, tarps, camouflage nets, or ponchos to cover
headlights, window glass, and other glossy surfaces. See Figure 3-3.
Use smoke or other obscurants to conceal positions and movements to deceive the enemy as to
mission and intent (draw attention to deception operations).
Operate at night or during periods of limited visibility as much as possible.
Position vehicles and facilities inside wood lines and erase vehicle tracks left outside of wood
lines. Dedicate air guards and understand the signs of UAS in the area (for example: noises that
are not normal for that area of operations).
Damage-Limiting Measures
3-12. Cover is the best damage-limiting factor. Since convoys are highly visible, you should plan routes that
offer damage-limiting features in case you become exposed. If your signature reduction efforts are not
successful, selecting natural cover such as ditches and embankments to the sides of the roads, offer cover and
should be used if the unit is attacked. See Figure 3-4 on page 3-5.
Dispersion
3-13. Dispersion may be your best damage-limiting measure. Proper dispersion of your unit and equipment
lessens target density and reduces the lethal effects of the ordnance used against you. Most of the munitions
that aerial platforms deliver against vehicles must make a direct hit to be effective. Even area weapons
become less effective if the unit is dispersed. The commander must weigh the need for dispersion against the
need to stay concentrated to accomplish the mission.
3-14. A technique to achieve dispersion is to travel in an open column with 80 to 100 meters between vehicles
during daylight movements and 25 meters during night movements. Air guards can be posted throughout the
column constantly watching the skies ready to give early warning of a detected hostile aerial platform. The
earlier an aerial threat is detected, the more time your unit will have to react. Air guards search and scan for
approaching aerial threat while observing their assigned sectors. Crewmembers must also scan their sectors
for ground targets while remaining aware of possible air threats. Crews should use the horizontal search-and-
scan technique or vertical search-and-scan technique for detecting air targets.
3-15. Crewmembers should periodically check the air space above their assigned sector using the rapid-scan
technique. As each crewmember completes a rapid scan across their sector and field of view where it meets
the horizon, they should switch to a detailed search and make a careful, deliberate search of tree lines, valleys,
and possible air corridors. When an aerial platform is detected, alert the vehicle commander by calling out
the type of platform (plane or unmanned aircraft) and pointing to the aerial platform. Examples of dispersion
methods include:
Increase the number of serials for convoy movements and decrease the number of vehicles in each
serial. This procedure provides a smaller target and increases the level of control over each convoy
element. This also allows for greater dispersion and reaction time between convoy elements.
Do not park vehicles in a straight line; instead, stagger the vehicles to present a poor target. Park
the vehicles under cover if available. Arrange with the drivers so that if an attack occurs, they can
drive the vehicles to the opposite sides of the road to seek cover. For example, the lead vehicle
(odd numbered) is driven to the left; the second vehicle (even numbered) pulls off to the right, and
so on (Figure 3-5 on page 3-6).
Detect
3-16. Fixed-wing and rotary-wing aircraft are difficult to identify as they usually engage at extremely long
ranges beyond visual recognition. UAS groups 1-3 can also be difficult to readily identify because they can
operate low to the ground, move very slowly and have small radar cross sections. To prevent fratricide leaders
must keep crews informed of friendly and hostile aircraft and aircraft systems operating in their unit’s sector.
Crews must make every effort to correctly identify a target as friend or foe prior to an engagement.
3-17. Based on METT-TC the combined arms commander may elect to establish air guards within sections,
platoons, or convoys. If an Avenger team is attached to the unit, they should assume the role as primary air
guards. Air guards are responsible for spotting aerial threats within close proximity to the units’ location. Air
guards can be the first line of defense especially detecting and coordinating enemy LSS targets and their
positions. It is important to engage all aerial targets at the earliest possible time. Air guards search for aerial
targets using search and scan techniques as crewmembers within the convoy. Air guards and gunners search
not only their assigned sector using the passive air defense techniques, but also ensure:
Sector limits established for the gunner must cover likely helicopter locations and avenues of
approach.
Gunners must make sure ground reference points are always within their field of view in order to
maintain directional control and situational awareness.
Note. You should expect enemy aircraft typically operating in pairs that may include one or more
pairs of aircraft conducting the attack mission.
