Beruflich Dokumente
Kultur Dokumente
NATO STANDARD
ATP-3.3.2.1
TACTICS, TECHNIQUES AND
PROCEDURES FOR CLOSE AIR
SUPPORT AND AIR INTERDICTION
Edition D Version 1
APRIL 2019
Published by the
NATO STANDARDIZATION OFFICE (NSO)
© NATO/OTAN
NATO UNCLASSIFIED
NATO UNCLASSIFIED
INTENTIONALLY BLANK
NATO UNCLASSIFIED
NATO UNCLASSIFIED
INTENTIONALLY BLANK
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ATP-3.3.2.1
I Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ATP-3.3.2.1
INTENTIONALLY BLANK
II Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ATP-3.3.2.1
RECORD OF RESERVATIONS
Note: The reservations listed on this page include only those that were recorded at time of
promulgation and may not be complete. Refer to the NATO Standardization Document
Database for the complete list of existing reservations.
INTENTIONALLY BLANK
IV Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ATP-3.3.2.1
Anything moving has kinetic energy; whether or not the moving object has
lethal capabilities depends on other factors.
Note: The reservations listed on this page include only those that were recorded at time of
promulgation and may not be complete. Refer to the NATO Standardization Document
Database for the complete list of existing reservations.
VI Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ATP-3.3.2.1
TABLE OF CONTENTS
KILL BOX.......................................................................................................................................A-1
Firepower is a critical enabler of land combat on the battlefield, primarily through its relationship
with, and contribution to, maneuver. The term firepower is commonly used to describe the
collective offensive capabilities of a military force or, alternatively, the military capability to
direct force at an enemy. Fire Power destroys, neutralizes, suppresses demoralizes and
influences. It can be delivered by sea, land and air platforms. It has physical, psychological
and physiological effects. Firepower provides the force to amplify or enable the effects of
tempo, simultaneity and surprise. Its effectiveness depends on its volume, accuracy, and its
suddenness or unpredictability. It allows force to be applied precisely, different systems to be
concentrated against a single task, and the rapid switching of fire between targets. The
psychological and physiological effects of Fire Power are transient, and should be exploited by
maneuver before they wear off. Hence effective operations require close coordination between
firepower and maneuver. Fire Power and maneuver are two of the Combat Functions, identified
in (land) tactical doctrine.
Joint Fires (JF) is defined as fires applied during the employment of forces from two or more
components in coordinated action toward a common objective. It includes direct and indirect
fires and is an effects-based approach to operations initiated at the operational level.
Joint Fire Support (JFS) is defined as the coordinated and integrated employment of land-, air-
and naval fires to create the required effects on ground targets to support operations on ground
in the full spectrum of conflict. It encompasses the integration of fires and effects in order to
influence the adversary forces, installations or functions.
Depending on national doctrine, the Joint Fire Support Element (JFSE) could either
encompass influence elements as e.g. PSYOPS, CIMIC, EW or be incorporated in a wider cell
dealing with overall influence activities.
Close Air Support (CAS) is an element of Joint Fire Support which requires detailed planning,
coordination, and training of ground and supporting air forces for safe and effective execution.
Based on threat and the availability of other means of fire support or supporting arms,
synchronizing CAS in time, space, and purpose with supported ground forces may be the most
detailed and continuous integration task performed by the joint force and component
commanders and staffs.
CAS is used to attack the enemy in support of the commander’s Concept of Operations
(CONOPS), in a variety of environmental conditions, during day or night, and to augment other
supporting fires. The speed, range, and maneuverability of aircraft allow them to attack targets
that other supporting arms may not be able to effectively engage because of limiting factors
such as target type, range, terrain, or the ground scheme of maneuver. The Ground Force
Commander (GFC) is the ultimate authority for the use of all supporting fires in his respective
operational area.
1-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
The GFC at the lowest level is responsible for the use of supporting fires delivered by CAS
assets unless specifically retained by a higher level commander in the ground force chain of
command. The supported commander establishes the target priority, effects, and timing of
CAS fires within the boundaries of their assigned operations areas. CAS is a key capability for
each of these components to employ fires that destroy, suppress, or neutralize enemy forces
and in turn permit movement, maneuver, and control of territory, populations, and key waters.
AJP 3.3. Allied Joint Doctrine for Air and Space Operations defines the air power as:
‘The ability to use air capabilities to influence the behavior of actors and the course of events.’
In order to maximize effectiveness of air power during joint fires planners must take into
consideration the following air power attributes and limitations.
a. Speed.
The speed of aircraft allows military power to be projected rapidly and responsively and to
complete missions quickly. This creates tempo and the potential to exploit time.
b. Reach.
About 70% of the Earth’s surface is water, but all of it is covered by air. This provides
aircraft with unrivalled reach, normally unimpeded by terrain, and opens up all of an
adversary’s resources to attack or influence, however distant or isolated their location.
c. Height.
The advantage of height is an enduring military reality. Air power offers an unparalleled
vantage point; facilitating observation and thereby enabling operations within the land and
maritime domains.
1.2.1.2 Additional Attributes
The speed, reach and height of air power enable and enhance air power’s additional attributes
of ubiquity, agility and concentration. In combination, these provide air power’s characteristic
flexibility as the most responsive and easily scaled tool of national force.
a. Ubiquity.
Air power’s reach, combined with the growing persistence available through air-to-
air refueling and high endurance unmanned aircraft systems (UAS), creates the
attribute of ubiquity. This enables the Alliance to use air power to pose or counter
threats simultaneously, and across a far wider area than surface capabilities.
Unlike land forces, air power is not fixed at specific locations and its light footprint
makes it easier to commit in politically ambiguous circumstances.
b. Agility.
Air power’s agility stems from its responsiveness, enhanced by the capabilities of
genuinely multi-role platforms. Agility means the Alliance can quickly switch the point
of application within and between operational theatres, sometimes during the same
mission, and create tactical to strategic effects in a variety of air power operational
roles. Agility also means the JTF can easily scale the scope of operations up or
down in response to a change in political guidance or political strategic objectives,
from air-policing at one end of the spectrum to full-scale war fighting at the other.
c. Concentration.
Air power’s speed and reach enables the JTF to concentrate air assets in time and
space to deliver military force when and where it is required. Precision technology
means that significant air power effects can be created without the need for large
numbers of aircraft; imposing psychological shock that may be crucial to military
success.
Air power has limitations as well as strengths. However, these are relative, not absolute, and
must be understood in context. The most significant are impermanence, limited payload, and
vulnerability.
a. Impermanence.
Although high endurance UAS and air-to-air refueling have increased individual air
assets’ persistence; aircraft still require ground servicing and rearming. However, air
power’s reach and responsiveness can be exploited to hold adversaries at risk
without necessarily maintaining a constant presence in the air. If a continuous
presence is required, multiple assets can be employed serially to satisfy
commanders’ objectives.
b. Limited Payload.
Aircraft design places a practical limit upon the payload that can be carried.
However, miniaturization and precision technology are enabling greater impact with
fewer and smaller weapons whilst the use of air transport aircraft trades-off weight
of payload against advantages in speed and reach.
c. Vulnerability.
The nature of the air environment creates specific vulnerabilities, including: the
relative fragility of air vehicles; the effects of weather on air operations; and the
requirement for basing.
d. Fragility.
Air platforms are comparatively lightly armored which limits the extent to which it is
sensible to expose them to hostile fire. Whilst tactics, techniques and procedures
(TTPs), low observable technology and platform protection can be used to mitigate
the operating risk, air planners must be cognizant of the capabilities (and limitations)
of the platforms assigned to a campaign or operation.
e. Weather.
Poor weather can hamper air operations and commanders require accurate, timely
and relevant environmental information in order to maximize the effectiveness of air
systems and missions. However, technological developments have enabled Alliance
air power to operate by day and night in adverse conditions; providing a potential
operational and tactical advantage that can be exploited against less capable
adversaries.
f. Basing.
Like other forms of military power, most air capabilities depend on regional bases
for support. Consequently, diplomacy and upstream engagement may be a key
enabler for air operations in order to secure the necessary access, basing and over-
flight permissions. Deployed land-based air operations also bring a specialist force
protection requirement that Member Nations need to consider when assigning air
assets to an operation or campaign.
CAS is an air action against hostile targets which are in close proximity to friendly forces and
which require detailed integration of each air mission with fire and movement of those forces.
CAS provides ground or amphibious forces with firepower in offensive and defensive
operations, by day or night, to destroy, suppress, neutralize, disrupt, fix or delay enemy forces
in close proximity to friendly ground forces. The firepower and mobility of aircraft can make an
immediate and direct contribution to the surface battle, especially against targets that are either
inaccessible or invulnerable to available surface weapons effects. The variety of targets likely
to be encountered makes it important to be able to employ a variety of weapons and delivery
systems, thus reliable and interoperable communications with the supported force are
essential features in the CAS environment (AJP-3.3).
CAS can be conducted at any place and time friendly forces are in close proximity to enemy
forces. The word “close” does not imply a specific distance; rather, it is situational. The
requirement for detailed integration because of proximity, fires, or movement is the determining
factor. At times, CAS may be the best means to exploit tactical opportunities in the offense or
defense. CAS provides fires to destroy, disrupt, suppress, fix, harass, neutralize, or delay
enemy forces.
Each nation organizes, trains, and equips to employ CAS within its roles as part of the NATO
alliance. As a result, a variety of aircraft are capable of performing CAS. The COM JFC and
staff must be capable of integrating CAS capabilities into the CONOPS.
Terminal Attack Control is the authority to control the maneuver of and grant weapons release
clearance to attacking aircraft. A certified and qualified JTAC/FAC(A), in accordance with ATP-
3.3.2.21,will be recognized across NATO as capable and authorized to perform TAC
operations. NATO operational commanders may require additional training and qualifications
for specific operations.
Terminal guidance is different from TAC. TGO are those actions that provide electronic,
mechanical, voice, or visual communications that provide approaching aircraft and/or weapons
additional information regarding a specific target location. Various ground elements or aircrews
conducting a wide variety of missions can search for, identify, and provide the location of
targets using systems like Global Positioning System (GPS), LASER designators/range
finders, and aircraft targeting pods. Unless qualified as a JTAC/FAC(A), personnel conducting
TGO do not have the authority to control the maneuver of or grant weapons release to attacking
aircraft. These functions must be done by appropriate command and control (C2) authorities.
Terminal guidance is guidance applied to a weapon between midcourse guidance and arrival
in the vicinity of the target and may be a function of CAS, interdiction, or other missions.
CAS is used to attack the enemy in support of the commander’s CONOPS, in a variety of
environmental conditions, during day or night, and to augment other supporting fires. The
speed, range, and maneuverability of aircraft allow them to attack targets that other supporting
arms may not be able to effectively engage because of limiting factors such as target type,
range, terrain, or the ground scheme of maneuver. Ground force commanders (GFC) are the
ultimate authority for the use of all supporting fires in their respective operational area. The
ground force commander at the lowest level is responsible for the use of supporting fires
delivered by CAS assets unless specifically retained by a higher level commander in the
ground force chain of command. As supported commanders, responsible ground force
commanders decide the target priority, effects, and timing of CAS fires within an operational
area and optimally make decisions with the advice and guidance of specially trained personnel.
As the supporting commander, the JFAC remains responsible for the planning and
employment of CAS assets provided by the air component.
a. Battlefield Utility.
CAS provides commanders with flexible and responsive fire support. Using CAS,
commanders can take full advantage of battlefield opportunities by massing
firepower to maintain the momentum of an offensive action or reduce operational
and tactical risk. The mobility and speed of aircraft provides commanders with a
means to strike the enemy swiftly and unexpectedly.
1 ATP 3.3.2.2 does not apply to FAC(A) certification and qualification. NATO nations currently develop
their FAC(A) standards independently.
1-5 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
b. Usage Criteria.
(7) Enemy air defenses and the joint force’s ability to counter them.
c. Targeting.
Targeting is the process of selecting and prioritizing targets and matching the
appropriate response to them, considering operational requirements and
capabilities. While conducting CAS, this may equate to the JTAC selecting a
particular target in a target array. The term targeting employed in this ATP doesn’t
refer to the joint targeting cycle but relates to the combat engagement. For a further
discussion on targeting, refers to AJP-3.9 “Allied joint doctrine for joint targeting” and
ATP-3.9.2 “Allied tactical doctrine for land tactical targeting”. When selecting
targets, JTACs begin with the supported ground force commander’s order or
direction to conduct a CAS attack, and then must consider details such as target
type, mission, enemy air defenses, terrain and weather, available armament, and
response time.
can use BDA to determine if objectives have been met, or whether a re-attack is
necessary.
The conditions for effective CAS are: thoroughly trained personnel with well-developed skills,
effective planning and integration, effective C2, air superiority (especially Suppression of
Enemy Air Defenses [SEAD]), target correlation, marking and/or acquisition, streamlined and
flexible procedures, and appropriate ordnance. Although not a requirement for CAS
employment, favorable environmental conditions improve CAS effectiveness.
CAS training should integrate all maneuver and fire support elements involved in
executing joint fires. Maintaining proficiency allows all players to adapt to rapidly
changing conditions in the operational environment.
Effective CAS relies on thorough, coherent planning and detailed integration of air
support into ground operations. The ability to mass joint fire support at a decisive
point and to provide the supporting fires needed to achieve the commander’s
objectives is made possible through detailed integration with ground forces. From
a planner’s perspective, the preferred use of a CAS asset is to have it preplanned
and pre-briefed. Rehearsals provide participants an opportunity to walk through the
operation, to achieve familiarity with terrain, airspace restrictions and procedures,
and to identify shortfalls.
d. Air Superiority.
Correlation is the process by which the JTAC/FAC(A) coordinates and confirms that
the attacking aircraft and/or a third party contributor have acquired the correct target
or mark. Correlation is required on each and every CAS attack.
Marks are aids to correlation. The commander employing CAS can improve its
effectiveness by providing timely and accurate target marks. Target marking builds
situational awareness, identifies specific targets in an array, reduces the possibility
of friendly fire and collateral damage, and facilitates terminal attack control. When
the commander employing CAS foresees a shortfall in ability to mark for CAS, the
commander should request that capability during the planning phase.
(1) Placing JTACs and Air Liaison Officers (ALOs) to facilitate continuous
coordination with ground units, communication with aircraft, and observation
of enemy locations.
(2) Placing CAS assets (aircraft and aircrews) to forward operating locations
near the operational area.
g. Appropriate Ordnance.
To create the desired effects with CAS, planners, JTACs, and aircrews must match
the appropriate ordnance to the target. For example, cluster and general purpose
munitions are effective against area targets such as troops and vehicles in the open,
but not against hardened targets, and are not advisable for targets where friendly
troops may be affected by the immediate strike or by unexploded ordnance. In all
cases, the supported commander needs to know the type of ordnance expended, in
order to achieve the desired weapon effects, the probability for collateral damage,
and the possible impact on the unit’s current or subsequent mission.
h. Environmental Conditions.
Environmental conditions may also limit the operations of one type of platform
without affecting another. For example, RW aircraft can often operate effectively
under low ceilings that might render FW aircraft CAS ineffective, while FW aircraft
can operate above blowing surface dust that might keep helicopters grounded.
Environmental conditions significantly impact the ability to use target marking
devices as well and must be considered for effective CAS missions.
In recent conflicts a significant air defense (AD) threat to multinational aircraft wasn’t a
concerning factor. In future conflicts multinational aircrafts may face an enemy equipped with
sophisticated AD threat systems integrated into a well designed overlapping AD umbrella.
These defense systems may seriously decrease the effectiveness of friendly CAS operations.
SEAD operations attack the adversary’s AD posture in order to create favorable conditions for
friendly operations to achieve their objectives with a reduced risk of attrition. For more details
on SEAD see AJP 3.3.1. Allied Joint Doctrine for Counter Air.
Effective SEAD requires unity of effort to create a combined arms effect. General guidance for
SEAD planning is provided by the Joint Force Commander (JFC). The JFC uses all assets to
protect friendly forces and exploit threat weaknesses. Component commanders will take this
guidance into account when developing their own plans and operations orders. Detailed SEAD
planning will take place at that command level where the assets to conduct SEAD are
available.
Each component has its own unique capabilities to suppress adversary AD systems.
Historically, the component directly affected by the threat has assumed the immediate
responsibility for suppressing enemy ADs. However, the distinct capabilities provided by each
component, the diverse combinations these capabilities offer, and the aggregate of total SEAD
capabilities allow allied forces to choose the best means and ways to conduct particular SEAD
operations from the array of available options. Some of these options include aircraft with anti-
radiation missiles (ARMs) and other air-to-surface munitions, EW, AH, direct or indirect fires
(including mortars, artillery, missiles, drones or maritime fires), and direct action by Special
Operation Forces (SOF). SEAD operations can be accomplished through destructive and
disruptive means.
a. Destructive Means.
Destructive means seek the destruction of the target system or the operating
personnel. The effects are cumulative and increase aircraft survivability, but
destructive means may place large demands on the available combat
capabilities/forces. Examples of destructive SEAD capabilities are Anti-radiation
missiles (ARMs), Directed Energy (DE) and other munitions, e.g. bombs, air and
surface-to-surface missiles, drones and artillery.
b. Disruptive Means.
1.3.6.3 Execution.
SEAD operations can fall into three categories: Joint Operations Area (JOA) AD system
suppression, localized suppression, and opportune suppression.
b. Localized Suppression.
c. Opportune Suppression.
When aircrews have acquired SEAD targets of opportunity but have not
engaged them because of mission priorities, system capabilities, or SEAD
ROE, they pass the information to the agency controlling their mission. This
agency immediately passes the targeting data through the appropriate system
or systems to coordinate with the force best suited for targeting.
For joint air operations, the integration of CAS starts at the operational level during the joint air
tasking cycle. The JFC’s air apportionment decision ensures consistent use of joint air assets
with his targeting priorities, guidance, and objectives. Whether conducting offensive or
defensive operations, commanders plan for CAS at key points throughout the operational area.
Like other joint force capabilities, the JFC prioritizes the use of joint air operations for CAS to
support his CONOPS. The Commander, Joint Force Air Component (COM JFAC) (if
established) provides the JFC with an air apportionment recommendation, after consultation
with other affected component commanders. Each component has the opportunity to influence
1-11 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
the JFC air apportionment decision. This impacts aircraft allocation for various joint air missions
(e.g., CAS, air interdiction [AI]) and sorties for a given period of time. The COM JFAC allocates
and tasks air capabilities/forces made available based on the JFC’s air apportionment
decision. Along with mission requirements, the COM JFAC positions joint air capabilities/forces
to optimize CAS support to requesting units. The operation order (OPORD), air operations
directive (AOD), air tasking order (ATO), airspace control order (ACO), and SPINS provide the
framework for integrating joint air operations (CAS, AI, etc.) into the JFC’s CONOPS and
provides CAS capabilities consistent with the supported component’s requirements.
a. Generic Considerations.
b. Fixed-Wing Considerations.
Due to inherent speed and range, FW CAS aircraft offer the COM JFC enhanced
versatility and flexibility in delivering combat power when and where directed.
Additionally, FW asset aircrews are trained and equipped to employ the full range of
unguided weapons and precision guided munitions. They are poised to effectively
employ the munitions available in their respective arsenals
c. Rotary-Wing Considerations.
RW attack assets also provide the ability to maneuver and reposition firepower in
response to changing situations. They carry a wide variety of forward firing
munitions, are equipped with advanced sensors, have excellent response and loiter
times, can conduct low altitude or nap of the earth ingress, attacks, and egress, and
have an excellent capability to conduct CAS in diverse terrain and when
accompanying other transport or rescue assets.
NATO members and their respective armed services may or may not consider RW
as performing CAS. Some may operate under Close Combat Attack (CCA)
guidelines and therefore may not require a JTAC to execute the mission. Reference
ATP-49 for CCA missions.
Unmanned aircraft (UA) are often equipped with weapons and sensor capabilities
on a par with most FW aircraft. UA offer the ground force commander additional
joint fire support assets that complement manned FW CAS aircraft and RW attack
helicopters. Some UA have very long on-station times and offer increased
communications connectivity and reach back capability to ground C2 personnel. UA
normally fly single ship and at slow speed, so they cannot be rapidly repositioned in
response to changing situations. When employing UA in CAS, a JTAC uses UA
video to build situational awareness (SA) of the target area and to locate targets that
are in defilade or masked from view on the ground.
Once a target has been found, the JTAC can use the video to talk a CAS aircraft
onto the target and give corrections to follow-on CAS aircraft. In a more complex
scenario, the JTAC can use a LASER target designator (LTD) to designate and/or
mark a target for LASER guided munitions from CAS aircraft onto targets. If the UA
is armed, its weapons payload may be employed using CAS procedures.
Furthermore, UA may be able to provide for LASER spot handoff for other aircraft.
With the use of full motion video or still target imagery, UA are capable of aiding in
the correlation of targets with other CAS participants.
Commanders at all levels must plan and execute their missions effectively albeit within the
constraints of international and individual national laws. Ensuring air operations maintain
legitimacy must be a key consideration for the COM JFAC and his/her staff; facilitated by Legal
Advisor (LEGAD) support whose primary role is to ensure air operations are conducted in a
legal manner and in particular in conformity with the law of armed conflict (LOAC) and the
relevant rules of engagement (ROE) if applicable, and otherwise with the other relevant areas
of international and national law.
LOAC is a part of international law governing the relations between states. It regulates the
rights and duties of the belligerents in time of armed conflict. Its main purpose is to protect
combatants and non-combatants from unnecessary suffering; to safeguard the fundamental
rights of civilians and persons who fall into the hands of an armed belligerent; and to facilitate
the restoration of peace.
The international security situation may require a broad range of responses, sometimes within
a single operation. Consequently, operations may occur within a complex legal framework
regulating the use of force which may, in turn, restrict the use of lethal force. Each nation
interprets and characterizes the situation and the applicable legal framework – including
relevant international law, Security Council authorizations, and its own domestic law and, in
some circumstances, host nation law – when making targeting decisions. General descriptions
of the Law of Armed Conflict principles related to targeting are below.
a. Military necessity.
Any target prosecuted must offer a definite military advantage. If there is a choice
between targets in order to realize a similar military advantage, the target that offers
the least risk of collateral damage should be chosen. Military necessity never
justifies a breach of international law.
b. Humanity.
c. Distinction.
Offensive action must only be directed against military objectives, making a clear
distinction between them, civilian objects and civilians. Feasible precautions are to
be taken in the choice of means and methods of any target prosecution to avoid –
or at least minimize – incidental loss of civilian life, injury to civilians and damage to
civilian objects. Particular care must be taken when considering targets in the vicinity
of entities on the no-strike list.
d. Proportionality.
Military actions are controlled by ROE which are authorized by the North Atlantic Council (NAC)
for NATO/NATO-led operations on approval of the operational plan (OPLAN). ROE define the
degree and manner in which force may be applied and are designed to ensure that such
application of force is carefully controlled. Should commanders at any level require a change
to the extant ROE in order to carry out their assigned task they may request a change, with
justification, through their command chain. Conformity of any action within any ROE profile in
force does not guarantee its lawfulness, and it remains the commander’s responsibility to use
only that force which is in accordance with the principles of international law.
ROE should be timely, appropriate, current, responsive to change and not too specific or
restrictive. It is also essential that adjacent or mutually supporting formations and forces
particularly understand each other’s ROE, as it cannot be assumed that each will react in the
identical fashion to a given situation. This in turn can contribute to confusion, misperceptions
and even fratricide. ROE never limit the right of self-defense, but provide political, legal and
policy direction for the conduct of NATO operations. Even if no rule from a particular series is
included, the relevant principles of law apply.
For the purpose of collateral damage estimation (CDE), collateral damage is defined as
unintentional or incidental injury or damage to persons or objects that would not be lawful
military targets in the circumstances ruling at the time.
CDE provides a probability, but not a certainty, of collateral damage for a specific weapon
system. CDE facilitates the legal consideration of proportionality. A formal CDE can only be
accomplished by a certified qualified CDE analyst and must be approved by the appropriate
level commander delineated in the ROE. Typically JTACs are not certified /qualified to do
formal CDE.
Casualties to friendly forces caused by friendly fire are the occasional tragic consequence of
warfare.
a. Causes.
Although occasionally the result of malfunctioning weapons, friendly fire has often
been the result of confusion on the battlefield. Causes include misidentification of
targets, inaccurate target locations or descriptions, target locations incorrectly
transmitted or received, and loss of SA by JTACs, CAS aircrews, requestors, battle
staff, or commanders. Items such as detailed mission planning, standardized
procedures for friendly force tracking and supporting immediate air requests,
realistic training/mission rehearsal, use of friendly tagging or tracking devices, and
effective staff, JTAC and/or ALO coordination, and sound clearance of fires
procedures can significantly reduce the likelihood of friendly fire.
b. Responsibility.
All participants in the CAS employment process are responsible for the effective and
safe planning and execution of CAS. Each participant must make every effort
possible to identify friendly units, enemy forces, and civilians correctly prior to
targeting, clearing fires, and weapons release. Combat Identification (CID) is the
process of attaining an accurate characterization of detected objects in the
operational environment sufficient to support an engagement decision. Depending
on the situation and the operational decisions that must be made, this
characterization may be limited to, friend, enemy, neutral, or non-combatant.
In other situations, other characterizations may be required including, but not limited
to, class, type, nationality, and mission configuration. CID characterizations, when
applied with ROE, enable engagement decisions and the subsequent use, or
prohibition of use, of lethal and non-lethal weaponry to accomplish military
objectives. CID is used for force posturing, C2, and SA as well as shoot, no-shoot
1-15 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
c. Training.
The joint force, components, and units must conduct joint training and rehearsals,
on a regular basis, that routinely exercise scenarios to simulate situations joint forces
will encounter in the operational environment in order to develop the skill sets and
familiarity required to avoid friendly fire.
Today the military’s operating environment is increasingly transparent and open to scrutiny.
This is particularly true for incidents of civilian casualties if they occur during highly visible and
readily attributable friendly air attacks. These events are tragic and can have lasting negative
operational and strategic effects, as well as possibly restrict future operations.
a. Causes.
Understanding and selecting alternate choices for fires application may offer the best
opportunity for reducing the likelihood and or impact of civilian casualties.
b. Responsibility.
All participants in the CAS employment process are responsible for the effective and
safe planning and execution of CAS, including positive identification (PID) as
established by theatre ROE and collateral damage estimates as required.
c. Training.
Pre-deployment preparation and review of current CAS ROE, vignettes and lessons
learned in theatre can help to minimize civilian casualties.
During crisis and conflict, and within a designated AOR, Supreme Allied Commander Europe
will appoint a commander joint force air component (COM JFAC) who will conduct Air C2 for a
specific operation.
COMJFAC plans, integrates, allocates, controls and tasks joint air operations based on the
JFC guidance and objectives, in accordance with the air apportionment decision and the
authority, command relationships and responsibilities laid down by the JFC.
COM JFAC serves as the principal air advisor to the JFC. Based on JFC’s direction and
guidance (D&G), COM JFAC is responsible for making recommendations on the employment
of assigned forces to include the apportionment of air assets.
COM JFAC typically exercises operational control over assigned assets and tactical control
over other air capabilities and forces made available for tasking. In Non-Article 5 Crisis
response Operations transfer of authority (TOA) assets will often be accompanied with a
team/person representing the nation of the TOA assets. The appointed representative will be
identified as the “Red Card Holder” and holds the authority to veto on given missions/tasks
according to national directives.
The COM JFAC establishes the guidance and priorities for CAS in CONOPS, operation or
campaign plans, the air apportionment decision, and when assigning capabilities and forces
to the components.
The JFAC conducts joint air operations in accordance with JFC’s intent and concept of the
operation. The JFAC will be formed in order to perform air C2 of Alliance air operations.
Operational C2 relationships will vary depending upon the size, complexity, and location of the
mission. These relationships are established in the Air OPLAN which is specific to the mission.
COM JFAC further conducts the air plan through a periodic air operations directive (AOD),
then through the air tasking order (ATO).
They provide the clear and concise statement of COM JFAC’s line of action.
2-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
The Air OPLAN and its supplements is a plan for a single series of connected
operations to be carried out simultaneously or in succession.
COM JFAC translates higher-level guidance into tactical level air instructions
through the AOD, which provides direction and guidance to the planning and
execution branches of the JFAC, and forms the basis for the ATO. CAS and AI
missions for the operation are described in the Air Power Contribution to Land
Operations/Air Power Contribution to Maritime Operations ANNEX of the AOD.
The ATO contains detailed tasking for all pre-planned air missions scheduled to
operate within the JOA during a specific timeframe, which is normally 24hours. It
contains information both on the missions flown under tactical command/tactical
control of the JFAC as well as other missions within the JFC’s assigned area. It also
contains the Special Instructions. Concerning Air Power Contribution to Counter-
Land Operations (APCLO)/Air Power Contribution to Counter-Maritime Operations
(APCMO) missions, in the ATO aircrew can find the appropriate information in order
to plan their mission such as: type of mission; type of assets; number; unit; weapons;
Time on Target (TOT); communication plan; IFF codes; formation/COMAO
synthesis; coordinating – procedural information etc. Changes to the ATO missions
can or may be applied after the initial publishing due to potential operational update
throughout the day via Air Task Message (ATM) or via a new ATO that will be
effective for the rest of the initial period.
SPINS are intended to provide information and direction and guidance that apply to
a longer period than just the ATO period or to more than one part of the ATO. SPINS
should not contain already established procedures. It is a very important document
for planning, executing and coordinating all missions as it clarifies the procedures
that must be followed by all assets operating in the JOA when executing the
assigned mission via the ATO. Normally SPINS are published at the beginning of
the campaign, are included in the ATO (or referred to) and are updated as the
operations are executed. APCLO/APCMO procedural instructions should be (and
normally are) included in the SPINS in order to simplify mission execution especially
when assets from different nations with different tactical training operate in the same
areas.
The OPTASK LINK specifies the operational management details for tactical data
links of all (link-fitted) players in the operational area. Assets used in different type
of CAS and AI missions may use their data links in order to execute their mission
more effectively. Moreover Data Link improves the Situational Awareness (SA) of
friendly assets by depicting friendly or hostile air and ground assets operating in
vicinity.
BDA is the assessment of effects resulting from the application of military action,
either lethal or non-lethal, against a military objective (AAP-6). The JFAC contributes
to the BDA process by means of written and verbal reports and available sensor
information. Accuracy of reported BDA during AI missions is highly dependent on
the capabilities of the assigned asset.
Effective liaison between forces is essential for coordinated operations and is a key factor in
the success of joint operations. Liaison elements serve as their parent commanders’
representative on matters of capabilities and limitations.
Component Liaisons serve as conduits for direct coordination between their respective CCs
and have the responsibility of presenting component perspectives and considerations
regarding planning and executing Joint air operations. They should possess the authority to
represent their CC on time-sensitive and critical issues and must be equipped and authorized
to communicate directly with their CC. Component Liaisons must be familiar with the details of
all component air, surface and subsurface missions.
Air operations are controlled through an overarching air C2 and Communications and
Information Systems (CIS) structure centered on the JFAC which includes structures,
personnel, procedures and equipment necessary to plan, direct and control air operations .
a. ARS/DARS.
Air Control Center/ Recognized Air Picture Production Center/Sensor Fusion Post
(ARS) and Deployable ARS (DARS) are ground-based integrated C2 elements.
They may be fixed (ARS) or deployable (DARS), static or mobile and can be
provided by an alliance, coalition, as a combined element, or by a single nation. One
or more radars are connected to the ARS/DARS, one of which may be collocated.
Subordinate to the JFAC, and horizontally integrated with tactical C2 and
intelligence, surveillance and reconnaissance elements, attack and support aircraft,
ARS/DARS is responsible for the decentralized execution of air defense and
The WOC provides C2 of unit forces and ensures sorties are generated to
accomplish CAS missions as directed by the ATO. The WOC may recommend
weapons load changes based on factors including weapons availability and desired
effects.
The AOCC provides an air entity, functionally subordinate to the JFAC, collocated
with a land forces corps HQ. The AOCC provides air expertise and integrates the
liaison and coordination functions relating to air operations which require integration
with other supporting arms and ground forces, including, but not limited to CAS and
AI. The AOCC will also provide a connection for the Air Liaison Element (ALE) team
to the JFAC. For exercises/operations, the AOCC will provide execution-level
coordination of air operations in support of the land component as an extension of a
designated JFAC for the exercise/operation. The AOCC processes, in close
coordination with the corps Joint Fire Support Element (JFSE), include the following:
handling immediate support requests, coordinating the execution of scheduled and
on-call CAS sorties, and coordinating manned/unmanned aircraft transiting through
airspace over the ground force commander’s operational area.
In instances where NATO and NATO members’ command and control structures
are integrated with other national or coalition command and control systems an Air
2For a further discussion on ARS/DARS see AJP-3.3 ed. B v.1 “Allied Joint Doctrine for Air and Space
Operations”
2-4 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Support Operations Center (ASOC) may exist in place of the AOCC. The ASOC will
conduct similar roles in the performance of CAS planning and execution as the
AOCC.
The TACP is the principal air liaison element supporting ground maneuver units.
The TACP has two primary missions: advise ground force commanders and Joint
Fire Support Elements on the capabilities and limitations of air operations, and
provide terminal attack control of CAS. TACPs contribute with JFSE to coordinate
ACMs and FCMs. In coordination with JFSE, TAPCP deconflict the aircraft with other
fire support and airspace users. Both TACP and JFSE closely coordinate for rapid
resolution of airspace users. TACPs may employ JTACs at any echelon, but will
most often place them in a forward position (e.g., the company/team level). Affiliation
of JTACs with services differs among NATO nations, however the functionality
described above is usually the same. The following are usually members of a TACP:
The ALO is the senior TACP member attached to a ground unit who functions
as the primary advisor to the ground force commander on air operations. An
ALO is an expert in the capabilities and limitations of air operations. The ALO
plans and manages CAS in accordance with the ground force commander’s
guidance and intent. An ALO may be assigned at various levels and echelons,
often with a corresponding change in terminology, e.g., Battalion ALO (BALO).
The JTAC is a qualified and certified individual, who, most often from a forward
position, directs the action of combat aircraft engaged in CAS and other air
operations. The JTAC provides the ground force commander recommendations
on the use of CAS and its integration with ground maneuver. The JTAC must:
(a) Know the enemy situation and the location of friendly units and
civilians.
Note: In some coalition nations and services JTACs are not issued from the air force. They
perform their JTAC duty as their primary or secondary duty and they are not subordinated to
members of TACP.
JFSE is the land C2 element deployed in all JFLC HQ from Coy to Corps level
responsible for the overall planning, coordination and employment of all allocated
JFS at all levels. It is the single point of contact for JFS coordination at all levels.
This element should always be tailored to the mission and reinforced by all
necessary liaison cells as required3.
(c) Role:
3 For a further information on JFSE see AArtyP-5 “NATO Fire Support Doctrine”.
2-6 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(d) Skills:
(2) Battalion/ Battle Group Joint Fire Support Element (BN/ BG-JFSE)
(c) Role:
(d) Skills:
(3) Brigade (to Corps) Joint Fire Support Element (BG-, DIV- or Corps JFSE
2/ Artillery Cell
(c) Role:
(d) Skills:
Airborne C2 manages air assets operating beyond the normal communication coverage of
ground elements and can act either as a self-contained airborne command post or as a relay
for ground based command centers. With properly trained aircrew, airborne C2 performs
functions to expedite C2 while extending the range of radio communications of C2 nodes.
Moreover, airborne C2 platforms ensure continuity of operations in case of ground elements
not yet deployed or disabled. Attack aircraft checking in for CAS or AI targets within an AO
often communicate with airborne C2 due to radio and line-of-sight (LOS) limitations of ground
C2 elements.
Airborne C2 platforms include the Airborne Warning and Control System (AWACS) and the
Joint Surveillance Target Attack Radar System (JSTARS).
CAS missions require a high degree of control exercised through effective communication.
Communications must be flexible and responsive (mission tailored and robust) to ensure that
links between aircraft and ground units are maintained, reducing the chance of friendly fire and
enhancing mission effectiveness. The flexibility and responsiveness of joint force CAS
communications are made possible using a variety of techniques including electromagnetic
spectrum management, countermeasures and emission control (EMCON), and through the
interoperable communications nets of the components.
CAS participants will use the communications nets and architecture of the requesting
component.
When CAS is executed in joint operations, all participants involved must have the appropriate
data to communicate effectively and successfully. The COM JFAC identifies the
communications requirements associated with CAS. The communications system directorate
satisfies these requirements. It is the responsibility of the COM JFAC to ensure that required
communications data for CAS is published in the joint ATO/SPINS.
Specifically, CAS-capable units and aircrews will need radio frequencies and call signs for
airspace control agencies, ground forces, and for the FAC(A)s/JTACs they will need to contact
during the course of their missions. They will also need identification, friend or foe (IFF) codes
and authentication materials. The supported component communications manager should
establish direct liaison to coordinate the necessary CAS communications data and products to
all elements in the CAS process.
The preferred means of communication during CAS missions is either using secure
voice or frequency-agile radio systems (e.g., HAVE QUICK, single-channel ground
and airborne radio system [SINCGARS]). Data link should also be used to transmit
information whenever possible. However, do not allow the non-availability of these
methods to hinder the application of CAS, especially in emergency situations or in
the case of dynamic targets.
b. Countermeasures.
c. Emission Control.
Emphasize EMCON throughout the planning and training cycles. As the enemy
increases the use of EW, traditional air support communications may become
impossible. This may reduce an aircrew’s ability to conduct immediate missions. A
preplanned mission, however, can be accomplished with minimum communication
between the JTAC/FAC(A) and CAS assets. Appropriate C2 agencies transmits the
brief to the aircrew as early as possible and prior to initial contact with the JTAC.
The aircrew contacts the JTAC, transmits the abort code, and receives the time to
target (TTT) or time on target (TOT).
This subparagraph describes the communications nets used by air control agencies and
tactical aircraft in the conduct of CAS. In addition to these nets, there are numerous others
within the C2 systems that could be used in extreme situations. These nets are designed to
provide communications redundancy. Nets may be controlled nets with a controlling agency.
Such nets may require explicit permission from the controlling agency to use.
2-11 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
This net is used for C2 of all maneuver elements within the maneuver force. TACPs
may access this net to obtain commander’s final release authority or to coordinate
with key staff agencies for information such as the disposition and location of forward
friendly units or elements.
The primary purpose of this net is to request calls for fire and Facilitate coordination
between maneuver, FCs, field artillery, mortars, and non-field artillery observers.
Aviation may also use this net to coordinate fires. TACPs may access this net to
activate or deactivate airspace coordination areas (ACAs), or for coordinating target
marks and/or suppression fire missions. This net may also be used to contact
forward observers or facilitate control of CAS missions.
