jp3 18ch1
jp3 18ch1
jp3 18ch1
T OF T H
EN E
TM HI
S W E' L L
DE
T
FE
AR
ND
AR
• DE P
MY
•
I CA
U NI
ER
TE
M
D
ST A
AT E S O F
11 May 2017
Incorporating Change 1
09 January 2018
Validated on 09 July 2021
PREFACE
1. Scope
This publication provides joint doctrine for planning, executing, and assessing joint
forcible entry operations.
2. Purpose
This publication has been prepared under the direction of the Chairman of the Joint
Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance
of the Armed Forces of the United States in joint operations, and it provides considerations
for military interaction with governmental and nongovernmental agencies, multinational
forces, and other interorganizational partners. It provides military guidance for the exercise
of authority by combatant commanders and other joint force commanders (JFCs), and
prescribes joint doctrine for operations and training. It provides military guidance for use
by the Armed Forces in preparing and executing their plans and orders. It is not the intent
of this publication to restrict the authority of the JFC from organizing the force and
executing the mission in a manner the JFC deems most appropriate to ensure unity of effort
in the accomplishment of objectives.
3. Application
a. Joint doctrine established in this publication applies to the Joint Staff, commanders
of combatant commands, subordinate unified commands, joint task forces, subordinate
components of these commands, the Services, and combat support agencies.
KEVIN D. SCOTT
Vice Admiral, USN
Director, Joint Force Development
i
Preface
Intentionally Blank
ii JP 3-18
SUMMARY OF CHANGES
REVISION OF JOINT PUBLICATION 3-18
DATED 27 NOVEMBER 2012
• Expands the discussion of sea control and eliminated the term coastal control.
• Describes where forcible entry normally occurs within the notional phasing
construct.
iii
Summary of Changes
Intentionally Blank
iv JP 3-18
TABLE OF CONTENTS
EXECUTIVE SUMMARY .............................................................................................. vii
CHAPTER I
INTRODUCTION
CHAPTER II
COMMAND AND CONTROL
Purpose.......................................................................................................................II-1
Force Employment .....................................................................................................II-1
Organization of the Forcible Entry Operational Area................................................II-2
Command Relationships for Forcible Entry Operations............................................II-3
Airspace Control ........................................................................................................II-5
Air Defense Command and Control ..........................................................................II-7
Communications ........................................................................................................II-8
Rules of Engagement ...............................................................................................II-10
Friendly Fire Prevention ..........................................................................................II-10
CHAPTER III
PLANNING
Purpose..................................................................................................................... III-1
Forcible Entry and the Joint Planning Process ........................................................ III-1
Forcible Entry Planning Considerations .................................................................. III-2
CHAPTER IV
OPERATIONS
Purpose..................................................................................................................... IV-1
v
Table of Contents
CHAPTER V
LOGISTICS
APPENDIX
GLOSSARY
FIGURE
vi JP 3-18
EXECUTIVE SUMMARY
COMMANDER’S OVERVIEW
Introduction
vii
Executive Summary
Forcible Entry Capabilities The Armed Forces of the United States conduct
forcible entry operations using various capabilities,
including: amphibious assault, airborne assault, air
assault, ground assault, and any combination
thereof. An amphibious force (AF), composed of
an amphibious task force and a landing force,
together with other forces that are trained,
organized, and equipped for amphibious
operations, conducts littoral maneuver by vertical
and/or surface means. Airborne forces may be
used as the assault force or used in combination
with other capabilities for a forcible entry, or they
may conduct follow-on operations from a
lodgment. Air assault forces execute forcible
entries using fixed-wing, tiltrotor, and rotary-wing
aircraft. Special operations forces (SOF) can
execute forcible entries using a combination of
fixed-wing, rotary-wing, and tiltrotor aircraft
employing airland or airdrop procedures.
viii JP 3-18
Executive Summary
ix
Executive Summary
Air Defense Command and The joint force is particularly vulnerable to attacks
Control by enemy aircraft or surface-to-surface missiles
during the early stages of a forcible entry. All
available surface-to-air assets should be
incorporated into the overall area air defense plan
and comply with procedures and weapons control
measures established by the area air defense
commander.
x JP 3-18
Executive Summary
Planning
Forcible Entry and the Joint Joint planning is conducted using a disciplined
Planning Process process described in policies and procedures
established in the Adaptive Planning and
Execution enterprise. These processes facilitate
both deliberate planning and crisis action planning.
Operations
xi
Executive Summary
xii JP 3-18
Executive Summary
CONCLUSION
xiii
Executive Summary
Intentionally Blank
xiv JP 3-18
CHAPTER I
INTRODUCTION
1. Forcible Entry
a. Joint forcible entry operations seize and hold lodgments against armed opposition.
A lodgment is a designated area in a hostile or potentially hostile operational area (OA)
(such as an airhead, a beachhead, or combination thereof) that affords continuous landing
of troops and materiel while providing maneuver space for subsequent operations. The
lodgment and the means to seize a lodgment will depend upon the objectives of the
operation or campaign. In most operations, forcible entry secures the lodgment as a base
for subsequent operations. It often has facilities and infrastructure that may be used to
receive large follow-on forces and logistics. In some operations, seizure of the lodgment
may be the primary objective, and its retention lasts only until the mission is complete, at
which time the assaulting forces withdraw. Forcible entry operations are inherently risky
and always joint. Forcible entry demands careful planning and thorough preparation;
synchronized, violent, and rapid execution; and leader initiative at every level to deal with
friction, chance, and opportunity. See Figure I-1.
For more information on cyberspace capabilities, see Joint Publication (JP) 3-12,
Cyberspace Operations.
c. Forcible entry operations are joint in nature. There are many Service and
functional component-unique forcible entry capabilities, techniques, and procedures the
US has developed since World War II, primarily consisting of amphibious assault, airborne
assault, air assault, and special operations. Despite these Service-oriented capabilities,
techniques, and procedures, forcible entry operations are inherently joint as evidenced by
the need for using resources (e.g., command and control [C2], transportation, sustainment)
I-1
Chapter I
from all elements of the Department of Defense (DOD) and often other resources (e.g.,
multinational and other US Government departments and agencies).
2. United States National Military Strategy and Joint Forcible Entry Operations
a. The National Military Strategy establishes three national military objectives: deter,
deny, and defeat state adversaries; disrupt, degrade, and defeat violent extremist
organizations; and strengthen our global network of allies and partners.
I-2 JP 3-18
Introduction
threats that rapidly emerge, disaggregate, and reemerge. These factors will significantly
affect how the joint force conducts joint forcible entry operations. Despite our best
planning and the application of sound intelligence combined with the other joint functions,
we can expect uncertainty and ambiguity to exist in strategic and operational environments.
To set favorable conditions for operational success, the following principles apply for
forcible entry operations:
For more information on JIPOE, see JP 2-01.3, Joint Intelligence Preparation of the
Operational Environment.
For more information on control of the air, see JP 3-01, Countering Air and Missile
Threats.
d. Control of Space. Space control operations use offensive space control and
defensive space control to ensure freedom of action in space and, when directed, deny an
adversary freedom of action. Space control plans and capabilities enable a broad range of
response options to provide for the continued, sustainable use of space. Space control
contributes to space deterrence by employing a variety of measures to assure the use of
I-3
Chapter I
Various Sources
space, attribute enemy attacks, and, consistent with the right to self-defense, hold enemy
space capabilities at risk.
I-4 JP 3-18
Introduction
g. Sea Control. The maritime force may require sea control from far off shore to
thwart the enemy antiaccess (A2) capabilities as US forces attempt to access the littorals.
The carrier strike group may launch strikes to shape the littorals prior to the arrival of the
amphibious force (AF) into the amphibious objective area (AOA). Local maritime
superiority is required to project power ashore in support of the joint forcible entry
operation and to protect sea lines of communications (SLOCs). SLOC protection
enables logistic support required to sustain operations ashore and support the transition to
continuing operations by follow-on forces. Defeating the threat in the littorals typically
requires a naval capability that is prepared for sustained defensive and offensive
engagements.
h. Isolate the Lodgment. The joint force attacks or neutralizes any enemy
capabilities with the potential to affect the establishment of the lodgment. These
capabilities include enemy ground, sea, and air forces that can be committed to react to
joint force assaults, indirect fire systems, and missile systems that can range the lodgment,
and related sensors, C2 systems, and digital networks. Barriers and obstacles can also be
used to isolate the lodgment by denying the use of areas, fixing opposing forces, and
reinforcing the effectiveness of friendly fires. Failure to isolate the lodgment can hamper
or stall momentum. In the event of culmination prior to isolation, the JFC must have a
branch plan for the alternate penetration or retrograde.
For more information on denying movement and maneuver and related capabilities, see
JP 3-15, Barriers, Obstacles, and Mine Warfare for Joint Operations.
i. Gain and Maintain Access. In any given OA, numerous and diverse limitations to
access will present themselves. Access may be restricted due to diplomatic, economic,
military, or cultural factors. Ports, airfields, and infrastructures may also be physically
limited. Enemies may employ A2/area denial (AD) strategies. A2 refers to those actions
and capabilities, usually long-range, designed to prevent an opposing force from entering
an OA. AD refers to those actions and capabilities, usually of shorter range, designed not
to keep an opposing force out, but to limit its freedom of action within the OA.
I-5
Chapter I
(2) Shaping Efforts. When planning indicates a requirement for forcible entry,
shaping efforts or activities focus on identifying and neutralizing an enemy’s A2
capabilities. This may require a change in intelligence priorities: for example, increasing
surveillance and reconnaissance to locate natural and man-made impediments to entry
operations. Shaping activities will also involve the employment of IRCs, specifically
military deception (MILDEC) and operations security (OPSEC). They will also be used
to influence local civilian populations and other interested nations and organizations.
