02.03.2015 Views

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Defense</strong> Counterair Planning <strong>and</strong> Operations<br />

2. Unit Security/Counter-Surveillance. Local unit security is an<br />

important element in denying accurate targeting data to enemy SOF or other enemy agents.<br />

Patrolling <strong>and</strong> ground forces support is important to keep enemy threat forces of Level I<br />

(agents, saboteurs, <strong>and</strong> terrorists) <strong>and</strong> Level II (small tactical units) from conducting<br />

harassment or interdiction attacks against DCA assets.<br />

3. Nighttime Support Operations. Consider nighttime for conducting<br />

time-consuming resupply or other operations that could highlight units’ visibility <strong>and</strong><br />

increase their vulnerability.<br />

4. Camouflage <strong>and</strong> Concealment. Practice visual signature reduction<br />

measures that can “hide” or deny accuracy in locating friendly targets/target systems. These<br />

measures may be conducted continuously or in response to specific warnings. Timely<br />

intelligence concerning the overflight by enemy satellite <strong>and</strong> aircraft collection systems is<br />

important to the effort. Those measures also may be coupled with deception measures to<br />

further complicate chances of effective enemy attacks. The employment of obscurants can<br />

negate the effectiveness <strong>and</strong> accuracy of attack threats during DCA operations.<br />

Refer to <strong>JP</strong> 3-13.3, Operations Security, for additional discussion regarding OPSEC.<br />

Refer to <strong>JP</strong> 3-13.4, Military Deception, for more details regarding deception operations.<br />

(3) Reducing Vulnerability. There are four measures that may enable friendly<br />

assets to survive enemy attacks by reducing their vulnerability.<br />

(a) Hardening. Valuable assets <strong>and</strong> their shelters are hardened to protect<br />

against physical attack, electromagnetic pulse (EMP), <strong>and</strong> transient radiation. Hardening<br />

measures should be accomplished during peacetime whenever possible. Hardening reduces<br />

the effect of attack on systems <strong>and</strong> facilities (i.e., aircraft, missiles, air base support<br />

equipment <strong>and</strong> facilities, nuclear delivery systems, nuclear storage areas, C2 facilities,<br />

communications nodes, <strong>and</strong> logistic facilities). When EMP hardening is not feasible, an<br />

EMP vulnerability assessment should be made to identify suitable preparatory <strong>and</strong> defensive<br />

measures.<br />

(b) Redundancy. A principal means of preserving combat power is<br />

duplication of critical nodes, capabilities, <strong>and</strong> systems that are particularly vulnerable to air<br />

<strong>and</strong> missile attack <strong>and</strong> for which other passive measures may be less appropriate.<br />

Redundancy includes dual, contingency, or backup capabilities that can assume primary<br />

mission functions (in whole or in part) upon failure or degradation of the primary system. Of<br />

primary concern are “soft” targets such as C2 nodes <strong>and</strong> sensors (antenne) <strong>and</strong> fixed sites<br />

such as airfields <strong>and</strong> ground stations for airborne sensors.<br />

(c) Dispersal. Dispersal reduces target vulnerability by decreasing<br />

concentration <strong>and</strong> making a target system less lucrative. Combined with mobility <strong>and</strong><br />

deception, dispersal increases enemy uncertainty as to whether a particular location is<br />

occupied <strong>and</strong>, if so, whether it will be occupied when the attack is executed.<br />

V-21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!