Interfaces with other ACCS units (AOCC, CRC, AWACS, JSTARS, and WOC) are
accomplished via high-frequency (HF), tropo-microwave links, and SATCOM
systems. All of these systems should normally be encrypted. These
communications nets are used for command communications traffic, including
operations and scramble orders, coordination, intelligence, and air defense warning.
Whenever possible, reliability and survivability are enhanced by using multiple
systems and redundant switches.
Digital is the primary method for transmitting/receiving ASRs. The form can be
transmitted via digital or voice means.
The JARN is the link between the AOCC and subordinate TACPs for aircraft
coordination and sending immediate air support requests. The AOCC is the net
control station (NCS). The AOCC will activate and operate as many nets as
necessary, contingent with needs, equipment available, and frequencies allocated.
The primary means for requesting immediate air support is the Air Support Request
(ASR).
The purpose of this net is to coordinate mission direction of airborne aircraft under
control of the CRC. The AOCC interfaces with the tactical air control net.
The TAD net provides a means for the control of aircraft. TAD nets are used by all
of the command and control nodes. The TACPs/JTACs use their UHF/VHF-
amplitude modulation (AM) net for the direction and control of aircraft engaged in
CAS. The TACP is the prime user of this net and is allocated specific frequencies
to conduct tactical operations. The AOCC is also authorized to enter this net to pass
time sensitive information. Due to the extremely time sensitive information passed
on this net, the TAD net assigned to the JTAC or FAC(A) should be reserved for
TAC only.
This UHF-AM net is for the airborne transmission of inflight reports (INFLTREPs) to
the elements of the ACCS. Reports are normally passed to the CRC, AWACS, or
JSTARS and relayed to the CAOC and/or AOCC. The AOCC and CAOC monitor
this net when in range.
j. Guard Net.
The guard net provides an emergency distress net for aircraft. Guard further serves
as a means for air control agencies to advise aircraft of emergency conditions or
serious hazards to flight safety. If able, all aircraft continuously monitor guard.
This net is used to pass urgent administrative, logistic, and command information
between the AOCC and TACP elements.
m. Data-link nets.
These nets provide digital communications, increased SA, targeting, and de-
confliction. The requesting unit will communicate with the CAS aircraft via the
established providing component net.
This net may be established in order for airborne platforms to communicate directly
with each other and a common ground station. Most often this ground party is the
JTAC or other ground based assets.
o. Alternate Nets
When communications are lost on the primary nets, CAS can still be conducted
through alternate modes of communication. Communications may be restored using
alternate air support nets or non-air support communications nets.
a. Common Equipment.
Equipment varies from nation to nation though basics such as line-of-sight (LOS),
beyond line-of-sight (LOS), analog and digital systems can be found throughout
NATO. For specifics utilize references such as SPINS and national and alliance
materials.
Systems that enable the TACP/JTAC or forward observers to communicate with the
JFSE and to aid in the speed and accuracy of information flow may be used. All
agencies involved with the conduct of fire (COF) should have the capability to
receive and disseminate digital requests for fires if digital means are to be used.
Intelligence preparation for CAS at all levels in the CAS process is largely dependent on
mission and planning time available. Optimum intelligence, surveillance, and reconnaissance
(ISR) support to CAS begins early in the planning process to include JIPOE and the targeting
process. While it is impossible to account for every conceivable possibility, this early integration
can assist in better target selection, intelligence collection requirements, force allocation, and
follow-on assessment. In turn, this will assist in preparing for immediate re-taskings. While
preplanned CAS benefits most from advanced planning, immediate CAS can still realize the
same benefits. At a minimum, tactical level forces should analyze the operational environment
in terms of military objectives; air, land, and maritime avenues of approach; and the effects of
weather and geography on personnel, CAS operations and weapons systems. The tactical
level evaluation for CAS should concentrate on standard order of battle, factors such as
composition, strength, morale, tactics, and training status of specific tactical units that can
interfere with mission accomplishment. Sources of information include:
b. ISR Systems.
These systems include UAS, JSTARS and variety of other ISR platforms. These
platforms provide classified communications intelligence and electronic intelligence
(ELINT) information which may be used independently or cross-cued with other ISR
platforms to augment or complete the overall intelligence picture.
Some aircraft are equipped with sensors and targeting pods that enable tactical
airborne reconnaissance
Battle tracking is the process of building and maintaining an overall picture of the operational
environment that is accurate, timely, and relevant. An aspect of battle tracking includes combat
identification. Combat Identification (CID) is use of identification measures to reduce friendly
fire and increase the operational effectiveness of forces and weapon systems.
Successful battle tracking increases the probability of CAS attack success by ensuring its
application at the proper time and place. The level of detail required and scope of the picture
will depend on the mission and information requirements of the joint force. At the tactical level,
the simplest form of battle tracking is the mental and graphic picture built and maintained by
using maps, observations, and battle updates from HHQ. At higher levels, battle tracking is
more complex and takes advantage of digital information systems using multiple sources to
generate a coherent picture of the operational environment.
Effective battle tracking will aid in maintaining and understanding of friendly and enemy
progress, reduce redundant targeting, and reduce the possibility of friendly fire. Effective
methods of battle tracking include maintaining up-to-date maps, imagery, and status boards,
and utilizing computerized tracking and display methods. It is imperative that TACP personnel
remain part of the information flow (e.g., battle drills, spot reports, targeting). Additionally, the
JTAC and TOC must operate with the most current information:
a. FSCMs/ACMs All applicable, i.e.: initial points (IPs), contact points (CPs), battle
positions (BPs), ingress/egress routes, minimum-risk routes (MRRs), ACAs, no-fire
areas (NFAs), restricted operations zones (ROZs), coordinate fire lines (CFLs),
restricted fire lines (RFLs), and fire support coordination lines (FSCLs).
c. Artillery. Current and planned artillery locations and gun-target lines (GTLs).
3.2 COORDINATION.
Once a target has been nominated, the Joint Terminal Attack Controller/Forward Air Controller
(Airborne) (JTAC/FAC(A)) and Tactical Operations Center (TOC) (or command post) must
coordinate the Close Air Support (CAS) attack with affected maneuver elements. Cross-
boundary clearance of fires, friendly Air Defence Artillery (ADA), and CAS aircraft
ingress/egress routing must be deconflicted and coordinated.
To avoid friendly fire, TOCs should announce “friendly air on station” to subordinate
units. TACP/JTAC and ADA personnel must coordinate Contact Point (CP)/Initial
Point (IP) usage, target location, type and number of aircraft, altitudes, and times on
station. The SPINS and ACO should include MRRs or safe return corridors and
associated procedures for aircraft to return from CAS target areas.
WCO describe the relative degree of fire control of surface-to-air weapons. The
resulting weapon control status (WCS) is the degree of freedom given to that
weapon system (air or ground) under any particular WCO, and will vary depending
on the tactical situation. The Airspace Control and/or Coordination Cell must have
the ability to receive WCO and disseminate WCS for all platforms. The WCO are
defined as follows:
c. Synchronization.
One of the most difficult functions performed by a JFSE is synchronizing CAS with
surface fires. The intent is to coordinate the timing of air support, supporting arms,
and maneuver to achieve the mass of a combined-arms attack. The goal is to
accomplish this without suspending the use of any of the supporting arms or
affecting the scheme of maneuver. An additional goal is to offer a reasonable
measure of protection to aircraft from the effects of friendly surface fires. High
altitude/standoff weapons (e.g., joint direct attack munition [JDAM]) offer the
capability to deconflict both in range and altitude from other supporting fires.
In a CAS engagement, the ground force commander that owns the battle space is the
supported commander. Aircrafts providing CAS, TACP/JTACs and observers are supporting
elements. The JTAC is the ground force commander’s direct representative and information
passed by the JTAC with regard to commander’s intent and approval of fires should be viewed
as coming directly from the ground force commander.
In order to assist the supported commander, the aircraft with the highest situational awareness
may be delegated/tactical lead for coordinated attacks, but this authority can only be delegated
by the JTAC.
The execution of a CAS engagement is a two-way dialogue and agreement between the
aircrew and the supported commander; commander’s representative – the JTAC. The JTAC
and aircrew team work together to accomplish the ground force commander’s intent. In the
end, two individuals on either end of the radio are working to assist another individual who
needs aviation fires. Aircrew should, however, interpret a CAS brief as a high constraint, that
is to say, they have to do their best to comply with the CAS brief regarding employment rules
and directives defined by C2 of supporting commander. Supporting elements, including
aircrews, should provide the supported commander with as much information as necessary in
order for the commander to make the appropriate decision.
Once the ground force commander has all the appropriate information, it is the supported
commander’s decision to employ ordnance in the commander’s battlespace. Given that
aircrew have passed all relevant information and situational awareness to the ground force
commander prior to employment and that they have SA to the correct target the responsibility
for the resulting employment falls on the ground force commander, not the aircrew.
The intent is to offer the lowest level supported commander, within the constraints established
during risk assessment, the latitude to authorize weapons employment. In addition to
nominating CAS targets and prior to CAS target engagement, supported commanders also
delegate weapons release authority to JTACs/FAC(A)s. The authority and responsibility for the
expenditure of any ordnance on the battlefield rests with the supported commander. The
supported commander will delegate weapons release clearance authority to JTACs/FAC(A)s
to facilitate CAS attacks
In addition to proper battle tracking, the supported commander and staff make continuous
tactical risk assessments. Risk assessments involve the processing of available information
to ascertain a level of acceptable risk to friendly forces or civilians. Based on the current risk
assessment, the supported commander will weigh the benefits and liabilities of authorizing
CAS employment. CAS is not always the best option. Specific levels of risk should not be
associated with each type of control or method of attack. Information to consider when
assessing risk includes:
a. Confidence in and the training of the unit, staff, and key personnel.
b. Timeliness of information.
c. Absence of information.
f. Threat information.
(1) Capabilities.
(2) Limitations.
(3) Restrictions.
JTACs/FAC(A)s and aircrews should regard friendly ground forces receiving effective fire as
‘troops in contact.’ JTACs/FAC(A)s and aircrews must carefully weigh the choice of munitions
and types of TAC against the risk of friendly fire, (e.g., troops in contact does not necessarily
dictate a specific type of control). ‘Troops in contact’ is an advisory call to increase awareness
and to highlight the urgency of the ground situation; however, a TIC does not remove the
aircrews/JTACs/FAC(A)s responsibility to avoid civilian and friendly troop casualties. ‘Troops
in contact’ requires the supported commander to determine priority of CAS with respect to
other mission impacts.
Civilian Casualties (CIVCAS) is a more recent term describing any noncombatant wounded or
dead as a result of armed conflict regardless of whether they were engaged deliberately or
accidently. When referring to CAS, CIVCAS is a type of collateral damage.
The failure to mitigate collateral damage below acceptable risk levels may expose
political and military leadership to adverse consequences in assigned military
missions and national security goals. Excessive collateral damage can lead to
reduced public support for operations, more restrictive ROE, early termination of
operations, and prolonging reconstruction operations.
b. Methodology.
The collateral damage estimation methodology (CDEM) does not account for weapon
malfunctions, unknown delivery errors, altered delivery tactics based on operator
judgment, unknown transients, individual marking or adjusting rounds when
employing surface-to-surface ballistic munitions, or secondary explosions.
(1) Can I make a positive identification (PID) of the object I want to affect?
(PID is the reasonable certainty that a functionally and geospatially defined
object of attack is a legitimate military target in accordance with the law of armed
conflict and the applicable ROE.)
(3) Can I mitigate damage to those collateral concerns by striking the target
with a different weapon or with a different method of engagement, yet still
accomplish the mission?
(4) If not, how many civilians and noncombatants do I think will be injured or
killed by this attack?
(5) Are the collateral effects of my attack excessive in relation to the expected
military advantage gained, and do I need to elevate this decision to the next
level of command to attack the target based on the ROE in effect?
c. JTAC/FAC(A) Responsibilities.
All CAS planners employ available resources, within the constraints of mission
accomplishment, time and friendly force protection, to minimize collateral damage.
The primary cause of collateral damage is PID failure. Therefore, JTACs physically
present at the point of air weapons employment, have a responsibility to work with the
supported ground force commander to ensure PID is attained and situational
awareness accounts for both friendly and civilian locations. JTACs/FAC(A)s often
provide final terminal control of CAS weapons which ensure weapons employment is
correct and safe in order to limit collateral damage. JTACs/FAC(A)s can help
minimize and mitigate collateral damage in the following ways:
(c) JTACs/FAC(A)s must take not only friendly locations but collateral
concerns into account when planning attack axes to mitigate the effects
of weapons landing off target due to human or technological failure.
Properly orienting attack axis so the weapon is moving away from the
nearest collateral concern at the point of impact accounts for possible
misses and orients fragmentation pattern away from the nearest
collateral concern.
JTAC/FAC(A) must be able to generate target coordinates (preplanned and immediate) and
associated TLE of sufficient fidelity to create the desired effects on target through efficient
battle tracking and effective fire support integration. The level of precision and accuracy
required for the target coordinate and TLE will be tactical scenario dependent. TTT/TOT should
not be delayed in order to generate more coordinate precision and/or accuracy if the current
coordinates, TLE, CAS asset, ordnance, and mark plan will create the desired effects.
Through effective use of the concepts of bomb on target (BOT) and bomb on coordinate (BOC),
desired target effects can be created quickly through CAS engagement at the JTAC’s level.
Simultaneously, the target coordinate and TLE must be sufficient to provide an accurate and
timely operational picture at the TOC/JFSE.
In a conventional, linear battlefield, less coordinate accuracy and/or precision may be required
for successful target engagement. The target coordinate serves as an ‘anchor point’ for
TOC/appropriate level fires approval agency and JFSE in order to provide an accurate, timely,
and relevant operational picture.
A dense urban environment with friendly ground units working cross boundaries with no easily
defined forward line of own troops (FLOT) or forward edge of the battle area will likely require
a very precise and accurate target location with low TLE. Target mensuration provides this
level of accuracy.
Target Location Error is the difference between the coordinates generated for a target and
the actual location of that target. TLE is expressed primarily in terms of circular and vertical
errors, or infrequently, as spherical error (SE).
a. Circular error (CE) is the error of the coordinates in the horizontal ground
plane (i.e., circular).
b. Vertical error (VE) is the error of the coordinates in the vertical plane (i.e.,
elevation).
These errors are expressed as CE90, VE90, and SE90 distances which mean that there is a
90 percent chance that the actual target will be within these circular, vertical, and spherical
distances.
TLE should be communicated when it will significantly affect the likelihood of mission success
or failure. In general, TLE category is not required to either approve a mission or successfully
engage a target with CAS. In order to facilitate the communication of targeting accuracy, TLE
is characterized in six categories. The first row presents the categories of TLE which range
from best (CAT 1) to worst (CAT 6) and are used to classify the accuracy of any coordinate
generating system.
Proper coordinate generation procedures must be followed when stating that a given system
is capable of a specific TLE category. In reality, variables such as digital point positioning
database errors, slant range, altitude, beam divergence of the LASER spot, and aim point on
the target all have significant effects on the accuracy of the coordinate generated.
3-8 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Aim point is a significant factor in the TLE of all coordinate generation systems. As an example,
portable tactical imagery tools may be capable of CAT 1 coordinates, but a JTAC may not be
able to produce a CAT 1 solution for a vehicle parked in a field that is not adequately depicted
in the system. Likewise, a FW aircraft/targeting pod combination may be capable of CAT 2
coordinates, but not able to generate a CAT 2 solution for a target/aim point that is not sensor
significant such as a bunker, trench line, or emplacement with overhead cover and
concealment.
Correlation is the process by which the JTAC/FAC(A) coordinates and confirms that the
attacking aircraft and/or a third party contributor have acquired the correct target or mark.
Correlation is required on each and every CAS attack.
Marks are aids to correlation. A target mark should be provided for CAS aircraft whenever
needed. Target marks should be planned to include sufficient time for CAS aircrews to observe
them prior to employment. JTACs/FAC(A)s should strive to provide redundant marks when
deemed necessary in case the primary mark fails, is late, or is inaccurate during the terminal
phase of an attack. Examples of redundant mark combinations are LASER/smoke, IR
pointer/tracer, and smoke/talk-on.
The effectiveness of marks can be measured under several parameters. These include
distance from the target, timeliness and the ability to be acquired. While guidelines such as
100-300m and 30-45 seconds are often used, environmental conditions should be factored
into marking. These include both natural and man-made conditions such as wind speed and
direction, marking contrast, and battlefield effects such as smoke and secondary explosions.
Aircrews generally use a combination of sensors and visual lookout to acquire marks and
targets. JTACs/FAC(A) should be generally familiar with aircraft sensor capabilities and
employ marks that take advantage of those capabilities.
Limited visibility and differing perspectives make it difficult to correlate at night. IR illumination
is effective for aircrew using NVGs. IR illumination can be delivered by indirect fire or aircraft.
Battlefield illumination may also be used to illuminate targets. Illumination should be planned
to be offset from the target in order to avoid blooming out aircrew NVGs.
3.8.1.1 Talk-On
When no mark is available, the CAS target may be correlated by narrative description provided
by the JTAC/FAC(A). Talk-On is a technique that uses verbal description of terrain and
manmade features to lead aircrews eyes from dominant terrain features to target.
a. Advantages.
(2) Does not require the aircraft to be equipped with sensors (for visual
Talk-On).
b. Disadvantage.
Talk-Ons can be using EO sensors and SAR radars.VDL enables JTACs to see what aircrew
sees through their sensors which can shorten the time to conduct the Talk-On.
a. Advantage:
b. Disadvantage.
Anything on the battlefield that can be used to cue aircraft situational awareness to the target
such as other fires in the area, burning structures, vehicle traffic, etc. JTACs/FAC(A)s must
always be prepared for a back-up marking plan or to use marks of opportunity on the battlefield.
Anything the JTAC/FAC(A)s can find to cue aircraft sensors and aircrew eyeballs to the target
may be useful as a mark.
Direct fire weapons can be used to mark targets. While this method may provide more
accuracy and timeliness than indirect fire marks, its use may be limited by range and the
visibility of the burst from the air and on the battlefield.
Grenade rounds, especially smoke rounds, can be used very effectively as marks.
Tracers can be used very effectively to mark targets in the dark. During times of dusk or dawn
when visibility for naked eye is insufficient, ambient light does not allow for use of NVDs and
thermal crossover limits use of thermal imaging systems tracers fired in bursts may represent
very effective way of marking targets.
FW and RW aircraft can also mark the target with munitions (guns, rockets, missiles, or
bombs).
(1) Advantages:
(2) Disadvantages.
(b) Hard to acquire visually during the day. Firing into the ground short
of the target may kick up dirt, which may be more visible to the aircrew.
This technique must be balanced with the undesirable need to purposely
not shoot the target.
(c) May require the aircraft to hold in specific direction from target in
order to get visibility on mark. JTAC should make every effort to narrow
down the area the aircrew is observing (when conducting visual Talk-On)
or provide coordinates with sufficient accuracy to slew the sensors to
general target area.
(d) Mark effect may dissipate quickly. For this reason the aircrew must
be observing the target area prior to the impact of the mark.
(f) Sensor field of view may be an issue for aircrew using sensors to
acquire the mark. If the mark is outside of the sensor field of view, the
aircrew will not see it.
Artillery, naval fires, or mortar fires are an effective means of enabling pilots to visually acquire
the target. Before choosing to mark by artillery, NSFS, or mortars, observers should consider
the danger of exposing these supporting arms to the enemy’s indirect fire acquisition systems,
and the additional coordination between supporting arms required for this mission. Caution
must be applied when using a White Phosphorus (WP) and/or red phosphorous (RP) mark on
a crowded battlefield that the mark is not confused with other activities on the ground. Timing
for marking rounds is situational dependent and must be coordinated prior to commencement
of the attack.
JTACs/FAC(A)s must calculate weapon times of flight and understand aircrew tactics to ensure
marks impact at the appropriate time. This lead time ensures that the marking round is in
position early enough and remains visible long enough for the JTAC/FAC(A) to provide final
control instructions and for the pilot of the attacking aircraft to acquire the target. Indirect fire
marking rounds are most effective when delivered within 100 meters of the CAS target, but
those within 300 meters of the CAS target are generally considered effective enough to direct
CAS aircraft. When indirect fire marking rounds are not timely or accurate, JTACs/FAC(A)s
should use a backup marking technique or verbal instructions to identify the target to CAS
aircrew. If the situation requires precise marks, observers or spotters can adjust marking
rounds to ensure that accurate marks are delivered to meet the CAS schedule.
a. Advantages.
b. Disadvantages.
(2) Accuracy of most indirect fires means that a correction from the mark will
generally be required.
(4) Sensor field of view may be an issue for aircrew using sensors to acquire
the mark. If the mark is outside of the sensor field of view, the aircrew will not
see it.
(5) Obscuration from IDF marks must be considered when employing LGWs.
Some aircraft can mark with WP/high explosive rockets, IR pointer, gun tracers, and/or LASER.
Details about use of LASER can be found in Chapter 3, Section XI LASER operations.
a. Advantages.
(1) When set up appropriately, LASER-handoffs are often the quickest way
to cue a LASER Spot Tracker (LST)-equipped aircraft‘s sensors onto a target.
3-12 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
b. Disadvantages.
(3) Requires coordination and geometry set up to ensure aircraft LST does
not track ground LTD.
(6) Modern armor has sensors that detect illumination by LASER and initiate
countermeasures.
(7) In order to ensure aircraft LST acquisition of a LASER mark and complete
correlation prior to an aircraft arriving at its weapons release solution, it may be
necessary to coordinate a target acquisition pass prior to the aircraft beginning
its attack run. This is often a factor when employing stand-off ordnance. LASER
marks may also be used without a target acquisition run.
(8) For ground lasing missions, final attack headings shall be passed when
using LASER handoff as a marking technique to ensure that aircraft are in the
LASER acquisition area. LTL shall be passed.
Ground IR Pointer
IRP are LASER devices that operate on wavelengths that are visible to NVDs. JTACs/FAC(A)s
may use IR pointers and other IR devices to mark targets at night for aircrews that are using
NVDs. Unlike LASER designators, IR pointer devices cannot be used to guide munitions.
The effective range of ground marking devices (like ground force commander’s pointer and IR
zoom LASER illuminator/designator) will vary depending on their power and the amount of
ambient light that is present. Depending on environmental conditions, the entire IR beam or
just a flashlight-type spot around the target may be seen. High ambient light level will decrease
the effectiveness of IR marks but will not negate them completely. During low ambient light
conditions, the entire IR beam should be visible to both aircrew and ground personnel with
night vision devices. The shape of the IR beam will appear narrow or pencil-like at the JTAC’s
position, while the beam will be mushroomed at the target, depending on IRP zoom setting.
Use IR pointers with caution as they may expose the JTAC to an enemy with night vision
capability. JTACs/FAC(A) must always be prepared to provide and describe distinguishing
characteristic(s) of their IR marker to the aircrew. IR marks should be initiated 20 to 30 seconds
prior to the CAS TOT/TTT, or when requested by the aircrew. JTAC must minimize the target
illumination time. This will minimize the chance of the friendly position being compromised,
especially if the enemy is night vision capable. When working with IR pointers, use night
infrared CAS brevity terms (see paragraph 5.4.15.4 IR Pointer Correlation).
When marking with ground-based IR pointer, aircrew shall be visual the friendly position, either
through friendly position marking (e.g. IR strobe, etc.), or through “roping” the aircraft, “snaking”
the target, etc.
a. Advantage:
b. Disadvantages:
(2) When enemy are equipped with NVDs, the use of IR sparkles may expose
the operator and/or result in a loss of surprise.
(4) Requires coordination to ensure that aircrews acquire the correct end of
the IR sparkle.
(5) Weather (e.g. fog, rain, snow) can severly degrade IR Pointer capabilities.
Airborne IR Pointer
JTAC can mark the target by walking an aircraft‘s IR sparkle onto a target using a verbal
commands.
a. Advantages.
(1) Does not require ground operator to expose his position to an NVD-
capable enemy.
(2) JTAC has visual confirmation of what the aircrew are correlated on.
b. Disadvantages.
(2) Enemy equipped with NVDs may become aware they are being targeted.
(3) Weather (e.g. fog, rain, snow) can severely degrade IR Pointer
capabilities.
Match Sparkle.
Directing the aircrew to overlay their IR SPARKLE onto an IR SPARKLE that is already on
the target. Aircrew will be “heads-out” matching SPARKLEs using their NVDs and slewing
their sensor/sparkle. Aircrew will then look inside to see what is in their sensor field of view.
CAS aircrew must be VISUAL and TALLY or CONTACT SPARKLE when using a ground-
based IR pointer as a mark.
a. Advantages.
(1) Quick.
(2) JTAC/FAC(A) has visual confirmation of what the aircrew are correlated
on.
b. Disadvantages.
(3) With multiple IR sparkles near a target, it may be difficult for the JTAC to
discern if the sparkles are actually on the target due to perspective and
“blooming” of NVGs.
(4) When the enemy is equipped with NVGs, the use of IR sparkles may
expose the operator and/or result in a loss of surprise.
Aircraft equipped with Link-16/SADL may select (“hook”) a track that has been created on the
Link-16/SADL network. This cues aircraft sensors to the location of that track.
a. Advantage.
(1) Aircraft en route to a target area can receive Link information well before
checking in with the TACP, allowing them to gain SA early.
b. Disadvantages.
(2) Most ground-based digital CAS systems are not capable of creating a
track on the Link-16 network without a gateway.
a. Advantage:
b. Disadvantages.
(2) Very little aircrew and JTAC/FAC(A) training on the uses of radar beacon
bombing.
3.8.1.11 Combination.
When the tactical situation deems it reasonable, a JTAC/FAC(A) will strive to provide
redundant marks in case the primary mark fails, is late, or is inaccurate during the terminal
phase of an attack. Examples of redundant mark combinations are LASER/ smoke, IR pointer/
tracer and smoke/ Talk-On. When IR pointers or LASER designators are employed,
JTACs/FAC(A)s and CAS aircrew must use standard marking brevity terms and procedures to
ensure CAS aircrews do not confuse the source of the mark or the friendly position with the
target end.
Marking friendlies is the least desirable method of enabling a TALLY on the target. Marking
friendlies can be confusing and should be used cautiously and only when no other method is
available. When conducting a visual target Talk-On, JTACs should mark their position with
devices such as strobe lights, mirrors, or air panels to aid aircrew identification of the friendly
position. Care must be taken to not highlight friendly ground forces positions to the enemy.
Some types of mark used to be VISUAL with friendly positions must be used with caution, as
they may in some instances confuse the aircrew and reveal friendly positions to the enemy,
therefore risks and benefits of marking friendly positions must be carefully considered.
The method of attack is an agreement between the supported commander, the JTAC/FAC(A)
and the aircraft regarding the aircrew’s correlation requirement and is completely independent
of the type of control.
In CAS, correlation is the process by which the JTAC/FAC(A) coordinates and confirms that
the attacking aircraft and/or a third party contributor have acquired the correct target or mark.
Correlation is required on each and every CAS engagement.
Method of attack conveys the JTAC’s/FAC(A)’s intent for the aircraft’s prosecution of the target;
either the aircraft will acquire the target or mark (Bomb on Target-BOT) or correlation will be
provided by system/weapon readback (Bomb on Coordinates- BOC).
JTACs will state the method of attack, whether BOT or BOC, as part of the game plan prior to
the CAS brief.
These concepts apply to all types of control and all ordnance employed in CAS missions.
JTACs/FAC(A) and CAS aircrew should think of and use these concepts as a clear, concise,
effective manner to communicate the requirements for correlation from CAS aircraft employing
ordnance. Effective use of BOT and BOC concepts to clarify JTAC and CAS requirements for
a CAS engagement will result in more expeditious attacks and help mitigate friendly fire and
collateral damage.
The misapplication of BOT and BOC in tactical scenarios will often result in confusion between
CAS aircraft and JTAC/FAC(A), increased time to kill and potentially cause friendly fire or
collateral damage.
A BOC attack is used when the JTAC determines that he can create the desired effects against
the target with CAS aircraft employing ordnance on a specified set of coordinates. The
coordinates must be of sufficient fidelity/mensuration to produce the desired effect on the target
and be used for fires approval. If the aircraft is never required to have the TALLY/CAPTURED
the target or CONTACT the mark, it is a BOC attack. The JTAC/FAC(A) does not need to delay
the CAS attack in order to build CAS aircraft awareness to achieve target TALLY/CAPTURE.
If a BOC attack is planned based on the tactical scenario, then unnecessary exposure to the
threat by CAS platforms is minimized; and time is not wasted conducting targeting
confirmation. Great care must be taken to ensure that the target location with the required or
necessary precision and accuracy determined in the commander’s tactical risk assessment is
obtained and entered into the weapon/navigation system.
a. For BOC missions, all aircraft delivering ordnance must readback Line 4
and Line 6 from their system or weapon, as appropriate, in conjunction with Line 8
and required restrictions.
a. LASER guided weapons employed into a LASER attack zone with the intent
to be guided by a source outside the attacking aircraft flight/section (e.g., [JTAC]
another close air support [CAS] flight/section).
A BOT attack requires that the JTAC’s/FAC(A)’s intended target or mark are
TALLY/CONTACT/CAPTURED by the aircrew. Coordinate accuracy and precision (to include
TLE) are not as important as the JTAC’s/FAC(A)’s ability to aid CAS aircraft in gaining the
target. If at any point during the CAS engagement, the attack aircrews are required to gain
tally/contact/capture the target, it is a BOT attack.
This delivery method is advantageous in numerous tactical situations such as mobile target
sets (whether stationary or moving), low threat environments that support continuous target
observation by CAS aircraft, situations where controllers are not able or do not need to
generate low TLE coordinates, or when targets or marks are TALLY/CONTACT/CAPTURED
by the aircrew.
If a BOT attack is planned based on the tactical scenario, then time should not be wasted
conducting detailed precision and/or accurate target coordinate generation. In many tactical
scenarios suited to BOT attacks, delaying the attack in order to generate a coordinate for BOC
employment will increase the time to kill or result in missed targeting opportunities.
Coordinates provided in the attack brief must be of sufficient fidelity to provide initial cueing to
the attacking aircraft; and be used for fires approval.
For BOT missions, only the flight lead is required to readback lines 4, 6 and 8 in conjunction
with other required restrictions. All attack aircraft will provide readbacks only if requested by
the JTAC/FAC(A).
a. LASER guided weapons employed into a LASER attack zone and self-
lased by the delivering CAS aircraft
b. Unguided ordnance dropped from any altitude under the weather with CAS
aircraft TALLY or CONTACT and employing off of the correction
Types of terminal attack control are tools that give the ground force commander the greatest
chance of accomplishing the mission while mitigating friendly fire and collateral damage. The
type of control conveys the JTAC’s/FAC(A)’s intent on how best to mitigate risk and his need
to control individual attacks:
Any type of control can be utilized with either method of attack and no type of control is tied to
one particular method of attack.
The three types of control are not ordnance specific but are influenced by the choice of
ordnance, delivery profile and the tactical situation.
The tactical risk assessment determines which type of control (1, 2, or 3) is used. Specific
levels of risk should not be associated with each type of terminal attack control but such may
be considered in a supported commander’s tactical risk assessment. During the fires approval
process at the appropriate unit level, the commander considers the situation and issues
guidance to the JTAC based on recommendations from the staff and associated risks identified
in the tactical risk assessment discussed earlier. The tactical situation will define the risk
associated with a given type of TAC, (e.g., GPS and digital targeting systems used in Type 2
control may be a better mitigation of risk than using Type 1).
Senior commanders may impose restrictions that will prevent subordinate commanders from
choosing certain terminal attack control types. However, the intent is for senior commanders
to provide guidance that allows the lowest level supported commander to make the decision
based on the situation. Type of control may be a decision delegated to the JTAC under certain
conditions.
Type of control shall be passed as part of the game plan before the attack brief for aircrew SA,
but impose no requirement on the aircrew.
It is not unusual to have two types of control in effect at one time for different flights. For
example, a JTAC/FAC(A) may control helicopters working Type 2 control from a BP outside
the JTAC’s field of view (FOV) while simultaneously controlling medium or low altitude FW
attacks under Type 1 or 3 control. .
Type 1 control should be utilized when the visual acquisition of the attacking aircraft and
analysis of attacking aircraft geometry by the JTAC/FAC(A) is the best means available to
ensure mission success and reduce the risk of the attack affecting friendly forces and/or
collateral concerns.
The intent is that the JTAC/FAC(A) is able to assess the attack geometry of the aircraft to
predict the weapon trajectory from release to impact, helping to ensure friendly positions and
collateral damage concerns are safe from undesired weapons effects.
c. The situation requires the JTAC/FAC(A) to visually acquire the target for
each attack.
d. The JTAC/FAC(A) will withhold clearance until the attacking aircraft has
completed maneuvering on the target (wings level).
Note: Some weapon such as turret mounted guns, door mounted guns, PGMs such as LGW
or IAMs may have such trajectories that do not depend on the nose geometry of the attacking
aircraft during release. Using Type 1 control in these instances will not increase the safety of
own troops and other methods of risk mitigation must be considered. JTAC/FAC(A) may
restrict the type of ordnance used by attacking aircraft to minimize the chance of unwanted
weapons effects from munitions capable of high off boresight trajectories.
b. JTAC/FAC(A) will send the game plan and CAS brief to attacking aircraft.
c. Attacking aircraft will verify target location correlates with expected target
area using all available means.
g. JTAC/FAC(A) will mark/designate target as agreed with the aircrew for BOT
missions.
h. Attack aircraft will provide “IN” call indicating entering terminal phase of air-
to-ground attack prior to weapons release.
i. For BOT missions, attack aircraft must state they are TALLY, or
CAPTURED (target/object).
provide a single clearance for the flight or each attack aircraft, based upon the
tactical scenario. JTACs/FAC(A)s must make it clear in the CAS brief to expect
clearance as a flight or individually in the remarks.
Note: In the case where aircraft acquisition/analysis by the JTAC/FAC(A) is difficult or not
possible, attack aircraft may be forced to modify their attack profile to aid in acquisition.
a. the JTAC/FAC(A) requires control of individual attacks and any or all of the
conditions below exist:
Examples of when Type 2 control may be applicable are night, adverse weather, and high
altitude or standoff weapons employment.
Type 2 control requires control of individual attacks. The JTAC may be able to gain a visual
on the attacking aircraft. While not required, if the tactical situation allows, the JTAC/FAC(A)
should make every effort to gain a visual on the aircraft and assess attack geometry under
Type 2 control in order to provide an additional measure of safety, enhance SA, and be able
to abort the attack if necessary.
b. If targeting data come from an external source and if time and tactical
situation allow, JTAC/FAC(A) should make every effort to verify target location
using all applicable means (crosschecking with map, pulling additional
information from observer, obtain VDL feed from UAS etc.) prior to creating CAS
brief
e. Attacking aircraft will verify target location correlates with expected target
area using all appropriate means.
h. If using a targeting pod as the sole means of target acquisition, the aircrew
must clearly communicate what they have positively identified and are tracking
3-21 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
based on correlation. The aircrew shall state “T-72 CAPTURED (or as passed in
line 5)” to confirm they have acquired and are tracking the target or “(reference
point) CONTACT”
j. Attack aircraft will provide the JTAC/FAC(A) with an “IN” call indicating
entering terminal phase of air-to-ground attack prior to weapons release. Aircrew
should make this call at the appropriate time to allow clearance before entering
the release window. If a restriction in the form of a direction or final attack heading
was given in the CAS brief, then it will be included with the IN call. Example: ‘IN
from the South’ or ‘IN heading 360’. All attacking aircraft are required to provide
an “IN” call unless coordinated otherwise.
m. If JTAC/FAC(A) does not have visibility on the target area, BDA can be
provided by the aircrew or 3rd parties involved in the attack.
The JTAC/FAC(A) must visually acquire the target or utilize targeting data from other asset
with accurate real-time targeting information. All targeting data must be coordinated through
the appropriate supported unit’s battle staff for approval.
JTAC will provide the CAS aircraft with targeting restrictions (e.g., time, geographic
boundaries, final attack heading[s], specific target set). Following mandatory readback by the
CAS asset, the JTAC/FAC(A) then grants a weapons release clearance (“CLEARED TO
ENGAGE”) or calls “TYPE 3 CONTINUE DRY” if weapons release is not intended.
While not required, if the tactical situation allows, the JTAC should make every effort to visually
acquire the aircraft and assess attack geometry under Type 3 control, in order to provide an
additional measure of safety, enhance SA, and be able to abort the attack if necessary.
The JTAC/FAC(A) will monitor radio transmissions and other available digital information to
maintain control of the engagement. The JTAC/FAC(A) maintains abort authority.
3-22 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Type 3 is a CAS terminal attack control procedure and should not be confused with TGO, air
interdiction, or other “air support” missions which do not employ a JTAC/FAC(A).
b. JTAC/FAC(A) passes the game plan and CAS brief to the attacking aircrew.
In addition to other information the briefing shall include in the
remarks/restrictions section:
j. If JTAC/FAC(A) does not have visibility on the target area, BDA can be
provided by the aircrew or 3rd parties involved in the attack.
The JTAC/FAC(A) maintains the flexibility to change the type of terminal attack
control at any time within guidelines established by the supported commander and
must be coordinated with the appropriate fires approval agency as the type of control
is part of the approved close air support mission. This change must be made prior
to the ‘IN’ call for Type 1 and 2 attacks and the “commencing engagement” call for
Type 3. If a type change is required after these calls, then the JTAC must abort the
attack and re-brief the aircraft. The JTAC/FAC(A) must ensure that any changes to
the attack brief are adequately conveyed in a timely manner to the attacking aircraft
and that both the terminal controller and the aircrew have the required situational
awareness to safely prosecute the attack.
Because there is no requirement for the JTAC to visually acquire the target and/or
visually acquire the attacking aircraft in Type 2 or 3 control, JTACs/FAC(A)s may be
required to coordinate CAS attacks using targeting information from 3rd party. The
3rd party can be a scout, UAS, SOF, CAS aircrew, or other asset with real-time
targeting information. The JTAC/FAC(A) maintains control of the attacks, making
clearance or abort calls based on the information provided by these 3rd parties. The
JTAC must consider the timeliness and accuracy of targeting information when
relying on any form of remote targeting. When any form of remote targeting is used
with single source targeting information, targeting data should be routed through the
commander’s battle staff to ensure target validity.