However, all shaping should be balanced against the need for surprise. Other US
Government departments and agencies and multinational partners may be vital to
developing intelligence and gaining sufficient access to permit forcible entry. Shaping may
also include improving on HN infrastructure so that the environment is better suited to
accommodate specific military operations.
(3) Operational Access. Operational access expands the degree to which the
JFC may employ the range of joint capabilities within the OA. Gaining and maintaining
operational access depends upon numerous factors such as the nature of the operation or
campaign, geography, the enemy’s capability to deny access, proximity of friendly bases,
and the joint capabilities available. Forcible entry operations are often the precursor to
follow-on major operations. Land forces projected into the lodgment seize key terrain and
eliminate enemy A2 capabilities. Air Force, Navy, and special operations forces (SOF)
extend their reach and ability to neutralize the enemy’s A2 measures. Ultimately, the
forcible entry may completely dislocate enemy defenses and allow the joint force to retain
the initiative throughout the dominate phase. In some instances, forcible entry operations
preclude enemy A2 measures and seize the initiative. For example, Operation
WATCHTOWER in August of 1942 seized the Japanese airfield on Guadalcanal and
nearby seaplane base. This operation surprised the Japanese and completely disrupted
Japanese plans to extend their strategic defensive perimeter and interdict SLOCs between
the US and Australia.
j. Neutralize Enemy Forces Within the Lodgment. The joint force must neutralize
enemy forces within the lodgment to facilitate the establishment of airheads and
beachheads and to provide for the immediate protection of the force.
l. Expand the Lodgment. The joint force quickly builds combat power in order to
enhance security and the ability to respond to enemy counter attacks, enable continuous
landing of troops and materiel, and facilitate transition to subsequent operations. Failure
to expand the lodgment can severely hamper or stall the momentum of the overall
operation.
I-6 JP 3-18
Introduction
I-7
Chapter I
a. Seize the Initiative. A forcible entry operation may be the JFC’s opening move to
seize the initiative. For example, a JFC might direct friendly forces to seize and hold an
airhead or a beachhead to facilitate the continuous landing of troops and materiel and
expand the maneuver space needed to conduct follow-on operations. The establishment of
the lodgment, followed by the arrival and preparation of follow-on forces, usually marks
the end of the forcible entry operations and a transition to further offensive operations.
(1) Coup de Main. A forcible entry may be designed as a coup de main that will
capitalize on surprise and simultaneous execution to achieve decisive results. Often
conducted by small forces conducting short-duration, limited-objective attacks against
opponents with modest but still lethal capabilities, these operations may be a likely type of
forcible entry. Operation URGENT FURY (1983) and Operation JUST CAUSE (1989-
90) are specific examples of the use of simultaneous operations overwhelming an enemy’s
ability to respond. The capitulation of enemy forces usually marks the end of the dominate
phase of the operation and a transition to further operations within the stabilize and enable
civil authority phases.
(2) MILDEC. The mere existence of a forcible entry capability may be used by
the JFC in any phase as a show of force or to force enemy movement even without
mounting a forcible entry operation, as with the amphibious demonstration during
Operation DESERT STORM (1991).
For further information on phasing, refer to JP 3-0, Joint Operations, and JP 5-0, Joint
Planning.
I-8 JP 3-18
Introduction
Operation CHROMITE took place on the heels of the retreat of the United
States and Republic of Korea forces down the Korean Peninsula in June
and July to an enclave on the peninsula’s southern tip. The primary
objectives were to land a large force behind the bulk of the North Korean
People’s Army (NKPA), recapture South Korea’s capital, Seoul, cut NKPA
logistic lines, and provide an “anvil” against which the US Eighth Army,
attacking from the south, would crush the NKPA.
Various Sources
The Armed Forces of the United States conduct forcible entry operations using various
capabilities, including: amphibious assault, airborne assault, air assault, ground
assault, and any combination thereof. Based upon mission analysis, JIPOE, and the joint
planning process (JPP), these operations may be used singularly or in combination.
Forcible entry operations may employ single or multiple entry points. In some cases, SOF
will support the entry of conventional forces (CF), but CF may be used to seize a lodgment
for support of special operations missions. The forcible entry operation may include linkup
and exploitation by ground maneuver from a separate location. Sustainment considerations
may drive the requirement for a combination of capabilities and linkup requirements.
(1) The organic capabilities of AFs, including air and fire support, logistics, and
mobility, allow them to gain access to an area by forcible entry. The salient requirement
of an amphibious assault is the necessity for swift introduction of sufficient combat power
I-9
Chapter I
ashore to accomplish the AF objectives. The assault begins on order, after sufficient
elements of the main body of the AF that are capable of beginning the ship-to-shore
movement arrive in the OA. For an assault, the action phase ends when conditions
specified in the initiating directive are met.
b. Airborne Assault Operations. Airborne forces may be used as the assault force
or used in combination with other capabilities for a forcible entry, or they may conduct
follow-on operations from a lodgment. As an assault force, airborne forces parachute
into the objective area to attack and eliminate armed resistance and secure designated
objectives. Airborne forces may also be employed from a lodgment in additional joint
combat operations. Airborne forces offer the JFC an immediate forcible entry option since
they can be launched directly from the continental United States (CONUS) without the
delays associated with acquiring intermediate staging bases (ISBs) or re-positioning of
sea-based forces.
c. Air Assault Operations. Air assault forces execute forcible entries using fixed-
wing, tiltrotor, and rotary-wing aircraft. Air assault forces can deploy from land-based
facilities and ships. Fires from land- and sea-based aircraft (manned and unmanned)
and/or ships and submarines take on added importance to compensate for the lack of field
artillery. An air assault force may require the establishment of an ISB. These forces can
rapidly project combat power throughout the depth of an OA.
I-10 JP 3-18
Introduction
A United States Navy Wasp Class Amphibious Warfare Ship underway in the Pacific Ocean.
Appendix A, “Airborne and Air Assault Operations,” provides more specifics on airborne
and air assault operations.
6. Multinational Considerations
a. Forcible entry operations with multinational partners are planned and conducted
much the same as a US joint force operation. However, there may be aspects of a
multinational force’s (MNF’s) organization or procedures the commander of a US joint
force needs to consider. Attaining unity of effort through unity of command for a
multinational operation may not be politically feasible, but it should be a goal. There must
be a common understanding among all national forces of the mission of the MNF and the
plan to achieve objectives. Commanders and staffs at all levels should also account for
differences in partner nations’ laws, weapons, equipment, technology, culture, politics, and
language.
b. MNFs may bring additional capabilities and capacity to forcible entry operations
but normally require careful attention to integration. To optimize these MNFs, the JFC
and component commanders may need to evaluate interoperability of equipment, conduct
additional rehearsals, and employ liaison teams to facilitate integration. Additional training
and rehearsal may be required by both US forces and MNFs to fully integrate the
multinational elements into the joint forces. Key to optimizing the participation of MNFs
I-11
Chapter I
Various Sources
is understanding their capabilities and coordinating and integrating them into planning and
execution as quickly as possible. This may include understanding national limitations
placed on contributing forces, as well as the experience and morale of individual units.
Both US forces and MNFs may require training and education prior to employment as a
force and the exchange of multiple liaison officers (LNOs). Multinational operations are
enhanced by the use of collaborative planning and information sharing environments
among the mission partners.
I-12 JP 3-18
CHAPTER II
COMMAND AND CONTROL
1. Purpose
2. Force Employment
The JFC should determine the forcible entry capability or combination of capabilities
needed to accomplish the mission. Unity of command is vital when amphibious, airborne,
air assault, and special operations are combined. Forcible entry is a complex operation and
should therefore be kept as simple as possible in concept. All elements of the joint force
and supporting commands should understand the commander’s intent, CONOPS, scheme
of maneuver, and coordination requirements.
II-1
Chapter II
(4) Threat.
(5) C2 capabilities.
b. AOA. The AOA is a geographical area of sufficient size for conducting necessary
sea, air, and land operations, and within which is located the objective(s) to be secured by
the AF. The AOA is normally specified in the initiating directive. This area must be of
sufficient size to ensure accomplishment of the AF’s mission but not be so large as to be
beyond the commander, amphibious task force’s (CATF’s), control capability or ability to
defend. The AOA is three dimensional to include the waters below and the airspace above.
c. Joint Special Operations Area (JSOA). The JSOA is an area of land, sea, and
airspace assigned by a JFC to the commander of a SOF to conduct special operations
activities. The JFC may establish a JSOA when geographic boundaries between SOF and
CF are the most suitable control measures. Establishment of a JSOA to conduct operations
provides a control measure and assists in the prevention of friendly fire incidents. The
special operations commander may also request the establishment of a JSOA. When a
JSOA is designated, the special operations commander is the supported commander within
the designated JSOA. The special operations commander may further assign a specific
area or sector within the JSOA to a subordinate commander for mission execution. The
scope and duration of the special operations mission, OE, and diplomatic considerations
all influence the number, composition, and sequencing of SOF and supporting forces
deployed into a JSOA. It may be limited in size to accommodate a discrete, direct action
mission or may be extensive enough to allow a continuing broad range of unconventional
warfare (UW) operations.
II-2 JP 3-18
Command and Control
d. Airspace Control Area. The airspace control area for the forcible entry operation
is that airspace laterally defined by the boundaries that delineate the OA. This airspace
may include sub-areas. This airspace may entail any OA and is a means of planning and
dividing responsibility. While an OA is in existence, airspace control within the OA is in
accordance with JFC guidance, the airspace control plan, and airspace control order.
