02.03.2015 Views

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

JP 3-01 Countering Air and Missile Threats - Defense Innovation ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter III<br />

17. Critical Asset List Development<br />

a. All assets nominated for the CAL usually are prioritized based on a methodology of<br />

assessing the three major factors of criticality, vulnerability (includes recoverability), <strong>and</strong> the<br />

threat (CVT). This is called the “CVT methodology.” The CVT process is objective <strong>and</strong><br />

considers intelligence, air operations, ground combat operations, maritime operations, <strong>and</strong><br />

support operations. Each asset is evaluated against defined criteria, <strong>and</strong> these criteria are<br />

weighed based on the consideration of the JFC’s intent, CONOPS, <strong>and</strong> COG concerns.<br />

b. CAL Development Factors<br />

(1) Criticality is the degree to which an asset is essential to accomplishing the<br />

mission. It is determined by assessing the impact that damage to or destruction of the asset<br />

will have on the success of the operation/campaign. Damage to an asset may prevent,<br />

significantly delay, or have no impact on success of the plan.<br />

(2) Vulnerability consists of two parts: susceptibility (the degree an asset is<br />

susceptible to surveillance, attack, or damage), <strong>and</strong> recoverability, if attacked <strong>and</strong> damaged.<br />

Recoverability, once a factor itself, is now a subset of vulnerability <strong>and</strong> is the degree <strong>and</strong><br />

ability to recover/reconstitute from inflicted damage in terms of time, equipment, <strong>and</strong><br />

manpower <strong>and</strong> to continue the mission. Comm<strong>and</strong>ers should consider the time to replace<br />

personnel, equipment, or entire units, as well as whether other forces can perform the same<br />

mission. The following factors should be considered when assessing vulnerability:<br />

(a) Survivability <strong>and</strong> cover (hardening).<br />

(b) Camouflage, concealment, <strong>and</strong> deception.<br />

(c) Mobility <strong>and</strong> dispersion.<br />

(d) Ability to adequately defend itself from air/missile threats.<br />

(3) Threat. Assess the probability an asset will be targeted for surveillance or<br />

attack by a credible/capable adversary. Determination of adversary intent <strong>and</strong> capability are<br />

key determinants of assessing the probability of attack. A thorough JIPOE oriented<br />

specifically on adversary air <strong>and</strong> missile capabilities is key to an accurate threat assessment.<br />

Examples include targeting information provided by intelligence estimates, past adversary<br />

surveillance <strong>and</strong> attack methods, <strong>and</strong> threat doctrine.<br />

c. High Value Assets (HVAs). HVAs are classified as friendly critical assets requiring<br />

protection. They may be any forces, facilities, or area, etc., the friendly comm<strong>and</strong>er requires<br />

for the successful completion of the mission. They are categorized as follows:<br />

(1) High Value Geopolitical Assets. Those assets so important that the loss of<br />

even one could seriously impact the JFC’s operation/campaign. In addition, the political<br />

ramifications of destroying one of these assets could provide the adversary with a<br />

tremendous propag<strong>and</strong>a victory.<br />

III-20 <strong>JP</strong> 3-<strong>01</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!