Type 2 and 3 control utilize different measures, other than visually acquiring the
aircraft, to mitigate risk, such as paying strict attention to specified final attack
heading restriction compliance, additional or enhanced correlation procedures for
BOT attacks, potentially requiring readbacks from all attacking aircraft, utilizing
available systems to mark or designate the target, or utilizing available systems to
confirm aircraft target designation (VDL, etc.). Any or all of these measures may be
applicable in the other types of control, but the JTAC/FAC(A) must pay additional
attention to these measures in situations where the JTAC/FAC(A) cannot visually
acquire either the aircraft or target at weapons release to mitigate risk.
c. Technological advancements.
Digital or data link systems capable of displaying aircraft track, sensor point of
interest, etc., significantly enhance situational awareness and the effectiveness of
terminal attack control.
While recent technological advances in weaponry and digital/data link systems have
provided significant enhancements to the CAS mission, it is imperative that
commanders and operators fully understand the capabilities and limitations of the
systems being used. Descriptive dialogue between the JTAC/FAC(A) and aircraft
will often provide the best means of mitigating risk and producing the desired effect
on target. It is essential that standard procedures and terminology be used by all
CAS participants.
Some guided aviation munitions offer a very limited capability to shift impact point
during time of flight. With CAS weapons the delivery time of flight is typically less
than 30 seconds, the decision for PLA must be made very early in the time of flight
to make any significant change to weapon impact point. Therefore, PLA is a
procedure of last resort.
The battle space owner must authorize the use of PLA and clearly establish the
requirements (CDE, pattern of life, etc.) for the PLA impact point as well as the area
between the PLA impact point and the target. Procedures for PLA execution shall
comply with the traditional fires approval process and need to be established prior
to weapon launch. Friendly forces entering the impact area, a late abort call or an
evolving scene that will result in unacceptable collateral damage are examples of
contingencies where a PLA plan can mitigate dangers or prevent friendly fire.
If the ground force commander wishes to authorize PLA, the JTAC/FAC(A) shall
inform the CAS aircrew in the Restrictions section of the situational update about the
PLA impact point. The PLA impact point must be approved by the supported
commander and the aircrew must explicitly be given PLA authority, including the
criteria for executing the procedure. If the supported commander does not grant
approval, PLA should not be performed and “silence is not consent.” The PLA point
must be transmitted as a restriction and can be expressed as:
Transmission of an abort point or direction and distance should not be confused with
authority to perform a PLA procedure. JTACs/FAC(A)s and aircrew should exercise
caution before utilizing this procedure in urban areas. Procedures for PLA are as
follows:
(5) In the event that the ground force commander or JTAC/FAC(A) needs to
initiate a post launch abort, the directive communication will simply be “Aircraft
call sign Abort!” followed by post launch abort actions to the previously approved
abort point.
An example of a capable post launch abort (PLA) munition is the AGM-114 Hellfire.
Paveway II and GBU-54 are not recommended for PLA.
Note: Any delay by the launch platform prior to PLA execution significantly reduces
the ability to actually move the weapon impact point. This tactic also introduces
added uncertainty and risks, is very difficult to execute properly, must be executed
very early in the weapon delivery, and therefore should only be considered in rare
cases. This tactic should not be briefed as a viable option to decision-makers to
reduce collateral damage and should be used only as an option of last resort.
FSCM are used to coordinate and integrate land, air, and maritime indirect fires to support the
maneuver commander’s intent and operations plan. The purpose of FSCM is to allow the
maximum exploitation of all available FS assets while ensuring the safety of own troops against
the effects of own fires. In the event that fires or the effects of fires are outside the area of
responsibility (AOR) or close to the boundaries, permission/coordination by liaison must be
obtained prior to execution.
It also implies that when requested to clear fires, the command controlling that zone of
operation has a clear responsibility to provide either clearance or denial of clearance to execute
those fires.
More details about FSCMs can be found in AArtyP-5 NATO Fire Support Doctrine.
3-26 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
The CFL is a line beyond which conventional surface fire support means (mortars, field
artillery and naval surface fire support ships) may fire at any time within the zone of the
establishing headquarters without additional coordination.
a. Purpose.
The purpose of the CFL is to expedite the attack (using surface fires) of targets
beyond the CFL without the coordination with the maneuver commander in whose
zone of action targets are located and to provide the maneuver commander with an
area within his zone of action where the forces can operate in safety from friendly
indirect fires.
b. Establishment.
c. Location.
The major factor for location should be the range of land-based indirect fire systems.
It does no good to have a measure in place for uncoordinated indirect fires when
there is limited range beyond the measure. The location of the CFL is also based on
such factors as the scheme of maneuver, patrol plans, locations of security forces
and the troop safety desires of the maneuver commander. There is no requirement
for the CFL to be placed on identifiable terrain, but it can be helpful for Forward
Observers (Coy-JFSE) calling in indirect fires. Additional factors such as the limits
of ground observation, the location of the initial objectives in the offense, and the
requirement for maximum flexibility in both maneuver and the delivery of supporting
fires should be considered.
d. Dissemination.
Initial and subsequent locations of the CFL are disseminated through the various
JFSE and fire direction centers to maneuver and supporting arms units concerned.
e. Graphic Portrayal.
A dashed black line with the letters CFL followed by the establishing headquarters
and nation above the line. Below the line the effective date-time group is added.
Caution: Use of the CFL does not eliminate the requirement/ responsibility to coordinate the
airspace required to conduct the mission.
The FSCL facilitates the expeditious attack of surface targets of opportunity beyond the
coordinating measure. An FSCL does not divide an area of operations by defining a
boundary between close and deep operations or a zone for close air support. The FSCL
applies to all fires of air, land, and sea-based weapons systems using any type of
ammunition. Forces attacking targets beyond an FSCL must inform all affected
commanders in sufficient time to avoid fratricide. Supporting elements attacking targets
beyond the FSCL must ensure that the attack will not produce adverse effects on, or to the
rear of, the line. Short of an FSCL, all air-to-ground and surface-to surface attack
operations are controlled by the appropriate land or amphibious force commander.
Coordination of attacks beyond the FSCL is especially critical to commanders of air, land,
and special operations forces. In exceptional circumstances, the inability to conduct this
3-28 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
coordination will not preclude the attack of targets beyond the FSCL. However, failure to
do so may increase the risk of fratricide and could waste limited resources.
a. Purpose.
The primary purpose of the FSCL is to provide a measure for coordination between
ground elements and supporting forces without endangering friendly forces in the
air or on the ground or requiring additional coordination with the establishing
headquarters. The FSCL serves several specific purposes:
(1) It facilitates the expeditious attack of targets beyond it, mainly by aircraft.
b. Establishment.
c. Location.
To facilitate recognition from the air, the FSCL should be located on identifiable
terrain. It should be located beyond the area in which the establishing commander
intends to send patrols or penetration forces or in which he intends to maintain
security forces. When detached forces are deployed beyond the FSCL in the zone
of action of the establishing commander, that commander must establish other
coordination measures to encircle and provide a degree of safety to the detached
forces. A key factor in the placement of the FSCL is the range of organic Indirect
Fire weapon systems.
d. Dissemination.
e. Graphic Portrayal.
A solid black line with the letters FSCL followed by the establishing headquarters
and nation above the line. Below the line the name and the effective date-time group
is added.
The FFA is a specific designated area into which any weapon system may fire without
additional co-ordination with the establishing headquarters.
a. Purpose.
The purpose of the FFA is to expedite the attack of targets and facilitate the jettison
of CAS munitions. Units are authorized to fire into the area without further
coordination with the establishing force headquarters.
b. Establishment.
The force staff determines the need for FFA, based on the enemy dispositions and
the current tactical situation. It then recommends the area to be designated a FFA
to the commander. He then requests approval of the recommended FFA from the
force commander or civilian official exercising jurisdiction in the area. Upon approval
of the request, the designated area is declared clear for firing without further
coordination.
c. Location.
The area should be easily identifiable from the air; however, it may be designated
by the use of grid coordinates, a radius around a center point on the ground or
LAT/LONG. If the intent is to jettison ordnance, typically the FFA will be located
behind the friendly forces in an area they will not have to maneuver through. If the
intent is to expeditiously attack targets, typically it will be located short of the FSCL
in an area where friendly forces will not have to maneuver through.
d. Dissemination.
The commencement and termination of the FFA are specified by date-time group.
The force commander then directs that the geographical limits and effective date-
time group(s) or the area be disseminated to his subordinate units.
e. Graphic Portrayal.
An area outlined with a solid black line. The letters FFA followed by the establishing
headquarters and nation are written within the area followed by the name and
effective date-time group for commencement and termination.
Restrictive measures have the purpose of providing safeguards to friendly forces or objects.
The establishment of a restrictive measure imposes certain requirements for specific
coordination prior to the engagement of those targets affected by the measure. Restrictive
measures include:
The NFA is an area into which no fires or the effects of fires are allowed except if
temporarily authorized by establishing authority or if an adversary force within this area
engages friendly forces.
3-31 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
a. Purpose.
The purpose of the NFA is to prohibit fires or their effects in the area, normally to
protect civilians, populated areas or areas of historical/cultural significance.
b. Establishment.
c. Location.
The established area should be readily identifiable from the air but may be
designated by the use of grid lines or by a radius about a center point on the ground.
d. Dissemination.
The locations, designations and effective date-time groups of the areas are
transmitted to all units of the force. All NFAs should be entered in the fire direction
systems and placed on maps and charts as appropriate to ensure safety in the
delivery of fires. The force commander is informed of any changes through constant
liaison.
e. Graphic Portrayal.
An area outlined with a solid black line with diagonal lines inside. The letters NFA
are written within the area along with the effective datetime group for
commencement and termination. The area should also be identified by the
designation of the headquarters that established the area.
The RFA is an area in which specific restrictions are imposed and in which fires that exceed
those restrictions are not delivered without co-ordination with the establishing
headquarters.
a. Purpose.
b. Establishment.
An RFA may be established by any ground unit commander within his own zone;
however, it is normally established below battalion level. Companies operating
independently, however, could establish RFAs.
c. Location.
The RFA should be located on recognizable terrain and readily identifiable from the
air, but its location can be given by grid coordinates or as a radius from a point.
When RFAs are used to protect a forward unit from friendly fires; e.g.,
reconnaissance teams, the RFA size should be large enough to allow the maneuver
of the unit but not so large as to needlessly restrict fire support in other areas.
d. Dissemination.
e. Graphic Portrayal.
An RFA is portrayed by a solid black line defining the area with the letters RFA, the
designation of the unit establishing the area, the name, any special instructions, and
the effective date-time group written inside the area.
The RFL is a line established between converging friendly forces (one or both may be
moving) that prohibit all fire or effects from fires across the line without coordination with
the affected force.
a. Purpose.
b. Establishment.
c. Location.
To provide for recognition by all JFSE, the RFL should be located on identifiable
terrain. This is not only because CAS can influence this operation, but also because
the inherent, complex nature of this operation requires simplicity in execution and
coordination of direct weapon system, as well as indirect fire systems. In linkup
operations, the RFL is positioned as close as possible to the stationary force to allow
maximum freedom of maneuver and fire support to the linkup (moving) force.
d. Dissemination.
The location of the RFL is disseminated by the staff of the establishing commander
to the staff of the subordinate, adjacent and higher headquarters as required. It is
further disseminated within each level of command, including the establishing
command and all concerned JFSE.
e. Graphic Portrayal.
A solid black line with the letters RFL followed by the name of the establishing
headquarters and nation above the line. The effective date-time group is written
below the line. See figure B-7.
Formal ACA
A three-dimensional block of airspace in a target area established by the appropriate
commander in which friendly aircraft are reasonably safe from friendly surface fires.
The Joint Airspace Coordination Center (JACC) establishes formal ACAs at the
request of the appropriate ground force commander. Formal ACAs require detailed
planning. Although not always necessary, formal ACAs should be considered. The
vertical and lateral limits of the ACA are designed to allow freedom of action for air and
surface fire support for the greatest number of foreseeable targets. Since the fire
direction center (FDC) can determine the trajectory for a specific round or naval asset
firing at a specific target, each target must be evaluated to ensure the trajectories of
the rounds do not penetrate the ACA. The JFSE should consult the FDC when
deciding the altitude of an ACA to determine if that altitude would allow the majority of
targets to be attacked without interference or problems. Formal ACAs are promulgated
in the ACO, ATO, or SPINS. ACAs, while restrictive for artillery, are permissive for
aircraft.
a. Purpose.
The ACA acts as a safety measure for friendly aircraft while allowing other
supporting arms to continue fires in support of the maneuver force. It ensures
aircrew safety and effective use of indirect supporting surface fires by deconfliction
of time and space. It facilitates simultaneous attack of targets near each other with
aircraft and one or more of the supporting arms. This is the primary way to deconflict
airspace for CAS and assault support.
b. Establishment.
The commander of the unit requesting air support requests ACAs based on the
recommendations of his JFSE. Formal ACAs are established by the airspace control
authority. The ACA should only be used when risk to friendly aircraft is great enough
to justify the attendant loss of surface delivered fires. The extent of the ACA
employed is dependent on the time available.
c. Location.
The ACA should be located on identifiable terrain. The ACA should be kept as simple
as the situation permits. Factors that should be considered in determining the actual
size and shape of the ACA are the type of aircraft, type of ordnance and air defense
threat.
d. Dissemination.
The ACA should be disseminated as early and quickly as possible. The maneuver
unit employing the ACA will disseminate the details to higher and adjacent units and
to JFSEs, which will notify their subordinate elements, as required. A scheduled ACA
will be disseminated with its effective date-time group(s), usually on an overlay. An
on-call ACA is promulgated without its effective date-time group. The information
that describes the ACA includes its designation, minimum and maximum altitudes
(above mean sea level (MSL) or above ground level (AGL)), length (grid
coordinates), width (either side of the center line defined by the grid coordinates),
and the effective date-time group(s).
e. Graphic Portrayal.
A formal ACA is shown as an area enclosed by a slid back line. Data includes the
letters ACA, the name, the originating headquarters, minimum and maximum
altitude and effective times.
Informal ACA.
Informal ACAs can be established using separation plans and Procedural Control
Means (see paragraph 3.13 Procedural Control Means. and may be established by
any supported commander. An informal ACA is an expedient measure designed to
provide immediate, yet temporary control and deconfliction. As such, informal ACAs
are normally short-lived and not as widely disseminated as formal ACAs. Aircraft and
surface fires may be separated by distance (lateral, altitude, or combination of lateral
and altitude) or by time. Informal ACAs can be more difficult for the JFSE and airspace
elements to coordinate and ensure all affected airspace users are informed. JFSE
must ensure restrictions to indirect fires or aircraft are limited to those required to
successfully execute the attack and are coordinated with all affected agencies.
Details on Airspace Control Procedures and Airspace Control Means can be found in NATO
publications AJP-3.3.5 Allied Joint Doctrine for Airspace Control and ATP-3.3.5.1. Joint
Airspace Control Tactics, Techniques and Procedures.
ACMs segregate, control, and/or reserve airspace for Allied operations, and are a means for
positive and procedural ID, thereby reducing the risk of fratricide. In general terms, ACMs can
be broken down into the following groups: air corridors and routes, areas, points, and
procedures and means. The ACMREQ is used to request a specific ACM be specified in a
future ACO or when a change to the present ACO is needed. ACMs are listed and defined at
Annex A to ATP-3.3.5.1. FSCMs also have airspace applicability.
All airspace requirements need to be considered at the Joint Force level and a plan constructed
that provides the best compromise, bearing in mind the Joint Force Commander’s (JFC)
operational priorities. This is the aim of the Airspace Control Plan (ACP) produced by the Joint
Airspace Control Center (JACC). Implementation of the ACP is done through the promulgation
of Airspace Control Orders (ACO), which, in conjunction with Air Tasking Orders (ATO) and
Special Instructions (SPINS) form the basis on which front line forces plan and conduct their
operational missions.
There is a wide range of ACM that can be used to subdivide the airspace to enable Procedural
deconfliction. Generally, routes can be used by either civil or military aircraft, whilst corridors
and all other ACM are for military use only. All requests for airspace or ACM themselves are
to be made to the JACC who will then decide on the most appropriate ACM to be used. All
requests must include details of why the airspace or ACM is required. The ACP/ACO will
include all ACM that potentially may be required in the Area of Operations (AOO). The daily
ACO and SPINS will nominate which ACM will be used during the specified period and, if
required, include amendments to the ASC structure. If appropriate, ACM for use up to any
Identification Friend or Foe (IFF) ON Line and, potentially, beyond must be defined to ensure
deconfliction across all areas of the battlespace in which such problems could occur. Details
of ACM that should be promulgated include:
b. Controlling authority.
d. ACM designator.
c. Activation times.
ACM dimensions and detailed procedures are usually only specified in the ACP/ACO/Op
Orders as they will vary, sometimes substantially, depending on the circumstances in which
they are being used.
b. Air Route.
Air Routes (AR) are bi-directional routes established to direct aircraft between
two points, providing minimum risk passage through friendly air defenses.
Generally, the Joint Airspace Co-ordination Center will deconflict AR from
activated zones.
c. Altitude Reservation.
3-38 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
The Coordination Level is a procedural means to separate fixed and rotary wing
aircraft by determining a level below which fixed wing aircraft should not operate
without prior coordination. Similarly, rotary wing aircraft should not fly above the
Coordination Level without prior approval. The height of the CL will depend on
the requirements of the operation, e.g. a higher CL may be appropriate for Peace
Support Operations (PSO), and a lower CL in forward areas where a high Surface
to- Air Missile (SAM) threat exists. Typically, the height of the CL could be 500 ft
Above Ground Level (AGL) up to the IFF Off line. Beyond the IFF Off line the CL
may reduce 150 ft AGL. However, levels are highly flexible and dependent on the
tactical situation and mission. Allocation of a CL is as a procedural deconfliction
measure and does not imply control of the airspace above or below the level to a
specific component. However, fixed wing aircraft descending below the CL (and
rotary aircraft climbing above the CL) should coordinate all cross-CL movements
through either the ACA or the component whose AOO they are transiting into.
guarantee sole use of the airspace but highlights the need for coordination and
deconfliction within the specified volume. The vertical and horizontal dimensions
of a ROZ will be determined by the type of activity being carried out. ROZ for
Army operated UAS may be coordinated directly between the Corps Airspace
Management Element (CAME)/Division Airspace Management Element (DAME),
Air Operations Coordination Center (Land) (AOCC (L)) and the appropriate ACA
or agency to which authority is delegated. Usage of a ROZ must be defined in
the Remarks section in the ACO.
Slow Aviation Assets Flight Routes (SAAFR) are established to route slow
moving aircraft in support of ground operations. They may be established by any
component, and, when approved by the JACC, a matrix may be created, as
depicted in Figure 3. However, SAAFR will normally be developed through direct
co-ordination between the appropriate agencies within the Land Component
Command (LCC) such as the CAME/DAME, AOCC (L) and ACA or delegated
agency. SAAFR will be activated and deactivated as operational requirements
dictate.
h. SAAFR are generally established below the Coordination Level and their
dimensions shall be as deemed appropriate to the mission.
The matrix of SAAFR will be specified in the ACP or ACO. The default setting is
that all SAAFR are inactive for the full period of the ACO unless otherwise
notified. SAAFR may only be activated during the ACO period with the authority
of the ACA, or a SACA after close coordination with the Joint Airspace
Coordination Center (JACC) or delegated agency.
SAAFR activation is either pre-notified within the ACO, or, if required at short
notice while the ACO is in force, the JACC or delegated agency must notify all
agencies and units that will or could be affected.
JTACs/FAC(A)s and fire support personnel should select separation techniques that require
the least coordination without adversely affecting the ability to safely complete the mission.
Successful integration requires deconfliction methods that facilitate simultaneous multi-
ship/platform CAS and indirect fire operations. To be successful, all participants must be well
versed in ACA terminology and have knowledge of all applicable ACAs in use The goal is to
integrate CAS aircraft with other supporting arms in a manner that quickly achieves the
commander’s objectives and supports the commander’s scheme of maneuver maneuver and
intent.
Procedural control means provide target orientation to aircrew, align aircraft for the attack or
egress, provide separation from other supporting fires, and provide separation from enemy air
defense assets. Procedural control means include CP/IP selection, offset direction, and final
attack heading.
The JTAC/FAC(A) selects the CPs/IPs/BPs based on enemy capabilities, target orientation,
friendly location, weather, aircraft capabilities, and FSCMs. CPs and IPs should be visually
significant geographic points whenever possible so that aircrew can visually acquire them in
the event of a degraded navigation systems or GPS-denied environments. IPs and BPs should
be in such distance from target area that allows for safety of the aircraft from enemy AD threat,
during holding and for employment of weapons, typically 5 to 15 NM. Actual distance therefore
depends on anticipated threat, aircraft and weapons used. For example FW PGM delivery run
typically begins about 8-10NM from the target. High altitude aircraft may require IPs in excess
of 20 nautical miles from the target. If ground forces want to achieve surprise the holding
distance should prevent the enemy from spotting the aircraft and reduce the noise to minimum.
IPs/BPs should be positioned over friendly territory, away from known friendly and anticipated
enemy artillery positions. When selecting BPs for helicopters or IPs for low flying aircraft
attention should be paid to terrain hampering LOS communications.
When coordinating the use of stand-off weapons, IP ranges may need to be extended to
ensure appropriate weapon delivery parameters. In some cases, stand-off CAS platforms may
need to apply required terminal deconfliction parameters to the weapon instead of the aircraft.
In this case, the aircrew should communicate an appropriate stand-off IP to the JTAC/FAC(A),
ensuring that the weapon will remain deconflicted throughout its entire route of flight.
Keyhole is an efficient method for establishing an IP/BP in the absence of control points or
their location does not sufficiently support target engagement. When CAS aircraft are passed
to a JTAC/FAC(A) from a contact point, the JTAC/FAC(A) should immediately pass an “Echo”
point (typically the target) to those CAS players, and then anchor their hold point off of the
target with a direction and distance.
JTAC/FAC(A) may also send other than target coordinates (for example center of the target
area), however this has to be clearly communicated to the aircrew.
The standard keyhole method is to label each of the cardinal directions with a letter: A – North,
B – East, C – South, D – West and E – Overhead Target and use radials when
cardinal/subcardinal directions are not appropriate. Distances are expressed in nautical miles
(for FW) or kilometers (RW).
Note: JTACs/FAC(A)s should remain aware that when target arrays change appreciably—
unlike when using traditional IPs--so will the hold point for the attacking aircraft when using the
keyhole template. This shift of attacking aircraft orbits and hold points must be communicated
clearly. Failure to change the Echo Pt when a target area changes can result in deconfliction
issues with other airborne players.
Note: If holding multiple aircraft around one Echo point the JTAC/FAC(A) should consider
deconflicting all the players also by altitude, as holding patterns of some players may
accidentally overlap during holding.
(1) If the tactical situation dictates that an IP north of the target is necessary, then holding
instructions for the CAS players might sound like this:
JTAC: “Stang 11, proceed to Alpha 8, Flight Level 150, report established.”
(2) Sometimes a cardinal direction is not appropriate for an IP.In these situations, any radial
from the target can be used for holding instructions. For example:
JTAC: “Stang 11, proceed to the 240 at 8, Flight Level 150, report
established.”
This template allows for unlimited flexibility in IP selection and precludes the need to generate
IPs for an entire operational area, many of which may never be used. “However, by choosing
the keyhole method, the JTAC/FAC(A) will probably not be able to provide a
visually/geographically significant hold point on which the aircrew can orientate.”
Lateral separation is effective for coordinating fires against targets that are adequately
separated from flight routes to ensure aircraft protection from the effects of friendly fires.
Lateral separation allows coordinated attacks against two adjacent targets. The informal ACA
should be big enough to allow aircraft to engage the target yet small enough to minimize
restrictions on supporting fire. Divide the target area into two or more engagement zones.
While the separation measure may be described by a MGRS, grid line or latitude/longitude
reference, terrain features have the added advantages of simplicity and constant visual
reference. This is an appropriate technique when aircrews and firing units engage separate
targets and aircraft will not cross GTLs. JTACs must know the GTLs so they can prevent
aircraft from flying through trajectories. For example: “Stay west of the grid line 62” or “Remain
west of the river.”
b. Base plus altitude. Base number is usually found in daily SPINS. Altitude is
expressed by subtracting the actual altitude from base number. (If base number
is 5 and pilot is flying at 15 000 feet, he reports his altitude as “Base plus 10”).
Altitude separation is effective for coordinating fires when aircraft remain above or below
indirect fire trajectories and their effects, This technique permits indirect fires to continue when
the aircraft must cross the GTL. Avoidance of the indirect fire trajectory and fragmentation
pattern is provided by “stay above” or “stay below” altitude restrictions. When calculating the
safe separation for an aircraft to stay above or below the indirect fire trajectory, the JTAC and
JFSE/FSO use tabular firing tables to determine the ordinate (altitude) of the projectile at the
location where the aircraft will cross the GTL. This altitude is converted to feet above mean
sea level (MSL) and a margin of safety is applied prior to passing the aircraft a “stay above”
or “stay below” altitude (for example, “stay above 5,000 ft MSL”). The JTAC and JFSE/FSO
must coordinate with the firing unit to determine the appropriate entry argument data to use
when referencing the firing tables.
Technique for separating multiple flights of aircraft by altitude over the same target is also
known as CAS STACK.
When separating multiple flights of aircraft by altitude, JTAC/FAC(A) should assign 2000 ft
block to each flight and if airspace allows, maintain 1000 feet safety buffer between aircraft
working blocks.
JTAC/FAC(A) should make sure all the aircraft in the stack are on the same altimeter pressure
setting.
Altitude and lateral separation is the most restrictive technique for aircrews and may be
required when aircraft must cross the firing unit’s GTL. This is an appropriate technique when
aircraft and firing units engage targets along the GTL or aircraft must cross the GTL. This
requires aircraft to remain above or below indirect fire trajectories. To calculate safe separation
from indirect fires, determine the point where the aircraft will cross the GTL, determine the
ordinate at the selected point and add or subtract the margin of safety. For example, “Stay
west of grid line 62 and remain below 3,000 ft. MSL.” When deconflicting by altitude always
specify in feet MSL.
Altitude and lateral separation is also used to deconflict aircraft in CAS stack during weapons
employment.
Time separation requires the most detailed coordination and may be required when altitude
restrictions from indirect fire trajectories adversely impact aircraft ordnance delivery (e.g.,
mortar trajectory). The timing of surface fires must be coordinated with aircraft routing. This
technique is appropriate when aircrews and firing units engage the same or nearby targets,
when indirect fire is providing SEAD in coordination with the aircraft attack, or when the target
is being marked by indirect fire. When deconflicting sorties, consider the weapons
fragmentation envelope and the likelihood of secondary explosions. All timing for surface fires
will be based on the specific aircraft event time (TOT/TTT).
If CAS aircrew are unable to comply with the TOT/TTT, CAS aircrew must inform the terminal
controller and should consider requesting an alternate TOT/TTT which can be achieved.
Aircrews can update the clock on check-in with air control/fire support coordination agencies.
TOT is a time at which the aircraft bombs are to impact the target and around which other
surface fires can be coordinated. TOT requires minimum communication and is usually
easier to employ than TTTs. All participants, air and ground, must understand the time
standard in use (Zulu or local), and the JTAC/FAC(A) may need to ensure all clocks are
synchronized by providing a time check. GPS provided time is the standard for allied forces
in establishing a common time reference and for setting TOT. Strict adherence to timing
by participants is required for aircraft safety.
3.13.5.2 Time to Target (TTT).
TTT establishes a precise number of minutes and seconds that elapse between an
established time hack and bombs on target. This is an accurate, although infrequently
used method of time control and is easy to implement when few participants are involved.
Sufficient duration for the JFSE/FSO to synchronize indirect fires must be considered.
Additionally, the JTAC/FAC(A) must consider time required for the aircraft to execute the
attack. After the CAS brief, specify the TTT and give the “time hack” (e.g., “TIME TO
TARGET 5+00, READY, READY, HACK”). The JTAC/FAC(A) or providing final control
normally provides the “hack.” Aircrew will acknowledge receipt of the time hack.
For additional considerations about use of TOT and TTT see paragraph5.2.3 Restrictions
This section outlines a CAS-related decision-making process that can be applied to deliberate
planning and crisis action planning (CAP), identifies specific CAS-related staff responsibilities,
outlines basic CAS planning considerations, and identifies procedures for requesting CAS and
CAS-related air support. Focus will be at the brigade level and below with the concept of TACP
being part of the JFSE. The JFSE is the primary tactical staff agency responsible for CAS
planning. The planning phase begins when the unit receives the order from higher
headquarters (HHQ).
The CAS decision-making process,, is a continuous three-phase cycle that has been tailored
for joint fire support and focused specifically on CAS. The CAS decision-making process
assists the commander and staff in developing the CAS portion of a fire support plan. The
JFSE/fire support officer (FSO) plays a crucial role in the process both as the staff fire support
expert and as a member of the targeting team. CAS planners may include the fire support
staff officers, ALOs, and FAC(A)s/JTACs. CAS planners actively participate with the ground
force commander to provide CAS-related inputs to the fire support plan or OPORD. The
planning phase ends in a published order to subordinate units.
This section identifies commander and key staff member responsibilities relating to joint fire
support planning. While these members may be from different nations with differing specialties,
the detailed integration requirement inherent in CAS mandates that they work as a team. Key
staff members should make every effort to establish a close relationship with each other and
provide cross talk and professional development opportunities. Only through thorough
understanding and appreciation for each other’s perspective can JFS planners function as an
effective combat team.
The commander’s intent and desired end state must be clearly understood,
particularly how fire support and CAS can aid in achieving the overall mission
objective. Commanders must ensure JFS planners understand the objective,
b. Intelligence Officer. The intelligence officer is the principal staff officer for
all matters concerning military intelligence and counterintelligence. In this
capacity, the intelligence officer provides current and timely CAS targeting
information as well as projected enemy actions. The intelligence officer serves
as the focal point for ISR systems that feed real time or near real time battlefield
intelligence. The intelligence officer is the source of targeting data (e.g.,
subordination or suspected maneuver unit identification, measurable target
locations, collateral damage risks) and other JIPOE information. JFSE has to
liaise with the intelligence cells in order to have:
c. Operations Officer. The operations officer is the principal staff officer for
ensuring the commander’s intent is met. The operations officer is responsible for
ensuring CAS is fully integrated into the OPORD and fire support plan. Example
designations: S-3, G-3, J-3.
d. Fire Support Officer. The FSO advises the commander on the capabilities,
limitations and employment of all fire support assets available to support his
operations. The primary responsibility of the FSO is to ensure the integration of
the fire support plan with the manoeuver plan, both during planning and
execution. Secondarily the FSO commands and directs his terminal control
elements (Forward Observers, JTACs) and others during planning and execution.
The FSO is also the link to the higher echelons JFSE for the planning and
coordination of the external fire support. The FSO is the commanders advisor for
all joint fire support related matters.
e. Air Liaison Officer. The ALO advises the respective ground force
commanders on the capabilities and limitations of CAS. The ALO should
maintain awareness of the proposed sortie distribution for the respective ground
element. ALOs should work closely with other members of the staff such as the
JFSE to ensure the smooth and effective integration of CAS into the planning
process. The ALO is responsible for the specific planning tasks as indicated in
each step of the CAS planning process.
f. Ground Liaison Officer. The ground LNO is the primary ground officer
assigned to air commander’s staffs, such as fighter wings, air operations centers,
and related HQ. They provide expert advice, information, and interface on all
3-49 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
g. Legal Adviser. Advise and counsel on the law of armed conflict, other
relevant laws, and applicable policy when considering collateral damage risk to
civilians, civilian structures, and properties associated with CAS attacks.
As integral parts of the planning team, the action officers and ALOs should gather all relevant
information and products and be prepared to provide pertinent information from products to
the ground force commander’s staff. The below examples are some of the most common
products:
b. ATO.
c. ACO.
d. SPINS.
e. OPORD.
CAS planner responsibilities for mission analysis actually begin before the new mission is
received. As part of the ongoing staff estimate, they must continuously monitor and track the
status of fire support systems to include available air support. Specifically, during mission
analysis CAS planners perform the following actions:
(3) CAS constraints and restraints (ground and airborne alert CAS response
times, weather limitations, tactical directives, ROE, etc.).
(2) Concept of fires/fire support tasks. What are the commander’s desired
task and purpose for fires? How can CAS contribute? What other joint functions
(C2, intelligence, fires, movement and maneuver, protection, sustainment) are
affected? Have all CAS assets been properly integrated?
(5) Observation Plan. How can CAS take advantage of available “eyes” on
the battlefield? Are terminal attack control methods (i.e., types of CAS)
considered? Where will JTACs, FAC(A)s or observers be required?
(6) Communications Plan. How will maneuver elements, fire support, and
TACP personnel communicate? Are JTACs integrated into the ground force
communications plan? Are communications plans reliable and redundant?
k. Preplanned Air Support Request. Once CAS planners have analyzed the
mission and are familiar with CAS requirements, initial Air Support Request (ASR)
should be drafted and submitted. Further refinements to these initial requests
can be forwarded as details become available. Adherence to joint air tasking
cycle time constraints is critical.
After receiving guidance, the staff develops COAs for analysis and comparison. Guidance and
intent focuses staff creativity toward producing a comprehensive, flexible plan within available
time constraints. During this step, CAS planners:
f. Develop the CAS integration plan by examining opportunities for the best
use of air power including the placement of TACP assets.
h. Prepare COA statements and sketches (battle graphics). This part involves
brainstorming to mass the most effective combat power against the enemy (CAS,
EW, ISR, and surface-based fire support).
(1) Commander’s Intent. How does the commander intend to use CAS?
What are the objectives? Does CAS facilitate the commander’s ability to
accomplish the mission?
(2) CCIRs. What CCIR can CAS assets provide? Will remote observers such
as JTACs, FAC(A)s or FOs be able to provide critical battlefield information?
How will this information be relayed to the maneuver unit?
(3) Enemy Situation. Where is the enemy and how does he fight (enemy
order of battle)? Where is he going? Where can I kill him or affect his actions?
When will he be there? What can he do to kill or hamper me? How am I going
to kill/influence him?
(5) Priority of CAS Fires. Priority of fires (POF) for each COA must be
identified. As part of the POF, priority of CAS fires must also be identified. The
ground maneuver commander establishes which element will receive POF and
priority of CAS. It is also important to make the commander and the
commander’s staff aware of their unit’s priority for CAS relative to other units in
the operational area. Does the element with priority of CAS fires have a
designated JTAC? What if priorities change or CAS is unavailable for the
planned COA? How will changes in priority be communicated with forward
elements and JTACs? Does the priority of CAS support the commander’s intent
for each COA?
j. TACP. The TACP provides the following inputs during COA development:
(a) Observation plan (to include target area, aircraft, and BDA).
(a) Personnel.
(b) Equipment.
(4) Update initial or submit new ASRs with all information currently
available.
The planning staff “fights the battle” to determine the advantages and disadvantages of each
COA and to identify which COA best accomplishes the commander’s intent. CAS planners
should:
h. CAS aircraft.
(3) JTACs/FAC(A)s.
i. List Assumptions.
(1) Timeliness.
(2) Accuracy.
(3) Flexibility.
(4) Mass.
(1) Map
(2) Radio
(3) Other
(2) Timetables
o. War game the battle and assess the results. Did CAS support the
commander’s intent for fires? Was CAS effectively integrated with ground
scheme of maneuver? Was C2 of CAS reliable and effective? Were FSCMs and
ACMs effective in supporting the COA?
p. Fires Paragraph. CAS and other fire support planners begin to refine the
fires paragraph to the OPORD by further developing fire support tasks. The
essential elements of a fire support plan include but are not limited to clear and
concise articulation for the use of CAS by identifying the task, purpose, and effect
of each fire support task.
(1) Task. Describes the targeting objectives fires must achieve against a
specific enemy formation’s function or capability. Examples include:
(3) “To enable Task Force Armor to secure access to Brown’s Pass.”
(1) “CAS destroys 8–10 vehicles vicinity Brown’s Pass; Armor BN secured
Brown’s Pass.”
(3) “CAS destroys enemy tanks in main defensive belt; 2nd BN advanced to
phase line Smith, seized and held Objective Panther.”
Orders are the means by which the commander expresses to subordinates the following
guidance: objectives, intent, decisive points, and the end state of an operation. This guidance
enables a staff to focus its efforts accordingly. They also help the staff integrate and
synchronize the commander’s decisions and concepts. JFSE members and ALOs should pay
particular attention to the CAS-related portion of HHQ orders. Planners must understand the
commander’s objectives for joint fires CAS and the utilization of CAS to best support the overall
mission objective(s).
The staff prepares the order or plan to implement the selected COA and provides a clear,
concise CONOPS, a scheme of maneuver, and concept of fires. Orders and plans provide all
necessary information that subordinates require for execution, but without unnecessary
constraints that would inhibit subordinate initiative. TACPs should produce the CAS specific
portion of the fire support annex of an OPORD.
Format for orders are listed in STANAG 2014 Formats for Orders and Designation of Timings,
Locations and Boundaries.
Air support requests (ASRs) are used to identify the supported commander’s requirements for
supporting air missions. There are two types of ASRs, preplanned and immediate.
(2) Amount of Detail. The amount of detail the requester is able to include
in the request is critical. If possible, the requesting unit should identify the target,
location, TOT, and other mission data (e.g., desired effects, FSCMs). This
information will provide more effective coordination and a higher likelihood that
the tasked aircraft will have the proper weapons load for the assigned target.
(3) Timeliness. A high level of detail may not be always available prior to
submitting the preplanned ASRs to the JFAC HQ. In these cases, preplanned
requests can still identify an anticipated requirement (such as CAS) to be
available during a period of time, with the exact time and place to be coordinated
as the battle develops. The requesting commander should provide a time frame,
probable target type, and place where the need for air support is most likely.
The important thing to remember for preplanned requests is to submit the
request in time to allow the JFAC’s battle rhythm and the joint air tasking cycle
planning phases to allocate the appropriate air resources. Then, as the situation
develops, the request can be updated through JFSE with the assistance of the
AOCC referencing the original request number as needed.
(2) Immediate ASRs submitted during ATO’s execution. This type of air
support requests usually result from unanticipated or unplanned needs on the
battlefield, often of an emergency nature.
(a) Joint Air Request Network (JARN). The JARN is the link between
the AOCC and subordinate TACPs for aircraft coordination and sending
immediate air support requests. The AOCC is the net control station
(NCS). The AOCC will activate and operate as many nets as necessary,
contingent with needs, equipment available, and frequencies allocated.
(f) Request Format. The ASR form is used for immediate ASRs. As
with preplanned digital ASRs are the preferred method of requesting air
support through fire support channels.
TYPES OF MISSIONS
a. Shaping Operations.
Commanders may employ CAS to support operations deep within the operational
area, which may include SOF or conventional forces with a deep operation mission.