See JP 3-0, Joint Operations, for guidance on organizing the OA and JP 3-52, Joint
Airspace Control, for guidance on organizing the air space control area.
a. JFC Authority. JFCs have full authority to assign missions, redirect efforts, and
direct coordination among subordinate commanders. JFCs should allow Service tactical
and operational groupings to function generally as they are organized and trained.
b. Combatant Commanders (CCDRs). The CCDR may organize the forcible entry
force as a subordinate joint task force (JTF), or the forcible entry force may be organized
from an existing component. An initiating directive will provide guidance on command
relationships and other pertinent instructions for the duration of the forcible entry
operation.
II-3
Chapter II
(3) Joint Force Air Component Commander (JFACC). The JFACC’s overall
responsibilities and roles are to plan, coordinate, synchronize, and integrate the actions of
assigned, attached, and supporting air capabilities/forces in time, space, and purpose in
support of the JFC’s CONOPS. The JFACC must closely coordinate with the supported
functional component commander or JTF commander to establish airspace control and area
air defense plans (AADPs) in support of the forcible entry operation as discussed below.
II-4 JP 3-18
Command and Control
upon achievement of a secure airhead line and the establishment of either a JFLCC or
designated ground commander command post in the airhead.
5. Airspace Control
II-5
Chapter II
For further details on airspace control, refer to JP 3-52, Joint Airspace Control.
a. Airspace Control Authority (ACA). The JFC normally designates an ACA who
has overall responsibility to establish and operate the airspace control system (ACS). The
ACA monitors, assesses, and controls OA airspace and directs changes in accordance with
the JFC’s intent.
(a) The distances involved and the duration of airborne and air assault
operations may require establishing special air traffic control facilities or special tactics
teams (STTs) to extend detailed control into the objective area.
(b) The volume of air traffic throughout the airhead demands careful
coordination to limit potential conflict and to enable the success of mission-essential
operations within the airhead. A high-density airspace control zone (HIDACZ) may
be established when planned operations involve a concentrated and complex mix of
airspace users and weapons supporting a ground or amphibious operation. Access to a
HIDACZ is normally controlled by the maneuver commander. HIDACZ may be
established around a drop zone (DZ) or landing zone (LZ) to provide sufficient terrain and
airspace to permit safe and efficient air traffic control. The HIDACZ can be nominated by
the ground force commander and should, at a minimum, include the airspace bounded by
the airhead line. Within the HIDACZ, all aircraft flights should be coordinated with
the DZ, LZ, and the agency responsible for controlling the joint airspace. The air
mission commander coordinates with the assault force commander to select the time on
target and the direction of approach into and through the airhead.
b. ACS. The forces involved in the operation largely determine the choices
available to the ACA in designating an ACS to control joint air operations; system
interoperability will also be a major determining factor. For the ACS to function
effectively, the ACA must maximize and enhance the capabilities of the collective
force using existing control systems.
II-6 JP 3-18
Command and Control
(2) ACS During Airborne/Air Assault Force Operations. The ACA will
normally control the airspace through the theater air control system (TACS) and the
Army air-ground system (AAGS) in forcible entries. Situations may limit establishment
of ground systems and require airborne or sea-based systems to conduct airspace control.
Commanders and staffs should closely monitor and plan the employment of critical
communications nodes within TACS/AAGS.
The OA, including ingress and egress routes, should be protected by an integrated air
defense system consisting of air, land, maritime, and space assets supported by cyberspace
capabilities. The joint force is particularly vulnerable to attacks by enemy aircraft or
surface-to-surface missiles during the early stages of a forcible entry. The primary
objectives for AMD operations are to assist in gaining air superiority and protecting
the assault force. The area air defense commander (AADC) integrates the joint force
air defense effort. All available surface-to-air assets should be incorporated into the
overall AADP and comply with procedures and weapons control measures established by
the AADC. The AADC will exercise a degree of control of all systems through
established guidelines, determination of weapons control status, and JFC-approved
procedural controls.
(1) During air movement to the OA, the AADC will normally control air
defense operations from an airborne platform (e.g., Airborne Warning and Control
System). In practice, extended distances from staging bases to designated OAs may require
the AADC to delegate control responsibilities to an air control element on board the
airborne platform. Initial air defense assets may be limited to fighter aircraft only. Control
of these aircraft will normally be exercised through established procedural controls.
(3) With force buildup and the introduction of follow-on forces into the lodgment
area, more robust, high- to medium-altitude air defense systems will likely become
II-7
Chapter II
available. The forces with these systems establish communications with the AADC’s C2
agency in order to be incorporated into the established air defense system.
(4) Once established, designated AADC control and reporting centers will
normally assume air defense control responsibilities for forces external to an established
AOA or AO as defined by the JFC or the initiating directive.
(a) Participating naval aircraft may be placed under the control of the
appropriate C2 agency.
7. Communications
II-8 JP 3-18
Command and Control
(3) Ground commanders in airlift aircraft may communicate with the chain
of command over the Army secure en route communications package. Normally, the
airlift mission commander and the airborne TF commander are in the same aircraft. The
senior ground commander can advise embarked ground commanders of changes in the
ground tactical situation or to the air movement plan.
II-9
Chapter II
and provide reconnaissance, surveillance, visual flight rules service, and limited instrument
flight rules air traffic control service. Other joint forces, such as SOF or Marine force
reconnaissance elements, are also capable of performing some of these functions.
8. Rules of Engagement
The ROE are developed by the Joint Staff and CCDRs and reviewed and approved by the
President and Secretary of Defense (SecDef) or other authorized military authority for
promulgation and dissemination. Additional ROE to address the specific circumstances of the
military operation may be proposed and requested by any commander at any level. Depending
on the measure(s) requested, approval by the CCDR, SecDef, and/or President will be required.
ROE ensure actions, especially force employment, are consistent with military objectives, US
and international laws, and national policies. Joint forces operate in accordance with applicable
ROE, conduct warfare in compliance with US and international laws, and fight within restraints
and constraints specified by their commanders. Properly developed ROE must be clear, tailored
to the situation, reviewed for legal sufficiency, and included in training. ROE will typically
vary from operation to operation and may change during an operation. The challenge for a JFC
is to ensure the ROE for a forcible entry operation provides the commander with the
flexibility to accomplish the mission, while assuring adherence to political, legal,
operational, and diplomatic factors the force may encounter including protecting those
persons and objects from attack that are entitled to protected status under the law of war.
For additional information on ROE, see Chairman of the Joint Chiefs of Staff Instruction
(CJCSI) 3121.01, Standing Rules of Engagement/Standing Rules for the Use of Force for
US Forces.
a. The complexity of forcible entry operations increases the potential for friendly fire
incidents and demands efforts by all elements of the joint force to deliberately reduce
the risk of friendly fire incidents. Friendly force tracking provides JFCs with enhanced
situational awareness that can help to reduce friendly fire incidents.
For further details on preventing friendly fire incidents, refer to JP 3-01, Countering Air
and Missile Threats; JP 3-09, Joint Fire Support; JP 3-09.3, Close Air Support; and
JP 3-52, Joint Airspace Control.
II-10 JP 3-18
CHAPTER III
PLANNING
“Now the general who wins a battle makes many calculations in his temple before
the battle is fought. The general who loses a battle makes but few calculations
before-hand. Thus do many calculations lead to victory, and few calculations to
defeat: How much more no calculation at all! It is by attention to this point that I
can see who is likely to win or lose.”
1. Purpose
a. Forcible entry operations require extensive JIPOE. The primary purpose of JIPOE
is to support the JFC’s planning and decision making by identifying, analyzing, and
estimating the enemy’s centers of gravity, critical factors, capabilities, limitations,
requirements, vulnerabilities, intentions, and COAs that are most likely to be encountered
by the entry force.
III-1
Chapter III
direct the movement of afloat pre-positioning force (APF) ships to the OA, embark
personnel and equipment at US or allied aerial ports of embarkation (APOEs), carefully
plan for aerial and amphibious embarkation and debarkation, and conduct reconnaissance
and surveillance operations.
c. Forcible entry will require well-trained and well-prepared joint forces capable of
executing operations on short-notice. It is essential all key elements associated with the
operation are included in planning from the onset. This ensures resources needed are
available in a timely manner and that ample time is available for preparation. When
operations require specialists, it is essential the requirements are identified early and those
organizations are included in planning.
JPP underpins planning at all levels and for missions across the range of military
operations. The process is designed to facilitate interaction between commander, staff, and
subordinate headquarters throughout planning. Forcible entry planning can occur during
deliberate planning or CAP. The JFC, staff, and subordinate and/or supporting
commanders and staffs follow JPP and consider the following factors when developing
forcible entry operations.
a. Planning Initiation. The President, SecDef, or the Chairman of the Joint Chiefs
of Staff may initiate planning to develop military options to respond to a potential or actual
crisis for an operation requiring forcible entry. Additionally, GCCs and other commanders
may initiate planning on their own authority when they identify a planning requirement not
directed by higher authority.
b. Mission Analysis. The joint force mission describes the essential task or set of
tasks, together with the purpose, clearly indicating the action to be taken and the reason for
doing so. In analyzing a forcible entry operation, the JFC and staff consider:
(a) Threat to joint forces en route to, and operating in, the OA.
(c) Lodgment terrain and infrastructure, with a critical eye on the ability to
support follow-on operations.