Routes
3-22. Consider using routes that offer the greatest natural concealment. Trees and the shadows they cast offer
concealment. The shadows cast by mountain ridgelines in the early morning and late afternoon also, provide
concealment. When crossing open country, travel should occur when the sun is high to avoid casting long,
highly visible shadows. When possible, use multiple routes to reduce convoy lengths. Travel in an open
column with 100 meters between vehicles. Vehicles stretched out in a long thin line in a convoy are less of a
target than vehicles that are located closer together.
Breakout Plan
3-24. Arrange to defend against an attack by moving the vehicles to opposite sides of the road to seek cover:
The lead vehicle goes to the right, the second vehicle pulls to the left, and so on. This technique is called the
Herringbone (see Figure 3-7). If possible, have vehicles drive 45 degrees off the road and move to a covered
and concealed position. Establish rally points for the convoy to reassemble after the attack. In cases where
not all vehicles in the convoy have radios, the unit must develop a means to signal drivers that enemy aircraft
are coming. The use of protective vehicle-launched or hand grenade smoke can cause the threat air to lose
weapons lock or disrupt target acquisition long enough for convoy vehicles to find suitable concealed or
dispersed positions.
What to do
3-31. Proper planning by leaders will ensure that units employ adequate force protection measures to counter
the UAS threat. Units must develop tactics, techniques and procedures to counter this threat in their respective
areas of operation. Units must request and coordinate current air threat information from their intelligence
sections, and observe all enemy techniques used and define an operational tactic, technique or procedure
(Direct Fire, Reporting Criteria, etc.). Notify higher and adjacent units (Clear airspace and pass early
warning). Move to overhead cover. Get distance and bearing to the threat. Recommended format to use in
reporting threat UAS shown in table 3-1 on page 3-15.
3-32. Understanding the capabilities and limitations of UAS group 1 or 2 can increase a Soldiers ability to
react and defeat a threat. Reacting to a threat UAS should include reporting timely and relevant information
to mission command and security control personnel if the UAS does not pose an immediate threat. Defeat
does not equate kinetic means; however, it is an option. Other defeat solutions could be limiting a
surveillance threat from gaining information or following the air path of the UAS to the operator.
Note: Right of Self-Defense-The inherent right to fire at attacking aerial platforms is derived from
self-defense doctrine refer to FM 3-01. A unit may defend itself from direct attack but may not
engage aerial platforms, which do not pose a threat except on the command of the appropriate
authority or in following the current ROE.
defense with exception of tasks focused primarily on ballistic and CM threats which identify launch points,
classify the type of threat and project potential impact points. Characterization of a missile threat is significant
for combined arms units as these threats typically traverse multiple operational areas requiring protection
from a nearby air defense weapon system. Active missile defense is the continuous actions to detect, identify,
classify and engage hostile missiles.
Air defense forces have a variety of different systems at their disposal that contribute to or perform
active missile defense. These systems are generally referred to as either sensors or shooters based on their
intended purpose but equally contribute to active missile defense.
Sensors play an important role in active missile defense. Whether acting as a stand-alone sensor
reporting to a single mission command node or functioning as part of a sensor network, sensors enable
situational awareness of the commander’s operational environment. It gives commanders the early warning
capabilities needed to mitigate risk to personnel and equipment minimizing effects from missile attack.
Contributing Sensors
Examples of sensors that contribute to active missile defense are:
The theater event system that provides comprehensive tactical warning architecture supporting
geographic commands and theater warning elements.
The Defense Support Program is a satellite system using space-based infrared detection
capabilities to detect and report near or real time missile launches
The Joint Tactical Ground Station is a transportable information processing system that receives
and processes in-theater, raw, wideband infrared data down linked from Defense Support Program
sensors. The system disseminates early warning, alerting, and cueing information on ballistic
missiles and other tactical events of interest throughout the area of operations using existing
communications networks.
The AN/TPY-2 forward based mode radar provides long-range surveillance, tracking, external
sensor cueing, and launch and impact point estimates for ballistic missile defense.