In this case, CAS will normally be limited in scope and duration to supporting
maneuver forces or special operations activities against targets in the vicinity of their
assigned operational areas. Shaping operations involving CAS may require
additional coordination to deconflict with other missions such as air interdiction (refer
to the ATO).
A commander generally assigns most available CAS to the unit designated as the
main effort. CAS aircraft and fire support assets can mass with surface forces to
support the commander’s objectives. The speed, range, and firepower of CAS also
make it a valuable asset for exploiting success and attacking a retreating enemy.
CAS supports offensive operations with scheduled or on-call missions to destroy, disrupt,
suppress, fix, or delay enemy forces. Commanders employ CAS depending on the type of
offensive operation being conducted: movement to contact, attack, exploitation, or pursuit.
b. Attack. Commanders plan for and use CAS to support attacks against
enemy forces. CAS can destroy critical enemy units or capabilities before the
enemy can concentrate or establish a defense. CAS can also help fix the enemy
in space or time to support the movement and assault of ground forces. CAS
3-61 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
may add to the concentration of firepower and the violence against the enemy.
CAS can be utilized to isolate enemy forces on the battlefield and force them to
defend in a direction from which they are unprepared to fight. CAS is incorporated
into the detailed planning and coordination involved in a deliberate attack.
c. Attack Penetrations. Engage enemy units that have bypassed main battle
area forces or penetrated friendly positions. CAS participants must take special
care to identify the location and movement of friendly forces and civilians to
ensure that they are not subject to direct attack or weapons effects.
The employment of CAS during stability operations is significantly different from CAS
employed during major operations. CAS in stability operations is limited in scale and scope.
This is primarily due to the restrictive nature of stability operations which often results in more
restrictive ROE. However, when CAS is effectively employed in stability operations it can prove
to be decisive. The use of precision-guided munitions (PGMs) by CAS aircraft is often
preferred by COM JFCs when supporting ground operations intended to destroy high-payoff
targets in urban environments. PGMs allow the commander to limit collateral damage while
creating the desired effects and mitigating adverse effects.
CAS in support of stability operations depends heavily on detailed and timely intelligence,
detailed coordination with maneuver commander’s plan, appropriate munitions, and JTAC with
“eyes on” the intended target. COM JFCs and their staffs should consider the use of CAS
carefully during stability operations. Other roles for CAS in stability operations include: a
flexible and timely forward aerial observation platform, limited defensive capability for troops
in contact, a show of force deterrence option, route and ground convoy security, and an aerial
quick reaction force. CAS can also provide the COM JFC with certain CCIRs that can Facilitate
the mission.
Depending on geospatial location and degree of protection targets can be divided into several
categories:
b. Hard targets are protected from weapons´ effects and therefore successful
engagement may require specific weapon
d. Area targets are spread out at larger area and therefore employment of
weapons that have area effect or employment of multiple munitions is required to
create desired effect
3.19 EFFECTS.
Supported commanders must specify the desired operational effects on target. For more
details see AArtyP-5 NATO Fire Support Doctrine, Annex A.
These effects are: delay, disrupt, defeat, divert, deter, degrade, dislocate, deny, deceive,
dissuade, limit, interdict, canalize, isolate, block, control area ,separate, fix, contain, compel,
obscure, illuminate, coerce, hinder, hamper, turn, demonstrate, eliminate, prevent, retaliate,
etc.
JTAC/FAC(A) must consider nature of the target and match proper weapon which will create
desired effect.
a. Harassment
b. Suppression
It is intended to degrade targets performance below the level needed to fulfill its
mission objectives. Suppression usually lasts only for limited time period.
Suppression is used to prevent enemy from effective interference with friendly forces
activity.
c. Neutralization
d. Destruction
e. Psychological effects
They improve morale of own troops and deter, demoralize and discourage enemy
forces. Actions creating psychological effects usually demonstrate the resolve and
readiness of friendly forces to use lethal ammunitions, if necessary. Psychological
effects are usually created with use of Show of Force and Warning Shots.
The ground commander may determine that the best COA for the current situation is an
escalation of force rather than using lethal fires. The ground commander has many options
available to escalate fires, one of which includes the use of CAS aircraft through a SoF. SoF
seeks to achieve an effect on the ground through non-kinetic means. Through witnessing a
display of potential military capability, the recipient (target) of a SoF may be deterred from their
present course of action. A SoF should clearly demonstrate the intent and capability to employ
kinetic effects if necessary. Generally, a SoF should be conducted with clear potential to
escalate to the use of kinetic means if necessary in order to produce the desired end-state.
The JTAC/FAC(A) employs the same procedures for a SoF as he would for any kinetic event
(see chapter 5, section III CAS Execution Template). The nature and conduct of the SHOF is
at the discretion of the JTAC and aircrew, in accordance with JOA and national restrictions and
tactics.
JTACs should remember that show of force is a nonlethal form of airpower employment and
does not require many of the restrictions normally associated with munitions or LASER
employment. While nonlethal, a show of force should have an intended target and a desired
effect, and must be conducted in accordance with theater ROE and SPINS.
Reasons for SoF. There are several reasons for a JTAC to request a show of force:
b. Friendly forces are too close to enemy forces for safe use of weapons. The
current situation does not meet ROE to allow weapons employment.
c. Friendly forces and/or the pilot are unable to get a precise fix on the
enemy’s position.
d. A unit, which the JTAC does not have direct communications with, is in a
“troops in contact” or an escalating situation and the JTAC uses a show of force
to reassure the unit that there is air support on station.
e. Civilians have gathered and the ground force commander would like them
to disperse. The JTAC can use a SoF over the personnel to attempt to disperse
them.
Note: Show-of-force maneuvers typically require the aircrew to leave sanctuary and enter
potential threat areas.
Warning shots are usually fired using forward firing weapons (rockets and guns).
Procedure for warning shot remains the same as for any kinetic engagement (see
chapter 5, section III CAS Execution Template). Impact area for warning shot must
be carefully chosen, so as the effect is created i.e. must be observable by enemy
forces, but with minimum risk of any collateral damage to include ricochet. Details
about warning shot procedures are usually published in theatre SPINS.
Valuable enemy targets are usually defended by air defense systems. Each of these systems
must be countered by proper tactics and weapons utilization. Air defenses usually consist of:
c. Surface to Air Missiles are the most sophisticated air defense systems
that represent major threat to aviation. They vary from man portable (MANPADS-
Man Portable Air Defense Systems), through vehicle mounted to stationary air
defense installations. They use several types of guidance (most common are
LASER beam riding, heat seeking and radar). Modern aircraft are equipped with
countermeasures and warning systems that help to mitigate SAM threat.
(1) MANPADS and short range SAMs. MANPADS are the most difficult AD
asset to locate on the battlefield due to their small size and easy proliferation.
For this reason their general presence must be always considered during CAS
planning. Short range SAMs mounted on vehicles are generally easier to locate
and they can be effectively suppressed by direct and indirect fires.
(2) Medium and long range SAMs require significant SEAD effort to create
favorable conditions for CAS missions.
Use of “standoff weapons”, employment form high altitudes and varying IP location will
enhance aircraft survivability by reducing exposure and altering attack direction.
JTACs/FAC(A)s should first evaluate different mission profiles, in order to minimize the
aircraft’s exposure to the threat envelope from known or suspected anti-air threats. If aircraft
cannot avoid enemy air defenses, aircraft vulnerability must be balanced against the risk of
exposing SEAD delivery systems. Surface-delivered SEAD involves planning and coordination
by the JFSE and at the maneuver units down to the company level. Air delivered SEAD and
EW must be coordinated and deconflicted in order to provide necessary support during the
time CAS is being conducted. Before requesting CAS that would require SEAD support, fire
support personnel must first consider whether mortars, artillery, or naval fires can range the
target and achieve the desired results. Effective SEAD depends on accurate intelligence on
the position and type of enemy weapons. SEAD is most effective against fixed threats such
as antiaircraft sites and ADA batteries. SEAD is least effective against individual MANPADSs
and highly mobile threats due to the difficulty of accurately targeting these systems. The JFSE,
working with the JTAC/FAC(A) and forward observer, may coordinate surface-delivered SEAD
with target marking.
If the enemy air defense threat is significant, air support may be limited until the threat is
reduced. Suppression of Enemy Air Defenses (SEAD) by EW and fires may be required to
facilitate CAS attacks. The primary objective of SEAD is to allow friendly aircraft to operate in
airspace defended by an enemy air defense system — including the target area and
ingress/egress routes. SEAD missions do not guarantee aircraft immunity from enemy air
defenses. SEAD support may be required against air defenses both in and outside the urban
area, with internal SEAD targets more difficult to find and anticipate. An aggressive, proactive
SEAD effort may be necessary during the early stages of urban operations.
From this information, CAS planners anticipate the enemy’s ability to affect the mission, and
the potential influence enemy actions may have on flight tactics. As the threat level increases,
the pre-briefing of aircrews and detailed mission planning becomes even more critical. The
potential for the threat situation to change during the course of the mission makes
communications and close coordination between the aircrews, control agencies, and the
supported ground force crucial. In-flight updates on enemy activity and disposition along the
flight route and in the target area may require aircrews to alter their original plan and tactics. If
the enemy is successful at disrupting communications, alternatives are planned to ensure
mission accomplishment. Secure voice equipment and frequency-agile radios can overcome
some enemy interference.
a. Target Acquisition
b. Weapons employment
c. Communications
d. Threat
Some types of terrain allow for good masking and concealment for threat.
3.22 TERRAIN.
a. General Description
Mountainous areas typically have rugged, compartmented terrain with steep slopes
and treacherous mobility. Weather may span the entire spectrum from extreme cold
with ice and snow in winter to extreme heat during the summer. In mountain
operations, the advantages favor the defender, and the focal point is the battle to
3-67 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
control the high ground. Infantry units are the most suitable force for this type of
combat, particularly when properly supported. Also, the terrain promotes isolated
battles that make C² difficult. Small-unit commanders often operate semi-
independently.
Mountainous terrain may force the enemy to concentrate forces along roads, valleys,
reverse slopes, and deep defiles, where CAS is very effective. However, the terrain
also restricts the attack direction of the CAS strikes. RW assets (CAS, Medevac,
Support) may be limited in use as their payload and ability to safely land, take off or
hover significantly decreases with increased altitude. CAS planners must assume
the enemy will concentrate air defenses along the most likely routes CAS aircraft will
fly. CAS planners must thoroughly identify the air defense systems and target them
to enhance the survivability of CAS assets.
b. Target Acquisition.
This environment emphasizes the issues that surround three dimensional planning
and execution against targets. Horizontal development of terrain may make target
acquisition for aircraft difficult. Assigning specific holding areas that allow for LOS
between aircraft and target area may aid in target acquisition. Mountains may
appear very similar to one another as well as pose issues due to terrain masking.
The vertical axis is less distinguishable from overhead positions and depth
perception can be diminished.
c. Weapons Employment.
d. Communications.
e. Threat.
a. General Description
Desert regions are usually located in warm or tropical climate zones, which mean
that there is a combined effect of climate and terrain. Deserts consist of large
stretches of terrain with a passable surface, fairly flat and relatively uninterrupted by
obstacles. There are also areas with great differences in altitude and with steep rock
formations, sometimes even in the nature of a low mountain range, and vast sand
dunes. The lack of water makes the desert an inhospitable region. It is sparsely
populated and has an extremely limited infrastructure. Inhabited areas are few and
far between and are only to be found where there is water. The surface conditions
away from the few roads require equipment with some degree of off-road capability,
such as tracked vehicles. Vegetation is scarce in the desert, which means that
artificial aids have to be used for camouflage.
b. Target Acquisition.
In general, if good contrast exists between the target and the background, target
detection will be possible at extended ranges. Deserts that have vegetation will
reduce target detection capabilities from standoff ranges. In a desert environment,
target identification by aircrews may be hampered by enemy capability to cover and
conceal potential targets. Camouflage and decoys have proven to be effective
countermeasures in the desert environment and will also delay target acquisition.
In flat desert terrain, lack of visual references will make target talk-on techniques
more difficult in the absence of target marking aids. In flat desert terrain, IP and CP
selection will be impacted by the difficulty selecting points that will be visible from
the air.
c. Weapons Employment.
d. Communications.
Greater communication ranges may be possible due to increased LOS ranges. Non-
LOS communications will be adversely affected by nonconductive soil. Repeaters
and relay stations may be necessary.
e. Threat.
CAS aircraft may be more vulnerable in the desert because of the lack of covered
approaches, and both friendly and enemy units are often widely dispersed. Enemy
threats may be able to acquire aircraft at longer ranges.
a. General Description
The term ‘wood and forest’ will be used to describe expanses of terrain which are
completely covered by trees or where the majority of the area is wooded and where
vehicle movement is largely restricted to roads, clearings and fire breaks,
necessitating different tactics to those employed in more open terrain.
Jungles are vast tropical forest areas which are often combined with mountainous
terrain or swamps. They have extremely dense vegetation with relatively few open
spaces. There are virtually no roads in jungles; paths must be cleared and kept open
by hacking through vegetation. The larger rivers form good approach routes. The
living conditions are tough, not least because of the exhausting climate. Reliable
maps are often unavailable or have limited value because of the lack of orientation
possibilities. The unfavorable terrain can restrict communications and limit the
possibilities for movement. Helicopters are essential for movements and support
tasks. High temperatures and humidity take their toll on equipment and soldiers.
b. Target Acquisition.
Because of the dense vegetation, the fields of observation and fire are extremely
limited; areas which would normally be designated as key terrain no longer have this
value. The dense vegetation of most jungles makes observation beyond 25 to 50
meters very difficult.
Target acquisition may be difficult or impossible under dense jungle canopies for
both the JTAC and aircraft. In these cases every effort must be made to mark the
target by any effective means. Vegetation can hamper use of LASER Range Finders
making generation of target coordinates difficult.
Use of LASER Target Designators will be limited by vegetation blocking the LASER
beam between LTD and targets causing multiple spots. Spot may be undetectable
by LGW seekers and LSTs if it is blocked by canopy. Same limitation may apply for
use of IRPs at night.
Colored smoke or WP rounds may be effective. In thick forest or double and triple
canopy jungles smoke tends to disperse as it rises creating an ambiguous mark.
There may also be a significant delay before smoke breeches thick canopy cover
and is visible to aircraft. Ground-burst artillery designation flares may be effective
in this type of terrain. FAC(A) aircraft that can remain on station may aid the
targeting process due to their increased SA.
c. Weapons employment.
In forest and jungle terrain, most contact with the enemy is at extremely close range.
If the friendly force has a substantial advantage in fire support, the enemy will most
likely try to close with the friendly force and maintain that close contact. Thus, the
friendly force commander might not be able to use fire support advantage without
increasing the risk of inflicting friendly casualties. Therefore, knowledge of the type
of munitions best suited for jungle/forested terrain and how to employ them is vital.
Ordnance and fusing may have to be tailored to penetrate dense forest or jungle
canopies. Because combat in these environments is usually of such close nature,
the delivery of the munitions must be closely controlled to avoid friendly fire. While
such conditions may increase damage through the fragmentation of foliage, such
conditions may also act as to absorb damage mechanisms. Particular conditions
may require changes in the number of munitions used per target type in comparison
to a more open environment.
d. Communications.
Communications will suffer between the JTAC and aircraft in dense jungles and
forests due to limited LOS. Communications may improve at reduced ranges.
Use airborne C2 platforms such as FAC(A)/TAC(A)as relay stations.
a. General Description.
The collective term Urban Environments refer to towns, villages, hamlets, industrial
areas and the associated infrastructure. The extent of their influence on operations
depends on structure, density and size. Built-up areas are normally at road
intersections and often form political, cultural and industrial concentrations.
Furthermore, the largest part of the population usually lives in built-up areas.
The compressed urban environment creates unique considerations for planning and
conducting CAS operations. These include operations in urban canyons,
deconfliction in confined airspace, restrictive ROE, difficulty in threat analysis, the
presence of noncombatants, the potential for collateral damage, and the increased
risk of friendly fire.
b. Target Acquisition
Tall buildings make it difficult for pilots to identify targets and may require specific
attack headings to achieve LOS with the target. Observers may be placed on upper
floors of buildings to improve visibility. There will be an increased need for marking
and designating CAS targets. Recommended items for a JTAC, and FAC(A) as
appropriate, include NVDs, an IR pointer, LRF, LTD, IR strobe light, IR and visible
chemiluminescence lights, spotting scope, multiband radio, pyrotechnics
(smoke/designation), gated LASER intensifier (GLINT) tape, access to a grenade
launcher with designation and smoke rounds, compass, mirror, common objective
graphics, and GPS. The JTAC must plan for redundant communication and marking
tools.
A single marking tool will not work in all urban environments. A JTAC will only be
able to utilize a ground LASER target designator (GLTD) when in a stationary
position and preferably from an elevated position. In brightly lit objective areas, a
JTAC may consider shooting out street lights to darken the area for use of IR
pointers or if directed by the commander in order to optimize friendly NVDs.
IR signatures are affected by the proximity of other buildings and structures. Urban
temperatures are generally higher than rural areas and can be significantly higher
than the surrounding environment. Thermal heating can adversely affect thermal
sights and other IR sensors.
Urban lights may overwhelm aircrew NVDs and render them useless for standard
night formation tactics. Plans may have to be adapted to allow for additional
deconfliction.
The CAS aircraft on station may be required to do aerial reconnaissance to find and
report targets or enemy movement. JTACs will request CAS aircrew to perform
reconnaissance when the threat permits and when not being used to directly deliver
ordnance. This may prevent an unexpected ambush or stop units advancing to
reinforce.
FW aircraft can be used to overfly the unit’s position and reconnoiter adjacent threat
avenues leading into the JTAC’s location. The ground force commander must
decide when organic/attached ground weapons are insufficient for the mission, and
CAS is required.
RW aircraft can be the “eyes” for the supported unit which means the pilots may
need to get very close to see what the maneuver force is experiencing.
JTACs may use a FAC(A), ISR or CAS aircraft to reconnoiter and attack enemy
forces outside the area of immediate engagement in order to prevent further
reinforcement. If the distance between enemy and friendly forces is too close for
the JTAC/FAC(A) to use CAS, or the target is not suitable for the CAS ordnance,
CAS aircrew should provide reconnaissance and assist the JTAC/FAC(A) in
assessing the overall situation. This is most useful for identifying enemy
reinforcements or directing friendly reinforcements.
c. Weapons employment
Historical studies prove that 90 percent of all urban engagements occur where
friendly and enemy forces are within 50 meters of each other, and that urban
engagements using supporting arms occur with less than 250 meters between the
same.
The target set in urban tactical operations will include troops in the open, armored
vehicles, and enemy forces using the urban terrain (buildings) as firing positions or
strong points.
The JTAC must select the appropriate ordnance to limit the potential of friendly fire,
particularly in an urban environment. The JTAC may not always see the target or
whatever is firing at the unit, but only hear where the rounds are coming from and
see their impacts. The friendly and enemy situation will be changing rapidly even if
only from building to building or room to room inside a building.
The ability of FW and RW aircraft to provide fires may be limited by the structural
makeup of the urban location
The requirements for weapons in the urban environment must focus on rapid
employment, the target set, minimal collateral damage, minimal rubbling, the ability
to employ in proximity to ground forces and with high precision. Whenever ordnance
is delivered, the consequences of collateral damage in the form of friendly fire,
unintended damage or destruction of persons or objects, should be a consideration.
Detailed planning of weapons and delivery tactics will minimize the risk to friendly
forces, civilians, and adjacent buildings/structures.
JTACs will judiciously use FW ordnance when troops are in contact, due to fragment
and overpressure dangers.
For example, cluster and general purpose munitions would be effective against
troops and vehicles in the open, whereas hardened, mobile, or pinpoint targets may
require specialized weapons such as LASER guided, EO, inertially-aided munitions
(IAMs), or aircraft with special equipment or capabilities. In all cases, the requesting
commander needs to know the type of ordnance to be expended (especially cluster
munitions). To provide effective CAS, the weapons delivery platform must have
adequate sensors to deliver weapons with a high degree of accuracy. The type of
fusing to best destroy a CAS-type target is also critical to weapon selection. This is
extremely critical when diverting sorties from a different kind of mission or target.
d. Threats.
Urban terrain provides excellent cover and concealment for a variety of weapons
systems. The urban environment also affects the employment of antiaircraft
weapons, including AAA, man-portable air defense systems (MANPADSs), and
SAM systems. Light to medium AAA may be employed from ground sites, from the
tops of buildings, or weapons mounted on civilian vehicles. The terrain may limit
suppression options.
e. Communications.
f. Other Considerations.
The JTAC/FAC(A) must provide an extraordinary level of detail in the CAS remarks
section of the brief working from big to small features (funnel approach). If not, then
the pilots must pull details from the JTAC/FAC(A). The “big” portion of the talk-on
brief can be eliminated if the JTAC/FAC(A) can mark either his position or the target
location visually or electronically with an IR pointer, GPS grid, or with reference to a
gridded reference graphic (GRG), for example. Even if a ground JTAC cannot see
the target, TAC hand-off to a FAC(A) can be done. The JTAC must always keep in
mind that his ground perspective is drastically different from the attacking aircraft’s.
The JTAC may not be in a position to observe all buildings containing friendly forces
due to intervening buildings and battlefield confusion. It’s likely that a JTAC will be
marking and engaging targets within 100 meters of his own or friendly positions,
within danger close parameters.
For aircrew survivability, every effort should be made to exploit standoff capabilities
with optics and weapons systems. Historically, 80 percent of urban combat injuries
result from glass shards from blast and overpressure.
g. Navigation.
Navigation over urban terrain can be more difficult than over natural terrain, because
maps do not show the vertical development of urban terrain. Rapid movement from
position to position can often create confusion between aerial and ground observers
as to friendly and enemy locations. Familiarity with the characteristics of urban
terrain allows aircrews to discern key features in this environment. Navigational
aids, such as GPS, have reduced but not eliminated this challenge. The use of the
GRG, GPS, and handheld pointers or designators eases the problems associated
with night navigation, orientation, and target identification.
Detailed gridded maps or photos (GRGs) derived in planning will aid in target
description and location. Roads and buildings may be numbered to speed the target
acquisition process from the air. Prior planning is required to ensure all units, both
on the ground and in the air, have the correct charts or imagery. A GRG (often
referred to as an urban grid system) labels structures and prominent features.
Imagery should contain a north arrow and the picture should be oriented north-up
whenever possible. Easting and northing lines should be labeled at the top and left
side of the GRG.
It is the responsibility of the ground unit that owns a particular operational area to
produce GRGs for that area, ensure dissemination to subordinate, adjacent, and
higher echelons, and maintain version control on the products as they are updated
or revised. The developing unit should consider selecting grid sectors based on what
the aircrew/aircraft sensors can most easily see such as rivers, road junctions,
buildings, bridges, and etc.
The developing unit should avoid over-targeting (i.e., numbering every building in
the city versus numbering the buildings in the expected and adjacent objective area).
Over-targeting can lead to time delays and confusion for FW and RW aircrews when
sorting through numerous pages of a map attempting to find a specific building. For
example, starting with the northwestern section of the zone and continuing
clockwise, immediate structures surrounding the zone will be labeled Al, A2, A3, and
etc. City streets, alleys, and other easily recognizable topographic features can
delineate the boundaries of Alpha, Bravo or Charlie. Numbering the buildings
clockwise, starting at the northwestern most sections, will assist in a quick cueing
process.
TRPs require labeling buildings or distinctive urban structures in and around the
objective area. These can be labeled TRP#1, TRP#2, and etc. TRPs should be
committed to memory by the JTAC/FAC(A) and aircrew to expedite passing or
interpreting a call for fire. If fire is being received, pass a TRP number, heading,
approximate distance and description of where and what type of fire is being
received.
Establishing objectives and phase lines assists in understanding the ground scheme
of maneuver and is one method to integrate air and ground operations. Consider all
types of maps and charts ranging from joint operations graphic charts and aerial
photos to tourist maps for use in urban environments.
3.23 WEATHER.
Unfavorable weather can limit effectiveness of CAS missions. Planners must overcome this
shortfall (JSTARS, other airborne C2, remote relay, etc.) or accept this condition as part of the
mission environment. Situational awareness enhancing systems (e.g., synthetic aperture radar
[SAR] and data link type systems) and coordinate seeking weapons improve the ability to
execute CAS in certain tactical situations despite weather limitations. Regardless, favorable
visibility normally improves CAS effectiveness. Ceiling and visibility may affect the decision to
employ low, medium, or high altitude tactics or whether to employ FW or RW assets.
These conditions will also affect the JTAC’s ability to see the target. Weather conditions may
also determine the attack profile of the aircraft. If enemy vehicles are moving, exhaust smoke,
dust trails, and movement can indicate their location. Visibility is more critical for long-range
deliveries (e.g., free-fall bombs/rockets) than it is for short-range deliveries (e.g., retarded
bombs and guns). Thick haze or smoke has a greater effect on low-level attacks than on
steep-dive attacks because horizontal visibility is usually lower than oblique visibility. Reduced
visibility and cloud layers restrict LASER and electro-optically guided ordnance. Target
acquisition is usually easier when the sun is behind the aircraft.
3.23.1 Visibility.
BOC attacks are not limited by visibility, therefore if assets are available and conditions
favorable (JTAC/FAC(A) able to generate precise coordinates, BOC capable aircraft/weapon),
BOC method of attack should be preferred. Limited visibility hinders aircraft’s ability to acquire
targets during BOT attacks
Limited visibility may force the aircraft to maneuver closer to the threat in order to maintain
visual contact with the target. Flying closer to the threat presents an obvious problem. If
conditions of limited visibility other than normally anticipated exist in the AO (such as
precipitation, sandstorms, heavy smoke etc.), they should be briefed by JTAC/FAC(A) to the
aircrew during situation update. Visibility is usually reported in meters or kilometers. If visibility
differs in different directions, the lowest figure is to be reported. Reduced visibility can be
caused by:
Presence of particles will generally degrade quality of picture of all optical and
thermal imaging sensors regardless of the time of the day making target acquisition
more difficult. Particles may also hamper use of LASER range finders and LASER
target designators by blocking the LASER beam, decreasing effective range or
causing false reflection (backscatter). They do not limit use of GPS/INS guided
weapons, as long as JTAC/FAC(A) is able to generate target coordinates with
sufficient fidelity. Radars are also not susceptible to this environmental factor,
therefore radar deliveries using aircrafts´ onboard radar or radar guided missiles
against radar significant targets can be the only option under conditions of severely
limited visibility.
As sun and moon change their position during day it causes different light conditions
that greatly influence ability of all players to visually acquire targets.
(1) Shadows. Even in broad daylight targets that are located in shadows of
adjacent objects will generally be harder to see by naked eye or optical sensors,
especially when camouflaged.
(2) Sun and moon position. When executing BOT attacks with unguided
ordnance where aiming is done be maneuver of the aircraft in sunny conditions
JTAC/FAC(A) should avoid attack headings into the sun, if tactical situation
allows. Sun may cause multiple glints on the cockpit canopy and HUD, making
aiming difficult. When executing low level attack into the sun the shadows of
objects will be placed on the ground in front of the objects, making outlines of
the objects blurry and they will be severely decreasing aircrews´ ability to
visually PID targets.
Bringing the aircraft from the sun hinders enemy’s ability to visually acquire the
attacking aircraft and reduces accuracy of small arms and optically guided
weapon systems.
When conducting attacks using low level tactics with NVD equipped aircraft
JTAC/FAC(A) should avoid attack headings into the moon or into bright light
source (for example lit up city), as they may wash out the picture in NVGs or
even blind the aircrew.
(3) Darkness/Low level light. Use of NVDs, LLLTV and Thermal Imaging
systems gives to coalition forces significant advantage during night operations.
(4) Thermal Imaging Systems are not limited by amount of ambient light,
because quality of the picture depends on thermal properties and significance
of objects.
(5) Devices that intensify ambient light (NVDs, LLLTV) require some level of
ambient light to produce picture.
(6) Dawn and Dusk. The most difficult times of the day in terms of visibility
are dawn and dusk. Thermal Imaging Systems are subject to Thermal
Crossover, that may severely limit their ability to detect targets. Use of NVD
during dawn and dusk may also be very limited. For JTAC working on the
ground conditions for use of NVDs may already exist, however aircrews
operating several thousand feet AGL may still be exposed to direct sunlight and
therefore their ability to detect objects on the ground is very limited. NVDs
cannot be used yet and targets on the ground are hidden in the darkness.
JTAC/FAC(A) should plan for effective target marking (LASER designators,
ground burst illumination, tracer fire,…) when planning for operations in this time
of the day.
(7) If the weather is clear and a bright moon is available, additional artificial
illumination may not be necessary. If CAS planners are anticipating these
favorable conditions will not exist during planned operations (for example during
some phases of the moon cycle), artificial illumination (using ground or air
delivered overt or covert illumination assets) should be planned for to facilitate
night operations. On the other hand, flares employed under an overcast sky will
highlight the aircraft for enemy defenses. Designation flares can increase the
effects of smoke and haze and further reduce the visibility.
(9) Milk bowl effect. Heavy haze will cause a “milk bowl” effect - the absence
of visual cues that allow aircrews to distinguish between the ground/water and
the sky - which severely limits slant-range visibility and may cause spatial
disorientation. Avoid allowing such conditions to drive the aircrews into flying a
more predictable flight path close to a threat.
3.23.2 Winds
Winds may affect availability of CAS aircraft, aircraft tactics, visibility and delivery accuracy of
some weapon systems.
b. Attack headings.
(2) PGMs. LASER guided bombs may require continuous lasing, as winds
may drift the bomb away from the spot, that will be out of weapons´ seekers´
FOV, if delayed lasing is used. Winds have none or very limited effect on
accuracy of GPS/INS guided weapons and guided missiles.
c. Other effects.
(1) Strong winds can pick up dust, sand or dirt and decrease visibility on the
ground level.
(2) Wind can decrease accuracy of indirect fires, making SEAD less effective
or placing marks away from intended impact points. Fires should be adjusted
by an observer to create required effects.
(3) Fires set by impacting ordnance may spread very quickly when aided by
favorable conditions (dry and flammable), causing risk to both, enemy and
friendly forces and possibly increasing potential for collateral damage.
3-78 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(4) Smoke which is used for friendly forces marking, target marking or
screening will drift away from its´ point of origin, decreasing desirable effect of
the smoke.
BOC attacks are not limited by low cloud base, therefore if assets are available and conditions
favorable (JTAC/FAC(A) able to generate precise coordinates, BOC capable aircraft/weapon),
BOC method of attack should be preferred.
If these conditions do not exist and only BOT method of attack can be executed, special
measures must be taken to enable visual acquisition of target by the aircrew and to protect
CAS aircraft from enemy air defenses and terrain collision.
b. Ingress and egress routes must be selected to minimize the time spent
within threat’s envelope. Aircrew must avoid terrain collision and JTAC/FAC(A)
should carefully select ingress and egress routes to enable the aircrew to acquire
target without spending too much effort avoiding obstacles.
c. Flight profiles. Very low cloud base may limit use of some flight profiles
(pop, toss) and limit it to level deliveries only, that do not allow effective use of
guns and rockets. Sometimes level delivery/very shallow dive delivery may be
the only options.
e. Weapons considerations.
(1) If standoff munitions (such as antitank guided missiles) are available, they
should be used to allow the aircrew to stay outside of or to minimize the time
spent within threats´ envelope.
(2) Low cloud base may require LASER guided missiles to fly flat trajectory,
which may decrease their maximum effective range.
(3) Use of retarded free fall bombs may be the only bombing option, as non-
retarded bombs would force the aircraft to fly through weapons´ effect zone.
High drag bombs have limited penetration capability against hardened targets.
a. Cold temperatures
(2) Icing. Cold and high humidity may cause icing. Icing conditions are those
atmospheric conditions that can lead to the formation of water ice on the
surfaces of an aircraft, or within the engine. Most aircraft are equipped with anti-
icing and de-icing measures, however icing represents great danger to any
aviation. Some aircraft will not fly when there are known icing conditions. Most
tactical UAS do not have any anti-icing measures and therefore if these
conditions are known to exist, they will not fly.
b. Hot temperatures
(2) Aviation. Heat decreases the power of jet engines, therefore most
platforms operating in extremely hot conditions may have severely reduced
weapons payload or playtime unless Air to Air refueled. Loss of
payload/playtime also applies to RW aircraft.
3.24 C2 ASSETS.
A detailed, flexible, and redundant C2 plan is essential. Airborne C2 support systems may
alleviate some of the challenges in C2. Each of these platforms has inherent capabilities and
limitations. Consider each of the available C2 assets and what role they can play to support
the mission. This may generate specific requirements that, in turn, end up as formal requests
for air support. As a minimum, consider the following C2 assets:
Consider integrating airborne C2 assets to enhance the plan. Are these assets critical and do
they warrant specific requests to HHQ? What is the specific role and function of each? Have
provisions been made to ensure adequate low level communications for C2 of RW attack
assets? As a minimum, review the following:
a. JSTARS.
Ground C2 assets must be integrated to enhance the plan. These assets are critical and
warrant specific consideration by HHQ. What is the specific role and function of each? Have
provisions been made to ensure adequate communications for C2 of all attack assets? As a
minimum, review the following:
a. TACP/JTAC.
While corps through brigade TACPs function primarily as liaisons, BN TACPs and
company JTACs have the primary responsibility of TAC. It is important to consider
TACP capabilities and limitations as well as subordinate or adjacent unit TACPs.
This consideration should include personnel (levels of training and qualification) as
well as equipment serviceability and availability. How will the TACP move, shoot,
and communicate? Which units will the TACP support?
b. Observers.
Observers may aid the JTAC by acquiring or lasing targets. If the JTAC plans to
use an observer, then he must be able to communicate and coordinate with the team
during target marking or TGO.
Functions as the primary control agency for the execution of CAS in direct support
of ground operations. Normally aligned with the senior tactical ground command HQ
at corps level and below, the AOCC coordinates and directs CAS for land forces.
The AOCC facilitates CAS, air interdiction, SEAD, mobility, and ISR missions within
its assigned operational area. The AOCC is the NCS for immediate ASRs and
monitors aircraft check-in/checkout. Use the form in Appendix A, “Air Strike
3-81 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Request,” to ensure the AOCC has all the pertinent information concerning the
mission (see Line 8, “REMARKS” of the form for transmittal to supporting aircrews.
There is no NATO standard specifying minimum list of equipment for JTAC. Annex A to
ATP-3.3.2.2. (Mission Essential Task List- METL) lists tasks that JTACs have to be able to
perform. These tasks imply use of this equipment, however some tasks are caveated and not
all coalition nations are equipped to performed all the tasks.
Minimum equipment list may be stipulated by combatant commanders for specific operations/
theaters.
JTAC/FAC(A) be must be able to establish good secure two way voice/data communications
with CAS aircraft and appropriate Command and Control nodes (HQs, higher echelon TACPs,
AOCC etc.) Frequencies and waveforms to be used for requesting CAS and for
communications with CAS aircraft are usually listed in theater SPINS. Most commonly used
frequencies and waveforms are:
a. VHF FM. Mostly used by ground forces for inter/ intra unit communications.
These frequencies may be used to communicate with some CAS aircraft that are
VHF FM capable. Communications in VHF FM band are mostly limited to Line of
Sight. Communications at greater distances is only possible if there are relay
stations available.
b. UHF AM. The most commonly used for Air to Ground Communications.
UHF communications are strictly limited to the Line of Sight between receiver and
transmitter. This may cause problems in mountainous or urban terrain or when
aircraft are using low level ingress tactics when terrain masking hinders LOS.
CAS planners must provide detailed guidance on use of unsecure nets such as use of code
words and encryption by AMSL (Allied Military Security List) and other means in order to
protect friendly communications from enemy interception and exploitation.
Organic JTAC target location equipment may include (list not exhaustive):
a. AO Imagery
(2) Satellite imagery provides JTACs more details of target area than most
standard military maps. Translating what JTAC sees on the ground to the
aircrew is also much easier with satellite imagery than with map when
conducting Talk-On. If possible satellite imagery should have MGRS overlay to
facilitate plotting of friendly forces and target location.
b. Compass
c. GPS Receivers
They provide quick and reliable means to plot friendly forces position. If coupled with
LASER Range Finder, they can quickly generate target coordinates and elevation.
If target cannot be collocated with terrain features, it may be the only tool to generate
precise target location. GPS receivers require good reception of signal from
satellites to provide accurate positioning, therefore terrain conditions such as urban
terrain with tall buildings, dense foliage in woods, or narrow canyons may decrease
accuracy of such positioning. Commercial GPS receivers are susceptible to enemy
jamming and spoofing and therefore their use in theatres of operation must be
avoided. CAS planners and JTAC/FAC(A) must make sure GPS receiver is loaded
with current crypto keys to ensure secure operation.
d. Binoculars
They provide very accurate distance measurements from own position to distant
objects (targets). They can be also used to measure distances and angles between
two distant objects. Most LRFs are equipped with built in Digital Magnetic Compass.
Accuracy of angle measurement with DMC depends on correct calibration that must
be performed in accordance with the manual for specific LRF. Presence of metallic
objects (vehicles, weapons, powerlines) during angle measurements influences
accuracy of such measurement. Therefore if JTAC relies on LRF coupled with GPS
as the only source of target coordinates he must make sure the LRF is properly
calibrated and not influenced by presence of metallic objects.
are induced by inaccurate GPS data, poor azimuth, range and elevation data,
system calibration and user skill. These errors are magnified with range and can
result in significant TLEs. Due to the variables listed previously, TLE may vary from
10 meters at 1 kilometer to more than 300 meters at maximum ranges.
NVDs utilize ambient light (from moon, stars and manmade sources) to create visible
picture in low light conditions. If there is not enough ambient light they cannot
produce image with sufficient resolution, especially at greater distances. In areas
with artificial illumination (cities) the presence of bright light sources will lead to bright
corona surrounding the light sources, which will limit visibility of objects in its´ vicinity.
Helmet mounted NVDs usually do not provide any degree of magnification, therefore
acquisition of targets at greater distances is generally more difficult. NVDs with
magnification are usually designed as hand held or weapon mounted. They provide
better resolution at greater distances, however this resolution is still limited by
amount of ambient light. Even when operations are planned for daylight only, JTACs
should always count on the possibility that operations may extend to night hours for
unforeseen circumstances and have always NVD available for this case.
