02.03.2015 Views

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter III<br />

enemy (i.e., low confidence-high risk). This remains a comm<strong>and</strong>er’s decision. For example,<br />

during DCA operations against numerous simultaneous attacks by enemy aircraft <strong>and</strong> CMs,<br />

potentially with WMD, it may be necessary to accept lower confidence ID methods for<br />

hostiles <strong>and</strong> increased risk of fratricide to minimize the risk of a “leaker” getting through to<br />

the target. Unambiguous lines of comm<strong>and</strong> <strong>and</strong> clarity of ROE are particularly important to<br />

the CID process, especially when delegating authority for engagement decisions during<br />

decentralized execution.<br />

c. The CID process is for all joint forces <strong>and</strong> for defensive action as well as<br />

offensive. For example, CID may provide a positive ID of friendly SOF positioned in close<br />

proximity to a high-priority target system deep in enemy territory being attacked from the<br />

air. The leader/battle manager of the attacking force would use that CID when making an<br />

engagement decision on that target.<br />

d. A CID matrix is a good tool for the CID process for counterair. To that end, the CID<br />

matrix should mirror the ID criteria <strong>and</strong> the CID process contained in the counterair plans<br />

<strong>and</strong> must be coordinated to ensure no conflicts arise during joint operations.<br />

See Appendix A, “Combat Identification,” for additional discussion of CID <strong>and</strong> a sample ID<br />

process matrix.<br />

15. Multinational Considerations<br />

a. Special attention must be paid to establishing a workable CID system during MNF<br />

operations. A mix of units with dissimilar capabilities <strong>and</strong> differing electronic systems, fire<br />

control doctrine, <strong>and</strong> training can present the AADC with an extremely difficult AD<br />

situation. Advanced planning may be required to compensate for a “patchwork” of separate<br />

MNF CID capabilities, not just for the surface AD <strong>and</strong> air control units, but for their aircraft<br />

as well.<br />

b. No matter how well integrated a CID system is, as much training as possible should<br />

be conducted to facilitate the CID processes. Means of positive ID should be stressed as<br />

early in the planning phases as possible <strong>and</strong> every effort made to devise a system of positive<br />

ID for each MNF members’ aircraft when airborne.<br />

c. In addition to the ID/CID obstacles, the AADC must ensure the promulgation of that<br />

data throughout the MNF. While US joint forces may have TDL, many MNF may not have<br />

the same TDL interoperability.<br />

16. General<br />

SECTION E. ASSET PROTECTION<br />

a. The JFC <strong>and</strong> staff, normally the plans directorate of a joint staff, develops a<br />

prioritized critical asset list (CAL) (see Figure III-3) for each general phase of an operation<br />

with inputs from the components <strong>and</strong> based on the theater level protection required to<br />

support tasks/missions assigned by the JFC. Within each general phase (e.g., seize initiative<br />

phase), subordinate JFCs or component comm<strong>and</strong>ers may establish additional phases that fit<br />

III-18 <strong>JP</strong> 3-<strong>01</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!