The Sentinel radar provides 360-degree surveillance coverage at a range of approximately 40
kilometers. It has the capability to acquire, track, and classify CMs, UAS, fixed and rotary wing
aircraft. The sentinel provides track data to Air Defense Airspace Management cells and is
normally deployed with Indirect Fire Protection Capability /Avenger and organic to Avenger
battalions and Target Acquisition Platoons at division.
Although these sensors cannot actively engage threats, they do provide weapon system cueing and
early warning functions needed by combined arms commanders to make an informed decision. These systems
are normally tied into an established early warning network where tactical commanders can integrate their
units through the deployment of air defense airspace management cells or AMD elements at the brigade
combat team or division. Based on the information given on a potential threat, a commander can make a
decision on active defense or employ passive defense measures. The commander may also have time
available to take force protection measures against a threat such as an inbound ballistic missile if there are
no available air defense systems that can defend against it. Above all, coordinating sensor plans with air
defense elements prior to and during operations can increase a unit’s survivability especially when located
separately from the main effort. Implementing sensor plans using varying routines will also reduce an
adversaries targeting and counter-target effectiveness. When combined arms forces operate their sensors they
must consider the following:
Positioning sensors and forces within the effective range of an air defense weapon system.
Coordinating with supporting Signal for spectrum management.
Operating radars other sensors using intervals and frequency diversity techniques.
Plan for low, slow, small UAS used for counter-sensor and targeting operations.
Prepare for electronic warfare directed at overwhelming sensor networks (including counter-fire).
Enemy employment of heavy or mobile jamming tactics.
Contributing Shooters
Examples of shooters that contribute to active missile defense:
The THAAD missile system is a defensive weapon system within the theater used to protect
against hostile incoming TBM threats. The system provides the upper tier of a two-tiered layered
defensive shield to protect high value strategic or tactical sites such as airfields or populations
centers. Combined arms forces may operate in areas where coverage by THAAD exists by default
through a theater early warning system.
The Patriot air defense system provides air defense coverage against TBM’s and ABT’s within
the area of operations. Patriot can defend against the larger UAS platforms (groups 3, 4, and 5),
lower tier TBMs, CMs, fixed-wing aircraft, and rotary wing aircraft. Combined arms forces may
transition through areas where Patriot coverage is coordinated or dedicated to them through theater
early warning operations.
Avenger missile systems are highly mobile and versatile. Avenger can be queued to search a
specific area or tied into the division’s early warning sensor networks. Avenger can support and
coordinate lower tier AMD engagements within their designated zones.
increased availability can make it difficult for friendly forces to distinguish between friendly and enemy UAS
platforms.
UAS Groups
UAS platforms are identified by groups ranging from 1 thru 5 based on their capabilities with each
group presenting a unique set of capabilities or problems for commanders. UAS threats are the greatest near-
term concern for SHORAD and combined arms forces.
UAS are grouped based on the physical and performance characteristics of weight, operating altitude,
and airspeed. UAS groups 4 and 5 are larger systems with endurance normally deployed to conduct
operational or strategic mission sets. These groups normally operate at altitudes up to 18,000 feet and require
runways or roads for launch. UAS groups 2 and 3 are smaller with missions that center on tactical operations.
Group 3 UASs normally operate at a comparable elevation as groups 4 and 5 but do not have the payload
capacity. UAS group 2 operate at a much lower altitude (less than 3,500 feet above ground level), have a
limited payload, and 2 require some logistical support. UAS group 1 consists of small or micro systems that
are easily deployable within line of sight of its operator and primarily used for surveillance and
reconnaissance at very low altitude (less than 1,200 feet), see figure 4-1 below.
The tasks of correctly identifying aircraft is often challenging in itself; however, performing these tasks
on unmanned platforms having limited or no identification, friend or foe capabilities, increases a unit’s
difficulties in achieving positive identification.
Combined arms commanders will be challenged with the tasks of detecting, identifying, and defeating
the unmanned threat platforms that enter into their airspace. During planning, a commander must consider
the capabilities of the unmanned threat within their area of operations, the capabilities of friendly air defense
systems and how they can contribute to countering the 4-20, threat.