TIS (also known as FLIR- Forward Looking Infra Red) produce picture based on
temperature of the objects. Therefore they do not rely on ambient light and generally
produce better picture at greater distances in poor light/night conditions. Their use
is not limited to poor light conditions, they can be used in daylight as well. Contrast
and resolution of the picture depends on difference in temperatures of objects it is
viewing. The greater the difference, the better contrast is achieved. Thermal imaging
systems operate on different wavelengths, thus different systems can produce
different quality of picture under the very same conditions. Some thermal systems
operate on wavelengths that can detect LASER radiation of LASER Target
Designators, therefore they can be used for target correlation when aircraft uses
onboard LTD or to lase targets with ground based LTD at night. Thermal significance
of objects has 2 sources: radiated and reflected heat. Radiated heat is caused by
objects´ internal heat sources. Examples are human body, vehicle engines, terrain
heated by an explosion of ordnance or vehicle tires heated up by friction during
driving. Reflected heat is caused by different thermal properties of materials heated
by external source, usually sunlight during day. Thermal crossover is main limiting
factor for use of thermal imagers. Twice a day (normally after sunrise and after
sunset) temperature of objects will become the same as temperature of their
background, causing objects to blend in with their background. This will lead to
washed out picture and poor quality of image. Due to different thermal properties of
different materials and changing weather conditions this period is hard to specify
precisely during operations. Therefore dawn and dusk are critical periods of the day
for target acquisition by thermal imaging systems. Most thermal imaging systems
are equipped with built in LRF, DMC and GPS receiver and can be used to generate
target coordinates and elevation, however the built in GPS is mostly based on
commercial receivers and therefore coupling the device with military GPS receiver
must be considered.
These devices enable JTAC to receive imagery from ISR platforms that are Video
Down Link capable (UAS, targeting pod equipped CAS aircraft). These systems
enhance JTACs´ ability to detect and locate targets that cannot be detected by
observation from ground position due to terrain masking and obstructed Line of
Sight. Accuracy of derived coordinates is dependent on specific platform
capabilities.
j. Targeting Software
a. Direct Fire Weapons. Basic considerations for use of fires to mark targets
can be found in paragraphs 3.8.1.4 and 5.4.15.3 Correction from visually-
significant marks.
Even though it is highly undesirable to use marking friendly positions to help aircrews to gain
Tally on intended targets, marking friendly positions may in some situation improve situational
awareness of aircrews and increase safety of CAS missions.
a. Signal panels are the most common markers used to mark friendly position.
Their visibility depends on slant range of the aircraft from marked position (up to
several kilometers) and contrast of the panel again its´ background. As distinctive
color is the primary marking feature of a signal panel, its´ visibility is limited to
naked eye and platforms with sensors that produce color image. Visibility of
signal panels in thermal systems is limited as the temperature of the panel blends
in with its´ background in several minutes. Visibility with NVD systems in
extremely poor. When using a signal panel to mark friendly position JTAC must
consider the possibility the enemy may have observers on elevated OPs and
must place the panel so as it is visible to the aircraft, but not to the enemy. Enemy
may also use deception and use his own overt markers to confuse the aircrew
about friendly/enemy positions.
b. Smoke is very effective way to mark friendly positions. Color of the smoke
to be used for marking friendly positions is usually listed in theatre SPINS. If JTAC
does not have the required color available he may choose to use different color,
but this must be clearly communicated with the aircrew. JTAC must make sure
3-86 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(2) Aircraft must be in good position relative to the position of the sun
f. GLINT Tape. Ground forces with GLINT tape may be seen by the SOF
gunship low-light level television, depending on the amount of environmental or
artificial designation in the area. Identification of friendly forces by this manner
should be verified by other means to avoid misidentification. Do not use more
than a 1/2-inch (1x1cm) square for an individual or four 1-inch squares (2,5x 2,5
cm) per vehicle.
g. Friendly Tagging Devices. Units equipped with tagging devices can use
their capability to relay latest position to C2 nodes equipped to receive and
display data. If airborne CAS forces are equipped to receive and/or display this
information, they can use this information to help confirm or update friendly
locations.
JTACs are required to control CAS mission from a variety of platforms to include those
frequently used such as dismounted and vehicle operations. Occasionally JTAC controllers
are utilized from both air and water-based platforms that require additional steps to ensure
mission success. JTACs must be trained to operate from platforms used by units they are
supporting.
a. Airborne platforms.
Limitations also exist and mission planning needs to factor in such limitations as well
as those that are a standard practice. The ability to mark, designate, and provide
types of terminal attack control will be dependent on the capabilities of the airborne
platform. The capability to integrate with the supported ground force commander or
battle staff will also vary and disadvantage and risk must be mitigated. Station time
is also a limitation versus terrestrial placement of a JTAC and is often measurable
in hours versus days or weeks.
Generally, two types of airborne platforms exist in this regard: command and control
aircraft and aircraft designed to scout or attack. The former aircraft often have
improved communication suites and may include members of the battle staff and the
ground force commander to be in the aircraft as well. Such configuration maintains
many elements of the integration possible on the ground and presents a more
thorough situational awareness than a platform which consists of just aircrew and
JTAC. Limitations may include positioning of such aircraft as the JTAC often has
less ability to influence the routing and holding of the aircraft as terminal attack
control may not be the first priority.
When operating out of a scout or attack aircraft, the advantages can be the opposite
of a command and control centric platform. Often the JTAC is the only member of
a battle staff on the aircraft with the remaining personnel being aircrew. As such,
the JTAC has to accomplish external liaison with ground force commanders and
staff in able to perform the mission. Such coordination may slow down the execution
of CAS by less presenting less efficient command and control means. This type of
aircraft often has the ability to mark, designate or act as a strike platform. As the
individual platform characteristics allow, the JTAC may be able to verify targets
through sharing a common visual or system-aided operational picture of the
battlefield with supporting aircraft. Some nations rely on C4ISR platforms to operate
JTACs/FAC(A) from Airborne position. These aircraft offer enhanced C2 capabilities
and operate multi-INT sensor suites (ELINT, EO-IR,….) over the battlefield, thus
contributing to the ground picture.
(1) Fixed-wing. JTACs operating from a fixed-wing aircraft can cover more
of the battlefield than rotary wing as well as better line-of-sight communications.
These advantages can be off-set by a limited visual identification, marking and
targeting capability. Such trade-offs must be considered during the planning
and preparation phases, not during execution.
points. The ability to hover and operate from a battle position can improve target
acquisition in areas with a high amount of overhead cover and interference.
c. Vehicles
FW and RW aircraft, their weapons, sensors and capabilities, can be found in various
references to include NATO, national or theatre specific documentation. Most aircraft deployed
to contingency operations are equipped with advanced sensors and weapons, however older
generation or less sophisticated platforms may deliver sufficient effect on the battlefield, if
proper techniques are used by JTAC/FAC(A).
CAS planners should select those combinations of munitions and aircraft offering the required
effect. To create the desired level of destruction, neutralization, or suppression of enemy CAS
targets, the weapons load, arming, and fuse settings must be tailored for the desired results,
if they are available. Most common aircraft sensors and avionics related to CAS are (list not
exhaustive):
a. Head Up Display (HUD) enables the aircrew to view basic flight data
(heading, airspeed, altitude etc.) without looking at the instruments. Aiming
solutions are also displayed on HUD. If target location and elevation are entered
into aircrafts´ navigation kit, it may also display symbol indicating target location
on the ground, if it is within field of view of the HUD. This aids in quick target
correlation and expedites target engagement. Some legacy platforms do not have
head up display, therefore correlation is more difficult and has to be accomplished
by other means, such as Talk-On, enhanced target description or use of marking.
c. LASER Spot Trackers are sensors that detect LASER energy. LSTs are
either embedded into targeting pods, or mounted on the aircraft and bore sighted
with the axis of the aircraft. Due to limited field of view of the sensor TGP optics
must be slewed at the expected target area, or (if mounted on the aircraft) nose
of the aircraft must be pointing at the target that is being illuminated. Symbol of
the LASER spot is displayed either on HUD, if it is within its´ field of view, or on
MFD. Use of LASER designators (ground or airborne) and LSTs greatly expedites
time required for target correlation.
d. Binoculars, if carried on board, enable the aircrew to view the target area
from greater distances/altitudes and with better degree of detail. This benefits
legacy platforms that are not equipped with advanced sensors.. Due to vibration
that is present in the aircraft use of stabilized binoculars is highly desirable.
f. NVDs used by aircrews provide the same capabilities and have the same
limitations as those used by JTACs. See paragraph 3.25.2
g. Low Level Light Television (LLLTV) is device that uses ambient light just
like NVDs to create picture. However this device has magnification and can zoom
in/out.
h. Electro Optical (EO) systems are sensors that are used in daylight
conditions. They have optical and digital zoom. Most fielded EO systems do not
distinguish colors, therefore JTAC should avoid using colors when conducting
sensor Talk-On during target correlation. New advanced EO systems have this
capability.
(3) LST
(4) LTD
(5) VDL
(7) Capability to provide field Collateral Damage Estimation with CDE rings
imagery.
In order to achieve the desired effect on the battlefield weapons with proper effect must be
employed. Weapons effects include:
3-91 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Risk estimate distances allow the supported commander to estimate the potential danger to
friendly troops from the CAS attack. They are discussed as 0.1 percent probability of
incapacitation (PI) (i.e., 1 in 1,000 PI). Different Factors such as delivery profile, target
elevation, terrain, buildings, trees, etc., can significantly reduce or increase PI.
Caution: NATO does not have standardized REDs. REDs used in training are mostly quoted
from US JFIRE. Parties involved in the planning and execution of CAS and joint fires must be
aware of the REDs that are in effect. This information can be found in SPINS, SOPs and other
governing documents.
Danger Close. Ordnance delivery at or inside the 0.1 percent PI distance will be considered
“danger close.” The supported commander must accept responsibility for the risk to friendly
forces when targets are inside the 0.1 percent PI distance. Risk acceptance is confirmed when
the supported commander passes his initials to the attacking CAS aircraft through the
JTAC/FAC(A), signifying that he accepts the risk inherent in ordnance delivery inside the 0.1
percent PI distance. Attack should be conducted parallel to the FLOT.
b. EO/IR guidance systems use sensors that lock onto target picture and
guide the weapon to target. Depending on sensor type picture is either in visible
or IR spectrum. Pilot must lock the seeker of the weapon on target prior to launch.
Once seeker is locked onto target and missile is fired it does not require any other
input from the aircraft or JTAC/FAC(A) and guides autonomously, allowing the
aircraft to exit target area or perform defensive maneuver maneuvers, greatly
increasing aircrafts´ survivability.
c. Radar guidance systems use radars to detect targets and home on them
autonomously. Targets must be radar significant and must match missiles´
search algorithm criteria to be targeted. Normally geographical area that is to be
scanned by weapons radar (its´ boundaries) must be entered into weapon by the
aircrew prior to launch, however low TLE is not required. Radar guidance systems
enable target engagement in virtually any weather. Missile locks on target after
launch. Missile will engage any target that matches search criteria within
boundaries that have been entered into weapons navigation system, however
weapon will not distinguish between friendly and hostile target or target that has
been hit and neutralized previously.
d. Radio/ Wire guided weapons are guided by radio commands from launch
platform or by wire that unreels from the missile. This requires launch platform
operator to keep crosshairs on target until weapon impacts, increasing aircrafts´
exposure to air defenses.
(1) Advantages.
(2) Limitations.
(a) Bomb on Coordinates. Using this method the aircrew will use the
coordinates provided by JTAC/FAC(A) as the only means of correlating
the target. Aircrew will not adjust or refine the coordinates that are passed
by the JTAC/FAC(A) and input them into the weapon’s navigation system.
The tactical scenario and commander’s tactical risk assessment
determine the acceptable TLE. If IAMs are delivered BOC, all aircraft
delivering ordnance must read back Line 4 and Line 6 from their system
or weapon.
(b) Bomb on Target. This method indicates that aircraft are employing
an IAM based on sensor or visual target acquisition, as opposed to
bombing on a coordinate given to the aircrew by external source. Using
this method the aircrew will use the coordinates provided by the
JTAC/FAC(A) to slew onboard sensors (such as thermal imager, ATP or
radar) to the expected target area and correlate the target by visual means
(such as Talk-On). Once the aircrew is Tally target they will use onboard
sensors to refine target coordinates and input them into weapon’s
guidance system. If an IAM is delivered BOT, the coordinates do not have
to be read back from the weapon.
NOTE: Inertially aided munitions flight path geometry may not be predictable when
using visual delivery methods.
f. Dual and Multi Mode Guidance Weapons. Weapons exist that possess
multiple methods of target acquisition. These weapons have been increasing in
prevalence and offer the ability to target under various environmental conditions
and target characteristics. Examples of dual and multi mode weapons guidance
systems are (list not exhaustive): LASER/GPS/INS, EO/GPS, Radar/LASER.
When employing these weapons it is important to be aware of the weapons full
capabilities and limitations and how these correspond to each form of targeting
that such weapons possess. If weapons´ guidance system allows for multiple
guidance options it must be clearly communicated between JTAC/FAC(A) and
the aircrew which guidance system will be used to prevent possible confusion
during execution. JTAC/FAC(A) should not request specific guidance for weapon
but rather describe situation and limitations on the ground with requested effect
on target and allow the aircrew to offer the best guidance option available.
a. Guns.
(1) Effect
Effect of guns depend on their caliber and type of ammunition being used.
Caliber of aviation guns varies from small arms calibers used on door mounted
machine guns in helicopters to 105mm howitzer used on AC-130 gunships.
Most fixed wing jets are equipped with 20mm to 30mm caliber guns. Guns are
effective against personnel in the open, light structures and soft skinned
vehicles. Armor piercing rounds can be very effective against armored targets.
30mm gun on A-10 can take out most modern main battle tanks, while 20mm
gun (F-15, F-16, F/A-18) can acheive effect only on soft skinned and lightly
armoured targets. Fragementation effect of High Explosive rounds from most
aviatik gun is limited to several meters from the impact point. Armor Piercing
Guns are usually fired from dive. Impact pattern of aviation guns depends on
diving angle. Shallow diving angle will generally produce linear impact pattern,
length of it depending on length of burst and diving angle. Steeper impact angle
will result in all rounds impacting roughly in the same location. When engaging
linear targets with guns JTAC/FAC(A) must take into consideration size and
orientation of the target when planning attack heading to achieve desired effect.
Ricochet may limit use of guns in environment where there is a risk of collateral
damage, as rounds ricochet from targets may go as far as several hundred
meters. Most guns are fixed to the aircraft and aiming is done by maneuver
maneuver of the aircraft. This requires proficiency of the aircrew. Some aircraft
(Attack helicopters, SOF gunships) have guns with off- axis capability that are
aimed by coupled sensors (helmet mounted displays, sensor turrets) where
aiming by maneuver of the aircraft is not required. JTAC/FAC(A) must take this
into consideration when planning for Type of Control. Guns must be fired at
short distances to achieve accurate hits. This exposes CAS platforms to enemy
air defenses.
b. Rockets
(1) Effect of rockets depends on type of warhead being used. The most
common warheads used on rockets are:
(d) Smoke warheads can be used for target marking or to create smoke
screen. When using smoke rounds to mark the targets they are usually
fired as single rockets.
(f) LASER guided rockets that have been fielded by many nations in
recent years enable point target first round hit capability at greater
distances due to semi-active LASER seeker guidance system. For
planning considerations see REFERENCE LGM.
(1) Effects. Primary effect of GP bombs are blast, fragmentation, cratering (if
delayed fuse is used) and limited incendiary. Actual effect depends on bomb
size (weight of bomb body and weight of explosives it contains), impact velocity
and impact angle. Sizes of GP bombs are usually expressed by its´ weight in
pounds or kilograms. Size of the most common NATO bombs used for CAS
varies from 500lbs to 2000lbs. Bombs of the same size can produce different
effects based on the type of fuses being used.
3/ Time fuse will activate the weapon after preset delay. This
delay is measured not from the impact, but from release from the
aircraft.
GP bombs´ bodies with add on guidance kits are used to create Guided Bomb
Units (GBUs).
d. Guided bombs
e. Guided missiles
Guided missiles allow CAS aircraft to attack targets with pinpoint accuracy at greater
distances. Most missiles used for CAS were initially designed as antitank missiles,
however specialized versions that have been optimized against buildings and
personnel are being fielded by coalition forces. Primary effect of antitank guided
missiles are:
(1) Effects
(a) Guided missiles are very accurate weapon systems with low
collateral damage yield. They provide standoff capability that increases
CAS aircraft survivability.
(b) Most of them require Line of Sight between launching platform and
target prior to launch. JTAC/FAC(A) should plan for adequate type of
control to exploit these capabilities without increasing risk of fratricide or
restricting aircrafts tactics.
(c) Failure of rocket motor during flight of the missile will result in short
impact, therefore missiles should not be launched over friendly positions,
unless tactical situation dictates otherwise.
(d) Modern main battle tanks are equipped with softkill and hardkill
countermeasures that are designed to prevent the missile from killing the
tank. Softkill mechanisms affect missile´s or launcher´s guidance system
resulting in missile missing the target. Hardkill countermeasures destroy
the missile as it approaches the target. Countermeasures are activated by
different sensors such as vehicles radars or LASER illumination detectors.
CAS planners should have detailed knowledge of countermeasures used
in theatre of operations and provide this information to JTAC/FAC(A)s and
CAS aircrews.
(e) Despite the fact guided missiles have low collateral damage yield
JTAC/FAC(A) must take into consideration nature of the target. Shaped
charge penetrating tanks´ armor will only leave small hole in the hull of the
tank, however it may detonate the ammunition stored inside the vehicle
causing massive secondary explosion which will contribute to overall
collateral damage.
In recent conflicts NATO did not encounter enemy equipped with sophisticated EW systems,
however this may change in the near future. Potential adversaries also have access to a wide
range of systems to support their operations and contribute to their situational awareness.
These include EM ISR sensors; electronic and communications intelligence intercept systems;
wide-ranging and in some instances highly secure EM communications devices such as
cellular phone systems, Wi-Fi and high power cordless phones.
c. GPS systems including those used for timing, and target acquisition,
EW is military action that exploits EM energy to provide situational awareness and achieve
offensive and defensive effects. EW, the conduct of EMO, is warfare in the EME.
EW effects and capabilities can be applied from the air, land, sea and space by manned,
unmanned, attended, or unattended systems. If not properly coordinated and integrated, the
use of EW may adversely affect friendly forces. Improper EW actions may cause EM fratricide
or eliminate targets of high intelligence value. Units that effectively apply EW capabilities
maintain freedom of action in the EME while denying its use by the enemy. EW control and
coordination is covered in Chapter 4.
EW actions are effects-based and comprise of EA, ED and ES. This terminology is primarily
aimed at commanders and operational planners and those engaged in delivering EW effects
at all levels. They are dealt with below.
3.25.8.2 EW Measures
EW Measures terminology has a different purpose and is focused on the mechanisms by which
EW works. It is more likely to be the preserve of specialists. The EW measures taken to achieve
effects and support operations have not changed. For exponents of EW, the measures-based
disciplines retain their importance. The annexes that follow this chapter provide guidance on
the measures based disciplines of EW Support Measures (ESM), Electronic Counter Measures
That division of EW involving action taken to search for, intercept and identify EM
emissions and locate their source for the purposes of immediate threat recognition.
It provides a source of information required for immediate decisions involving ECM
EPM and other tactical actions. (AAP-6)
ESM resources are used to intercept and locate enemy AD emitters. Generally,
airborne ESM resources will be the most effective collectors for EW support to
SEAD. Their elevation relative to the terrain permits a long and uninterrupted line-
of-sight to emitters. However, ground based ESM resources provide an additional
level of support to the tactical commander as Low Level Air Defense (LLAD) systems
may be difficult to detect from the air.
That division of EW involving actions taken to ensure effective use of the EMS
despite the enemy's use of EM energy. There are two subdivisions of electronic
protective measures: active electronic protective measures and passive electronic
protective measures.(AAP-6).
(5) Careful siting to reduce the risk of detection and degrade the accuracy of
adversary DF.
(6) The use of SOPs to reduce the need for communications and keep EM
emissions to a minimum.
(7) The use of SOPs for countering enemy jamming and deception.
(8) Strict Emission Control (EMCON) measures, which either forbid or limit
EM emissions during certain phases of the battle.
(9) The use of technical measures which affect the design of electronic
equipment (eg. encryption, spread spectrum) to reduce the risk of detection.
Pre-mission.
Electronic warfare (EW) consideration is integral to the success of CAS in many environments.
The spectrum of capabilities is wide and may include activities to jam or spoof enemy
communication and intelligence gathering abilities. However, these EW activities may have
inadvertent effects on friendly force capabilities as well. Planning conducted through
Electronic Warfare Officers (EWO) and GLOs can help mitigate any effects through proper
planning and deconfliction by understanding the capabilities and limitations of supporting EW
assets. This includes ground based as well air based platforms and the interaction between
them.
On-station.
Integrate EW support into the command and control of assets supporting CAS. This includes
airspace and sensor management and will maximize effectiveness while minimizing any
potential negative effects. Use knowledge gained during the planning process to deconflict
EW from itself as well as non-EW assets.
b. ELINT sources,
c. scout reconnaissance
d. troop reports
e. JTAC/FAC(A) observations,
f. Artillery radars
h. HUMINT sources.
These elements are specifically tailored for ISR roles and normally report through established
intelligence channels. Resultant data can be passed to and used by JTACs via electronic or
voice links to complement the operational environment picture.
Nontraditional ISR assets should also be considered on an as needed basis. For example,
many strike aircraft contain organic ISR capabilities for imaging, ELINT, and ground moving
target indicator tracking. Although possibly limited in FOV (Field of View) resolution, or scope
of operations when compared to traditional sources, nontraditional ISR data from strike aircraft
has the advantage of being focused, flexible, and more readily adjusted to suit the JTAC’s
immediate needs.
Aircrew, JTACs and CAS planners should make every effort to become familiar with the
capabilities and limitations of traditional and nontraditional methods, particularly in reference
to their ability to distinguish between individual combatants and noncombatants on the
battlefield.
a. Time Available for Planning. Planners must estimate the amount of time
necessary to plan the mission, effect the coordination, and execute the mission
to support the ground force commander. Inadequate planning time will result in
reduced effectiveness and increased risk to aircrews and ground troops alike.
3-104 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
b. Air Tasking Cycle. The specific theatre or operations area will have
established ATO cycle “cut off” times for preplanned requests. CAS requirements
that do not meet the established cut off times are submitted as a change to the
ATO through the combat operations division of the CAOC or as an immediate
request per theatre/operations SOPs.
LASER operations supplement other CAS procedures and are not substitutes for other
planning and execution procedures and techniques. In any LASER-designating situation,
strive for simplicity and use all available resources to help ensure first-pass success.
LTDs are devices that are used to illuminate targets with LASER energy. LTDs
operate on wavelength that is invisible to human eye. Most designators are class
4 LASERs and they can cause damage to human eye, if not handled with caution.
Coded LTDs emit LASER energy with unique Pulse Repetition Frequency and
require input of specific LASER codes for operation. Purpose of PRF is to harmonize
the designator and seeker interface, therefore the LASER designator Pulse
Repetition Frequency must be matched to the PRF setting on the weapon or tracker.
PRF is matched to a specific LASER Code (see STANAG 3733- LASER PULSE
REPETITION FREQUENCIES (PRF), PULSE ENERGIES AND EFFECTIVE
DESIGNATION RANGE OF LASER SYSTEMS FOR TARGET DESIGNATION
AND WEAPON GUIDANCE). LASER code is expressed as 4 digit number always
starting with 1. PRF on most LTDs is adjustable and must match the PRF setting on
the weapon or tracker. LTDs can be either ground (GLTD) or airborne (ALTD).
(1) GLTD ranges vary from 10 meters to 20 km, their actual ability to
designate target depending heavily on size of the target, stability of the lasing
platform and atmospheric conditions.
(2) ALTDs are carried on aircraft and provide the same function as the GLTD.
ALTDs are capable of very long range lasing and are normally employed below
30,000 ft AGL
b. LASER-Guided Weapons.
All LGWs home on PRF-coded reflected LASER energy. Some LGWs require target
designation before launch and during the entire time of flight. Other LGWs require
target designation only during the terminal portion of flight. Most LGWs require
designation until weapon impact. Typical LGWs are:
LSTs are LASER sensors that provide heads up display cueing for aircraft equipped
with these systems. While scanning for LASER energy, these systems have a
limited FOV that depends on range and switch settings. Target acquisition involves
the use of an LST carried by the aircraft and a LTD aimed by a ground team or
another aircraft. The LST is used to acquire the LASER “spot” to assist in visual or
sensor aided attacks. In general, the chances of acquisition are improved when
cueing aids such as target marks, landmarks, and INS/GPS coordinates help the
pilot point the LST in the direction of the target.
Additional considerations
For off-board LASER designation, the JTAC/FAC(A) will confirm the LASER code prior to CAS
execution. For ground-based LASER designation, the JTAC shall pass final attack headings
to ensure the attacking aircraft is in the LASER acquisition area and not the LASER safety
zones. The LTL shall be passed during the CAS mission briefing in the Remarks section. This
paragraph provides CAS-specific TTP and background information on LASER-guided system
employment.
The CAS aircrew can also confuse the LASER source with the intended target. When
employing LASERs to mark, include the call sign of the lasing entity along with the 4-digit
LASER code in the remarks portion of the CAS briefing “Blackjack LASER, code 1688”. The
JTAC/FAC(A) will use the LASER code passed by aircrew set in any LASER guided weapons
(LGWs) they briefed during the CAS check-in briefing. In the remarks section of the CAS
Brief, JTACs/FAC(A) shall provide final attack headings to ensure that the attacking aircraft is
in the LASER acquisition area and not in a LASER safety zone, and shall provide the LASER-
to-target-line (LTL) in degrees magnetic from the LASER designator operator to the target. For
LASER designation, the aircrew will provide a ten second warning to activate the designation.
Thereare into two primary categories: target acquisition, and weapons guidance.
Using a LTD to provide energy for an aircraft’s LST. Aircraft LST display provides
cueing to aircrew. . An aircrew can use the LST to visually locate the target. LTD
may be ground-based or from another aircraft. Once the aircrew locates the target,
they can conduct an accurate attack using unguided ordnance. LASER-guided
systems improve the delivery accuracy of unguided ordnance. Aircraft equipped with
LASER designators can also be “talked onto” the target by the JTAC/FAC(A), then
self-designate the target and deliver the weapon or, in some cases, confirm the
correct target with an airborne LTD.
(1) Autonomous LGW employment uses the CAS aircraft’s onboard LTD for
terminal weapons guidance. Most aircraft capable of delivering LGWs can
provide on-board autonomous self-designation. This is also called “self-
lasing”.
(2) Assisted LGW employment uses an off-board LTD for terminal weapons
guidance. This is typically accomplished by a ground team operating a GLTD
(such as a ground/vehicle LASER target designator, also known as “ground
lasing”) or another aircraft (known as “buddy lasing”). Aircraft without on-
board ALTDs that can carry and deliver LGBs require assisted LGB
employment.
Note: The PRF of LGBs is normally only adjustable prior to flight and cannot be
changed once airborne.
a. LASER Limitations
(1) LOS must exist between the designator and the target and between the
target and the LST/LGW.
(2) PRF codes of the LASER designator and the LST/LGW must be
compatible.
(3) The direction of attack must allow the LST/LGW to sense enough reflected
LASER energy from the target for the seeker to acquire and lock-on the target.
(4) The LASER target designator must designate the target at the correct
time, and for the correct length of time. If the length of time is insufficient, the
3-107 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
seeker head could break lock and the flight pattern of the LGW becomes
unpredictable.
(5) The delivery system must release the LGW within the specific LGW
delivery envelope to ensure the weapon can physically reach the target. There
is an increased hazard to friendly forces when aircrews release weapons behind
friendly positions. The final decision to release standoff LGWs from behind
friendly positions in a CAS environment rests with the maneuver commander.
LSTs must be set to the same code as the coded LTD for the user to see the target
being lased. Most missiles such as Maverick and Hellfire can be adjusted in-flight
prior to launch. In the case of airborne LSTs, the aircrew can select PRF codes for
the LST while in flight. All coded ALTDs, with few exceptions, can change codes
while airborne. The JTAC/FAC(A) will have to coordinate efforts to ensure both the
aircraft and designators are on the same code. Coordination for the LTD to match
the LGW code is conducted through the ATO, AOCC, or JTAC’s/FAC(A)’s CAS brief.
Sometimes, a LTD will serve the dual purpose of target designation for a coded
LASER acquisition/spot tracker and terminal weapons guidance for LGWs. In these
cases, the LTD, LST, and the LGW must have the same code. LASER codes are
always passed as four-digits to avoid confusion. When briefing LST-equipped
aircraft, include the four-digit LASER code and LTL in accordance with the CAS
briefing format. If aircraft check in with a different code, then it is the
JTAC’s/FAC(A)’s responsibility to make appropriate corrections. Even if the aircraft
is capable of self-designation, the JTAC should have a backup GLTD ready if it is
available.
c. Environmental conditions
(3) Battlefield obscurants. Smoke, dust, and other particulates in the air may
attenuate or reflect the LASER beam. LASER energy reflected from such
particles may also present a false target to the tracker or the munitions.
Backscatter refers to a portion of the LASER energy that is scattered back in
(5) False Seeker Lock-on. LASER seekers may occasionally lock-on to other
reflected energy instead of the target. Even in optimum conditions the seeker
may incorrectly lock onto the LTD or the atmospheric scatter present along the
LASER beam. In this case, a seeker is most likely to detect stray energy only
in the immediate vicinity of the designator. To help to minimize seeker lock-on
of the designator position due to LOS with the LTD optical port, the designator
should be masked from the seeker field of view. The designator can be masked
by terrain, vegetation, or means of a temporary screen such as blankets or a
tarp. Due to the threat of false seeker lock-on, it is imperative that JTACs
conduct follow-on correlation after a LASER hand-off has been attempted.
Use multiple LASERs and transfer the mission from an obscured LASER to a non-
obscured LASER.
Podium effect occurs when spot is blocked from the seeker. Examples are LGB
dropped on heading that will prevent the seeker from seeing the spot due to
orientation of surface of the target which is being lased. When lasing target for LGB
JTAC should carefully observe the target, determine how is the surface of the target
oriented, choose appropriate place for LASER spot and assign proper attack
heading which meets safety cone criteria and enables weapon to detect LASER spot
(over left or right shoulder). When lasing target for LGM (that can fly low or high
trajectory) JTAC should select attack heading where no obstacle will block the spot
from weapon seekers field of view during flight if it flies low (flat) trajectory.
LASER beam widens with increasing distance from the source of the beam. This is
known as beam divergence, its´ value being expressed in angular units called
miliradians (mrad). If a LTD has a beam divergence of 1 milliradian, its spot would
have a diameter of approximately one meter at a distance of one thousand meters
in front of the designator. If this spot were aimed at a three meter by three meter
box three thousand meters away the LASER spot would be as wide and tall as the
box. The LASER spot size is a function of beam divergence and the distance from
the LASER designator to the target. Reticles on most LTDs enable LASER
operators to determine size and precise position of the spot on actual target. This
knowledge is critical when placing LASER spot on difficult targets such as main
battle tanks.
(1) Overspill is caused by the LASER spot either being too large or only
partially placed on the target. Any LASER energy traveling beyond the target
may be reflected back to the weapon and cause erroneous guidance. JTAC can
prevent the spillover from happening by aiming LASER beam at the bottom of
the target, so as target works as backstop and no LASER energy travels beyond
the target. However great care must be taken to avoid underspill or entrapment.
(2) Underspill (also known as flashlight effect) occurs when LASER energy
of a LASER beam which is aimed at the bottom of the target is spilled on the
ground and on objects in front of the target, causing false or multiple spots that
may lead to erroneous guidance. JTAC can prevent the underspill from
happening by raising the beam higher on the target, however great care must
be taken to avoid overspill.
(3) Entrapment is an effect which occurs when LASER spot is aimed into
position where it cannot be detected by weapons´ seeker or LST. Examples are
threadwell of a tank or LASER being fired into open window of a building). JTAC
should carefully observe the target and consider where to place the LASER
spot, especially when lasing distant targets or targets with complicated shape
(armor, vehicles).
f. Target reflectivity.
Quality of LASER spot depends on surface of the target. There are two types of
reflections (see NU STANAG 3606/ ASRP-04 “LASER Safety Evaluations for
Outdoor Military Environments”) :
(2) Diffuse reflection occurs on rough and matt surfaces. Most LASER
energy is accumulated on the surface of the target with very little energy being
reflected, resulting in good spot. Diffuse reflection is desired during LASER
operations.
(3) Wet surface reflection lies between specular and diffuse reflection and
quality of spot is therefore unpredictable.
Spot Jitters caused by instability of the lasing platform. Spot will bounce on or around
the target. JTAC should select the most stable platform available to stabilize the
LASER beam when lasing target (lean the designator on the backpack, use tripod
etc.).
3-110 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
h. Target countermeasures.
Modern armored vehicles have sensors that can detect the LASER energy and that
are able to initiate active or passive countermeasures (such as smoke screen or
active hard/softkill countermeasures) in a fraction of a second. They may also
indicate direction of the LASER source to the crew, enabling them to rapidly acquire
and neutralize the source by fire. CAS planners should provide intel on capabilities
of these countermeasures. If these countermeasures exist JTAC should avoid lasing
directly the target and place the LASER spot next to target as close as possible.
LGBs should deliver sufficient effect on armoured vehicles even if direct hit is not
achieved. When lasing for LGMs JTAC should shift the spot onto target immediately
prior to impact.
If using LASERs (ground or airborne) to mark the target, LASER designation must
be selective and timely as lengthy LASER emissions may compromise friendly
positions.
When conducting target designation the aircrew may request a longer LASER-on
time based on munitions characteristics. If communications are unreliable, the
JTAC/FAC(A) should begin designating 20 seconds before TOT or with 20 seconds
remaining on TTT (unless the aircrew is using loft delivery). LASER designation time
with LGBs delivered from a loft profile will vary depending on the weapon being
delivered. Refer to appropriate tactics manuals for loft LASER designation time
rules of thumb.
JTACs/FAC(A)s provide aircrews with an attack heading. The attack heading must
allow LST or weapon´s seeker to acquire the reflected LASER energy. Due to the
possibility of false target indications, final attack headings must avoid the 20-degree
safety exclusion zone. The safety zone is a 20-degree wedge whose apex is at the
target, extends10 degrees either side of the LASER to target Line (LTL), and
extends from the surface to infinity. The optimal attack zone is a 120 degree wedge
whose apex is at the target and extends 60 degrees either side of the LASER
designator –to-target line.
Aircrews release or launch LGWs so the reflected LASER energy will be within the
seeker FOV at the appropriate time. The maximum allowable attack angle (LASER-
3-112 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Paveway II GBU-12 is the most common LGB used for CAS. These general considerations
may not apply to other types of LGBs. CAS planners should make every effort to familiarize
JTAC/FAC(A)s with weapons that are used in theatre of operations, their TTPs and limitations.
a. Altitudes
In order to achieve hit the bomb must be guided during terminal phase of the fall.
Designation must last at least 7 seconds, last 5 seconds prior to impact being critical.
Therefore minimum release height of the weapon should be at least 5000 ft AGL
(corresponds roughly to 7 seconds of TOF). If released from higher altitude cloud
base should be at minimum 5000ft AGL to allow enough time for weapon´s guidance
system to detect spot and steer the bomb to its´ target.
b. Winds
When LASER safety procedures and tactical situation allows LGBs should be
dropped with these preferences:
(1) Tailwind
(2) Headwind
(3) Crosswind
Those considerations may vary between types of aircraft, due to the geometry of the
weapon’s release basket. For instance for slow movers (RPAs, turboprop) the
impact angle hardly varies and tailwind release may increase the risk to drop LGBs
outside the weapon’s envelope.
(1) In the event the LASER signal is lost, the weapon will safe itself and
overfly the target. The Maverick system allows aircrew to engage targets
designated by either air or ground sources with in-flight selectable PRF codes.
(2) Delivery aircraft must have unobstructed LOS to the target to achieve
Maverick lock-on.
(3) The missile must lock on to the LASER source prior to launch.
(4) The Maverick and the LASER designator must be set to the same PRF
code prior to weapon delivery.
(5) For other than self-designation, the attack heading must be adjusted to
optimize the reflected LASER energy.
(2) The Hellfire system should use PRF codes in the range of 1111 to 1488
to achieve the highest probability of hit. UA may use PRF codes in the range
of 1111 to 1788 due to the absence of pronounced jitter resulting from the
airframe.
(3) The Hellfire system allows the aircrew to conduct multiple, rapid launches
using one or two designation codes simultaneously. UA can employ up to four
Hellfire simultaneously. The aircrew can assign missiles to search for two codes
simultaneously. The aircrew can set or change the missile PRF code from the
cockpit. If launching subsequent missiles (all set on the same PRF code) the
JTAC/FAC(A) designator shifts the LASER designator to the next target prior to
missile impact. If using two designators (each set to a different PRF code) the
missile launch interval can be as low as two seconds. The use and coordination
of multiple designators present a complex problem for the aircrew and the
JTAC’s/FAC(A)’s designator.
(4) The Hellfire missile uses last pulse logic in case of underspill and to
protect the designator. The missile will hit the most distant LASER spot within
the seeker FOV.
(5) The Hellfire is unimpeded by ceilings of 2,000 ft AGL and above. For
employment under ceilings below 2,000 ft the aircrew will vary the missile mode,
designator delay, and employment range to shape the trajectory. The rule of
thumb minimum ceiling for Hellfire employment is 500 ft AGL.
(6) The Hellfire can be employed in a lock-on before launch (LOBL) or lock-
on after launch (LOAL) mode.
(7) LOBL is when the missile seeker locks onto properly coded LASER
energy prior to the missile launch. The missile seeker must have direct LOS
with the designated target for this launch mode to work properly. LOBL gives a
higher probability of hit when the aircraft is close to the target. It is also used to
confirm the aircraft is within missile launch constraints, that the missile “sees”
the correct LASER code and target, and when the threat or environment does
not require delayed designation.
(8) LOAL is when the missile seeker locks onto the coded LASER energy
after the missile is launched and is in flight. This method allows the aircrew to
launch the missile without LOS to the target. This reduces the exposure of
launch aircraft, helps defeat LASER countermeasures by delaying the
3-114 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
designation, and extends the missile range when using a remote designator.
LOAL has three different trajectories that can be used based on required
obstacle clearance requirements and cloud ceiling limitations. They are LOAL-
Direct (lowest trajectory), LOAL-LO, and LOAL-HI (highest trajectory).