III-2 JP 3-18
Planning
(6) Strategic and operational aims, including the military end state.
c. COA Development. In the development of a forcible entry COA, five phases are
addressed: preparation and deployment, assault, stabilization of the lodgment, introduction
of follow-on forces, and termination or transition. To produce a valid COA, the following
should be considered (Chapter IV, “Operations,” further expands on the five phases):
(c) Determine requirements for local air and maritime superiority to conduct
the forcible entry operation.
III-3
Chapter III
(g) Commanders must plan for culmination and retrograde criteria in the
event that transition to Phase II (Assault) is no longer viable or a decision is made to
terminate the operation.
For more information on culmination, see JP 5-0, Joint Planning. For more information
on retrograde operations, see JP 3-35, Deployment and Redeployment Operations.
3. Space within the lodgment and maneuver space for future operations.
(d) Plan for reception of reinforcing forces (if required) and follow-on forces
for subsequent operations.
III-4 JP 3-18
Planning
(c) Plan to terminate the forcible entry portion of the joint operation.
d. COA Analysis and Wargaming. The commander and staff analyze each COA
separately according to the commander’s guidance to bring out relevant factors in each
COA. Wargaming provides the means for the commander and participants to analyze a
COA and obtain insights not otherwise discernable. A JFC can use red teams to provide
insights and alternatives during planning, execution, and assessment to:
III-5
Chapter III
(2) Assist the commander and staff in framing problems and defining end state
conditions.
(6) Assist in identifying areas for assessment, as well as the assessment metrics.
e. COA Comparison. The staff will evaluate COAs using governing factors
identified during the wargame in order to identify the COA with the highest probability of
success.
f. COA Approval. The staff determines the best COA and presents a
recommendation to the commander for approval.
h. Red Teaming. Forcible entry, particularly from the sea, is one of the most difficult
and complex operations in warfare. The level of difficulty and complexity are underscored
by the dynamic factors that could adversely impact operational success—weather, sea
states, maintenance readiness of connectors, training and experience of ships crews, and
LFs are only a few potential single-points-of-failure factors. Perhaps the single, largest
factor that will impact operational success is the disparate elements of the joint force’s
understanding of how they must achieve unity of effort and appreciate the aforementioned
factors’ adverse impact on the operation. During forcible entry operation planning, the
JFC should use red teaming to mitigate the inherent risk and promote a uniform
appreciation of forcible entry.
III-6 JP 3-18
Planning
available information for determining changes in the OE relative to the initial planning OE
baseline. In this manner, relevant and measurable indicators are determined during
planning and revised, observed, and analyzed during execution to assess progress or
regression relative to desired effects indicating success or failure of actions. When
planning for the relevant effects, measures, and indicators, it is important for the planner
to think in terms of the entire OE and capabilities of both friendly and enemy forces. By
focusing on the relevant capabilities, resources, and vulnerabilities, the planner will be able
to build performance and effectiveness measures, as well as indicators that anticipate the
likelihood of achieving or not achieving objectives. Finally, the planner must realize and
identify feedback mechanisms through which reporting can be accomplished. Feedback
mechanisms will be the conduit through which the operation will acknowledge
reinforcement of successful actions or the need to deviate/refocus assets to create a more
desired effect within the operation.
Refer to JP 3-0, Joint Operations, for more information on operational estimates. For more
information on assessments, assessment planning, and red teams, see JP 5-0, Joint
Planning.
III-7
Chapter III
Intentionally Blank
III-8 JP 3-18
CHAPTER IV
OPERATIONS
1. Purpose
2. Introduction
a. General. This section highlights some common issues and considerations that integrate
and synchronize activities during a forcible entry operation. The discussion that follows is not
a checklist, but may be used by JFCs and staffs, as appropriate to meet their specific needs.
IV-1
Chapter IV
Forcible entry operations are normally conducted during the seize the initiative or
dominate phase of a joint operation. Within the context of these phases established by a
higher-level JFC, the forcible entry operation commander may establish additional phases
that fit the forcible entry CONOPS. Forcible entry operations may be planned and
executed in the five phases listed in Figure IV-2. Planning for each phase should include
branch and sequel planning. Transitions between these phases are designed to be distinct
shifts in focus by the joint force, often accompanied by changes in command or support
relationships. The activities that predominate during a given phase, however, rarely align
with neatly definable breakpoints. The need to move into another phase is normally
identified by assessing that a set of objectives are achieved or the enemy has acted in a
manner that requires a major change in focus for the joint force and is, therefore, usually
event driven, not time driven. Changing the focus of the operation takes time and may
require changing commander’s objectives, desired effects, measures of effectiveness,
priorities, command relationships, force allocation, or even the organization of the OA.
Appendix B, “Control Joint Forcible Entry Operations,” provides considerations in a
notional checklist format to assist with the planning and conduct of joint forcible entry
operations.
For further information on phasing in joint operations, refer to JP 3-0, Joint Operations,
and JP 5-0, Joint Planning.
(1) Planning. The JFC, the component commanders, and their staffs must
be intimately involved in planning and executing the deployment of forces to the OA.
Phase II Assault
IV-2 JP 3-18
Operations
(4) Transition to Assault. During phase I, support forces set the conditions
that are required for a successful assault by isolating the lodgment and achieving local
air and maritime superiority. Support forces set the conditions and support the conduct of
forcible entry operations. Air interdiction, naval surface fire support (NSFS), SOF
missions, cyberspace operations (CO), and/or other actions to prepare assault objectives
will normally occur prior to the commitment of assault forces. In other situations, political
or operational considerations may preclude such actions prior to the initiation of the assault
phase of the operation.
IV-3
Chapter IV
b. Assault (Forcible Entry Phase II). Phase II begins with joint force assaults to
seize initial objectives in the lodgment and concludes with the consolidation of those
objectives.
(1) Initial Assaults. Initial assaults are designed to surprise and overwhelm the
enemy with decisive force and to protect assault forces as they accomplish assigned
missions. SOF and IRCs may be employed in advance of assault forces to identify, clarify,
and modify conditions in the OA and/or to conduct reconnaissance, surveillance, and
interdiction operations well beyond the initial assault objectives. Opening entry points will
involve actual assault by various combinations of amphibious and airborne forces to achieve a
coup de main or enable follow-on operations through the seizure of existing ports and airfields
or the establishment of expeditionary facilities. SOF may be used in combination with naval
forces to conduct assaults to open entry points. Planning for this phase may include pre-
assault strikes by cruise missiles; armed unmanned aircraft; fixed-wing or tiltrotor aircraft;
attack helicopters; NSFS to destroy enemy forces in the objective areas; and/or enemy ground
force reserves, aircraft, missiles, weapons of mass destruction (WMD), and naval forces that
could disrupt the operation. Assault forces may use multiple approaches and entry points to
deceive the enemy and diminish their ability to observe, orient, decide, and act.
(a) Initial Entry Forces. These are the first forces to enter onto foreign
territory. They include both CF and SOF. Initial entry forces’ defining characteristic is
their ability to insert offset from infrastructure (such as airfields and seaports) by air,
surface, or subsurface assault or infiltration means as tactically coherent units and
formations that are able to operate immediately upon arrival. The means of assault
insertion include air assault, amphibious assault, airborne assault, and airland operations.
Initial entry forces are able to operate for predetermined periods of time without a need for
external sustainment. The concept of initial entry forces (and reinforcing entry forces) is
scalable and applies to small entry operations, as well as to larger entry operations.
See JP 3-02, Amphibious Operations, for a discussion of the advance echelon as the initial
assault force during an amphibious operation.
(b) Reinforcing Entry Forces. Reinforcing entry forces reinforce initial entry
forces shortly after the initial entry. Reinforcing entry forces (which may be either CF, SOF,
or a combination thereof) are more heavily equipped than initial entry forces in order to
increase the fire support, protection, maneuver, or other required capabilities to support initial
operations. They do not require reception, staging, onward movement, and integration (RSOI)
upon arrival and can operate immediately or shortly after landing. However, reinforcing entry
forces must follow the initial entry forces into the AO due to offload security requirements that
must be met prior to their introduction. Closing the reinforcing entry forces on the initial
objectives quickly is critical to ensuring the survival of the initial entry forces during opposed
entry operations. Depending on the specific mission of the reinforcing entry forces, existing
infrastructure may be needed to support offload, or the reinforcing entry forces may be the
force creating the expeditionary infrastructure (such as expeditionary airfields) needed to
support receipt of follow-on forces and replenishment of logistics for the initial entry forces.
Some limited-duration missions may only employ initial entry forces and not require the
capabilities of reinforcing entry forces. For entry missions limited in scope and duration, a
IV-4 JP 3-18
Operations
planned withdrawal with little to no use of follow-on forces is normally expected. The assault
follow-on echelon is that echelon of the assault troops, vehicles, aircraft, equipment, and
supplies for an amphibious assault which, although not needed to initiate the assault, are
required to support and sustain the assault.
(2) Overcoming A2/AD Threat Capabilities. The JFC will be faced with
natural and man-made obstacles intended to restrict or halt movement that allows the
enemy to mass its forces and repel the assault. Naval mine countermeasures (MCM) forces
may be required to conduct MCM operations in order to clear transit routes and OAs of
sea-based mines and/or obstacles in order to facilitate rapid movement of LFs and follow-
on forces from the sea. Explosive ordnance disposal (EOD) personnel and combat
engineers enhance the mobility of assault forces on land by clearing roads and airfields of
explosive hazards and other obstacles. Combat engineers support forward aviation ground
units by conducting forward aviation combat engineering operations. EOD forces also
have the capability to locate, access, identify, diagnose, render safe/neutralize, recover,
exploit, and dispose of weapons and explosives that threaten personnel, which include
captured enemy ammunition, unexploded explosive ordnance, improvised explosive
devices (IEDs), and CBRN munitions. The JFC will also face a dramatic improvement
and proliferation of weapons and other technologies capable of denying access to, or
freedom of action within, an OA. These may come not only from advanced technologies,
but also from the innovative use of basic, even crude, capabilities. Typical of these crude
capabilities are clandestine networks employing improvised devices to include IEDs. In
an improvised threat environment, the JFC will need to establish exploitation centers and
exploitation reachback procedures. These exploitation capabilities are needed to defeat
threat attempts to maintain anonymity. Threat groups attempting to preserve anonymity
may include, insurgent, terrorist, and criminal networks. As a result of improvements in
these A2 capabilities, deploying forces will find themselves at risk at greater ranges.