Cloud cover, heavy foliage, and built up areas provide ideal cover and concealment for groups 1 thru
3 and these platforms can operate at ranges varying from 25 to 800 kilometers with flight times up to 72
hours. UAS roles include; reconnaissance, surveillance, target acquisition, suppression of enemy air defense,
ground attack, decoy, communications relay, and chemical detection. The enemy’s surveillance mission may
incorporate UAS to locate friendly maneuver forces and key assets with the ability to pass real-time
information to long-range systems. The commander must assess his unit’s methods (tactics, techniques, and
procedures) that will be used to confirm and report unknown and hostile UAS activity, and how to counter a
possible UAS threat.
Planning considerations at the tactical level include:
Incorporating early warning network capabilities including ADAM and Brigade Aviation Element
cells.
Identify capabilities and profiles of hostile UAS platforms.
Address locations of likely targets
Train ground troops to identify a UAS either visually or acoustically.
Required coordination and synchronization actions with supporting command posts and air
defense units for integration into sensor plans and targeting priorities.
Establish UAS reporting procedures.
Identification of unknown UAS.
Notification forwarded to supporting air defense or integration officer.
Minimize the unit’s exposure to threatening UAS while coordinating UAS position.
Monitor threat UAS actions and coordinate engagement support of threat UAS if needed.
Combined arms forces that encounter hostile UAS may have limited time to engage due to the speed
and altitude of the UAS. Air space control officers may encounter similar difficulties based on; the
capabilities of sensors used within their early warning network, the low radar cross sections of many UAS,
or targeting impacts due to congestion of the airspace. Considering these factors, engagement control should
be released to the lowest levels of engagement authority to ensure early engagement opportunities.
Air defense operations and air ground integration personnel have established coordination techniques
and reporting procedures available to aid commanders’ in countering unmanned air threats. See ATP 3-91.1
and FM 3-01 for further reference on C-UAS threat and reporting.
all sources of information and intelligence from a variety of sources. For example, using sensors (audible,
radars, imagery, and human intelligence) or maintaining visual means.
Volume Fire
Volume fire is an effective method to employ when using small arms fire against aerial threats. The
key to success in engaging enemy aircraft with small arms is to put out a high volume of fire towards the
immediate threat. The more bullets a unit can put in the sky, the greater the chance the enemy will fly into
them (Figure 4-2). Even if these fires do not hit the enemy, throwing up a wall of lead in the sky can intimidate
enemy pilots, ultimately breaking off their attack or distracting them from taking proper aim. One of the most
important points about volume fire is that once the lead distance is estimated, you must aim at the estimated
aiming point and fire at that single point until the aircraft has flown past that point. Maintain the aiming point,
not the lead distance. Once you start firing, do not adjust your weapon.
in front of the target and fires at that point. This aiming point is determined using the football field technique.
When deciding to fire upon an enemy aircraft, practical considerations need to be taken into account before
engaging. An example is engaging a helicopter attacking you from a standoff range of 3 kilometers. It is
important to consider the capabilities of the weapons you have available to you. Using small arms at this
range is ineffective while the best possibility may be the use of the main gun on a tank or tracked vehicle.
Small arms have a low probability of kill against attacking aerial platforms due to their travel speeds
and maneuverability. The use of coordinated group firing, using all organic weapons will make the pilot
aware that they are under fire disrupting their concentration and potentially causing them to miss their target
or abandon their attack.
Aiming Points
Aiming points used to engage hostile jets and helicopters are different but may be used on a variety of
different threats. An example of this technique would apply if missiles were detected and the decision was
made to engage, they should be engaged using the FW aiming point technique. UASs should be engaged
using the helicopter aiming point technique. The rules for selecting aiming points are simple, easily learned,
and retained. The various aiming points are summarized in Table 4-1.
Table 4-1. Aiming Points.
AERIAL PLATFORM TYPE COURSE AIMING POINT
JET / CM Crossing Two football fields in front of the nose
of the platform
JET / CM Overhead Two football fields in front of the nose
of the platform
JET / CM Directly At You Slightly above the aerial platform nose
Helicopter Hovering Slightly above the helicopter body
Helicopter Directly At You One half football field in front of the
nose
UAS / LSS Crossing (UAS Group 1) half a football field in
front
(UAS Groups 2 and 3) one and a half
football fields in front
UAS / LSS Directly At You Slightly above UAS body
UAS / LSS Hovering Slightly above UAS body
CM cruise missile JET JWICS earth terminal
LSS low, slow, small (UAS) UAS unmanned aircraft system
Tank commander's machine guns are useful weapons against unarmored threats. They can be fired
quickly unleashing a high volume fire. Ensure that the area is clear of friendly personnel. Use the following
guidelines when using crew served weapons:
When targets are hovering or inbound, aim high with the machine gun and fire a continuous burst,
adjusting onto target by observing the travel and impact of tracers remembering, tracers may
appear to be striking the target when they are actually going under it.