This section identifies some basic TTP used by aircrews to conduct CAS. Standardized
procedures and tactics provide a baseline for further refinement and improvement. This
section describes basic FW and RW CAS aircraft tactics. Tactics are ever changing and must
3-115 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
be adapted to the specific situation. JTACs must be familiar with these as well as advanced
CAS tactics. Aircrew will ultimately decide aircraft tactics but must ensure the tactics used fall
within any constraints issued by the JTAC/FAC(A).
a. Coordinated Attacks.
b. Type of Attack.
The type of attack is principally based solely on the avenue to the target, and does
not apply to the target itself. Example: “Combined/sequential/visual” means the
avenue to the target is shared airspace; timing on target is sequential, with the
trailing flight taking visual spacing on the leading flight’s last attacker.
“Sectored/sequential/1 minute” means the avenue to the target is sectored (using
an acknowledged sector), and timing on target is sequential with the trailing flight
taking one minute spacing from the leading flight’s TOT.
(2) The JTAC/FAC(A) must approve re-attacks (after coordination with the
ground force commander).
(3) If an aircraft enters another flight’s sector, the aircrew will immediately
notify the other flight, the JTAC/FAC(A), and deconflict or exit that sector.
(4) JTAC/FAC(A) and aircrew must coordinate munitions that may enter the
other flight’s sector before the attack.
c. Re-attacks.
The aircrew’s goal is to complete a successful attack on the first pass. Re-attacks
may be required for the following reasons: multiple targets remaining in the target
area; desired effects not created on first attack; and aircraft reconnaissance/BDA.
JTAC/FAC(A) must authorize all re-attacks. JTACs authorize re-attacks after
assessing the need for a re-attack, aircraft vulnerability to enemy fire, and probability
of success. The JTAC/FAC(A) may provide additional target marks for the re-attack
and can describe the target location using the last mark, last hit, terrain features, or
3-116 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
friendly positions. The re-attack may engage other targets within a specific target
area as long as PID is obtained or maintained by the JTAC and/or the attacking
aircraft and appropriate coordination is conducted. For any retargeting or attacks on
alternate targets, controllers must ensure the affected sorties have appropriate
munitions and fuses on board. Additionally, controllers and pilots must ensure
appropriate safe distances from friendly forces are considered for any new munitions
and fuses assigned. Due to the prevalence of mixed weapons loads,
JTACs/FAC(A)s and aircrews must ensure follow on munitions used in re-attacks
still meet the ground force commander’s intent and JTAC/FAC(A) restrictions before
expending ordnance.
Medium/high altitude tactics are flown above approximately 8,000 ft. above ground level (AGL).
High altitude bombing can be described as “bombing with the height of release over 15,000 ft.
AGL.” These tactics are employed when slant range and altitude can be used to negate local
threat systems. For visual deliveries, the local weather conditions must include sufficient
visibility and ceilings for the desired/required weapons deliveries to be employed. Terrain must
also be considered when selecting employment altitudes. More time may be available for
target acquisition, but bombing accuracy with unguided munitions may be degraded.
(1) All flight members can continuously observe the target area, marks, and
hits from other aircraft.
(7) Communications between aircrews and control agencies are less affected
by terrain.
(13) Improved ability to deconflict aircraft with altitude, in addition to timing and
lateral deconfliction measures. Potential to use more aircraft within smaller
lateral confines via an aircraft “stack”.
(1) Enemy acquisition systems can detect the attack force at long range,
allowing the enemy to prepare its air defenses.
(3) May require high weather ceilings and good visibility when using LASER
guided or other weapons requiring visual target acquisition by the aircrew (may
not be a limiting factor when the ground force commander authorizes use of
IAMs).
(4) May make it difficult for the JTAC/FAC(A) to visually acquire the aircraft.
(5) Visual target acquisition can be more difficult from higher altitudes and
slant ranges.
c. Ingress. The higher altitude of the aircraft often makes receiving situation
updates from extended ranges feasible. This enables the aircrew to build SA
prior to entering the immediate target area. JTACs/FAC(A)s may route CAS
aircraft to the target area via IPs, control points, geographic references, dead
reckoning (time, distance, and heading), or a combination of these techniques.
JTACs/FAC(A)s should use caution to not send friendly aircraft into
uncoordinated adjacent unit airspace or known areas of concentrated enemy air
defense. Multiple attack flights can be deconflicted using vertical and horizontal
separation.
(1) Racetrack: An oval holding pattern with straight legs of at least 10 miles
in length and with standard-rate 180 degree turns on each end. Bomber aircraft
may require holding between 10-40 miles from the target, with 10-15 mile legs.
(2) Figure 8:The same as the racetrack pattern except the turns at each end
of the pattern are made toward the target area and are 230 degrees of turn
instead of 180 degrees.
(3) Wheel Orbit: Circle around the designated target. Appropriate for
nonlinear battlefields with “pockets” of enemy activity.
(1) Level Deliveries: Used for guided and unguided free-fall weapons.
Release points may have bomb ranges outside of visual range. Because of the
long bomb ranges and weapons profiles, nose position may not be indicative of
where weapons will impact.
(2) Dive Deliveries: Used for guided, unguided, and forward firing ordnance,
these dive deliveries of 5 to 60 degrees. Most modern fighter aircraft delivery
systems incorporate some type of continuously computed impact point (CCIP)
display. CCIP allows the aircrew to accurately deliver ordnance without having
to fly predictable wings level passes.
(3) Dive Toss: These deliveries provide increased standoff by using aircraft
systems to compute release points similar to loft deliveries. The target is
designated in the weapon system’s computer by the aircrew at an extended
slant range with the aircraft in a dive. The weapon is then released as the
aircraft’s dive angle is decreased.
Low/very low altitude tactics are flown below approximately 8,000 ft. AGL. Low altitude
bombing can be described as bombing with the height of release between 500 and 8,000 ft.
AGL. Very low can be described as a height below 500 ft. AGL. These tactics may be
employed when threat system capabilities, weather conditions, or weapon delivery parameters
preclude aircraft operating at higher altitudes.
a. Advantages:
(1) Decreases enemy acquisition systems ability to detect the attack force at
long range, decreasing the enemy’s time available to prepare its air defenses.
(2) May be used when local air superiority has not been achieved.
(3) May be used with low weather ceilings and poor visibility.
(5) May improve target acquisition and accuracy of weapons delivery due to
shorter slant ranges at low altitude.
b. Disadvantages:
(2) Terrain avoidance tasks and formation control become primary tasks,
decreasing time to concentrate on mission tasks.
(3) Observation of the target area, the marks, and hits from other aircraft are
limited prior to the attack, which increases the difficultly of properly acquiring the
target during the attack. This difficulty can be offset by a thorough enhanced
target description, which requires more time coordinating and holding in
between attacks.
(6) Attack timing and geometry are more critical than in higher altitude tactics.
(7) Exposes aircraft and aircrew to small arms, MANPADS, and AAA.
c. Ingress. Aircrews and mission planners may employ support aircraft and
other countermeasures to degrade threat system effectiveness. Aircrews,
JTACs/FAC(A) s, and air controllers select routes that avoid known threat
weapon envelopes. Routes should include course changes to confuse and
deceive the enemy concerning the intended target area. During simultaneous
CAS with helicopter and FW aircraft, CAS aircrew must be under the control of
the JTAC to transit above or below the coordination altitude. Low altitude FW
CAS CPs and IPs will likely require lateral deconfliction with helicopter HAs and
BPs. Formations are used to complicate enemy radar resolution and improve
lookout capability against enemy fighters. Aircrews plot, brief, and study the
ingress routes to gain the maximum advantage from terrain masking. Entry
should be delayed into a heavily defended target area until the aircrew has a clear
understanding of the mission. The expected threat intensity and sophistication
influence the selection of ingress tactics. JTACs/FAC(A)s and aircrews tailor
communications and control requirements to counter the threat. Normally, control
of CAS flights is handed over to the JTAC/FAC(A) at the control point. In a limited
communications environment, scheduled missions may be the primary method
used to limit the required communications. Proper planning increases the
chances for mission success even if there is little or very difficult radio
communications after the flight becomes airborne.
for fragmentation pattern avoidance in the low altitude environment. The final
run-in from the IP to the target is the most crucial phase of the CAS mission.
Aircrew tasks intensify as the aircrew must follow a precise timing and attack
profile. The terrain dictates the type of formation flown by the attack element.
Figure illustrates the attack phase of a typical FW CAS mission.
e. Types of Delivery:
(1) Level. Deliver ordnance with a wings level pass over the target.
(2) Loft. To execute a loft delivery, the aircrew proceeds inbound to the target
from the IP. At a calculated point, the aircrew starts a loft maneuver pull up.
Once released, the weapon continues an upward trajectory while the aircrew
executes follow-on tactics or egresses the target area. After the weapon
reaches the apex of its trajectory, it follows a ballistic path to impact.
(3) Pop-up. To execute a pop-up delivery, the aircrew proceeds to the target
from the IP at low/very low altitude. As the aircrew nears the target, they pop-
up to the desired altitude and execute a level or dive delivery.
(4) Dive Deliveries. Used for both free fall and forward firing ordnance.
These deliveries typically use dive angles of 5 to 45 degrees.
NATO members and respective services utilize RW differently to include whether or not CAS
is a supported mission. Some utilize close combat attack and follow procedures and formats
that differ from the CAS brief. Prior coordination is key to integrating NATO RW assets into a
CAS mission. RW that perform CCA and not CAS should adhere to ATP-49.
d. Day versus Night. Altitudes will normally vary for the same area of
operations from day to night time, and will depend heavily on threat, weather, and
terrain. In open desert, helicopters will normally decrease their altitude as lighting
conditions decay in order to maintain visual reference with the ground. Over
urban areas, attack helicopters can often operate more safely than during the
daytime, but will elevate high enough to avoid being belly-lit by cultural lighting,
usually operating in the 1,500-3,000 ft. AGL block.
(1) Purpose. Ideally, en route tactics (route, altitude, and airspeed selection,
terrain flight profile, and formations) allow attack helicopter aircrews to avoid
concentrations of enemy air defenses, prevent early acquisition, avoid
detection, or allow the attack helicopters to remain outside of the effective range
of certain threat systems.
(2) Navigation. En route navigation tactics depend on the threat, need for
and availability of support aircraft, friendly air defense requirements, weather,
and fuel. As aircrews approach the target area, probable point of enemy
contact, or areas with a high IR SAM threat, they fly lower and with increased
caution to move undetected by the enemy. Aircrews use terrain flight (TERF) to
deny/degrade the enemy’s ability to detect or locate the flight visually, optically,
or electronically. When flying terrain flight profiles, aircrews may maneuver
laterally within a corridor or maneuver area compatible with the ground scheme
of maneuver and assigned route structures. Within the corridor, aircrews can
use a weaving or unpredictable path to avoid detection by the enemy. En route
TERF profiles fall into three categories: low level, contour, and nap-of-the-earth
(NOE).
(4) Contour. Contour flight conforms to the contour of the earth or vegetation
to conceal aircraft from enemy observation or detection. Aircrews use contour
flight until reaching a higher threat area. Contour flight is normally conducted
from 50-100 ft AGL.
(5) Nap of the Earth (NOE). NOE flight is as close to the earth’s surface as
vegetation and obstacles permit while following the earth’s contours. Terrain
and vegetation provide cover and concealment from enemy observation and
detection. NOE flight uses varying airspeed and altitude AGL based on the
terrain, weather, ambient light, and enemy situation.
Ingress tactics apply from arrival at the release point or HA until the target attack
phase begins at the BP.
(1) Control. Once the aircrew reaches the BP, the JTAC/FAC(A) or mission
commander issues final instructions to the flight. Aircrews select individual FPs
and remain masked while awaiting the TOT/TTT or the order to attack.
(2) Attack Tactics. Specific techniques used to attack a target are the choice
of the air mission commander. Choose attack tactics considering the threat,
target size and vulnerability, weather, terrain, accuracy requirements, weapons
effectiveness, and fragmentation patterns.
target with rocket and gunfire while the flight lead fires PGMs to reduce
the vulnerability of the flight.
(b) Running Fire. Running fire is performed when the aircraft is in level,
forward flight. Forward flight may add stability to the aircraft and improve
the accuracy of unguided ordnance. Running fire may reduce an aircrew’s
vulnerability to enemy air defenses by providing a moving target and by
producing a smaller signature than a hover would because of less dust
and debris. While performing running fire, aircrews can use direct and
indirect fire techniques. Aircrews deliver direct fire when they have an
unobstructed view of the target, and indirect fire when they cannot see the
target.
(c) Diving Fire. Diving fire is delivered while the aircraft is at altitude
and in descending forward flight. If delivering unguided ordnance, diving
fire may produce the most accurate results. Using diving fire the aircrew
can remain above or outside the threat envelope. Diving fire is often
employed by attack helicopters operating in an overhead position. The
overhead position allows the aircrew to maintain high SA, look down into
urban settings, maintain a constant weapons solution, and deliver more
accurate fires. The overhead pattern does leave the attack helicopters
continuously exposed to enemy fire. The altitude of an overhead pattern
will reduce vulnerability to small arms and RPGs, but increases tracking
time and reduces background clutter for an IR SAM shot. Risk versus
benefit must always be weighed by the aircrews when considering the
overhead pattern.
may not be available for the ground party, but should be used if available. If
beyond LOS communications equipment is available SA, regarding ongoing
engagements may be passed well before a bomber arrives on station to support
ground forces. Every attempt should be made to use secure communications.
b. Pre-attack.
(2) Data link. The CAOC may relay information from the JTAC/FAC(A).
(3) Orbit. B-1s typically operate in the mid to high 20s while B-2s or B-52s
can operate up into the high 30s and even low 40s. Bombers will typically look
at the target or at least verify the target location/coordinates passed by the
JTAC/FAC(A) using their onboard targeting sensors (radar and/or advance
targeting pod [ATP]) from distances as far as 40 nautical miles and as near as
5 nautical miles from the target area, depending on optimum sensor
parameters. The B-1 and B-52 use advanced electro-optics (Sniper and
Litening Advanced Targeting Pods (ATPs)) and are able to observe general
target areas from this distance, but may require LSS, IR pointer, or VDL to
positively identity targets once they turn inbound. The JTAC/FAC(A) should not
unnecessarily restrict the orbit location as IAMs may not require a traditional
track to the target. Orbit locations should be selected based on proximity to
threats and friendly locations or in the interest of maintaining the element of
surprise and avoiding aircraft visual/audible detection by the enemy-based on
ground forces assessment and recommendation. Consideration must be given
to aircraft jet engine noise abatement (day and night) and visual observation of
aircraft or contrails if ground forces are trying to maintain the element of
surprise. Generally, bombers avoiding the use of afterburner will not be heard
and very difficult to visually detect outside 5 nautical miles from the target area
when above 20,000 ft. MSL. Bombers may also have the capability to neutralize
threats while en route to the CAS orbit.
20 NM legs
Up to 10 NM turns
c. Attack phase.
(3) Urban Environment. Because bombers have a larger turn radius and
typically employ at higher altitudes, positive ID of targets in urban environments
will be more challenging. The effects of ‘urban canyons’ on target identification
can be minimized from higher altitudes and higher lookdown angles. When
using IAMs, accurate coordinate collection in urban environments is critical.
Maximum use of LSS, IR pointer, and VDL is warranted in these urban settings.
In the absence of VDL, the talk-on in such an environment (radar and/or
targeting pod) will be extensive. In all cases, careful attention must be paid to
the correct coordinates being passed. TTP for designation and marking devices
should be carefully employed to avoid erroneous coordinate collection or
grazing unintended targets with an IR pointer or LASER spot.
(5) Non-pod equipped bombers cannot attack a target with visual cues only,
but crew or formation can accept map Talk-Ons and multiple CAS briefs. The
preferred coordinate format is DD-MM.MMMM (degrees decimal minutes).
MGRS can be used but additional time from CAS brief receipt to readback may
be necessary for coordinate conversion.
Note: The B-1 can accept MGRS and latitude/longitude equally without taking
time to convert coordinates.
(8) Crews will never place radar crosshairs or targeting pod on friendly
locations while in bomb mode to avoid potential friendly fire.
d. Ordnance Employment.
(1) The bomber has the ability to attack several desired point of impact (DPI)
on a single pass using IAMs. Each DPI could be attacked with different
ordnance.
(2) The bomber can employ a wide range of weapons per pass in large
numbers if desired or they can make many passes employing smaller amounts
per pass. Bomber crews are trained to weaponeer targets real-time with tabbed
data. The JTAC/FAC(A) should pass the desired effects, target area size and
true axis or cardinal direction (if applicable) in the CAS brief remarks. If the
JTAC/FAC(A) passes the target centroid, i.e., desired mean point of impact,
coordinates for area targets, the crew will build a weapon pattern around this
point. The aircrew will confirm that the effects of the selected weapons pattern
do not violate risk estimate distances.
(2) Targeting-pod equipped bombers can provide extensive BDA due to their
ability to loiter over the target area, depending upon the threat environment.
This section identifies capabilities, planning considerations, and tactics used by UASs to
support and conduct CAS operations.
(2) Thermal Imaging Systems. Allows for day or night working in the IR
spectrum and allows for some or limited visibility through dust and smoke (Note:
thermal crossover, clouds, and thermal blooming in the target area will degrade
performance of Thermal Imagers).
(3) Near-IR passive night optics works the same spectrum as NVGs.
(6) SAR provides detailed pictures of radar significant objects and geo-
features regardless of weather.
(9) LASER- and GPS-guided weapons with high off-bore sight capability that
enables a wide field of view for target or marking acquisition.
(11) Electronic Warfare capabilities allow for enhanced sensing, detection and
prosecution of targets in the electromagnetic spectrum.
(1) UASs should follow the same procedures given by the JTAC/FAC(A) as
manned aircraft.
(4) Control at the lowest tactical level or at the command level best suited to
exploit the UAS FMV, sensors, imagery, communications, and weapons
payload capabilities.
(5) Difficult to re-task certain UAS in flight over large distances due to low
transit airspeeds.
(6) UASs require detailed integration and deconfliction for operations and
airspace. Coordination with higher and adjacent units must include UAS
operating areas and altitudes.
(8) When being supported by armed UA, the required attack profiles or orbits
needed to launch weapons have to be planned for to include the deconfliction
with other aircraft in the area, in the same manner as any other airborne
weapons delivering platform.
(9) A UAS with radio relay payloads in the UHF and VHF frequency range
can act as a low-flying, surrogate satellite. This capability allows ground forces
to communicate, in an urban environment or mountainous terrain, over long
distances using standard man-portable radios.
(10) Weather is a major consideration for UAS flight operations, particularly the
launch and recovery. Sensor degradation may occur in less than optimal
weather conditions.
(11) UASs that fly low and have a large visual signature or a loud engine noise
will alert enemy forces, or may give away friendly positions. Atmospheric
conditions must be considered in a UA’s flight profile to best utilize the aircraft
for its given mission.
(12) Some UASs are equipped with class-3 and class-4 LASERs. Planners
must ensure planning occurs for nominal ocular hazard distance if working with
ground forces or piloted aircraft as manned aircraft may fly through the LASER
unexpectedly. Additionally, ground forces may be illuminated with reflected
LASER energy or may be looking up at the UAS. Proper coordination and tactics
will minimize this risk.
(1) Briefing. The standard CAS brief and CAS check-in format is used by
UAS flight crews, however the standard control points and IP matrix used by
current high performance manned strike/fighter aircraft are usually too far away
to be of use to an armed UA due to their slow speed (60-250 knots).
(2) Orbiting. The UA will generally orbit over the target area for weapons
delivery, using the following flight profiles.
(a) Wheel Figure depicts a “wheel” orbit profile used when there is no
restriction or required final attack heading and terrain features or urban
development do not mask the target. Orbit size will vary based on
ordnance, sensor capability, and target, but a wheel orbit is typically
between 5 km (2.5 nautical miles) and 8 km (4.5 nautical miles) ground
range around the target. The orbit distance should allow the UA to
maintain PID of the target and remain in position to quickly achieve attack
parameters if terrain or urban development is masking the target during
portions of the orbit the UAS pilot may off-set to minimize masking.
(b) Figure 8.The “figure-8” track and the “racetrack” pattern may be
used when restrictions to final attack headings are required for airspace
deconfliction purposes or other considerations. These restrictions
include: friendly positions, collateral damage concerns, terrain/urban
development, or if cluttered or congested airspace precludes UAS CAS
operations.
The SOF gunship is a uniquely capable CAS platform. Due to the precision fires, control
system and sensor capabilities, ground SA, and flight profile the SOF gunship does not usually
require a Type of control, “Cleared Hot,” “Cleared to Engage,” or a JTAC to control their fires.
The SOF gunship uses the call for fire depicted below as its standard format, but is able to
accept a CAS brief for PGM engagements (AC-130W) or when pre-coordinated for gun
engagements. If JTAC/FAC(A) is on scene, the SOF gunship will work directly with them. This
section covers the TTP used by ground maneuver units and the SOF gunship aircrews.
(1) Coordination. The SOF gunship aircrew will make every effort to
establish radio contact while en route to speed acquisition of the tactical
situation and authenticate the JTAC/FAC(A) or ground party if no JTAC is on
scene.
(2) Orbiting. If no preplanned targets exist, the aircraft will normally proceed
to a designated orbit area and contact the ground party (JTAC, C2 agency, etc.)
to report on station and await tasking.
d. SOF gunship Call For Fire. SOF gunship aircrews use the SOF gunship
call for fire (see Figures In addition to the standard briefing items, the following
items are mandatory for SOF gunships: a detailed threat description, marking of
friendly locations, identifiable ground features, and the ground force
commander’s willingness to accept “danger close.” Because the SOF gunship is
capable of extended loiter, SOF gunship crews can work a series of targets with
a single ground party. In these cases, the call for fire briefing format can be
abbreviated but must include: magnetic bearing and range to the target in meters
from the friendly position to the target; and a brief description of the target.
(1) Terrain Features. Firing down an incline can cause considerable miss
distances.
(2) Burst Pattern. Consider the lethal areas of fragmentation for the various
types of ordnance (105, 40, 30, and 25 millimeter).
3-136 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
g. Parameters for Attacking the Target. The type of target, its value, the
proximity of friendly forces, and the damage already inflicted will determine the
munitions selection, type ammunition, and the number of rounds required to
successfully attack the target. Munitions selection should not be dictated to the
SOF gunships, but rather provide the desired effects.
h. Procedures. One factor that distinguishes the SOF gunship from other
weapon systems, other than precision night strike capability, is its ability to deliver
firepower under conditions of low ceilings and/or poor visibility. When employing
the SOF gunship with radar beacons, the JTAC/FAC(A) must give all target
ranges and bearings from the location of the beacon. The beacon should be
located as close as is practical to the perimeter of friendly forces. Shorter offset
distances allow for more accurate weapons delivery. For longer offset distances
first round accuracy may be reduced.
The execution of limited visibility or night CAS missions is difficult. Fundamental CAS
procedures still apply at night. However, limited visibility and adverse weather CAS demands
a higher level of proficiency that can only come about through dedicated, realistic CAS training.
JTACs, ALOs, ground units, and aircrews must routinely train together during these conditions.
In addition to training, limited visibility CAS relies heavily on systems and sensors due to the
pilot’s limited ability to visually distinguish friendly positions from targets. Aircraft and
JTACs/FAC(A)s can perform night CAS using artificial illumination or with NVDs. Specific
attack and delivery techniques vary depending on the amount of illumination, the specific
capability of the CAS aircraft, and equipment available to the JTAC/FAC(A). For these
reasons, limited visibility operations require additional coordination and equipment.
The challenges of identifying friendly and enemy locations, identifying targets, and maintaining
SA become acute in the night or adverse weather CAS environment. The entire training,
equipping, planning, tasking, and execution process must recognize these challenges.
Weapons can be delivered at night or through the weather to a set of coordinates by properly
equipped aircraft. The effectiveness of an IAM depends upon the tactical situation (type of
target, desired weapons effects, target movement, etc.) and the accuracy, or TLE of the target
coordinates (to include elevation) and the CEP of the munitions themselves. In addition, CAS
planners, JTACs, and aircrew must ensure that the World Geodetic System 1984 (WGS-84)
coordinate datum plane is used by both controller and weapon delivery platform when
employing IAMs. Datum planes should be verified prior to deployment/mission as part of
deployment/mission checklist and coordinated or confirmed with the AOCC and/or higher
echelons. Significant errors can result if different datums or excessive TLEs are used.
During night visual employment, JTACs/FAC(A)s and aircrews must contend with lower
ambient light conditions, and use battlefield fires, or artificial designation to successfully attack
targets. Threat permitting, the JTAC’s/FAC(A)’s requirement to see the CAS aircraft may
require use of aircraft lights or flares.
a. Low Ceilings. Low ceilings may force the aircraft to maintain lower
altitudes. Flares dropped below low ceilings may not produce the desired results.
Low ceilings will further complicate deconfliction between aircraft holding at
control points.
c. Illumination
(a) Distinguish the need to attack general versus desired mean point of
impact.
(3) Artificial Illumination. In most cases, CAS aircrews will be using night
vision goggles (NVGs) or Thermal Imaging equipment and will not require overt
designation of the target area. However, flare employment is essential for low-
designation night operations without NVGs. If at all possible, do not illuminate
friendly positions. Any designation introduced into the battle area must be
coordinated with the ground force commander prior to flare release.
Friendly positions, winds, and the threat will determine the position and direction of the
weapons delivery pattern. Prior to allowing aircraft to illuminate or mark a target at night,
coordinate with the commander so that precautions are made to preserve own troop night
vision or prevent enemy observation of own troop locations.
System-aided target acquisition and weapons delivery methods are relied upon more during
night and adverse weather. While these system-aided employment options can be used
independently, combining the systems increases the probability of mission success. These
systems include LASER, EO/IR (to include targeting pods), radar, GPS and/or IAMs, and
helmet-mounted cueing systems (HMCSs).
a. LASER. Night procedures for target designation by LASER are the same
as those used during daytime operations. However, adverse weather may limit
the use of LASERs. Cloud cover and precipitation as well as battlefield conditions
(smoke, dust, haze, and other obscurants) can seriously degrade LASER
effectiveness.
3-140 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
These errors increase the risk of friendly fire as the distance to friendly troops
decreases to within the TLE.
NVDs are an additional sensor for aircrews to use together with other systems to find and
attack targets. Maneuver forces and aircrews must ensure there is no confusion between
conventional and NVD terms. JTACs/FAC(A)s must be equipped with IR marking devices to
fully integrate with supported maneuver forces and exploit the potential of NVDs.
a. Weather. Target area weather can effect designation. An overcast sky can
decrease effective designation but may also highlight an attacking aircraft to the
threat, especially night-vision-capable threats. Smoke, haze, and precipitation
will degrade NVD capabilities; however, NVDs still increase the pilot’s awareness
of the battlefield.
c. Marks.
(1) IR-marking devices provide the perfect complement to NVDs and allow
the pilot to identify both friendly and enemy positions. As a result, the
combination of NVDs and IR marking devices allows safe, accurate employment
in close proximity to friendly ground forces. Particular care must be taken to
ensure that friendly location is not confused with target location.
IR beam or just a flashlight-type spot around the target may be seen. High
designation levels will decrease the effectiveness of IR marks but will not negate
them completely. During low designation conditions, the entire IR beam should
be visible to both aircrew and ground personnel with night vision devices. The
shape of the IR beam will appear narrow or pencil-like at the JTAC’s position,
while the beam will be mushroomed at the target. When working with IR
pointers, try to minimize the target designation time. This will minimize the
chance of the friendly position being compromised, especially if the enemy is
night vision capable.
(4) Artillery. Artillery marking round effects are enhanced with NVDs. The
HE/WP round is obvious upon detonation and will be visible for one to two
minutes. Burning embers may be seen up to 10 minutes after impact. Artillery
flares that provide bright visible light are not normally used for NVD operations
because they are not covert. However, IR designation rounds may be available
for use by the firing element. Smoke rounds provides smoke and burning
embers that may be seen as far as several kilometers.
(6) Aircraft Ordnance. In general, all free-fall munitions (e.g., MK 82, MK 84,
etc.) will cause an initial flash and may cause fires that are useful as marks.
Depending on terrain, these weapons will heat up the ground in the impact area
that will be detectable even in the absence of fire. This is usable as a mark for
a short period of time and can also be used for adjustments.
d. Friendly Marking.
Ground forces can illuminate their position with IR devices or other friendly tagging
devices. The current battlefield (all sides) is rife with pointing and marking devices
due to their low cost and wide availability. Ground forces should always be prepared
to provide distinguishing marker characteristics to supporting aircrew. IR lights
should be placed where aircrew overhead can visually acquire and maintain sight of
friendly positions.
(3) CAS Briefing Form. When using IR target pointer/illuminators, indicate the
target mark type in line 7 of the CAS Briefing Form with “IR” or “IR pointer.”
Additionally, include the pointer-to-target line in the remarks section of the CAS
briefing form.
(4) GLINT Tape. Ground forces with GLINT tape may be seen by the SOF
gunship low-light level television, depending on the amount of environmental or
artificial designation in the area. Identification of friendly forces by this manner
should be verified by other means to avoid misidentification. Do not use more
than a 1/2-inch square for an individual or four 1-inch squares per vehicle.
(5) Friendly Tagging Devices. Units equipped with tagging devices can use
their capability to relay latest position to C2 nodes equipped to receive and
display data. If airborne CAS forces are equipped to receive and/or display this
information, they can use this information to help confirm or update friendly
locations.
CHAPTER 4 - PREPARATION
Introduction
Preparation consists of activities by the unit before execution to improve its ability to conduct
operations including, but not limited to, the following: rehearsals, movement, and observations.
Once the plan is formulated and approved by the commander, it should be rehearsed. This
includes primary and redundant connectivity and control methodology. Observers must be
identified and their communications capabilities verified. Consideration must be given to the
methods of tactical movement throughout the battlefield. The overall observation plan should
be feasible, executable, and tactically sound. Preparation by the TACP/JTAC, fire support
assets, and maneuver staff is critical to the synchronized execution of joint fires.
Coordination between echelons and preparation that precedes execution are just as important
as plan development. Staff preparation includes assembling and continuously updating
estimates, (e.g., continuous JIPOE) with the goal of providing accurate situational updates for
commanders. Whether incorporated into a formal process or not, the staff’s preparatory
activities such as JIPOE, targeting, fire plan refinement, etc., continue throughout preparation
and execution.
Preparation includes concept of employment (COE) briefs, COE mission rehearsals, OPORDs,
backbriefs, equipment and communications checks, SOP reviews, load plan verification, pre-
combat checks/pre-combat inspections, and weapons test-fire.
4.1 REHEARSALS
The rehearsal is one of the most overlooked aspects of maneuver and fire support planning.
It provides attendees the opportunity to visualize the battle, ensure total comprehension of the
plan, promote responsiveness, and identify areas of confusion, friction or conflict that may have
been overlooked. This visual impression helps orient individuals to both the environment and
other units during the execution of the operation. Moreover, the repetition of combat tasks
during the rehearsal leaves a lasting mental picture of the sequence of key actions within the
operation. The extent of the rehearsal is limited by imagination, the tactical situation, time, and
resources available. The types of rehearsals include combined arms rehearsal and fire support
rehearsal.
Local SOPs should identify appropriate rehearsal types and techniques as well as standards
for their execution. This section focuses on the key areas that CAS participants should focus
on, be prepared to discuss/cover in the rehearsal, and leave the rehearsal understanding.
a. The Ground Force Commander’s (GFC) Intent for Fires and CAS. The
GFC’s intent for fires should include intent for CAS. During the planning phase,
the ALO should advise the GFC with respect to threat, aircraft availability, and
potential weapons loads to ensure a viable, obtainable intent is developed.
Requests for CAS should clearly describe the desired effects to meet the GFC’s
4-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
intent. AOC planners should then tailor aircraft and weapons loads to create the
desired effects. Often, there is no separate “intent for CAS” defined; however,
the GFC’s intent for fires is inclusive for all fires of which CAS is an integral part.
(10) Plan for effective use of excess CAS sorties (i.e., use of kill boxes/handoff
to another sector or /etc.).
After the rehearsal, the participants must be able to effectively communicate the
plan to subordinate personnel prior to the beginning of the operation. Specific ALO
responsibilities include providing key information concerning all aspects of air
support of the ground force commander. During the combined arms rehearsal, the
ALO or FSO will address the following:
(7) ACMs/FSCMs.
Fire support rehearsals focus on the execution of the ground maneuver commander’s essential
fire support tasks, the effectiveness of FSCMs, and the timing and synchronization of all fire
support efforts with maneuver. Fire support rehearsals serve to refine the fire support plan,
ensure understanding by all personnel in the JFSE, and confirm the feasibility of the current
plan.
The fire support rehearsal is the most critical part of the preparation phase of an operation.
The ALO/JTAC is responsible for providing key information concerning all aspects of air in
support of the ground force commander. The following areas should be covered and/or
rehearsed during the fire support rehearsal:
b. Identify and confirm that FSCMs support the scheme of maneuver and fires.
d. Verify coordinate locations for critical targets using the proper map datum.
e. Verify that each CAS target has a clearly defined task, purpose, and effect
and that targeting priorities are clearly delineated.
f. Verify trigger points for each target and target engagement criteria.
(8) Review FSCM and attack guidance matrix for CAS targets.
l. Verify likely CAS attack tactics (high/medium altitude, low/very low altitude).
(4) Conduct radio checks –COF, TACP, company/battalion TAC, TAD, air
request net, and NSFS.
o. Verify attack guidance for each target (unit[s] to fire, shell fuse combination,
number of volleys, number and type of aircraft available, and standard
conventional loads [SCLs]).
p. Verify/deconflict the movement plan specifying when and where firing units
will move:
r. FSCMs/ACMs:
(2) Formal.
(3) Informal.
(1) Review the integration / deconfliction plan of air and surface fires.
v. TOT/TTT.
(1) Type 1, 2, or 3
(4) ALO/FSO recap critical fire support, CAS, and naval surface fire events.
(7) Discuss indirect fire system position areas. CAS changes or updates
made during combined arms or fire support rehearsals should be forwarded to
the AOCC as soon as possible in accordance with established ATO planning
cycle “timelines.” Changes or updates that cannot be included in the ATO must
be passed to the aircrews as soon as possible to increase the chances of
success.
Pre-combat checks and pre-combat inspections allow personnel to prepare for a mission and
provide the leader/supervisor an opportunity to ensure the operational readiness of personnel
and equipment.
The following pre-combat checklists are a guide to help personnel to prepare for pre-combat
inspections. Pre-combat checks can be broken down into the following areas:
(2) FSCMs.
(3) ACMs.
(a) - Day.
(b) - Night.
(e) FPFs.
d. Preparation.
(b) UAS.
1/ SEAD SOP.
2/ LASER plan.
In turn, the appropriate agencies should provide the following information to the TACP:
(2) ATO breakout; assets coming to the operational area as well as operating
nearby.
4.3 COMMUNICATIONS
During the preparation phase, and often in conjunction with the pre-combat inspections,
communication links are checked and verified. This ensures that primary and backup voice
and digital systems are checked, crypto material is current, time is synchronized, and code
words, brevity codes, authenticators, passwords, and call signs are available and current.
Ensure systems are fully operational and connectivity is established. Often unit SOPs will
delineate connectivity checks (e.g., “...each station will perform a communications check on
TAR/HR on the half hour reporting in precedence order”). Additionally, any extra measures
such as day/night friendly marking procedures and visual or sound signals are practiced.
a. Nets:
(a) Company.
(b) BN.
(c) Regiment/brigade.
(a) COF.
(a) TAR/HR.
(b) JARN.
(c) TAD.
(6) LASER designators and their associated codes. Information for planning
and coordinating LASER designator use should include LASER designator
location (i.e. observation post location), LASER codes, and LASER-target line
at a minimum.
(7) Pyrotechnics.
(a) Smoke.
Movement.
The ALO ensures TACP movement is in accordance with the maneuver unit’s observation
plan. Most TACP operations require movement to forward assembly areas, observation posts,
or BPs during the preparation phase of an operation. The maneuver unit OPORD will normally
specify formations and techniques of movement. This allows the commander to position
elements where they will optimize the unit’s operational area and Facilitate execution of the
scheme of maneuver.
Positioning. The ALO recommends initial observation positions of TACPs to the commander.
The ALO and the commander must consider three aspects in the TACP positioning decision:
security, observation, and communications.
a. Security. A TACP cannot provide its own security. The TACP is positioned
within the maneuver unit’s area where it can optimize its observation capability
yet maintain its survivability and communications capability. The maneuver unit
commander considers the Factors of METT-T when selecting a position.
CHAPTER 5 - EXECUTION
Introduction.
CAS execution begins with a target nomination from the supported commander and involves
two processes that are continuous and overlapping in nature: JTAC/operations center
coordination and CAS target engagement. This chapter discusses the considerations required
for the detailed integration of CAS with the fire and maneuver of the supported unit.
The Game plan is the concise means to inform all players of the flow of the upcoming attack.
Game plan is utilized for attacks involving single or multiple attack elements and third parties.
When conducting coordinated attacks or third-party lasing, coordinated attack instructions
should at first be briefed to all players, as an SA-enhancing way to frame a complicated
engagement followed by single element game plan as appropriate.
If coordinating engagement that includes multiple players (such as JTAC, FAC (A), forward
observer, ISR assets used for marking targets, multiple flights of attacking aircraft etc.)
JTAC/FAC(A) should inform all the players about elements participating in the engagement
and the roles they will play in the planned course of action. It should be done in plain text.
It should also include information on type of coordinated attack, flow of attack and actions by
third parties.
a. Combined.
Aircraft will engage the same target. If combined, the order and separation that the
elements will use (e.g. visual, timing , altitude) should be stated.
b. Sectored.
Attack elements will engage different parts of target area. If sectored, which general
target area each element will be responsible for and what will be used to define the
sector (e.g. geographic reference, gridline)
c. Simultaneous.
All aircraft will deliver ordnance simultaneously. This method minimizes CAS aircraft
exposure to threats and minimizes the amount of time the enemy will have to react
to the attack. This is the optimum method of attacking multiple targets, especially
mobile targets that may flee once the attack commences. Primary limitation of this
method is the inability to correct or abort between impacts.
d. Sequential
Aircraft will attack one at a time with a specific interval between each aircraft. The
interval between aircraft is based on several factors including: time to acquire the
subsequent aircraft and judge nose position, time of flight of the weapon, time to
clear obscurations from first impacts, and time needed to assess effects and decide
on subsequent attacks.
Third parties contributing to attack with their ability to provide terminal guidance operations,
BDA, airspace management, marking etc include FAC(A), TAC(A), forvard observers and
spotters, UAS, and other aircraft. . Their contribution to attack should be specified in game
plan.