Personnel, supplies, and equipment located in rear areas once thought to be secure,
increasingly, will be targeted. Some enemies will possess limited numbers of these
capabilities, but others will deploy fully integrated and layered advanced A2/AD systems
that may be guided by a single C2 system and employed in mutual support so that, to defeat
one capability, an attacker must expose himself to others. For example, maritime forces
and capabilities may be required in the littoral to support operations inland while defending
against threats from shore-based defenses, coastal submarines, and small attack craft.
For more information on overcoming obstacles, see JP 3-34, Joint Engineer Operations;
JP 3-15, Barriers, Obstacles, and Mine Warfare for Joint Operations; JP 3-15.1, Counter-
Improvised Explosive Device Operations; and JP 3-42, Joint Explosive Ordnance
Disposal.
(3) Main Assault. Assault forces can enter objective areas via parachute assault,
air LFs, helicopter-borne air assault, tiltrotor aircraft, and amphibious assault. Throughout
the assault phase, landed forces must have immediately available joint fire support to
destroy, interdict, or suppress enemy forces and missile defense. The joint force must
maintain the initiative and rapidly prepare to receive follow-on forces to develop the
combat power necessary to secure the lodgment. CAS and NSFS are critical resources
during the assault. Depending on resources available to the JFC, the introduction of LFs
IV-5
Chapter IV
During the rapid advance following the Inchon landing and breakout from
Pusan, US and ROK [Republic of Korea] forces advanced rapidly up the
eastern coast. The US X Corps planned for an amphibious assault at
Wonsan, the only useable North Korean landing area.
Evidence began to mount that the North Koreans were mining the coastal
waters of North Korea. Three US ships, the Brush, Mansfield, and Magpie,
struck mines and suffered heavy damage. Although intelligence sources
indicated enemy mines were being laid in coastal waters, little was known
about the location and extent of these mine fields. North Korean interests
certainly dictated, however, that the sea approaches to Wonsan should be
mined.
At this point the novel idea was advanced of exploding mines along a
narrow passageway by aerial bombing which would permit the lead sweeps
to pass.
On 12 October, 39 planes from the carriers Philippine Sea and Leyte flew
down the Russian channel dropping 1,000-pound bombs.
Three minesweepers, the Pirate, Pledge, and Incredible, then entered the
bombed channel to resume minesweeping. Northwest of Yo-do Island the
Pirate struck a mine at 1209; the Pledge hit one six minutes later. Both
vessels sank. As the Incredible, third in line, maneuvered into safe water,
enemy shore batteries opened fire. Twelve men went down with the two
sunken ships. One enlisted man died later from wounds. At least 33 others
were wounded and injured in varying degrees; some sources place the
number of wounded as high as 99. The Incredible itself rescued 27
survivors.
IV-6 JP 3-18
Operations
may be combined with simultaneous strikes against other key enemy assets throughout
the OA in order to prevent the enemy’s ability to react effectively. Entry-capable forces
must be able to deploy rapidly and be employed immediately upon arrival without the
requirement for RSOI.
(4) Transition to Stabilizing the Lodgment. The main assault may transition
to offensive, defensive, or retrograde operations as described by the JFC’s operational
concept and by the introduction of follow-on forces to assist in securing the lodgment and
continue on to follow-on operations without an operational pause.
(1) Securing the Lodgment. Whether the forcible entry is envisioned as the
establishment of a lodgment to enable future combat operations, or as a coup de main, the
lodgment must be secured and protected in order for it to serve as an entry point for follow-
on forces and sustainment. Based on the JFC’s analysis of the threat and available forces,
the lodgment is expanded, as required. Lodgment security is continuous and enables
organization and expansion.
IV-7
Chapter IV
(3) Expanding the Lodgment. Expansion is when the lodgment is not fully
established and the introduction of combat power significantly contributes to the
development of the security situation. During the expansion, the capacity of ground forces
to maintain the lodgment in the face of a coherent enemy response should significantly
increase.
The joint force must maintain the initiative and rapidly prepare to receive follow-on
forces to develop the combat power necessary to secure the lodgment.
IV-8 JP 3-18
Operations
subsequent support operations. Follow-on forces and equipment may flow via air LOCs
and SLOCs into the APODs and SPODs located within the now-established lodgment. In
general, follow-on forces require some form of RSOI activities before they are able to
conduct operations and arrive using the existing airfields and seaports or expeditionary
airfields and seaports. During this phase, joint logistics over-the-shore (JLOTS) operations
commence in earnest. Follow-on forces may also deploy to the OA to link up with pre-
positioned equipment. Initially, airfield operations may be conducted in a combat
environment. Airfield operations and security should conform to currently published
guidance (see the Army Techniques Publication [ATP] 3-17.2/Marine Corps Reference
Publication [MCRP] 3-20B.11/Navy Tactics, Techniques, and Procedures [NTTP]
3-02.18/Air Force Tactics, Techniques, and Procedures [AFTTP] 3-2.68, Multi-Service
Tactics, Techniques, and Procedures for Airfield Opening, and JP 3-17, Air Mobility
Operations) and in accordance with any valid Service or multinational agreements or plans.
Once the airfield is secure and open for full operations, improvements can be made to
provide the capacity for aircraft maintenance and parking. Follow-on force equipment will
largely flow from pre-positioned stocks.
(3) MPF and APS-3. MPF and APS-3 options provide the JFC with significant
combat capabilities to initiate or prosecute follow-on operations. Fundamental
requirements for MPF or APS-3 operations include intertheater lift and a secure
environment (e.g., arrival airfields, ports, and/or beaches) for arrival, off-load, and
assembly of forces. These are the conditions necessary for a forcible entry operation.
(b) APS-3. When available, the APS-3 provides the GCC or designated
subordinate JFC with a similarly responsive brigade size armored force to be employed
rapidly in response to a crisis situation. Like the MPF, this capability consists of the
equipment required by brigade combat teams (BCTs) and enabling units to conduct a wide
range of operations.
IV-9
Chapter IV
(a) CRF. The CRF is composed of Air Force personnel and assets, trained
and equipped to secure after seizure, assess, open, and initially operate airfields. The CRF
provides engineer, security, communications, and airfield support assets needed to support
the forcible entry effort. Special capabilities, not present in every CRF, include airborne,
air assault, and pathfinder; expanded combat communications; and expeditionary
engineering.
(c) STTs. STTs are comprised of Air Force combat control, combat weather,
and pararescue personnel. The STT has the capability to assess, establish, and control LZs;
provide weather observations and forecasting; and provide battlefield trauma care. They
employ with airfield seizure forces, CRF, or unilaterally to provide terminal control of the
airfield. Combat control personnel are qualified as joint terminal attack controllers.
IV-10 JP 3-18
Operations
(d) 820th Base Defense Group. This Air Force battalion-sized unit is
comprised of three rapidly deployable base defense squadrons. Each multi-functional
squadron contains security forces, intelligence, emergency management, engineering,
communications, medical, logistics, and administration personnel able to operate with
limited support from other deployed forces. The unit is trained and equipped to perform
airborne insertion, air assault operations, airfield security assessments, base defense,
mounted/dismounted patrolling, and C2 of defense forces for one large base or several
small sites. Additionally, the squadrons can link with other integrated defense or initial
entry/base seizure forces and provide a secure and smooth transition to airfield opening
forces.
(f) Air Force Air Mobility Liaison Officers (AMLOs). AMLOs integrate
with supported joint force component staff function(s) at the echelon(s) making decisions
for air movement and sustainment planning, validation, prioritization, preparation, and
execution. They are organized to advise ground force commanders on air mobility issues
and may be granted coordinating authority and direct liaison authority to provide essential
coordination and enhance the interoperability between the global mobility enterprise,
supported combatant commands, joint force partners, and other authorized mobility users
in garrison and forward deployed.
For additional information regarding the Air Force’s airbase opening capabilities, refer
to Air Force Doctrine Annex 4-0, Combat Support.
IV-11
Chapter IV
The Air Force air mobility liaison officer aligned with the 173d Airborne
Brigade participated in detailed operational planning and pre-mission
coordination leading up to Task Force Viking to airdrop forces delivered,
inserted with the seizure force, to assist transition to 86th Tanker Airlift
Control Elements airfield opening personnel.
Various Sources
operations depicted in JP 3-0, Joint Operations, (e.g., seize the initiative, dominate, or
stabilize phases) as part of the larger operation.
For further details on stability activities, refer to JP 3-07, Stability. For further details on
interagency coordination, refer to JP 3-08, Interorganizational Cooperation.
The following discussion illustrates the type of activities that may occur at the JFC
level to integrate and synchronize a forcible entry operation. This list is not all-inclusive
but presents activities for JFCs and staffs to consider when synchronizing a forcible
entry operation. The number and types of phases for forcible entry operations, as with all
operations, may vary. As phasing is a key synchronization action, these activities are
organized into the five phases of forcible entry operation presented earlier in this chapter.
