JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
JP 3-01 Countering Air and Missile Threats - Defense Innovation ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter IV<br />
special operations, <strong>and</strong> airlift aircraft that directly support the offensive aircraft or other<br />
forces capable of OCA operations.<br />
c. UA. UA can be used for attacks, surveillance, reconnaissance, deception, jamming,<br />
<strong>and</strong> decoy of enemy forces <strong>and</strong> AD systems. UA are preprogrammed or remotely piloted<br />
<strong>and</strong> often provide intelligence to friendly forces while providing confusing <strong>and</strong> erroneous<br />
information to the enemy. Some UA are night-capable <strong>and</strong> carry precision guided weapons.<br />
UA may cause the enemy to expend weapons <strong>and</strong> other AD resources to evaluate or attack<br />
them. <strong>Air</strong>space control can be a problem when mixing UA <strong>and</strong> manned aircraft in close<br />
proximity.<br />
d. <strong>Missile</strong>s. <strong>Missile</strong>s that may be used for OCA include surface-to-surface, air-tosurface,<br />
<strong>and</strong> air-to-air guided missiles as well as air-, l<strong>and</strong>-, <strong>and</strong> sea-launched cruise missiles<br />
(SLCMs). CMs provide the capability to attack very heavily defended targets when the risk<br />
to aircrews is not acceptable.<br />
e. SOF. SOF conduct direct action, provide terminal guidance, observe attacks, <strong>and</strong><br />
collect intelligence through special reconnaissance. SOF may strike enemy targets that are<br />
normally beyond the capability of other conventional munitions. Examples include targets<br />
concealed by difficult terrain, underground facilities, or “safe haven” targets. SOF may also<br />
be used to locate, positively identify, <strong>and</strong> designate targets for other forces. Coordination<br />
with the SOLE at the JAOC is critical to synchronize/deconflict operations <strong>and</strong> avoid<br />
fratricide for SOF working behind the lines <strong>and</strong>/or in the l<strong>and</strong>/maritime AO.<br />
f. Surface Fire Support. Artillery <strong>and</strong> naval surface fire support may be used during<br />
OCA operations if enemy targets are within range. Surface fire may provide the safest <strong>and</strong><br />
fastest method of attacking targets.<br />
g. Antisubmarine Warfare Forces. Sea- <strong>and</strong> l<strong>and</strong>-based antisubmarine capabilities<br />
may be employed against some enemy CM <strong>and</strong> BM submarines, based on approved ROE.<br />
Employment is dependent upon whether the enemy presents an operational threat <strong>and</strong> the<br />
comm<strong>and</strong>er’s desires regarding conflict escalation.<br />
h. Armed Helicopters. When apportioned by the JFC <strong>and</strong> made available for tasking,<br />
these assets may be placed in direct support of the JFACC with mission-type orders for<br />
attack operations. Army attack helicopters are considered maneuver units for the l<strong>and</strong> forces.<br />
i. C2 Systems. C2 support for OCA includes early warning <strong>and</strong> surveillance systems,<br />
radars, ID/CID systems, communications systems, <strong>and</strong> other surface-, air-, <strong>and</strong> space-based<br />
sensors. These systems provide indications <strong>and</strong> warning, intelligence, targeting data, <strong>and</strong><br />
C2. C2 systems are vital to counterair.<br />
j. IO. IO can generate nonlethal effects that have proven to be essential to OCA<br />
operations. The employment of information-related capabilities can save valuable aircraft<br />
sorties during a high-tempo air war. Many OCA targets, such as C2 nodes, missiles, <strong>and</strong><br />
support infrastructure, <strong>and</strong> airfields/operating bases can be affected by various IO actions<br />
that include computer network operations <strong>and</strong> EW. Some information-related capabilities<br />
afford the JFACC access to targets that may be inaccessible by other means.<br />
IV-6 <strong>JP</strong> 3-<strong>01</strong>