If engaging a moving target, track along its flight path using a lead of 50 meters or half a football
field. Fire a continuous burst, forcing the target to fly through the cone of fire.
Stryker squads are trained to use machine guns against FW aircraft, unarmored helicopters, and
airborne troops (it is ineffective against heavily armored helicopters such as the Hind). When used, the
machine gun must fire a continuous burst (50-to-100 rounds) at the aiming point, while squad and
crewmembers use time on target to bring the rounds on target. Just as in ground engagements, the maximum
effective range of the specific machine gun will apply.
Ideally, when the Stryker must engage high-speed aircraft, mounted and Infantry rifle elements, direct
small-arms weapons and controlled machine gun fire on a designated point. The platoon leader, platoon
sergeant, or squad leader can initiate this type of fire by issuing a predetermined command or by firing tracers
to indicate the target. He applies a 200-meter lead (the length of two football fields) on approaching aircraft.
When coordinated effectively, the aircraft will fly through the platoon's cone of fire. Vehicle commanders
must not try to track high-speed aircraft because they fly too fast.
When enemy aircraft fly directly at Stryker vehicles, vehicle commanders are responsible for engaging
them with controlled machine gun bursts of 50-to-100 rounds. They are trained to select an aiming point
slightly above the nose to position the aircraft in the cone of fire.
To engage aircraft, the squad leader or vehicle commander chooses one or more reference points
(Figure 4-6). For example, the platoon leader alerts the platoon. Then as an aircraft nears a reference point,
the platoon leader will order, ENEMY AIR, REFERENCE POINT TWO, and then FIRE. The Stryker(s)
and rifle Infantry Soldiers fire all weapons at a 45-degree angle above the reference point.
MISSION PLANNING
A-6. Mission planning involves steps and process for determining the critical asset list (CAL) and the DAL.
This includes risk management used to protect the commander’s critical assets. Risk management considers
all hazards that have the potential to injure or kill personnel, damage or destroy equipment, or otherwise
impact mission effectiveness. Risk management provides an adaptive process for combined arms units to
conduct continuous assessments and assists in identifying control measures where specific standards may not
exist. For commanders and staff, risk management begins during planning and continues throughout the
operations process.
A-7. DAL development is an interactive process that involves subordinate commands. After reviewing the
initial DAL, subordinate commanders and their staffs may nominate additional assets for inclusion in the
DAL. The joint force commander and his staff may incorporate one or more nominees and issue an updated
(re-prioritized) DAL, which then becomes the basis for AMD planning and defense design.
A-8. Other critical planning guidance provided by joint force planners includes the airspace control order
(ACO) and the air tasking order (ATO). The ACO implements the airspace control plan, and provides the
details of the approved request for airspace control measures. The ATO also provides specific instructions
for tasking forces/capabilities/sorties to specific missions and targets. The ACO is part of the ATO, although
it may be transmitted separately. Both are provided to all subordinate echelons of command. All components
of the ACO and the ATO should be included in the planning process to give commanders and staff a complete
understanding of the air battle.
A-9. The service and functional component commander (for example, Army Forces Commander or Joint
Forces Land Component Commander or the Joint Forces Air Component Commander) reviews the joint force
commander 's OPORD, including the mission, situation, concept of operation, tasks to be accomplished,
DAL, and other pertinent mission related information. The joint force commander will normally task the
Joint Force Air Component Commander (JFACC) and AADC to develop the DAL with input from all
components. Part of the planning process along with the DAL will contain the levels of engagement
effectiveness needed to protect defended assets. The role of the JFACC and AADC is to provide centralized
direction, coordination, and integration for counter air operation capabilities.