The example assumes a combination of forcible entry capabilities will be used to obtain a
lodgment as the initial operation of a larger campaign. These phases are normally
sequential but may overlap. During planning, commanders must establish conditions for
transitioning from one phase to another. The commander adjusts the phases to exploit
opportunities presented by the enemy or to react to unforeseen situations.
(8) Desired arrival sequence of forces in the TPFDD is validated, then scheduled
to available transportation.
IV-12 JP 3-18
Operations
(10) Military activities that support communication themes and messages are
integrated—military information support operations, public affairs (PA), and defense
support to public diplomacy (DSPD).
(16) Surveillance assets in the assault areas are positioned and reported.
(3) Modifications to existing plans and branches and/or sequels are deconflicted.
(4) Fire support coordination and airspace coordinating measures are activated.
IV-13
Chapter IV
(3) Runways, aprons, taxiways, and parking areas are repaired and maintained to
support continuous air landed operations.
(3) Reconstitution and/or redeployment of assault forces (e.g., embark the LF for
a subsequent mission) is completed.
(6) Ports of debarkation are maintained to maximize and sustain throughput for
follow-on forces.
(1) Joint force and/or component missions and command relationships are
reorganized.
Special operations are an integral part of forcible entry operations and these actions
and operations are integrated to achieve military objectives. SOF may be employed prior
to forcible entry operations to collect intelligence, seize key terrain, organize and train
guerrilla forces, and conduct other activities that facilitate the introduction of CFs. In the
execution stages of a forcible entry operation, SOF can seize objectives, interdict targets
(especially those that can severely disrupt the assault to open entry points), and conduct
other operations to support the main force. In the closing stages of the operation, SOF can
play a key role in transition or termination by working with HN, multinational, interagency,
and intergovernmental partners.
IV-14 JP 3-18
Operations
From 29 January until 16 February 1991, Naval Special Warfare Task Group
elements conducted near-shore and off-shore reconnaissance missions in
support of US Central Command’s deception strategy to fix Iraqi attention
on a potential amphibious assault by US Marines. The special
reconnaissance missions resulted in the collection of information,
established a naval presence along the Kuwaiti coast, and focused the
attention of the Iraqi command on a possible maritime invasion. The
deception effort culminated in a large-scale operation on the night of 23-24
February 1991, the eve of the ground offensive, which simulated a beach
reconnaissance and clearing operation. The deception campaign
prevented Iraqi units at the beaches from reinforcing those being attacked
in the west.
6. Fires
In forcible entry operations, the initial assault forces are building combat power in the
OA from nothing as quickly as possible. They will normally have very minimal or no
artillery support available for fire support in the early stages of the operation. Fires from
aircraft (manned and unmanned) and/or naval platforms (surface/subsurface) take on added
importance to compensate for the lack of artillery. The supported commander establishes
the priority, timing, and effects of all fires within the boundaries of the designated OA.
JP 3-09, Joint Fire Support, and JP 3-02, Amphibious Operations, provide more
information on fire support.
a. The JFC uses intelligence to decide what, why, when, where, and how to attack;
determine forcible entry capabilities needed, and task organization required, to seize initial
objective(s); support targeting and combat assessment; and anticipate future operations
(see Figure IV-3). Counterintelligence (CI) helps the JFC maintain the element of surprise
essential to forcible entry operations by supporting OPSEC and MILDEC.
See JP 2-01, Joint and National Intelligence Support to Military Operations, to identify the
primary providers of intelligence assigned to or supporting the JFC and the diverse
products and services available to satisfy joint force intelligence requirements.
b. Intelligence considerations for the five phases of a forcible entry operation are
described below.
IV-15
Chapter IV
Intelligence Support
Intelligence
(b) JIPOE. JIPOE is a key input to mission analysis and the process
continues to refine and update intelligence products to provide commanders and staffs the
means to successfully prosecute operations.
For further guidance on intelligence support, refer to JP 2-0, Joint Intelligence; JP 2-01,
Joint and National Intelligence Support to Military Operations; and JP 2-01.3, Joint
Intelligence Preparation of the Operational Environment.
(2) Assault (Phase II). The joint force is most vulnerable to enemy action during
the assault phase. Effective warnings, targeting support, and collection management to
track enemy reaction to the assault and force protection (FP) are paramount concerns
during this phase.
IV-16 JP 3-18
Operations
8. Information Operations
IO are integral to successful military operations and are key during forcible entry
operations. The full impact of IO on friendly, neutral, and hostile forces should be
considered with the key goal of IO achieving and maintaining information superiority for
the US and its allies and exploiting enemy information vulnerabilities. IO are the integrated
employment, during military operations, of IRCs in concert with other lines of operation
to influence, disrupt, corrupt, or usurp the decision making of enemies and adversaries
while protecting our own.
a. IO is a key part of setting the conditions for forcible entry operational success; IO
efforts will be central to achieving surprise and isolating the lodgment and will also be an
important enabler for gaining control of the OE and neutralizing enemy forces. OPSEC
IV-17
Chapter IV
Various Sources
and MILDEC, combined with the other IRCs, will be the heart of achieving operational
and tactical surprise during the forcible entry operation.
(1) OPSEC, as an IRC, denies the enemy and adversary the critical information
and indicators needed to correctly assess friendly capabilities and intentions. Forcible entry
forces preparing for deployment have large, distinct signatures. Masking the movement
of forces to staging bases and to the OA is essential to protect critical information and
indicators from adversary collection. These movements may not be totally hidden;
however, such detail as the composition of the forces or the time and location of the forcible
entry should be concealed. The object is to surprise, confuse, or paralyze the enemy.
OPSEC is a force multiplier that can maximize operational effectiveness by saving lives
and resources when fully integrated into operations, activities, plans, exercises, training
planning, execution, and assessment.
(a) Deceive the enemy as to the time, location(s), and strategic and/or
operational purpose of the forcible entry.
(b) Focus enemy attention and effort away from actual assault objectives.
(c) Cause the enemy to disperse forces to defend all possible airheads and
beachheads in the OA so the enemy cannot mass decisive force to deny joint force assaults.
IV-18 JP 3-18
Operations
(f) Force the enemy to maintain heightened states of alert and/or readiness
for extended periods of time.
b. The lodgment must not only be isolated from nearby enemy military forces, but
also from C2 centers outside the OA. CO and electronic warfare (EW), supported by
physical attack on C2 networks, will play a decisive role in this isolation.
c. EW includes any military action involving the use of electromagnetic and directed
energy to control the EMS or to attack the enemy. The JFC’s plan must be developed to
ensure complementary use of assets and weapons systems to effectively disrupt and/or
destroy enemy C2 and weapons systems, while protecting joint force capabilities.
d. Other Capabilities
(1) DSPD. DSPD consists of activities and measures taken by DOD components,
not solely in the area of IO, to support and facilitate public diplomacy efforts of the US
Government. DSPD requires coordination with both interagency partners and among DOD
components.
(2) CMO. Properly executed CMO during forcible entry operations can reduce
potential friction points between the civilian population and the joint force, specifically by
eliminating interference with military operations and limiting the impact of military
operations on the populace. CMO encompass the activities taken by a commander to
establish, maintain, influence, or exploit relations between military forces and indigenous
populations and institutions by directly supporting the attainment of objectives relating to
the reestablishment or maintenance of stability within a region or HN. Use of civil affairs
(CA) forces and units specifically organized, trained, and equipped to conduct CA
operations in support of CMO can assist the commander.
9. Public Affairs
A PA plan should be prepared during the planning process and executed upon
initiation of the forcible entry operation. PA planning must anticipate detection of all but
small covert operations by the enemy and the press.
IV-19
Chapter IV
The enemy may employ CBRN weapons at any point in the conflict. Planning against
an enemy known to have the capability and willingness to employ CBRN weapons/devices
should take into account the need for protective clothing, decontamination, and logistical
support to enable the force to continue the mission. Additional considerations may include
the need for specialized training for the assault forces or the need for additional CBRN
units to further support operations.
Air mobility forces enhance other forces’ combat power and flexibility, either by
extending their range, bolstering their staying power, or providing them with greater
maneuverability. Airlift allows employment of joint forces by airdrop and airland insertion
over strategic distances without delays caused by terrain or obstacles. OPCON of air
mobility forces may be transferred to the theater commander or retained by the
Commander, US Transportation Command. Detailed planning is required for effective
utilization.
IV-20 JP 3-18
CHAPTER V
LOGISTICS
1. General
Logistic planning for the phases of forcible entry operations occurs concurrently, not
sequentially. Planning should address the logistic core capabilities. The following specific
planning considerations supplement those detailed in JP 4-0, Joint Logistics, and JP 5-0,
Joint Planning. Appendix B, “Control Joint Forcible Entry Operations,” provides
considerations in a notional checklist format to assist with the planning and conduct of joint
forcible entry operations.
V-1
Chapter V
(5) Determine air, land, and sea LOC requirements to support forcible entry and
subsequent operations.
(6) Determine logistic factors and establish airhead and beachhead resupply
responsibility.
(7) Analyze force health protection and health services planning considerations.
(9) Analyze and recommend changes to TPFDD flow to ensure that adequate
support will be available.
(10) Integrate and synchronize logistic support of initial and subsequent flow of
forces into the OA.
(1) Analyze potential lodgment area to ensure continuous air and sea landing of
personnel, equipment, and logistic resources, paying strict attention that infrastructure
(e.g., buildings, roads, and power supplies) supports planned operations.
(3) Identify and plan advanced logistic bases in support of the joint force
operational concept. Unless additional forcible entry operations are anticipated, planning
for follow-on operations will be in accordance with standard joint force logistic planning
doctrine in JP 4-0, Joint Logistics.