Third party lasing-When using an off-board element to host a LASER guided weapon, the
JTAC/FAC(A) shall include the lasing entities call sign and the LASER PRF codes for the
intended weapons in the game plan. Off-board platforms providing LASER to other elements
requires detailed coordination among all players. JTACs/FAC(A)s shall also ensure they
correlate with the lasing platform.
Individual game plan must be given to each attack element. Minimum information in the single
element game plan shall include:
d. Aircraft Interval
The CAS brief is the standard for use with FW and RW aircraft. The brief is used for all threat
conditions and does not dictate the CAS aircraft’s tactics. It consist of 9-line, remarks and
restrictions.
5.2.1 9-line
a. Line 1 –Initial Point or Battle Position (IP or BP). The IP is the starting
point for the run-in to the target. For rotary wing aircraft, the BP is where attacks
on the target are commenced (for running and diving fire) or actual firing position
(for hovering fire). IPs and BPs are usually described by name, geographic
location and description of terrain feature (if it is used as an IP/BP).
Details of IPs and BPs (such as names, coordinates and descriptions) are usually
published in the SPINS.
b. Line 2 - Heading and Offset. The heading is course from the IP or center
of the BP to target.
The offset is the side of the IP-to target line on which aircrews can maneuver for the
attack (LEFT or RIGHT).JTACs/FAC(A)s use an offset direction to ease fire support
coordination, align the aircraft for the attack or egress, or keep aircrews away from
known threats. An offset direction aids fire support coordination by restricting
aircrews from using airspace on the side of the IP-to target line where there might
be a conflict with other airspace user such as GTL. The offset direction regulates the
attack quadrant without assigning a specific attack heading unless it is assigned in
the Restrictions of the CAS Brief.
d. Line 4 -Target Elevation. Target elevation is needed for cuing sensors and
for weapon/targeting solutions for CAS platforms which require it. The target
elevation is given in feet above mean sea level (MSL). Can be given in feet height
above ellipsoid (HAE), but this must be specifically stated. Elevation is the most
difficult aspect to judge accurately. Targeting software is the most accurate
method to derive elevation; however, terrain association can generally be
accurate enough except in very steep terrain and/or in urban environments.
(2) Latitude and longitude (DMM, DMS) Care should be taken to clearly
communicate which specific format is being used as transposition errors or
misinterpretation can result in significant coordinate error and greatly increase
the risk of potential collateral damage.
Examples of lines 4 through 6 when using a GEOREF, TRP, GRG, navigational aid
or an offset:
“450 feet, personnel in square single-story building, Building 145 in sector Papa 8 of
macro GRG.”
“232 feet, tactical vehicle and personnel, 200 meters east of the intersection of Gas
Station and Baseline roads.”
“15 feet, enemy personnel in a ditch, 150 meters southeast of friendly position.”
There are rare times when a JTAC/FAC(A) is unable to provide a target elevation
and coordinate, making lines 4 and 6 a GEOREF, TRP, GRG or an offset from it. In
this case, there must be additional correlation between the attacking aircraft and
controller to confirm the actual target location. This may include verification through
Talk-On or use of VDL.
In this instance when tally/captured and if able to provide, aircrew will pass an
elevation and grid for the target. The JTAC/FAC(A) and the supporting fires approval
chain will utilize this grid for final fires integration, as a starting point for future
correlation if required, and for the BDA report. The grid passed from the aircraft to
the JTAC/FAC(A) during read backs does not require any further read back by the
JTAC/FAC(A). The JTAC/FAC(A) will respond with either “good read back” or
correlate further if there is concern over grid provided. The purpose of this TTP is to
confirm correlation of target location in an expeditious manner and ensure the
supported ground element has a record of final target location.
JTAC: Good readback. (JTAC now plots the grid, verifies friendlies locations and
sends line 8: “Be advised Friendlies are North 900 meters”
WARNING. These techniques should be used with caution due to the potential for
confusion and they do not support the fires approval process, collateral damage
estimation, and friendly fire mitigation.
(1) Whether the LASER will be used for marking of for weapon designation.
(2) The call sign of the platform/ individual that will provide the LASER
mark/designation (normally should be on the same frequency to facilitate
LASER communications during execution.
(3) LASER code. (for designation of weapons the LASER code set on
weapons must be used. This information is received during Fighter Check In –
see 5.4.9 CAS Aircraft Check-in.)
i. Line 9 - Egress. These are the instructions the aircrews use to exit the
target area. Egress instructions can be given as a cardinal direction, by using
control points or, if the operational environment allows, by stating “Egress at
pilot’s discretion.” Under all circumstances JTAC/FAC(A) must maintain SA on
aircraft’s position and altitude after egress and be able to deconflict the aircraft
from other airspace users, if necessary. Consideration should be given to provide
egress altitude as well.
5.2.2 Remarks
Remarks convey additional information important to the conduct of the CAS mission. The
following is a list of remarks that should be included in the CAS brief, if applicable. The order
of the remarks portion of the CAS brief is recommended for a standard, logical flow of
information. Only those elements that are applicable and have not previously been briefed (for
example during routing instructions, situation update or game plan) should be included.
Remarks are not required to be read back by the aircrew, unless requested by JTAC/FAC(A).
This information usually comes from the intelligence officer or ISR assets.
Information about artillery fires can be obtained from JFSE.
d. Active GTLs. Gives aircrew SA to fires on the battle field. It must be briefed,
unless already briefed during routing/ safety of flight or situation update.
Information must include:
(2) Max Ord in feet MSL (if deconflicting the aircraft by altitude) and
(1) Strong winds (expressed as cardinal direction and wind velocity in knots)
(2) Low Cloud base (in feet above ground level, if JTAC/FAC(A) is able to
estimate)
This information usually comes from JTAC´s own observation or from weather
forecast briefed prior to the mission.
This information usually comes from intelligence preparation of the battle field.
(1) IP inbound.
NOTE: These calls are usually requested after correlation immediately prior to the attack run.
h. Additional remarks.
5.2.3 Restrictions
The following information is always a restriction and must be included if applicable. Additional
restrictions are at the discretion of the JTAC/FAC(A). All passed restrictions shall be read
back.
If any friendly forces are within Danger Close distance (see 3.25.7.2 Risk Estimate
Distance (RED) for ordnance to be used, mission is considered Danger Close.
Supported commander must accept responsibility for possible fratricide by passing
his initials to the aircrew.
If there is any limitation on use of the airspace that has not been briefed during
Routing/Safety of flight (see 5.4.8 Routing/Safety of Flight –) or during situation
update (see 5.4.10 Situation Update.), it must be briefed here. However
JTAC/FAC(A) may choose to repeat this information here to enhance safety of the
flight.
Assigning TOT/TTT has a synchronizing effect on the battlefield. TOT/TTT allow for
efficient fires approval, and effective integration with fire and movement.
JTAC/FAC(A) assigns TOT/TTT to precisely synchronize attacks of multiple aircraft
or to synchronize CAS with supporting fires. Great care must be taken to make sure
all participants are on the same timeline.
JTAC: “ .................................. “ this is “..................................” advise when ready for Game Plan
(Aircraft Call Sign) (JTAC Call Sign)
Type of Control 1 2 3
After making a tactical risk assessment, commanders nominate CAS targets based on
previously planned target sets or from spot reports received during execution. The nomination
process can occur before or after aircraft arrive at the control point.
Once a ground force commander has nominated a CAS target, the JTAC/FAC(A) should
accomplish the following tasks to prepare for CAS engagement. These steps should begin
with the target and work backwards. This sequence allows the JTAC/FAC(A) to build a game
plan, CAS brief, and remarks / restrictions in a logical order. Each step, however, will affect
the others and may result in an iterative process. For instance, SEAD requirements may
influence game plan development.
Planning for a CAS attack should begin with the target and work backwards. There are five
main pieces of information a JTAC/FAC(A) needs to begin the CAS attack planning: target
elevation target description, target location, friendly location, and commander’s desired effects
on the target.
Line 5 should be a concise, accurate description of the target (e.g., “Five APCs in
the open”). Avoid using overly complicated descriptions or labels that will not be
understood by aircrew. However, JTACs/FAC(A)s should be specific with the actual
target. For example, if the commander’s intent is to kill a high value target that
happens to be inside a building at the time, line 5 should be “HVT in 2 story building”
vice “2-story building”. The target is the personnel, not the building itself.
(1) Terrain association with map –least accurate, but fast, efficient and
effective depending on the situation.
(2) LRF coupled with GPS and/or compass – more accurate than terrain
association, however still has limitations related to magnetic bearing. This
method can take longer than terrain association but may yield a more accurate
location. JTAC should plot the grid derived in his map and cross check the
expected location as poorly calibrated DMC may result in significant TLE.
The following target location considerations should be used when developing line-6:
(1) For an area target, give the location of the target’s center or location of
the greatest concentration.
(2) For a linear target, give the location of intended impact point, orientation,
and the distance to each end either in line 5 or the remarks section of the CAS
brief, if required. However ability to engage linear target with multiple weapons
in one pass is platform dependent and details must be discussed with the
aircrew prior to game plan, if JTAC/FAC(A) is not familiar with aircraft
capabilities.
(3) When the mission includes more than one target, read one standard CAS
brief with the nearest target to friendlies, then assign the additional target
locations to the other mission aircraft prior to remarks and restrictions. Make
sure to include changes in elevation (line 4) and locations (line 6) if required.
(4) For a moving target, if able and without losing SA, give a location along
the target’s route of travel along with a direction of movement and estimated
speed. Attack Aircraft and JTAC/FAC(A) must consider the direction of a
moving target (away/towards friendlies or collateral damage) when updating
lines 4, 6, 8, and restrictions. Additionally, consider any airspace/FSCM issues
that may arise, to include adjacent units/operations.
Commander’s Desired Effects determined through dialogue with the ground force commander.
JTACs/FAC(A)s should provide the commander with a realistic expectation of ordnance effects
based on the likely aircraft loadout and professional expertise. For effect see paragraph 3.19
Effects. For weapons considerations see paragraph 3.25.7 Weapons .
Once a rough location for the target has been determined and commander’s desired effects
are known, JTACs/FAC(A)s should request air support at the earliest possible opportunity due
to the transit time required for CAS aircraft to arrive on station. Do not delay the request to
refine the coordinate at this time. Extreme caution should be taken when using “generic” or
previously generated coordinates for the Air Support Request ASR. Friendly Fire events have
occurred when JTACs/FAC(A)s utilized friendly locations in the air request as initial routing
points for CAS aircraft. Friendly locations must never be utilized as the target location in the
request.
Air Support Request (ASR)Accuracy. Ideally, the controlling agency (e.g., AOCC, AWACS),
briefs the aircrew before contact with the JTAC using the information from the ASR, Section 1,
Block 8 The brief must be accurate, concise, and executed quickly. If other than WGS-84, the
map datum must be considered when determining target grid coordinates.
If there are questions regarding aircraft capabilities, ordnance, tactics etc., these should be
cleared up during CAS check in using plain language prior to passing of the CAS briefing to
avoid issuing unsupportable instructions.
The first step in developing a game plan is to determine the ground force
commander’s desired effects and, if necessary, a proposed optimum combination of
ordnance and fusing to create those effects. This assessment should also factor in
the aircraft and SCLs that will likely show up in support. Factors to consider are:
Plan for SEAD when attacking aircraft cannot avoid exposure to a threat based on
expected aircraft delivery profile and the threat‘s max effective range. Depending on
the threat system, SEAD planning may be extremely complicated and require
detailed integration with EW systems and fires agencies.
When planning IDF SEAD, the SEAD timeline should be planned to suppress
the threat from the first aircraft‘s entry into the threat‘s max effective range until
after the last aircraft‘s exit from the threat‘s max effective range. If attack
geometry does not allow for this, interrupted suppression may be utilized.
IDF SEAD and CAS may both prosecute the same threat, but consideration
must be given to obscuration caused by SEAD impacts. Effects of SEAD must
not prohibit successful CAS attacks.
(2) EW SEAD – Modern radar guided threat systems may also require EW
support in order to effectively employ CAS, requiring detailed planning and
coordination.
The optimum method of attack is chosen based on which method allows the quickest
and most effective target engagement and is dependent on: For basic
considerations on Methods of Attack see paragraph 3.9 Methods of Attack.
(5) weather.
Generally BOC method allows for shorter time to kill, as correlation is done through
readbacks.
For basic considerations on types of control see paragraph 3.10 Types of control
Type of TAC is based on several factors that include:
g. JTACs/FAC(A) should plan for allocation of the multiple sensors that may
be available for a CAS attack.
JTAC/FAC(A) must plan for the most effective way of target correlation and marking to enable
the aircrew to engage the target. Available marking assets, third party contributors, method of
engagement and aircraft and ordnance capabilities must be considered. For marking and
correlation considerations see paragraphs 3.8 Correlation and Marking 5.4.15 Correlation.
a. BOC
No mark required for attacking aircraft. Line 7 is “Negative mark” or “No mark.”
If terminal guidance is used for LGWs, line 7 will state the LASER with the associated
PRF code (e.g., “Designation by Blackjack´s LASER, code 1688”).
b. BOT
(4) BDA.
Therefore, correlation is also required with third party contributors. A third party
contributor may be used to support either BOT or BOC attacks. Examples of third
party contributors are remote observers (scout, sniper, etc.), airborne platforms that
can provide terminal guidance (LASER equipped UAS, RW, and FW platforms), as
well as airborne platforms that can generate target location information or provide
target marking.
JTACs/FAC(A)s must consider many factors when determining attack geometry and make an
educated compromise amongst these factors:
(1) JTACs/FAC(A)s must be aware of the effects of short or long hits along
the bomb-fall line or weapon-to-target line. In general, FAHs should be planned
to be as close to parallel to the FLOT as possible.
(1) For linear target sets, FAHs should generally be planned along the long
axis of the target set.
(4) Terrain – significant terrain, such as mountains, may influence FAHs due
to terrain masking targets or interfering with delivery profiles.
e. Weather
(2) Sun / moon position and angle. FAHs that force an aircraft to attack into
the sun, or a bright moon that is low on the horizon, make it difficult for aircrew
to acquire targets. This is especially true for FW diving and RW attacks. FAHs
that allow aircraft to attack out of the sun may provide increased protection from
IR MANPADS.
(6) Remarks/Restrictions
(7) Readbacks
(8) Correlation
(9) Attack
(11) BDA
Military operations in coalition environment pose great challenge to language proficiency of all
players. CAS due to it’s inherent complexity brings together players from multiple nations that
must accomplish common task. Despite all the efforts to standardize the language proficiency,
problems with language barrier may arise. Poor communications caused by frequency
interference or enemy electronic warfare may also hamper communications necessary for
execution of CAS mission. For this reason all players are strongly encourage to:
f. Use appropriate brevity terms in accordance with this publication and Allied
Standard APP-7 Joint Brevity Words whenever possible.
A brevity code is a single word or phrase that does not provide security but
shortens the message rather than concealing its content. Using brevity eases
coordination and improves understanding in tactical communications since
brevity codes have only one meaning. In periods of communications jamming,
brevity is required to “get the message across” since transmissions must be
minimized. CAS players should always use brevity for clearer and more concise
communications.
Battle staff coordination is essential to ensure that CAS is integrated with surface fires and
maneuver forces to meet the commanders intent.
a. ALO should initiate the activity within TOC, verify deconfliction plan,
activate ACA and alert JTACs/FAC(A)s.
b. Intelligence officer should verify enemy size, activity, location, unit, time
equipment (SALUTE) and update supported commander/operations officer.
d. Fire Support Officer should provide information about current fires. Alert
units providing support (marking, SEAD) and observers. Coordinate ACA
deconfliction and TOT/TTT.
Following authentication the aircrew should immediately inform JTAC/FAC(A) about his
position and altitude in order to facilitate deconfliction and routing instructions.
JTAC/FAC(A)must be prepared to deconflict assets (i.e., aircraft from aircraft, aircraft from
surface fires, and aircraft from known threats.) JTAC/FAC(A)must advise aircrew of available
airspace and desired IP/hold point locations for the attack. At initial aircraft check-in, ALO /
JTAC/FAC(A) shall respond with, in order:
Upon initial contact each controller shall at least give “maintain” instructions in order
to establish control of aircraft:
If unsure of aircraft‘s current position and altitude, JTAC/FAC(A) must request this
information prior to giving routing / safety of flight instructions in order to avoid
potential conflicts:
If using an unbriefed keyhole template for holding, the JTAC/FAC(A) must pass the
center of the keyhole to the aircraft prior to passing holding instructions.
“Latch 65, keyhole in effect, echo point is november uniform nine one eight three
five seven, proceed Alpha ten, angels 14-16”
“Latch 65 proceed Chevy-Dodge hold 13-15, you are the only aircraft on station.”
c. Immediate threats:
“Deuce 21 proceed Emily to Adder maintain below 1500’ AGL, there is a ZSU23-4
vicinity of compound 34, you are the only aircraft on station.”
e. Significant weather/terrain
“Deuce 23 proceed HA Betty, stay below 2k’ MSL en route, gun position 12 is hot, gun target
line three four zero. You are the only air on station, send your check-in”
To maintain SA to where aircraft are during routing, JTACs/FAC(A) may request status calls
from aircrew. Some common calls used to maintain awareness are:
“Report passing xxxx” Call for aircrew to verbally report passing the
specified altitude
NOTE: Bringing the aircraft immediately into the overhead is common trend in low threat
environment. Having aircraft in the overhead aids in target acquisition when using visual Talk-
On or IR pointers, however in current operations where aircraft are equipped with advanced
sensors, that enable target acquisition from distances exceeding 5 NM and with PGMs that
are generally released in distances exceeding 3 NM, holding aircraft in the overhead does not
provide any significant advantage. Tactical targets will be alerted by presence of the aircraft
and will react. Holding the aircraft with sensors and PGMs in such direction and distance that
allows for immediate start of the attack run as soon as correlation is completed significantly
shortens time to kill without hampering most correlation methods and helps to achieve surprise.
Aircraft check-in procedures are essential for establishing the required flow of information
between the CAS aircrews and control agencies. Controlling agencies should update all CAS
assets on the current situation en route to the target. Consequently, it is important for the
JTAC/FAC(A) to brief the current situation to the AOCC allowing CAS aircraft to arrive with the
most current information available.
JTACs/FAC(A)s should be directive about when they want the aircraft check-in.
There may be a reason to delay taking or abbreviate the aircraft check-in: an attack in progress,
JTAC/FAC(A) not ready to copy, or JTAC/FAC(A) waiting for aircraft to contact a different
terminal controller prior to passing the check-in.
If aircraft are on the ATO and the JTAC/FAC(A) have a copy of the ATO, the CAS asset may
check-in “as fragged” and subsequent transmissions may be minimized.
This brief may be abbreviated for brevity or security (“as fragged” or “with exception”).
Capabilities examples include, sensors, Link-16, and etc. JTACs/FAC(A)s and CAS aircrew
should strive to minimize multiple unnecessary check-ins. If the JTAC/FAC(A) is planning on
passing the aircraft to another controller, consideration should be given to waiting until talking
to the JTAC/FAC(A) that will be working with the aircraft to give the full CAS check-in.
Example: “Latch 65, Broadsword 11 will take your check-in once you contact him on Amber”
Depending on the situation, a JTAC/FAC(A) may ask for only those parts of the check-in he
currently needs.
Example: “Latch 65, hold your full check-in, say ordnance and play-time.”
3. Position and altitude: ________. (e.g., “Currently 20 nm north of Ford, block 20-21”)
4. Ordnance: ______. (e.g., “500 rds of 20mm, 1 by GBU-12, 1 by GBU-38 each aircraft,
LASER
codes Rumble 31-1688, Rumble 32-1731, instantaneous and delayed fuzing for GBU-12s
and
GBU-38s”)
5. Playtime or Time on Station: _______. (e.g., “We have 25 minutes time on station”)
6. Capabilities: FAC(A), Type of Sensors, Link-16, VDL code, SITREPs on board, map
version or GRGs, UAS Lost Link Procedures/Route: (e.g., “Rumble 31 is FAC(A) capable.
Both aircraft are ATFLIR, and CAT II coordinate generation capable. Timber Sweet, Rumble
31 VDL code 4927. Rumble 32, VDL code 4977. We have SITREP C and micro-GRG 15-
17 onboard.”)
7. Abort code: ______. (e.g., “Abort code none, Ready to copy your updated SITREP.”)
MNPOPCA–The abbreviation MNPOPCA is useful for remembering the order of the check-in.
“Holding in 86CG9”
d. Ordnance. Flight lead should state number and types of weapons per
aircraft. If aircraft are carrying different weapons load it must be clearly stated.
Information should include:
(3) Number of rockets. If aircraft is carrying rockets that can deliver other than
kinetic effects (illumination, smoke) it should be clearly stated.
(4) Number and type of missiles (with LASER code, if LASER guided)
f. Capabilities. If not stated by the aircraft, the following items may be asked
for by the JTAC/FAC(A).
(1) Sensor type and capability (type of targeting pod, NVG capability).
During the CAS check in briefing, the flight lead gives the JTAC/FAC(A) a
challenge code for use with the flight lead’s flight only. The JTAC/FAC(A) refers
to the authentication document, finds the reply, and notes but does not transmit
it. The reply ‘letter’ becomes the “abort code.” If no abort code was briefed, then
the CAS attack is aborted by simply transmitting: “ABORT, ABORT, ABORT”
The JTAC may elect to use a single abort code for all aircraft under his control in
situations where multiple flights of aircraft with multiple abort codes would be
problematic. In such cases the JTAC/FAC(A) needs to state this nonstandard
procedure during the situation update and establish the code.
If the JTAC/FAC(A) is unfamiliar with any of the aircraft’s capabilities, they should ask
questions in plain language at this time in order to avoid developing and issuing unsupportable
instructions.
Note: Abort Code (challenge) must be read back by JTAC/FAC(A) to the aircrew upon
completion of the check in.
After aircraft check in is received JTAC/FAC(A) must brief supported commander on CAS
aircraft capabilities related to ground commander’s intent for CAS. This information may
include playtime, weapons available, sensors, capabilities and other information deemed
necessary for the supported commander to make decision how to use CAS most efficiently.
The situation update brief is a tool used to increase all players’ SA to the level required by the
tactical situation. The objective of the situation update is to build the oncoming aircrew’s SA
to the level necessary to conduct the expected mission. The brief must be missionized based
on the JTAC’s/FAC(A)’s expectations of the use of the CAS asset. Two example techniques
for the situation update brief are below:
Situation Update Example 1
(TTFACOR)
- Define who has which elements of brief, stack, mark, and control
*- If not already prebriefed, a game plan for the approval of fires should be
passed for BHO.
Remarks and - Additional radio calls that will be - Additional radio calls that will be
Restrictions included for the whole TOS included for the whole TOS
- Hazards (WX) or other remarks stack, mark, and control should occur
CAS: “Current surface-to-air threat is a SA-6 at KJ 123 456, just west of MSR Tampa; target
is light armored company attempting to flank us to the north and two companies dug in three
klicks to our west, break.”
“Friendlies are two companies in the vicinity of OP 2, one on the high ground and the other
in a blocking position to the east. I am with the company on the high ground. There is also
a Recon team at the northwest tip of Black Mountain, arty is firecapped at Firebase 5E, firing
generally west, break.”
“Savage 13 has control. Plan on using your GP bombs to disrupt the light armor. Winds on
the deck are 10-knots out of the west. Savage is LASER and IR capable, advise when ready
for gameplan.”
- Should include all friendlies that may be a factor during time on station
(TOS),
- Include all CAS assets, ordnance, and TOS remaining for BHO.
Artillery - Indirect fire assets that may be a - Firing unit location, call sign,
Authority - If there may be confusion due to multiple voices on tactical air direction,
roles should be clarified: “Savage 13 has control and is located in the
COC, my FO call sign E4B is located with Charlie company, and is up this
net.”
- Define who has which elements of brief, stack, mark, and control.
- If not already prebriefed, a game plan for the approval of fires should be
Hazards -obstacles for low flying aviation (towers, masts, high voltage powerlines,
high ground, places where birds gather,…)
Remarks and -Additional radio calls that will be - Additional radio calls that will be
included for the whole TOS.
Restrictions included for the whole TOS.
- JTAC capabilities (LASER,
infrared sparkle, video downlink, - Hazards (weather) or other
etc.) remarks.
-Other remarks
CAS:
“Enemy is light armored company attempting to flank us to the north and two companies
dug in three klicks to our west, break.”
“Friendlies are two companies west of Phase Line Maple, I am with the southern element.
There is also a Forward Observer team, CS Steelrain 15 located 1km east of PL Maple on
high ground north of MSR ,break.”
“Artillery will provide SEAD and marking, expect separation by time. Arty position WQ 101
235, GTL 350°, Max Ord 5500ft AMSL, break.”
“Savage 13 has control, expect type 2 and 3 controls. I am VDL, LASER and IR capable.
Steelrain 15 has eyes on target, is LASER and IR capable and will provide terminal
guidance, break”.
“ Winds on the deck are 10-knots out of the west, visibility 5+ expect light rain shower.
Advise when ready for game plan.”
The length and depth of the situation update must be balanced with the need to pass game
plans and CAS briefs in order to create timely and desired effects. Not all elements must be
passed to all aircraft. Situation updates that are read too quickly, are excessively long, or pass
unnecessary information waste time and decrease SA. JTACs/FAC(A)s should break up the
situation update into manageable transmissions. A situation update that is rattled off to
aircrews that are just arriving into a dynamic scenario will most likely not be copied. For
example, in a situation where the JTAC is in a ‘troops in contact’ situation, has requested air,
has done thorough coordination with the fires approval chain, and is simply waiting on aircraft
to check-in to execute a BOC attack, the situation update would be relatively short. On the
other hand a JTAC/FAC(A) giving a situation update to an aircrew who is preparing to conduct
urban overwatch of a friendly patrol may require a more detailed brief.
If time and tactical situation allows JTACs/FAC(A)s should pass their update to appropriate
C2 element (such as higher echelon TACP, AOCC) who will pass it to the attack aircraft to
alleviate the need for the JTAC/FAC(A) to pass a full situation update. Situation updates may
be given alphanumeric codes. Upon initial check-in with the JTAC/FAC(A), aircraft should state
the code for the situation update they have received. Changes to the situation update may be
passed by the TACP as aircraft check on station. If appropriate, JTACs/FAC(A)s may pass
specific AO situation updates as well.
The situation update is also a format recognized for battlefield handover between terminal
controllers (i.e., JTAC to JTAC or FAC(A)). The format should be adapted to the mission and
only those items required to accomplish the expected mission should be passed. Passing
redundant or nonessential information increases time-to-kill and should be avoided.
NOTE: If there are questions regarding aircraft capabilities, ordnance, tactics etc., these
should be cleared up using plain language prior to passing of the CAS briefing to avoid issuing
unsupportable instructions.
When conducting coordinated attacks or third-party lasing, the coordinated attack instructions
should at first be briefed to all players followed by single element game plan as appropriate.
Using the term “in order” establishes the order the aircrew should respond to the
JTAC’s/FAC(A)’s calls, establishing good communication cadence. This cadence order should
match the order the JTAC/FAC(A) is planning on executing the attack.
Example: “Latch 65 and Venom 11, in order, advise when ready for game plan”
(1) Combined.
(2) Sectored.
(3) Simultaneous.
(4) Sequential
b. Third party contributors to CAS mission, their roles, call signs and
frequencies.
Example: “Razor 55 and Deuce 23, we have JFO call sign Steel 13, he is on
this net. He will provide Talk-OnTalk-ons and BDA. Razor 55 advise when
ready for game plan”
Example: “Latch 65 and Venom 11, we have MQ-1 on station at FL 120, call
sign Reaper 44, he has eyes on target and will provide LASER handoff.
Advise when ready for game plan”
Each attack element must be given a game plan. Minimum information in the
single element game plan shall include at minimum:
“Deuce 21, Type 1, guns only, advise when ready for CAS Brief”
“Venom 15, Type 3, bomb on target, I need all BRDMs and enemy personnel in
the vicinity destroyed, advise when ready for CAS Brief”
NOTE: When requesting LGMs JTAC/FAC(A) should clearly state who will provide
designation to avoid confusion between possible LASER hand off and actual
designation:
“Silvo 21, Type 2, bomb on target, 1x GBU-12 self lased, advise when ready for
CAS Brief”
When briefing Game plan JTAC/FAC(A) should avoid repeating information that will be given
in other parts of the CAS brief.
The JTAC/FAC(A) should read the first element’s entire game plan, CAS brief, and remarks /
restrictions prior to the second element’s game plan, CAS brief and remarks/restrictions in
order to maintain good communication cadence.
By giving the coordinated attack instructions first, all aircrews should be paying attention to the
game plans and CAS briefs given to other elements. If all elements are attacking the same
target (combined attack), the JTAC/FAC(A) has the option of issuing a CAS brief to the first
element, and simply issuing changes to the CAS brief for the second element.
When briefing coordinated attacks, the JTAC/FAC(A) may state “Hold all readbacks” in the
remarks portion of each CAS brief so the JTAC/FAC(A) transmits briefs for all elements prior
to receiving readbacks. The JTAC/FAC(A) should then request readbacks when he is ready.
The JTAC/FAC(A) may also get readbacks immediately following the attack briefs to each
element if this better fits the JTAC’s/FAC(A)’s habit pattern.
Elements of a CAS Brief will not be passed piecemeal over several minutes and out of
sequence. JTACs/FAC(A)s must read the CAS Brief at a moderate pace. Information that is
read too quickly increases confusion and delays time to kill when it is required to be said again.
The first 9 lines require the line header to be read before data for that line is passed. Units (if
applicable) may be included. These lines should be read at least in 3 transmissions of three
lines each.
CAS brief should be prefaced by: “Aircraft call sign, advise when ready for CAS Brief”.
JTACs/FAC(A)s should ensure they are ready to pass the CAS brief prior to asking the aircraft.
Line 2 - Heading and Offset. The heading is expressed in three sequential digits in degrees
magnetic (unless requested differently by the aircrew).JTACs/FAC(A)s give an offset (offset
left/right) if a restriction exists.
Line 3 - Distance. For fixed wing aircraft, the distance is given in nautical miles and should be
accurate to a tenth of a nautical mile. For attack helicopters, the distance is given in meters
from the center of the BP and is accurate to the nearest 100 meters.
NOTE: Lines 1-3 shall not be omitted („Lines 1-3 N/A“). Instead JTAC/FAC(A) shall state „Lines
1-3 from the overhead.“. If keyhole template is used, lines 1-3 may be expressed as „Lines 1-
3 AB@7”(Start the attack 7NM North East).
Line 4 - Target Elevation. The target elevation is given in feet MSL, unless requested
differently by the aircrew. It shall be read as sequential digits.
Line 5 - Target Description. The target should be described accurately and concisely using
plain language. If target sorts are required, they should be given later as part of amplifying
information so as not to disrupt the flow of the CAS brief.
Line 6 - Target Location. The JTAC/FAC(A) provides the target location in 3 specific manners:
“Location-six digit grid to follow: Three-three Uniform, Victor Quebec, one- two-three
(pause), four-five-six.
“Location North four niner degrees, one five, decimal one one two minutes, East
zero one six degrees, four five decimal eight one one minutes.”
“Location North four niner degrees, one five minutes, three five seconds, East zero
one eight degrees, four five minutes, one five seconds.”
“200 meters east of the intersection of Gas Station and Baseline roads.”
a. Geographic location where the aircrew can start looking for target in MGRS,
L/L coordinates or known point (TRP, GRG reference point)
c. Estimated speed
“Heartless 21, Punisher 99, the target is a single tactical vehicle in the vicinity of Papa Uniform
123 … 456, traveling Northeast along route Michigan at approximately 50 kilometers per hour.”
Note: Lines 4 through 6 will not be combined into one statement such as “Lines 4
through 6, from your system” or “Lines 4 through 6, from the talk-on.”
Line 7-Mark Type/Terminal Guidance. Specify what type of mark JTAC will use
(smoke, LASER, or IR). If using a LASER, the JTAC/FAC(A) will also pass the LASER
code that will be used. If LASER code on weapons is not selectable from the cockpit,
JTAC/FAC(A) or third party contributor providing designation must set the LASER code
that was reported during CAS check in. If third party (such as UAV, Forward Observer,
another aircraft) will provide target marking or designation, call sign of the third party
must be provided (unless already provided in the game plan).It must be clearly stated
if LASER will be used for marking or also for target designation.
“Mark None”
“Mark IR Pointer”
Line 8 -Friendlies. Cardinal/subcardinal direction from the target (N, NE, E, SE, S,
SW, W, or NW) and distance of the closest friendly position from the target in meters
Only those elements that are applicable and have not previously been briefed should be
included.
5.4.13.1 REMARKS:
“Threat is SA-6 on grid WQ 123 456. It will be suppressed by arty, expect continuous
SEAD from TOT minus 2 till plus 2, GTL 158 degrees magnetic.”
“Expect small arms fire, MANDPADS reported by the intel, location unknown.”
“Artillery position Delta is active, GTL 225 degrees, Max Ord 9000ft MSL.
f. Hazards to aviation.
Other
5.4.13.2 RESTRICTIONS.
The following information is always a restriction and must be included if applicable. Additional
restrictions are at the discretion of the JTAC/FAC(A). All passed restrictions shall be read
back.
e. TOT/TTT
While technically a timing ACA and a restriction, to indicate the end of the
restrictions/remarks portion, TOT/TTT should be last. If the TOT/TTT has not been
assigned yet, “Standby TOT/TTT,” or “TOT/TTT will be issued after correlation”
should be used.
Before assigning TOT to the aircrew JTAC/FAC(A) must conduct time check
to make sure all players are on the same timeline.
Example: JTAC: “Hawg 53, time check follows: minute 34, seconds 15,16,17,18”
NOTE: When using frequency agile or encrypted radios there is an inherent 1-2
second delay in transmissions, therefore tolerance of 2-3 seconds in time check is
generally considered a good check.
(3) TOT/TTT assigned after correlation - For a BOT attack that may require
lengthy correlation, JTACs should consider waiting until after correlation is
complete to assign the TOT. This alleviates multiple TOTs being passed due to
correlation taking longer than expected.
Examples:
(5) “Push when ready” vs. “Immediate” – There may be times when issuing
a TOT is unnecessary and aircrews may proceed on a timeline of their
discretion. JTACs/FAC(A)s should use the terms “Push when ready” in this
case. The word “Immediate” in relation to TOT infers a level of urgency that
may result in task-shedding on the part of all players. “Immediate” TOTs should
be reserved for when that level of urgency truly exists.
If the aircrew are not be able to make the specified TOT/TTT, they must tell the
JTAC what TOT/TTT they can make, so the JTAC/FAC(A) can begin the
approval process for that TOT/TTT, vice the JTAC/FAC(A) making multiple
guesses as what TOT/TTT the aircrew will be able to make.
5.4.14 Readbacks.
The aircrew shall read back all mandatory readback items, ie:
a. Line 4 (Elevation)
b. Line 6 (Location)
If the readback is not correct the JTAC/FAC(A)must restate the portion in question correctly
and request additional readback:
“Deuce 21 correction, final attack headings 1-8-0 through 2-1-0, read back!”
NOTE: For BOT attacks the flight lead will provide readbacks, unless directed otherwise
by JTAC/FAC(A).
For BOC attacks all aircraft delivering ordnance shall provide readbacks of lines 4 and
6 from aircraft navigation kit or from the weapon. The aircrew must state that they are
providing system read back from system or weapon.
“From my system (weapon): elevation 1650 feet, position 33U, WQ 12345 67890, friendlies
West 500.”
If the JTAC/FAC(A) does not receive readbacks from all aircraft, but desires them, he should
continue to request those readbacks required to positively control the attack.
For BOT attacks where no grid was provided in line 6, if capable, the aircraft should include
the target location during the read back to provide situational awareness to other members of
the CAS stack, the fires clearance personnel and to aid the JTAC/FAC(A) in the BDA report.
5.4.15 Correlation.
The process by which the JTAC/FAC(A) coordinates and confirms that the attacking aircraft
and/or a third party contributor have acquired the correct target or mark. Correlation is required
on each and every CAS attack. For basic considerations see paragraph 3.8 Correlation and
Marking For considerations about use of LASER see Chapter 3, section XI LASER operations.
Once the JTAC/FAC(A) is comfortable the aircrew have acquired the correct target,
the JTAC/FAC(A)shall transmit “The xxxx is your target.” Aircrew shall respond with
“TALLY (target/object)” or “CAPTURED (target/object)”as appropriate.
JTACs/FAC(A)s should strive to include what the target is in this statement, such as
“The third vehicle is your target” or “The individual north of the road is your target.”
Simply saying “That‘s your target” is ambiguous and must be avoided. If the
JTAC/FAC(A) determines that there was significant potential for confusion during
correlation, he may ask the aircrew to provide an updated coordinate for the target
once it has been acquired. In order to avoid “ping-ponging” of coordinates the
JTAC/FAC(A) is not required to readback this updated coordinate. The
JTAC/FAC(A) should plot the updated target location given by the aircrew and
ensure that it satisfies required geometry. Requesting updated coordinates is not
required, and doing so must be weighed against delaying effects on target.
(target/object)
Specified surface target or object has been acquired and is being tracked
with an onboard sensor.
CAPTURED
Aircrew does not have the ground object, reference point, or target in
LOOKING
sight. Opposite of CONTACT.
The following paragraphs outline procedures for conducting correlation using different
correlation techniques and marking plans:
5.4.15.1 Talk-On.
The objective of a Talk-On is to correlate a specific target or target area between the
JTAC/FAC(A) and the CAS aircrew through verbal description to a level of fidelity such that
the terminal attack controller knows the CAS asset has acquired the target. The JTAC who
effectively executes Talk-On techniques while considering the CAS/FAC(A)s asset’s
visual/sensor perspective for a BOT will likely be able to successfully execute expeditious and
complete target correlation prior to the CAS attack. Exact brevity and language to conduct a
talk-on is dependent on the situation and perspective of the JTAC/FAC(A) and CAS aircrew
and targeting systems available to each. The JTAC/FAC(A) must consider the following basic
elements that will affect talk-on effectiveness:
d. Target area relief. Vertically develop terrain creates lot of dead ground
hindering observation from ground position. Controllers must use graphics to
overcome this limitation.
(3) Through estimation with naked eye- the least accurate method.
As the JTAC/FAC(A) considers the CAS asset’s perspective, also consider whether to use
large target area features to cue to smaller features or a more narrowly focused initial search
patterns to expedite target correlation. The decision as to which technique to use is dependent
on such Factors as:
c. Aircraft INS.
d. GRGs/operational graphics.