A-10. The joint force commander defines the JFACC's authority and responsibilities, which may include, but
are not limited to, planning, coordinating, allocating, and tasking for joint civil affairs operations based on
the joint force commander’s concept of operations and air apportionment decisions.
A-11. JFACC or AADC staff planners develop and distribute a rough first-order ADP to the components.
The role of the AADC is synchronizing land-based air and missile operations. With input from other
components, the staff then produces an operation's plan or OPORD conveying the joint force commander’s
strategic and operational objectives but focusing on the service and functional component area of operations.
The threat composition must be evaluated in the planning process to determine the objective. The OPORD is
then sent to subordinate commands, which include the AAMDC and corps.
AAMDC PLANNING
A-12. The AAMDC has overall responsibility for planning Army AMD operations in support of the ARFOR
commander or Joint Forces Land Component Commander. Planners review the assigned mission, critical
assets to be protected, the enemy situation, and the composition and disposition of AMD resources available
to protect critical assets against the known threat. This is based on the IPB process. They then perform a top-
level defense lay down to estimate if available AMD resources can adequately protect critical assets. If
required, levels of protection cannot be achieved; additional resources are requested from the service or
functional component commander (or the commander is advised of the risk to forces or assets) to support
asset defenses. See FM 3-01 for AMD planning responsibilities of each echelon.
A-13. Based on this planning, the AAMDC task organizes the subordinate ADA brigade(s) and assigns
missions to the brigade(s). If the AAMDC is not present in theater, the responsibility for this planning falls
to an ADA brigade. To ensure the overall Army AMD effort within the theater is coordinated and
synchronized, the AAMDC must coordinate planning with the corps and division ADA elements.
CORPS PLANNING
A-14. Corps planners perform essentially the same planning functions and produce the same planning
products as the AAMDC planners, except the focus is on protecting maneuver forces and critical assets within
the corps area of operations. Because the corps lacks robust automated AMD planning capabilities, it may
rely upon a supporting ADA brigade to perform most of the AMD planning. This planning may include
development of the AMD support annex to the corps OPLAN. In developing the AMD annex, the ADA
brigade, in coordination with the corps (and division level elements if applicable) will use its organic planning
staff and capabilities to best meet mission objectives. The ADA brigade may leverage subordinate units to
assist in this development. This will likely include Patriot battalion staff personnel and air defense airspace
management personnel as well.
A-15. Based on this planning, the corps task organizes its subordinate air defense elements and coordinates
with the supporting ADA brigade and liaisons for support. AMD asset availability and mission assignments
are based on priorities and overall scheme of maneuver. The ADA brigade also coordinates with the AAMDC
to ensure the corps effort is integrated and synchronized with the theater Army's AMD effort.
Commanders and staff use the factors of METT-TC to support hazard identification.
Insufficient time for mission preparation often forces commanders to accept greater risk in
planning, preparation, and execution of orders and plans associated with mission planning.
During hazard assessment, the members of the protection cell identify and prioritize the
commander’s critical assets through the use of the vulnerability assessment and criticality
assessment.
CRITICALITY ASSESSMENT
A-27. A criticality assessment identifies key assets that are required to accomplish commander’s mission. It
addresses the impact of temporary or permanent loss of key assets or a unit’s ability to perform its mission.
It examines costs of recovery and reconstitution including time, dollars, capability, and infrastructure support.
The staff must gauge how quickly a lost capability can be replaced before giving an accurate status to the
commander. The general sequence for a criticality assessment follows:
List the key assets and capabilities.
Determine whether critical functions or combat power can be substantially duplicated with other
elements of the command or an external resource.
Determine the time required to substantially duplicate key assets and capabilities in the event of
temporary or permanent loss.
Prioritize responses threats to personnel, physical assets, and information.
A-28. DAL development is an interactive process that involves subordinate commands. After reviewing the
initial DAL, subordinate commanders and their staffs may nominate additional assets for inclusion in the
DAL.
A-29. The joint force commander and his staff may incorporate one or more nominees and issue an updated
(re-prioritized) DAL, which then becomes the basis for AMD planning and defense design.