V-2 JP 3-18
Logistics
(5) Develop provisions to clear reinforcing supplies and equipment from off-load
points.
(5) Plan for reconstitution and redeployment of the assault force for follow-on
operations.
(2) Plan for preparing the force for follow-on, out-of-area operations, such as
redeployment to another geographical area.
(3) Once plans have formally addressed and integrated all seven core logistic
capabilities, the force should be well prepared to begin the application of those functions
that support operational execution.
V-3
Chapter V
Intentionally Blank
V-4 JP 3-18
APPENDIX A
AIRBORNE AND AIR ASSAULT OPERATIONS
1. Purpose
Joint airborne and air assault operations involve the air movement and delivery of
specially trained combat forces and logistic support into an objective area to execute a
mission. Airborne and air assault forces provide the commander with the unique ability to
quickly respond on short notice and mass rapidly on critical targets. Airborne operations
can be launched at a considerable distance from the target area with such speed as to cause
tactical or operational surprise and prevent effective action by the enemy. Airborne forces
can secure and/or destroy critical installations, facilities, or terrain; reinforce US forces and
MNFs; and conduct a show of force or attack an enemy in isolated areas. Air assault
operations increase mobility and freedom of action by providing operational and tactical
mobility for both the offense and defense. Air operations enable forces to reduce time and
space limitations normally encountered in movement of assault forces by land; cross terrain
obstacles; bypass hostile areas; and attack, destroy, and/or seize objectives deep in enemy
territory. Each component can significantly contribute to the successful execution of
airborne and air assault operations.
a. Concept. Airborne and air assault forces are capable of conducting operations in
support of strategic, operational, and tactical objectives. They land intact with weapons,
ammunition, and other combat equipment and are prepared for combat immediately.
Airborne forces aggressively seize and hold objectives until linkup is accomplished. An
airborne operation usually terminates upon seizure of the objective, linkup with other
ground forces, or extraction. Air assault operations are deliberate, precisely planned, and
vigorously executed to strike over extended distances.
b. Characteristics. Airborne and air assault forces share many of the same
capabilities. They can provide operational reach, move, and rapidly concentrate combat
power quicker than land-mobile forces. Airborne and air assault forces also share the same
limitations. They are dependent on the availability of airlift assets, fire support, and combat
service support resources; they are highly vulnerable to enemy attack by ground and air
forces while en route to the LZ and/or DZ; and are equally assailable when operating in
open terrain against an armored threat or WMD. Environmental conditions and adverse
weather can also impact performance. There are four phases of airborne operations:
marshalling, air movement, landing, and ground tactical phases. Air assault operations
have five phases: staging, loading, air movement, landing, and ground tactical phases.
A-1
Appendix A
initiates airborne and/or air assault operations with a planning directive to participating
units. The directive is distributed through normal command channels, and pertinent
information is issued to subordinate units. After receipt of a directive and preparation of
initial estimates and studies, the commanders, staffs, and representatives of supporting
forces meet in a joint conference to develop a CONOPS. The CONOPS forms the basis
for the preparation of the commander’s planning directive and development of OPLANs
and OPORDs, including a list of forces in support, a schedule of events, and stated
conditions under which the operation will begin, be delayed, altered, or terminated.
c. Command. The JFC may initiate joint airborne and/or air assault operations in
support of strategic and/or operational objectives. The complexity of airborne and air
assault operations and their vulnerability require an exceptional degree of unified action.
The initiating directive is an order to the airborne and/or air assault commander to conduct
the operation. It is issued by the JFC delegated overall authority for the operation. JFCs
establish command relationships and assign authority to subordinates based on the
operational situation, the complexity of the mission, and the degree of control needed to
ensure that strategic intent is satisfied.
A-2 JP 3-18
Airborne and Air Assault Operations
Effective liaison between operational elements of an airborne and/or air assault operation
and with higher authorities will facilitate mutual understanding and unified action.
(1) The airborne assault force commander accompanies the initial assault and is
responsible for (see Figure A-1 for a list of tasks at various command levels):
(2) The airborne TF commander may also be the JTF or land component
commander, depending upon experience and the scope of the operation. If the assault
requires an airborne BCT, for example, the BCT commander leads the assault force, and
the parent Army headquarters (normally a division) provides the airborne TF commander.
This ensures the assault force commander can give full attention to the fight in the airhead
and not be consumed with managing en route follow-on forces and support.
A-3
Appendix A
Assault Force Develop ground plan and En route planning Expand lodgment
Headquarters rehearse ground operations
Seize assault objectives Receive initial follow-on
En route planning forces
Secure and defend airhead
Seize assault objectives Link-up with special
Control supporting fires
operations forces and
Secure and defend airhead
amphibious forces
Control supporting fires
Exploitation
(4) The JFC is responsible for joint operational planning; joint integrated
prioritized target list development; joint intelligence, surveillance, and reconnaissance
integration; setting the conditions for joint forcible entry; C2; and air flow and air space
management.
f. Forces
A-4 JP 3-18
Airborne and Air Assault Operations
(2) The initial assault stresses the coordinated action of small units to seize initial
objectives before the advantage of surprise has worn off. After the initial assault landings
accomplish the initial ground missions, commanders must organize the airhead line.
Airborne forces defend to protect and retain areas or installations seized during the assault
phase of the operation. Because an airborne assault is most often conducted in the enemy
rear, an all-around defense is required. Units can be airlanded on terrain under the control
of friendly forces near the line of contact or on secured locations in the enemy’s rear.
However, it takes time to land a sizable force and a secured LZ is necessary. Even when
multiple LZs are employed, it takes longer to mass forces in the airhead during airland
operations than during parachute operations. Subsequent operations can include continued
defense of the airhead, linkup, passage of lines, relief, withdrawal, or offensive operations,
to include exploitation or further airborne and/or air assaults.
(3) Air Assault. Whether performed from the sea or a land ISB, aviation and
combined arms provide the JFC with an agile fighting force capable of conducting both
offensive and defensive operations. Air assault operations allow friendly forces to strike
over extended distances and terrain barriers to attack the enemy when and where he is most
vulnerable. Air assaults are deliberately planned due to their complex nature. However,
units are often required to execute air assaults within short time constraints. Reinforcement
of committed units, linkup operations, gap crossing operations, security operations, limited
visibility operations, and ship-to-shore operations should all be considered during air
assault operations.
4. Termination or Transition
(3) Exfiltration.
A-5
Appendix A
b. As conditions permit, the buildup of forces and supplies continues and follow-on
operations commence. The airfield transitions from being seized to being improved for
use as an airbase suitable for joint operations.
Army Field Manual (FM) 3-99, Airborne and Air Assault Operations, provides more
specifics on airborne and air assault operations.
A-6 JP 3-18
APPENDIX B
CONTROL JOINT FORCIBLE ENTRY OPERATIONS
SECTION A. OVERVIEW
c. JFCs have authority to assign missions, redirect efforts, and direct coordination
among subordinate commanders. JFCs should allow Service tactical and operational
groupings to function generally as they are organized and trained and in coordination with
the JFC’s staff.
SECTION B. CHECKLIST
(2) Balance requirements for initial combat and noncombat operations, joint
forces reception and buildup, and timing of required follow-on operations.
B-1
Appendix B
(e) Missions assigned to special operations forces (such as direct action and
special reconnaissance).
(f) JIPOE.
B-2 JP 3-18
Control Joint Forcible Entry Operations
(m) EW operations.
B-3
Appendix B
(a) Land, air, maritime, and special operations forces in the OA.
a. Air mobility forces are usually matched with airborne, air assault,
light infantry, or SOF specifically designed for delivery by air.
4. Vulnerability to interdiction.
5. Operating facilities.
(b) Initial entry forces, to include advance, pre-assault, and assault forces
securing lodgment airhead, and amphibious forces securing beachhead.
(c) Assault forces preparation to receive reinforcing entry forces and assault
echelon coordination with assault follow-on echelon.
B-4 JP 3-18
Control Joint Forcible Entry Operations
(c) Force link-ups of initial entry forces, reinforcing entry forces, and other
follow-on forces.
1. Casualty evacuation.
B-5
Appendix B
d. Monitor crisis response and limited contingency operations related to forcible entry
operations.
(1) Counterterrorism.
(4) MILDEC.
B-6 JP 3-18
Control Joint Forcible Entry Operations
c. OPSEC.
d. MILDEC.
(1) Enemy options to identify likelihood of efforts to surprise, observe and detect,
or conduct espionage, terrorist, or sabotage operations.
f. MISO. (See CJCSI 3110.05 for specific MISO objectives that support forcible
entry operations.)
3. Assess the Effectiveness of Command and Control for Forcible Entry Operations
a. Information architecture.
B-7
Appendix B
d. Organization of operational land, maritime, air, and special operations areas in the
joint operations area.
(2) Force OAs, such as AOAs and JSOAs, continue to support current operations
and are disestablished when no longer required.
(d) AOA.
(e) JSOA.
B-8 JP 3-18
Control Joint Forcible Entry Operations
(c) Determine requirements for local air and maritime superiority to conduct
the forcible entry operation.
(h) Branches and sequels for forcible entry operations based on the changing
situation or additional requirements.
(2) Phase II (Assault). Joint forces seize initial objectives in the lodgment and
consolidate those objectives.
B-9
Appendix B
3. Space within the lodgment, immediate maneuver area, and space for
future operations.
(c) Identify initial entry and reinforcing entry forces to secure airheads (e.g.,
advance, pre-assault, and landing forces) and amphibious forces for beachheads.
