JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter III<br />
17. Critical Asset List Development<br />
a. All assets nominated for the CAL usually are prioritized based on a methodology of<br />
assessing the three major factors of criticality, vulnerability (includes recoverability), <strong>and</strong> the<br />
threat (CVT). This is called the “CVT methodology.” The CVT process is objective <strong>and</strong><br />
considers intelligence, air operations, ground combat operations, maritime operations, <strong>and</strong><br />
support operations. Each asset is evaluated against defined criteria, <strong>and</strong> these criteria are<br />
weighed based on the consideration of the JFC’s intent, CONOPS, <strong>and</strong> COG concerns.<br />
b. CAL Development Factors<br />
(1) Criticality is the degree to which an asset is essential to accomplishing the<br />
mission. It is determined by assessing the impact that damage to or destruction of the asset<br />
will have on the success of the operation/campaign. Damage to an asset may prevent,<br />
significantly delay, or have no impact on success of the plan.<br />
(2) Vulnerability consists of two parts: susceptibility (the degree an asset is<br />
susceptible to surveillance, attack, or damage), <strong>and</strong> recoverability, if attacked <strong>and</strong> damaged.<br />
Recoverability, once a factor itself, is now a subset of vulnerability <strong>and</strong> is the degree <strong>and</strong><br />
ability to recover/reconstitute from inflicted damage in terms of time, equipment, <strong>and</strong><br />
manpower <strong>and</strong> to continue the mission. Comm<strong>and</strong>ers should consider the time to replace<br />
personnel, equipment, or entire units, as well as whether other forces can perform the same<br />
mission. The following factors should be considered when assessing vulnerability:<br />
(a) Survivability <strong>and</strong> cover (hardening).<br />
(b) Camouflage, concealment, <strong>and</strong> deception.<br />
(c) Mobility <strong>and</strong> dispersion.<br />
(d) Ability to adequately defend itself from air/missile threats.<br />
(3) Threat. Assess the probability an asset will be targeted for surveillance or<br />
attack by a credible/capable adversary. Determination of adversary intent <strong>and</strong> capability are<br />
key determinants of assessing the probability of attack. A thorough JIPOE oriented<br />
specifically on adversary air <strong>and</strong> missile capabilities is key to an accurate threat assessment.<br />
Examples include targeting information provided by intelligence estimates, past adversary<br />
surveillance <strong>and</strong> attack methods, <strong>and</strong> threat doctrine.<br />
c. High Value Assets (HVAs). HVAs are classified as friendly critical assets requiring<br />
protection. They may be any forces, facilities, or area, etc., the friendly comm<strong>and</strong>er requires<br />
for the successful completion of the mission. They are categorized as follows:<br />
(1) High Value Geopolitical Assets. Those assets so important that the loss of<br />
even one could seriously impact the JFC’s operation/campaign. In addition, the political<br />
ramifications of destroying one of these assets could provide the adversary with a<br />
tremendous propag<strong>and</strong>a victory.<br />
III-20 <strong>JP</strong> 3-<strong>01</strong>