A-30. Other critical planning guidance provided by joint force planners includes the ACO and the ATO. The
ACO implements the airspace control plan, and provides the details of the approved request for airspace
control measures. The ATO also provides specific instructions for tasking forces/capabilities/sorties to
specific missions and targets. The ACO is part of the ATO, although it may be transmitted separately. Both
are provided to all subordinate echelons of command. All components of the ACO and the ATO should be
included in the planning process to give commanders and staff a complete understanding of the air battle.
A-31. The protection cell staff continuously updates the hazard assessment during the operations process.
As the staff identifies and modifies a friendly COA, reconnaissance confirms or denies information
requirements. As the threat changes, the risk to the force changes. New risks may require different mitigating
measures. The protection cell analyzes changes that may require modifications to protection priorities.
A-32. A vulnerability assessment is a command, or unit-level evaluation (assessment) to determine the
vulnerability of an air terrorist attack against an installation, unit, exercise, residence, facility, or other site.
It identifies areas of improvement to withstand, mitigate, or deter air attack acts of violence or terrorism. The
staff addresses the questions of who or what is vulnerable, and how it is vulnerable. The vulnerability
assessment determines the susceptibility of the commander’s assets to an air attack by the previously assessed
threats. The product of the vulnerability assessment is the identification of physical characteristics or
procedures that render critical assets, areas, or special events vulnerable to the range of known or potential
threats. The assessment provides a basis for developing controls to eliminate or mitigate vulnerabilities.
Vulnerability is the component of risk over which the commander has the most control and greatest influence.
The general sequence of a vulnerability assessment is below:
List assets, capabilities, and the threats against them.
Determine common criteria for assessing vulnerabilities.
Evaluate the assets and capabilities for their vulnerability
A-33. After determining what assets to protect and comparing them to the risk, the protection cell develops
risk mitigation measures and makes recommendations to the commander. The CAL is the primary tool used
by the protection cell to mitigate risk.
protecting assets. Therefore, the staff must determine which assets are critical for mission success and
recommend priorities with available resources. The list will vary depending on the factors of METT-TC.
SECTION II – TERMS
active air defense
Direct defensive action taken to destroy, nullify, or reduce the effectiveness of hostile air and missile
threats against friendly forces and assets. It includes the use of aircraft, air defense weapons, electronic
warfare, and other available weapons (JP 3-01).
airspace control authority (ACA)
The commander designated to assume overall responsibility for the operation of the airspace control
system in the airspace control area. (JP 3-52)
REQUIRED PUBLICATIONS
These sources must be available to intended users of this publication.
ADRP 1-02. Terms and Military Symbols. 7 December 2015.
JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 8 November 2010.
RELATED PUBLICATIONS
These sources contain relevant supplemental information.
JOINT PUBLICATION
Most joint and Department of Defense doctrinal publications are available online:
http://www.dtic.mil/doctrine/new_pubs/jointpub.htm.
JP 3-0. Joint Operations, 11 August 2011
JP 3-01. Countering Air and Missile Threats, 23 March 2012
JP 3-52. Joint Airspace Control, 13 November 2014
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: www.apd.army.mil.
ADP 6-0. Mission Command, 17 May 2012
ADRP 1-03. The Army Universal Task List, 02 October 2015.
ADRP 3-0. Unified Land Operations, 16 May 2012.
ADRP 5-0. The Operations Process, 17 May 2012.
ATP 3-91.1. The Joint Air Ground Integration Center, 18 June 2014
FM 3-01. United States Army Air and Missile Defense Operations, 2 November 2015.
FM 3-01.7. Air Defense Artillery Brigade Operations, 11 February 2010.
FM 3-21.10. The Infantry Rifle Company, 27 July 2006
FM 27-10. Law of Land Warfare, 18 July 1956
PRESCRIBED FORMS
None
REFERENCED FORMS
Unless otherwise indicated, DA Forms are available on the Army Publishing Directorate (APD) web
site: www.apd.army.mil.
DA Form 2028, Recommended Changes to Publication and Blank Forms.
D R
defended asset list, A-1, A-6, Right of Self-Defense, 2-6, 2-7,
A-7, A-9, A-16, A-18, A-20, 4-4
Official:
GERALD B. O’KEEFE
Administrative Assistant to the
Secretary of the Army
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: Distributed in electronic media
only (EMO).
PIN