(d) Reception of reinforcing forces (if required) and follow-on forces for
subsequent operations.
B-10 JP 3-18
Control Joint Forcible Entry Operations
(c) Coordinate arrival and/or disposition of any allocated MPF and APS.
(c) Plan to terminate the forcible entry portion of the joint operation.
d. Develop enemy COAs that impact on or affect forcible entry operations or current
and projected future environmental or civil conditions.
B-11
Appendix B
(1) Wargame against enemy COAs or current and projected future environmental
or civil conditions.
(1) COA that best achieves objectives against most probable and/or most
dangerous adversary COAs or against most likely or most dangerous and complex
environmental or civil condition.
(2) Feasible alternatives, using the best information available and determining
the advantages and disadvantages of each.
g. Prepare discussion of, and/or recommendation pertaining to, the current estimate.
(1) Advise components and units of adjacent or related actions and operations.
(2) Ensure change remains supportive of current mission and intent, based on
continuing estimate of the situation.
B-12 JP 3-18
Control Joint Forcible Entry Operations
a. Display information.
b. Brief information.
c. Inform supervisors, decision makers, other JTF staff, and staff counterparts.
B-13
Appendix B
Intentionally Blank
B-14 JP 3-18
APPENDIX C
REFERENCES
a. DOD Directive 5100.01, Functions of the Department of Defense and Its Major
Components.
e. Chairman of the Joint Chiefs of Staff Manual (CJCSM) 3122.01A, Joint Operation
Planning and Execution System (JOPES) Volume I, Planning Policies and Procedures.
g. CJCSM 3130.03, Adaptive Planning and Execution (APEX) Planning Formats and
Guidance.
C-1
Appendix C
cc. JP 3-15, Barriers, Obstacles, and Mine Warfare for Joint Operations.
C-2 JP 3-18
References
3. Multi-Service Publications
C-3
Appendix C
b. Air Force Doctrine Annex 2-0, Global Integrated Intelligence, Surveillance, and
Reconnaissance Operations.
C-4 JP 3-18
APPENDIX D
ADMINISTRATIVE INSTRUCTIONS
1. User Comments
Users in the field are highly encouraged to submit comments on this publication using
the Joint Doctrine Feedback Form located at:
https://jdeis.js.mil/jdeis/jel/jp_feedback_form.pdf and e-mail it to:
js.pentagon.j7.mbx.jedd-support@mail.mil. These comments should address content
(accuracy, usefulness, consistency, and organization), writing, and appearance.
2. Authorship
a. The lead agent for this publication is the US Army. The Joint Staff doctrine sponsor
for this publication is the Director for Operations (J-3).
3. Supersession
4. Change Recommendations
b. When a Joint Staff directorate submits a proposal to the CJCS that would change
source document information reflected in this publication, that directorate will include a
proposed change to this publication as an enclosure to its proposal. The Services and other
organizations are requested to notify the Joint Staff J-7 when changes to source documents
reflected in this publication are initiated.
5. Lessons Learned
The Joint Lessons Learned Program (JLLP) primary objective is to enhance joint force
readiness and effectiveness by contributing to improvements in doctrine, organization,
training, materiel, leadership and education, personnel, facilities, and policy. The Joint
Lessons Learned Information System (JLLIS) is the DOD system of record for lessons
learned and facilitates the collection, tracking, management, sharing, collaborative
resolution, and dissemination of lessons learned to improve the development and readiness
D-1
Appendix D
of the joint force. The JLLP integrates with joint doctrine through the joint doctrine
development process by providing lessons and lessons learned derived from operations,
events, and exercises. As these inputs are incorporated into joint doctrine, they become
institutionalized for future use, a major goal of the JLLP. Lessons and lessons learned are
routinely sought and incorporated into draft JPs throughout formal staffing of the
development process. The JLLIS Website can be found at https://www.jllis.mil
(NIPRNET) or http://www.jllis.smil.mil (SIPRNET).
6. Distribution of Publications
a. Joint Staff J-7 will not print copies of JPs for distribution. Electronic versions are
available on JDEIS Joint Electronic Library Plus (JEL+) at
https://jdeis.js.mil/jdeis/index.jsp (NIPRNET) and http://jdeis.js.smil.mil/jdeis/index.jsp
(SIPRNET), and on the JEL at http://www.dtic.mil/doctrine (NIPRNET).
b. Only approved JPs are releasable outside the combatant commands, Services, and
Joint Staff. Defense attachés may request classified JPs by sending written requests to
Defense Intelligence Agency (DIA)/IE-3, 200 MacDill Blvd., Joint Base Anacostia-
Bolling, Washington, DC 20340-5100.
D-2 JP 3-18
GLOSSARY
PART I—ABBREVIATIONS, ACRONYMS, AND INITIALISMS
A2 antiaccess
AADC area air defense commander
AADP area air defense plan
AAGS Army air-ground system
ACA airspace control authority
ACS airspace control system
AD area denial
ADRP Army doctrine reference publication
AF amphibious force
AFTTP Air Force tactics, techniques, and procedures
AMD air and missile defense
AMLO air mobility liaison officer
AO area of operations
AOA amphibious objective area
APEX Adaptive Planning and Execution
APF afloat pre-positioning force
APOD aerial port of debarkation
APOE aerial port of embarkation
APS-3 Army pre-positioned stocks-3
ATF amphibious task force
ATP Army techniques publication
GL-1
Glossary
LF landing force
LNO liaison officer
LOC line of communications
LZ landing zone
GL-2 JP 3-18
Glossary
OA operational area
OE operational environment
OPCON operational control
OPLAN operation plan
OPORD operation order
OPSEC operations security
PA public affairs
PIR priority intelligence requirement
GL-3
PART II—TERMS AND DEFINITIONS
air assault. The movement of friendly assault forces by rotary-wing or tiltrotor aircraft to
engage and destroy enemy forces or to seize and hold key terrain. (Approved for
incorporation into the DOD Dictionary.)
air assault force. A force composed primarily of ground and rotary-wing air units
organized, equipped, and trained for air assault operations. (DOD Dictionary. Source:
JP 3-18)
air assault operation. An operation in which assault forces, using the mobility of rotary-
wing or tiltrotor aircraft and the total integration of available fires, maneuver under the
control of a ground or air maneuver commander to engage enemy forces or to seize
and hold key terrain. (Approved for incorporation into the DOD Dictionary.)
airborne assault. The use of airborne forces to parachute into an objective area to attack
and eliminate armed resistance and secure designated objectives. (DOD Dictionary.
Source: JP 3-18)
airborne operation. An operation involving the air movement into an objective area of
combat forces and their logistic support for execution of a tactical, operational, or
strategic mission. (DOD Dictionary. Source: JP 3-18)
airhead. 1. A lodgment that, when seized and held, ensures the continuous air landing of
troops and materiel and provides the maneuver space necessary for projected
operations. (JP 3-18) 2. A designated location in an operational area used as a base
for supply and evacuation by air. (JP 3-17) (Approved for incorporation into the DOD
Dictionary.)
airhead line. A line denoting the limits of the objective area for an airborne assault.
(DOD Dictionary. Source: JP 3-18)
assault. 1. In an amphibious operation, the period of time between the arrival of the major
assault forces of the amphibious task force in the objective area and the
accomplishment of the amphibious task force mission. (JP 3-02) 2. To make a short,
violent, but well-ordered attack against a local objective, such as a gun emplacement,
a fort, or a machine gun nest. (JP 3-18) 3. A phase of an airborne operation beginning
with delivery by air of the assault echelon of the force into the objective area and
extending through attack of assault objectives and consolidation of the initial airhead.
(DOD Dictionary. Source: JP 3-18)
assault phase. In an airborne operation, a phase beginning with delivery by air of the
assault echelon of the force into the objective area and extending through attack of
assault objectives and consolidation of the initial airhead. (DOD Dictionary. Source:
JP 3-18)
combined arms team. The full integration and application of two or more arms or
elements of one Service into an operation. (DOD Dictionary. Source: JP 3-18)
GL-4 JP 3-18
Glossary
covering force. None. (Approved for removal from the DOD Dictionary.)
forcible entry. Seizing and holding of a military lodgment in the face of armed opposition
or forcing access into a denied area to allow movement and maneuver to accomplish
the mission. (Approved for incorporation into the DOD Dictionary.)
lodgment. A designated area in a hostile or potentially hostile operational area that, when
seized and held, makes the continuous landing of troops and materiel possible and
provides maneuver space for subsequent operations. (DOD Dictionary. Source: JP 3-
18)
seize. To employ combat forces to occupy physically and to control a designated area.
(DOD Dictionary. Source: JP 3-18)
staging base. 1. An advanced naval base for the anchoring, fueling, and refitting of
transports and cargo ships as well as replenishment of mobile service squadrons. (JP
4-01.2) 2. A landing and takeoff area with minimum servicing, supply, and shelter
provided for the temporary occupancy of military aircraft during the course of
movement from one location to another. (DOD Dictionary. Source: JP 3-18)
vertical envelopment. None. (Approved for removal from the DOD Dictionary.)
GL-5
Glossary
Intentionally Blank
GL-6 JP 3-18
JOINT DOCTRINE PUBLICATIONS HIERARCHY
JP 1
JOINT
DOCTRINE
All joint publications are organized into a comprehensive hierarchy as shown in the chart above. Joint
Publication (JP) 3-18 is in the Operations series of joint doctrine publications. The diagram below
illustrates an overview of the development process:
Initiation
ENHANCED
JOINT JOINT
WARFIGHTING DOCTRINE
CAPABILITY PUBLICATION
Approval Development