Following figure articulates the elements of a target area which should be considered in
determining what visual aspects of a target would be most remarkable and effective. For
example, the vertical relief of a structure will be more apparent from the ground terminal
controller’s position than from an overhead FW aircraft. However, low flying RW aircraft are
more likely to perceive vertical relief. The following figure applies to general perspectives as
they relate to target descriptions during a talk-on. It is most useful when at least one of the
assets is not aided by a multispectral sensor or video downlink. JTACs should select the most
prominent structure/feature nearby for initial orientation between themselves and the aircrew.
Aircraft
System
Delay
The JTAC/FAC(A) may elect to conduct a talk-on cued by larger features if CAS aircraft or
terminal controller sensors (optics, NVDs) or systems are either not available or degraded, and
precision targeting systems are unavailable. In all cases the starting point would be a feature
of the target’s surroundings, which based on perspective, is identifiable to both the
JTAC/FAC(A) and CAS aircrew. This is often referred to as an “Anchor Point”. From this
feature a gradually more detailed description would begin, ultimately resulting in proper
correlation to the intended target.
When coordinating a talk-on, the JTAC/FAC(A) should be specific about which type of talk-
on he will be using, i.e. visual, map, GRG, VDL, etc. The JTAC/FAC(A) should also be specific
about when he switches from one type of talk-on to another. For example, a JTAC/FAC(A)
may begin a talk-on using a GRG, but transition to a visual talk-on once a common frame of
reference has been established. When using GRGs, TRPs, geographic references etc., it is
essential that both the JTAC and aircrew have a common understanding of the product or
feature being used.
“Latch 65, advise when ready for a GRG talk-on using the version 4.8 GRG.”
JTACs/FAC(A)s should consider the best way to begin the talk-on. Generally visual talk-ons
should be conducted “big-to-small.” Sensor talk-ons in an urban area may, on the other hand,
start by orienting the aircrew‘s sensor to a specific intersection or recognizable building in order
to ensure a common starting point.
Talk-on descriptions and directions should be simple and short, “driving” the aircrew‘s eyes
from one point to another. A technique for doing this is to give directions in the following format:
a. Visual Talk-On
The aircrew may establish an anchor point when they are confident that they
are looking to the target area. When establishing an anchor point the aircrew
must choose feature that JTAC can identify using his mission graphics, if he
does not see it from his position.
When anchor point is established, JTAC/FAC(A) and aircrew will establish unit
of measure. Distances in meters are hard to estimate for the aircrew from higher
altitudes, therefore using meters as unit of measure for visual Talk-On is not
desirable and must be avoided. Unit of measure is usually established as
distance from an anchor point to another easily identifiable feature.
(3) FIDO
When anchor point and unit of measure are established, JTAC/FAC(A) can start
leading aircrew’s eyes using technique called FIDO:
NOTE: When conducting visual talk-ons JTACs may use linear terrain
features to orient aircrew to cardinal directions. Even if those linear
features do not line up exactly with a cardinal direction, establishing them
as “north/south” or “east/west” may aid in the talk-on.
(d) Object seen (target or object the JTAC wants the aircrew to see).
(a) When possible, JTAC/FAC(A) should lead pilot’s eyes along linear
terrain features (such as roads, railways, edges of wood, demarcation
lines between fields of different color etc.) rather than moving across
terrain.
(d) Unit of measure may be changed during Talk-On (when agreed with
the aircrew) when moving at greater distances.
Note: Use confirmers around target/object to ensure aircrew are in the correct
area.
JTAC: “Razor 53, from the Cubby-hole, proceed south across MSR Michigan to
the first building and call contact”
JTAC: “Razor 53, that building will be called the bank, from the bank go two
buildings east and call contact on a building with a courtyard in the middle”
A 2 and 1 ratio should be used when conducting talk-ons, give two directive
statements, then ask a confirming question of the aircrew.
When transitioning from a map or GRG talk-on to a visual talk-on, the JTAC
must be aware of the limitations of his perspective. The JTAC/FAC(A) should
not ask the aircrew to describe features that the JTAC/FAC(A) cannot visually
see.
Once the JTAC/FAC(A) has talked the aircrew onto the correct target,
correlation should be completed by verifying the aircrew is looking at the correct
target. This should be done by asking specific questions about the target that
are unique and distinct. Examples include:
“How many individuals are on the north side of the lead vehicle?”
When the JTAC/FAC(A) and aircrew are both VDL equipped, a sensor talk-on
provides good certainty as to what the aircraft is looking at.
For ease of JTAC/FAC(A) use, aircrew should strive, within a section, to select
downlink frequency with at least 30 megahertz separation. This will allow the
JTAC/FAC(A) to rapidly switch between aircraft downlinks within a section while
not dealing with bleed-over from the other aircraft.
Details about sensor Talk-On can be found in Annex F, chapter G.3 Execution.
Most aircraft downlink video feeds provide symbology, including sensor aim point
reticle, target location and elevation, and aircraft position and elevation.
JTACs/FAC(A)s should strive to be familiar with general symbology, but if they
are not, may query aircrew regarding the display. Some aircraft systems are also
capable of transmitting metadata that allows aircraft position and Sensor Point of
Interest (SPI) to be overlaid on the map feature of some VDL receiver systems.
When using the term ”slew” to directively move a sensor, JTACs/FAC(A) should
use up, down, left, and right instead of cardinal directions to avoid confusion. VDL
Talk-On should drive the sensor directively from one point to another to avoid
excessive slewing.
The use of TRPs or a GRG (an urban grid) requires some degree of
communication. If aircrews are operating without any of the above preplanned
control measures, then disciplined voice communications (cadence, clarity,
brevity) will be critical. Even with preplanned or unplanned control measure
graphics, JTACs/FAC(A)s should select the most prominent structure nearby for
initial orientation between themselves and the aircrew. The time to pass a brief
and then pass talk-on type remarks will decrease as the level of pre-mission
planning increases. Whereas it may take 5-10 minutes for a detailed talk-on
using only a 1:12,500 city map, it may only take 2-3 minutes given a photograph
or line-art urban grid.
d. RADAR Talk-On.
When the talk-on is complete, the aircrew should derive target location from the
highest resolution radar scale possible to reduce scope-induced error.
An enhanced target description “paints a picture” in the mind of the aircrew (some aircrews
actually make a sketch of target and it´s vicinity) as to what the target area will look like as they
ingress and describes where they will find the target. It must be tailored to match the viewpoint
and perspective of the attacking aircraft as they approach the target area on the final attack
heading (i.e. JTAC/FAC(A) must “rotate” the description so as it matches not his, but aircrew´s
view).
When conducting low level attacks, JTAC/FAC(A) should use for ETD vertically developed
features (such as masts, towers, tall buildings and trees etc.), because they will stand out
better than the horizontally developed ones (intersections, roads, bodies of water etc.). If
conducting attacks from higher altitudes, horizontally developed features may be used
effectively. Aircrews look for targets with their eyeballs and not with sensors, therefore use of
colors during ETD may aid in target acquisition.
d. Reference (clearly identifiable feature) or a mark that the pilot should see
near the target.
Frequently, an enhanced target description will begin with a map or GRG talk-on
and then provide amplifying information including features that are not on the chart.
Enhanced target description is usually transmitted by JTAC/FAC(A) after the CAS attack brief
has been read back and prior to the attack run. Because the JTAC is describing what the
aircrew will see and not what he is currently looking at, the aircrew shall not call “contact” as
the JTAC/FAC(A) is describing the area.
JTAC/FAC(A) should break down the ETD into multiple transmissions and deliver only one
information at the time in order to allow the aircrew to process the information gradually into a
mental picture. Pilot shall acknowledge every transmission with “Roger”. When JTAC/FAC(A)
transmits all elements of ETD, he shall state “ETD Complete”. Pilot shall respond with “Roger
ETD”. JTAC/FAC(A) may request the aircrew to repeat the information to be sure that it has
been received correctly.
Example:
Aircrew: “Ready”.
JTAC: “Your target is 3 BMPs on paved road East- West oriented, spacing about 50 meters.
Aircrew: “Roger”
JTAC” That road the vehicles are sitting on is a demarcation line between green field North
and brown field South”.
Aircrew: “Roger”
JTAC: “During your attack run you will see a white water tower in western part of a village, it
looks like a ball on a stick, it will be reference point”
Aircrew: ” Roger”
JTAC ” From the water tower, NW direction, 800 meters, is your target- three tanks in the open.
End of ETD.”
Aircrew: “Wilco”
Note: Prior to commencing the attack run the aircrew must validate the information received
in ETD matches the expected target area details using their maps. If in any doubt, the aircrew
should pull from JTAC additional information in order to maximize the chance to hit the target
during first run as reattacking a target that has been alerted by an unsuccessful pass may
increase exposure of aircraft to enemy air defenses.
When the aircraft commences attack run JTAC/FAC(A) should communicate to the aircrew
details of the target area as they will appear on the ingress (big-medium-small) to help the
aircrew to acquire dominant terrain features and lead their eyes from the most dominant terrain
features(big) through smaller (medium) to target (small). When sighting the features being
described by JTAC/FAC(A), the aircrew will respond “Contact”. JTAC/FAC(A) will lead aircrews
eyes from objects that the aircrew sees using direction and distance.
JTAC/FAC(A) must be prepared to give direction and distance from objects not previously
described in ETD that aircrew reports they see in the target area during attack run, such as
marks of opportunity or other terrain features. For example if JTAC described the water tower
in the village as reference point and the aircrew during attack run instead reports “Contact
burning village”, JTAC/FAC(A) must have sufficient SA to provide direction and distance to
target/target area. “From there- North East, 2 kilometers is the village with white water tower
in western part, call contact”.
If no specific Final Attack Heading was assigned, or if Final Attack Heading cone is wide open,
cardinal/subcardinal directions should be used when leading pilot’s eyes from one point to
another.
If FAH attack cone is narrow JTAC/FAC(A) can use clock code to drive pilot’s eyes from one
point to another. Aircrafts´ direction of travel/FAH is in this case considered 12 o´clock.
Distances are easier to estimate from lower altitudes, therefore distances should be expressed
in meters or kilometers, as there is no time to establish common unit of measure.
IDF, direct fire, or aviation fires may be employed specifically as marks for CAS aircraft. Marks
of opportunity, such as battlefield fires or smoke not specifically employed for CAS may also
be used. Aircrew will generally use a combination of sensors and visual lookout to acquire
these marks.
Consider the timing of the mark. JTACs/FAC(A)s may coordinate a mark to arrive on deck 30-
45” prior to an assigned CAS TOT, or they may coordinate a mark earlier to take advantage of
aircraft sensors while the aircraft is holding at an IP or HA. This technique gives the aircrew
more time to discern hard to find targets before the attack run, but sacrifices surprise.
For BOT attacks using IDF, direct fire, or aviation fires as visual marks that are deliberately
synchronized to arrive 30-45 seconds prior to CAS TOTs, there is minimal time to conduct
correlation. For these types of attacks, correlation is satisfied by the JTAC/FAC(A)s providing
an accurate correction from the visual mark once observed, “Razor 53, from the mark, east
50.” Transmitting “mark is on the deck” is not required.
Aircrew shall call “contact the mark” to advise JTAC/FAC(A) they are meeting the requirements
of BOT and allow him to make correction from the mark.
When using direct fire weapons to mark, the JTAC/FAC(A) must consider when the mark will
be visible to attacking aircraft. FW aircraft will most likely only be able to acquire direct fire
impacts using their sensors from inside traditional IP distances. If the threat allows,
JTACs/FAC(A)s should coordinate moving them to the overhead to aid in visual acquisition.
JTACs/FAC(A)s must also be aware that the presence of multiple direct fire assets on a
battlefield could lead to confusion.
If the IDF, direct fire, or aviation fires mark falls out or is unusable, the JTAC/FAC(A) must
weigh the risk of continuing the attack. JTACs/FAC(A)s should have a plan to deal with a mark
fall-out. This may involve flexing to a back-up mark, using a mark of opportunity, or aborting
an aircraft or the entire attack. In addition, attacking aircrew may call contact of something
besides the intended mark. JTACs/FAC(A)s must be able to quickly weigh whether to use the
object the aircrew is contact as a new mark.
If something other than the mark referenced in Line 7 is being used for cueing, it should be not
be called ”the mark”, it should be called by a different label, i.e., “lead‘s hits,” “the black smoke,”
etc.
The JTAC must ensure that the aircraft is in a position to acquire the target end of
the IR sparkle. This may require bringing FW aircraft into the overhead, or pushing
RW aircraft forward from the HA. Depending on the target and the attacking aircraft
profile, this may require a target acquisition run or may be conducted on the attack
run.
Depending on target size and composition, JTACs may need to cease sparkle to
avoid the IR energy washing out the target. When attacking tactical size targets, the
attacking aircraft may be able to see the target end of the IR pointer, but unable to
acquire the target. In this case, aircraft should make a “contact sparkle” call
indicating they are able to discern the target end from the friendly end of the IR
sparkle, but unable to make out the exact target. Prior to receiving weapons release
authorization, aircrew must call “VISUAL” and either “TALLY” or “CONTACT
SPARKLE” when ground forces employ IR sparkle.
JTACs/FAC(A) must be aware that using their IR sparkle may expose them to NVG-
equipped enemies. Ground IR sparkle should not be left on for excessive amounts
of time.
b. Sparkle Walk-on.
When the tactical situation prevents the JTAC from using a ground based IR sparkle
(dead batteries, broken equipment, concealment from enemy observation,
excessive skip/overspill, etc.), a sparkle walk-on may be used to orient the aircraft’s
sensor to the target. The JTAC observes the aircraft’s IR sparkle and directs the
aircrew to move their IR sparkle using cardinal/sub-cardinal direction and distance
slew commands until the aircraft‘s IR sparkle overlays the target.
If holding at an IP, aircraft may need to proceed inbound in order to acquire the
target on their sensors.
Do not use “left, right, up, down” when conducting a sparkle walk-on.
the aircrew. In addition, since aircrew are splitting time between looking outside and
their sensors, it is extremely difficult to precisely measure direction and distance
over the ground when slewing the IR sparkle. JTACs/FAC(A)s must be careful not
to give directions that cause the IR sparkle to continually bracket back and forth
across the target: “Latch 65 slew north 100” “Latch 65 slew south 100” “Latch 65
slew north 100”. If JTACs note this occurring they should reevaluate their direction
/ distance estimations and use limiting features.
When the aircraft‘s IR sparkle overlays the target the JTAC/FAC(A)s should direct
“Aircraft call sign, Steady.”
JTAC completes correlation by confirming what the aircrew sees where their IR
sparkle is.
JTACs/FAC(A)s may also request that aircrew sparkle the target as they ingress
during the attack run in order to provide additional confirmation.
c. Match Sparkle.
When matching IR sparkles, all players must be disciplined in call sign usage to
avoid confusion as to who is to “Sparkle on” or “Cease Sparkle.”
JTACs/FAC(A)s should ensure that prior to attempting to match sparkle, the aircraft
is in position to allow observation of the sparkle they are to match. This may require
pushing FW aircraft into the overhead, or allowing RW aircraft forward of the HA or
BP. JTAC/FAC(A) verifies own IR sparkle is pointed at the correct target.
JTAC: “Aircraft call sign, proceed into the overhead and advise when ready to
match sparkle”
Note: JTAC/FAC(A) should echo calls to his IR sparkle operator (if applicable) prior
to responding to the aircrew. The JTAC/FAC(A) may have to direct the sparkle
operator to shift to ensure the correct target is marked.
JTAC/FAC(A) may initiate match sparkle if required. When aircrew reports ready,
JTAC/FAC(A) turns on IR sparkle and transmits “Aircraft call sign, match
sparkle”.
JTAC/FAC(A) should then observe the aircraft‘s IR sparkle move to overlay the
ground IR sparkle.
Once the aircrew’s pointer is on the correct point, the JTAC/FAC(A) confirms what
the aircrew sees there.
Note: In some cases, the ground-based pointer can “wash-out” the aircraft‘s pointer.
In this case the JTAC should cease the ground-based IR sparkle in order to confirm
the aircraft’s sparkle is on the appropriate location. JTAC should transmit the
informative call “Broadsword 11 ceasing sparkle.”
Note: RW IR sparkle will often not be steady on the target due to vibration of the
aircraft.
Note: JTACs should be aware that since current aircraft thermal imagers are unable
to sense IR sparkle, aircrew must compare what they see outside the cockpit to what
their sensor is centered on during correlation.
If aircrew reports ”no joy” or indicates problems with skip / overspill that preclude
locating the target:
CALL MEANING
STEADY Stop oscillation of IR pointer. (JTAC steadies the beam after a SNAKE
or PULSE call. This can aid in verifying that the aircrew is looking at the
proper IR pointer.)
CEASE Discontinue sparkle activity. (JTAC turns the beam off. This can aid in
SPARKLE verifying that the aircrew is looking at the proper IR pointer, especially if
followed with a SPARKLE call.)
ROPE Circling an IR pointer around an aircraft to help the aircraft identify the
friendly ground position. Caution: This technique may damage night
vision devices.
MATCH Overlay requested target designator type. (Directive term for a second
SPARKLE party to overlay an IR mark on an existing mark.)
CAS aircraft that can transmit APTD allow the JTAC/FAC(A) to see where the aircraft is and
the aircraft’s designated sensor point of interest if the JTAC/FAC(A) is properly equipped.
If a target has been published as a Link-16 track file, aircraft sensors will be cued to the
approximate target location. A talk-on will still be required to correlate the exact target.
LASER hand-offs may be conducted as part of a target acquisition run after readbacks, or as
the aircraft are ingressing on the attack run.
JTACs/FAC(A)s must be directive in order to ensure proper LASER safety geometry is adhered
to when executing a LASER hand-off. This is especially crucial when aircraft are in the
overhead, since if aircraft are on the far side of the overhead from the designator, there is
potential for the LST to track the designator. Holding aircraft in the overhead for LASER handoff
should therefore be avoided. Inbound headings should be provided for LASER hand-off and
should be interpreted by the aircrew as mandatory to avoid false lock-on.
Instructions should be assigned for the LASER hand-off and may be passed as part of remarks
/ restrictions. The directions/headings that are used for the hand-off may be different than the
final attack headings. In this case, the headings used for the target acquisition pass should
not be called final attack headings.
Example: “Final attack headings 150-170, LASER target line 220, after readbacks expect
to proceed inbound heading 230-260 for the LASER hand-off, standby TOT”
“Latch 65 proceed inbound heading 230 to 260, stare 1688 Papa Uniform 123 456”
Note: JTAC/FAC(A) may restate LASER target line as part of this transmission if comfort level
dictates.
Note:When JTACs use a dedicated co-located LASER operator, ensure the operator is trained
to respond to internal TACP communication brevity calls for LASER operations
The JTAC shall ensure continuous lasing until the aircrew directs “Aircraft call sign, spot,
cease LASER.”JTAC shall direct “Cease LASER” to the LASER operator.
Once the aircrew has called “Spot, cease LASER”, the JTAC shall confirm the aircraft‘s
sensor was cued to acquire the correct target.
Note: The terms “spot” and “capture” are not synonymous. JTAC should not cease LASER
until directed by aircrew (common sense and judgment apply). In situations where it is
apparent that a “cease LASER” call was not made or missed, the JTAC should query the
aircrew with “Aircraft call sign, status”. Otherwise, the aircraft may lose the spot before setting
a designation. Due to designator jitter, LASER overspill, LASER underspill and battlefield
obscuration, the LASER spot acquired by the aircraft may be slightly off the intended target.
Target verification through verbal confirmers is still required to confirm the correct hand off.
Note: After an LST handoff, JTACs/FAC(A)s should avoid going “back out” to use big to small
confirmers, as this will likely induce confusion and unnecessarily increase time to engage.
However, due to spot jitter, overspill and underspill, a JTAC should “back out” as much as
necessary to confirm the exact target acquired. In a congested target environment, it may be
necessary to “back out” some in order to confirm that the aircraft has acquired the exact
intended target and not a nearby similar target.
Many factors influence whether airborne platforms are in a position to receive properly coded
LASER energy (angle of incidence, reflectivity, power out, environmentals, etc.).
Re-initiate LASER hand-off procedures. If unsuccessful and unable to resolve, choose another
mark.
CALL MEANING
SHIFT (direction/ TN) Shift LASER aimpoint. Note: Can be used to shift from offset
position onto the target. Also used during multi-aircraft attack
to shift LASER energy or target assignments
STARE (w/ LASER code Cue the LASER spot search/ tracker function on the specified
and reference point) LASER code in relation to the specified reference point.
Reference point may include the following: steeropint,
geographic reference, bearing and range, or data link point.
JTACs equipped with thermal LASER spot imager or see-spot devices may correlate by
directing the aircrew to lase the target with their LASER designator. On vertically developed
targets, the aircraft LASER must be on a surface that the JTAC can observe.
After correlation is complete, and before the attack, any questions that remain must be
answered. If, during correlation, either the aircrew or JTAC/FAC(A) realize that an element of
the CAS brief should be changed in order to facilitate a successful attack, it should be
discussed. Additionally, other information necessary for the attack may not be decided until
correlation is complete and should be discussed in plain language between the JTAC/FAC(A)
and aircrew prior to beginning the attack. Examples of this include:
e. Fusing.
JTACs/FAC(A)s must remember to issue the TOT/TTT if it has not already been issued and
confirm mission with their fires approval chain.
JTACs/FAC(A)s may also need aircrew to state the type of delivery profile they will execute in
order to allow the JTAC/FAC(A) to plan appropriately.
If JTAC/FAC(A) requires the aircrew to make additional radio calls prior to or during attack that
he did not mention in the Remarks section of the CAS brief, he may request them after
correlation prior to attack.
5.4.16 Attack.
Throughout a CAS attack, the JTAC/FAC(A) must maintain awareness to the aircraft position,
the friendly situation, and the objective area.
Changes to the friendly situation must be monitored to ensure their fire and movement will
remain integrated with the CAS attack timeline. If changes occur, JTACs/FAC(A)s must weigh
their ability to continue, shift, or abort the attack based on the attack timeline. For instance, if
SEAD is required, the JTAC/FAC(A) must know the SEAD timeline so that he can shift the
CAS TOT if the SEAD is late. The earlier these adjustments can be made, the greater the
chance of mission success.
The JTAC/FAC(A) must also maintain awareness to the objective area for the timely
recognition of changes, such as target movement and/or entrance of non-combatants and
civilians.
TAD discipline. The TAD net can become very congested very quickly. All players on a TAD
net must use “active listening” and appropriate communications discipline and cadence.
Ultimately, the TAD belongs to the JTAC/FAC(A), and the JTAC/FAC(A) must control it by
voice.
Once an aircraft calls “In” all other calls should be held until after the JTAC/FAC(A) has issued
weapons release authority or abort. An exception to this is that anyone can and should call an
abort at any time they deem necessary.
Once the clearance requirements for a particular type of control are met, it is important to pass
clearance in a timely manner to give aircrews time to prosecute the attack before release
parameters have expired. A wide variety of ordnance is available and suitable for CAS
missions. Mixed weapons loads on aircraft or between flight members will require the flight
lead and the JTAC/FAC(A) to coordinate different delivery patterns. When employing standoff
munitions or delivery methods, the JTAC/FAC(A) must provide a timely clearance appropriate
for the weapon being delivered. For example, medium-altitude attacks can result in weapon
releases more than four nautical miles from the target. Weapons release authority grants
JTACs/FAC(A)s the authority to provide the following to attacking aircraft:
CALL MEANING
CLEARED HOT Type 1 and 2 close air support terminal attack control clearance to
release ordnance on this pass.
CONTINUE DRY Continue present maneuver, ordnance release not authorized. Used
to provide approval to aircraft to continue the pass without expending
ordnance during Type 1, 2, or 3 control. (Joint terminal attack
controller must use “Type 3, CONTINUE DRY” for dry Type 3
control.)
CLEARED TO Type 3 control clearance. Attack aircraft or flight may initiate attacks
within the parameters imposed by the JTAC/FAC(A). (Joint terminal
ENGAGE attack controller must use “Type 3, CONTINUE DRY” for dry Type 3
control.)
WARNING
The word CLEARED will only be used when ordnance is actually to be delivered. This will
minimize the chances of dropping ordnance on dry passes, further reducing the risk of
friendly fire incidents. Nonstandard calls must be avoided at all times.
The JTAC/FAC(A) shall direct CAS aircrews to abort if they are not aligned with the correct
target, and must abort them if it appears that friendly troops may be endangered, or for the
safety of the CAS aircrew.
During wartime, most CAS aircraft have been shot down by threats they were not aware of.
The JTAC/FAC(A) can contribute greatly to the mission’s success by suppressing threats,
briefing the CAS aircraft on the threats, and monitoring for threats during the attack. During
CAS mission execution, the JTAC/FAC(A) should endeavor to monitor the attacking aircraft to
the maximum extent possible. The JTAC/FAC(A) will be in an optimal position to observe
surface to air threat activity. A missile launch observed from the ground has high line of sight
and a smoke trail with a clear sky background. From the air, a missile tracking on the aircraft
will have very little line of sight and have a cluttered background. Because of this, the JTAC
should make every effort to observe the attacking aircraft and be ready to alert the pilot to
surface to air activity.
When targeted by a surface-to-air threat, the CAS aircraft will execute defensive maneuver s
to allow him to survive long enough to egress the threat envelope. The type of defensive
maneuver will depend on the type of threat.
When a SAM is launched against a CAS aircraft, the pilot will execute a break turn
and dispense chaff and flare in an attempt to foul any radar and decoy if it is IR
guided. The maneuver is designed to force the missile to fly a longer flight path, thus
using up energy and ultimately causing it to overshoot and miss the aircraft. In the
case of a SAM launch the JTAC/FAC(A) should immediately transmit, “(Aircraft call
sign), SAM LAUNCH” followed by the launch location in relation to the aircraft or in
a direction from the target. Example: “Winder 61! SAM LAUNCH NORTH OF THE
TARGET AREA.” Do not delay the call since the time of flight of the missile may only
be several seconds and time is critical.
When fired upon by AAA, the pilot will maneuver the aircraft, changing altitude and
heading in a 3-dimensional maneuver, called a “jink,” to defeat the bullets already
fired by the gunner and complicate further firing solutions. This also causes an
increasing slant range, which decreases the gun’s accuracy. The pilot may also
dispense chaff to decoy any radar that is providing aiming information to the gun. If
air defense artillery (ADA) is observed in or around the target area then transmit,
“JINK, TRIPLE A” followed by the firing location in relation to the aircraft or a direction
from the target area. If the JTAC/FAC(A) can observe the aircraft and the ADA and
believes the aircraft are in imminent danger, then transmit, “Winder 61, JINK,
TRIPLE A NORTH OF THE TARGET AREA.” JTACs/FAC(A)s should preface the
call with the aircraft’s call sign that is under attack. If the JTAC has the situational
awareness, the call should be directive and then descriptive. Tell the aircraft what
to do and then tell him why. JTACs/FAC(A)s should continue to update the aircraft
until the aircraft is out of danger. Once the aircraft is out of immediate danger, the
JTAC/FAC(A) should update the aircraft’s egress instructions. If the threat pops up
prior to weapons release and the tactical situation permits, the JTAC/FAC(A) should
abort the attack prior to issuing directive communications.
JTAC: "Winder 61, you are clear of the guns, continue with your egress, back
to MAZDA, block 13-14."
Once ordnance impacts the target, the JTAC/FAC(A) must assess whether the commander‘s
desired effects were created. This assessment will determine whether to continue the attack,
abort sequential attacks, or set up a re-attack. Obscuration may preclude effect assessment
for several minutes. JTACs should weigh the need for follow-on attacks with the need to
preserve ordnance until an assessment can be made.
Re-attacks allow CAS aircraft to quickly reposition to attack the same target, and while
maneuvering, maintain compliance with any restrictions in force. A re-attack by CAS aircraft
under Type 1 and 2 control may be requested if additional fires are required on the target;
aircraft under Type 3 control are free to re-attack as long as their “Cleared to Engage” is in
effect. In a high-threat or non-permissive environment, aircraft may be unable to make multiple
passes due to enemy defenses. The JTAC/FAC(A) issues approval for immediate re-attack
and remains aware of any threats to the aircraft. As was required in the initial attack, clearance
to drop/fire on a re-attack must be issued by the JTAC/FAC(A) before ordnance release.
Corrections and new restrictions can be given to the aircrew during maneuvering. If ordnance
adjustments are required, they must be given in a timely manner. Corrections are given in
cardinal direction and distance in meters from the previous weapon impact point. In the
following example a correction is being given to the second attacking aircraft in the flight -
based on flight lead aircraft’s impacts (e.g., “Razor 02, from lead’s hits, north 100”).
If re-attacks are required, the JTAC/FAC(A) must determine if there is a need for a new game
plan and also determine whether a new CAS brief is required.
If the re-attack is against the same target, the JTAC/FAC(A) should state “Call sign, continue
for a re-attack, restrictions remain the same”
If the re-attack target is in close proximity to the previous target, the JTAC/FAC(A) must ensure
the aircraft is correlated to the new target, but does not require a whole new CAS brief.
JTACs/FAC(A)s shall also ensure that previous restrictions are still applicable to re-attacks,
and change them if necessary.
Accurate and timely BDA leads to a more accurate operational picture of the current enemy
order of battle, which helps the C2 system correctly dictate asset flow and allocation
JTACs/FAC(A)s must ensure that BDA is accurate, and should not overestimate BDA, or report
BDA that they cannot observe.
BDA reports may be passed throughout the time on station or prior to aircraft egressing, and
should be given for a flight, not individual aircraft.
Whenever possible, the JTAC/FAC(A) provides attack flights with the BDA of their attack as
they egress. The JTAC/FAC(A) gives BDA for the flight, not for individual aircraft in the flight.
BDA must also be passed to intelligence and controlling agencies as soon as possible. The
JTAC/FAC(A) should not assume the target is completely destroyed because the enemy may
employ deception. The JTAC/FAC(A) should provide a “SALTR [size, activity, location, time,
remarks]” report to the appropriate C2 agency to determine if further assets are required.
Develop and maintain a log of all BDA. The log should contain the following elements:
a. mission number,
b. call sign,
c. target coordinates,
g. recommendation.
The INFLTREP can be used to report other tactical information of such importance and
urgency that if the aircrew were to wait for a normal post-flight debriefing the information might
no longer be useful. This might include the presence of SAMs, AAA, or radar warning receiver
indications or numbers of remaining targets. Send the INFLTREP directly to any ACS agency,
the supported unit, or via any available relay. Message recipients may add additional
information and forward via another INFLTREP. INFLTREP information is incorporated in all-
source intelligence reports.
JTACs/FAC(A)s are responsible for providing routing and safety of flight instructions to aircraft
as they egress. This provides safe passage for exiting aircraft, and allows JTACs/FAC(A)s to
maintain a picture of their CAS stack and positions of assets. Routing should include a point
and an altitude block that provides deconfliction from other aircraft and fires.
e. Air Defense Officer should inform friendly AD that air is off station and
adjust weapons control order.
When aircraft are tasked to conduct ISR, and there is not an immediate need to conduct CAS
attacks, the following caveat to the execution template may be used.
a. Routing/safety of flight.
ISR While ISR is being conducted, JTACs/FAC(A) should remain engaged with
aircrew and update tasking and sensor allocation as the tactical situation develop.
This step may continue into correlation if the aircrew discovers a target.
When it appears likely that a CAS attack will be required, JTACs/FAC(A)s should be
proactive in executing the steps discussed in section a “JTAC Actions for Developing
CAS Brief” to develop targeting data, game plan, CAS brief, and restrictions.
Developing this information early will allow JTACs/FAC(A)s to issue a preemptive
CAS brief, remarks, minimizing time to kill once the attack has been approved.
If aircrews are the first to gain SA to a target, the JTAC should request target
coordinate and elevation from the aircrew. Depending on the type of attack planned,
the coordinate and elevation passed from the aircrew does not need to be derived
through a dedicated coordinate generation pass. For BOT employments, the
coordinate and elevation are used by the JTAC/FAC(A) for target location
verification and clearance of fires. However, if the attack is planned as a ROC for
the original aircraft or other CAS assets, the coordinate and elevation must be as
precise as necessary to meet ground force commander’s intent. If in doubt, the
aircrew should query the JTAC/FAC(A) as to the level of precision required.
d. Game plan.
e. CAS brief. If the aircrew were the first to gain SA to the target, the lines 4
and 6 passed should be the same as provided by the aircrew during ISR.
f. Remarks / restrictions.
g. Readbacks. If the aircrew were the first to gain SA to the target, readbacks
will be in accordance with Appendix E, “Example of Close Air Support Missions,”
Example 13. An aircrew can acquire a target and derive targetable data (lines 4,
5, and 6) for JTAC/FAC(A) while conducting CAS, ISR, escort, and other
missions. After verifying the target data provided by the aircrew, the
JTAC/FAC(A) will provide the same aircrew with a CAS briefing using the target
data provided by the aircrew. The transmission of the target data by the
JTAC/FAC(A) is considered the mandatory readback and is the responsibility of
the aircrew to confirm readback was correct.
Note: This situation only applies if the aircrew that provides the target data is the
same aircrew that is provided the CAS briefing by the JTAC/FAC(A).
h. Attack
j. BDA.
In emergency circumstances, the ground force commander might require air support when a
JTAC/FAC(A) is not available or is no longer able to provide assistance, but detailed integration
with friendly forces fire and movement is still required. Aircrew executing CAS under these
circumstances bear increased responsibility for the detailed integration required to minimize
friendly fire and collateral damage, tasks normally done by a JTAC/FAC(A). In these
Due to the complexity of air support, the aircrew and supported commander must consider the
increased risk of friendly fire and civilian casualties when using personnel who are not
JTAC/FAC(A) qualified. The requester must notify/alert his command element when a
JTAC/FAC(A) is unavailable to conduct terminal attack control and/or assume control of
supporting CAS assets. If the maneuver commander accepts the risk, the request is
forwarded to the CAS controlling agency (AOCC, JFACC). This information will alert the CAS
controlling agency that aircrew will be working with non-JTAC/FAC(A) personnel.
Execution.
Ground personnel requiring air support will normally be able to provide much of the information
needed to complete the CAS brief. CAS aircrew shall draw the following information from the
ground personnel:
a. Target elevation.
b. Target location (grid, lat/long, direction and distance from reference point,
etc.).
d. Any target marks that the ground personnel are able to provide (smoke,
direct fire, LASER, IR pointer, etc.).
f. Any restrictions that the ground force commander feels are necessary or
situational awareness the aircrew needs to prosecute the target safely (presence
of civilians or other friendly troops, etc.). Aircrew should be prepared to develop
their own restrictions they believe are necessary for the safe prosecution of the
target to include final attack headings in order to ensure the friendlies and civilians
are safe from the effects of all fires.
Aircrew shall achieve positive target correlation through a sufficient dialogue or question and
answer method with the ground personnel while understanding that the ground personnel are
not specifically trained in target correlation methods.
Aircrew should direct the ground personnel to use the brevity term “Abort” if any unsafe
situation develops during the attack. Aircrew in this situation will make a timely effort to involve
a JTAC/FAC(A) in the situation; be prepared to “pull” information from ground personnel to
complete the attack brief; and exercise vigilance with target identification, weapons effects,
friendly locations, and execution of the final attack/abort procedures.
(1) Provide final attack clearance in accordance with Type 1, 2, and 3 control.
b. Radio Relay
(1) Provide a communication link due to LOS for the JTAC and supported
unit.
(2) Provide a communication link between the supported unit and aviation
C2system.
(3) Provide a communication link between the JTAC and RW CAS assets.
c. Reconnaissance
e. Asset Coordination/Deconfliction
(3) Put targeting information into CAS brief format, tactical situation
dependent.
(4) Pass targeting information (CAS brief, SOF gunship call for fire, SPINS
specified formats).
It is important for the FSE, JTAC and FAC(A) to rapidly determine responsibilities for execution
and expedite CAS procedures in a tactically safe manner. The three objectives of the FAC(A)
are:
The FAC(A) must understand the tasking and duties set forth by the JFSE and JTAC in order
to accomplish them autonomously and reduce the work load required of the JTAC. Absence,
or misidentification, of the tasks and duties for the FAC(A) during planning and/or execution
will likely result in delayed CAS operations. It is important to note that these duties can change
at any time during the time on station for the supporting FAC(A), at the discretion oft he TACP.
Should TAC duties be divided between the JTAC and FAC(A), the element who has the
authority to provide final weapons release permission must be clearly stated. This will alleviate
any confusion during the critical phase of employment. JTACs and FAC(A)s should use the
following brevity terms to quickly communicate duties, and shall positively echo any
responsibilities passed:
a. BRIEF.
The FAC(A) will automatically pass information such as operational area updates,
available CAS briefs, BDA, etc. to CAS assets within the operational area, as well
as copy CAS asset check-in information. The FAC(A) will keep the JTAC updated
on the situation, but will allow them to focus on other duties. It is not uncommon for
some aspects of the brief to be passed, while the JTAC retains other aspects, e.g.,
a JTAC could task the FAC(A) to check aircraft into the operating area and then
pass a current situation update, while retaining the attack brief or CAS brief. The
JTAC will be as specific as necessary, using plain language, to clearly identify the
JTAC’s desires to the FAC(A).
b. STACK.
The FAC(A) will deconflict all CAS assets from surface fires within the operational
area, as well as provide deconfliction for assets upon check-in. Deconfliction will
include HAs, ingress and egress routings, and target areas. The FAC(A) will keep
the JTAC updated of the situation as required, allowing the JTAC to focus on other
duties. The JTAC must keep the FAC(A) updated on any changes with FSCMs/IDF
operations. Further coordination should take place between the JTAC and FAC(A)
if any specific axis or holding points are desired for following missions that the JTAC
wishes to undertake.
c. MARK.
The FAC(A) will provide target marks for CAS attacks. It is critical that the FAC(A)
and JTAC coordinate whether or not the JTAC will issue a clearance via Type 1, 2
or 3 for the FAC(A) to release a mark. A CAS brief is not required to be provided for
a FAC(A) mark, as it could significantly increase time to kill, however care should be
undertaken to achieve proper target confirmation prior to issuing release authority.
If the FAC(A) is provided the authorization to release airborne marks autonomously
by the JTAC, at a minimum the FAC(A) shall still telegraph intentions by
communicating an IN for the MARK call prior to releasing ordnance, allowing the
JTAC to abort the autonomous mark if tactically necessary. Talk-Ons are considered
a mark for this tasking. The FAC(A) will bring aircraft forward with deconfliction
established and threat permitting, in order to provide Talk--Ons to targets associated
with passed CAS briefs/areas of interest.
d. CONTROL.
The FAC(A) will provide final release authority to attacking aircraft if delegated this
authority by the JTAC. As always, the JTAC retains abort authority. There is no need
to use the term “Joint Control,” as it is ambiguous. The JTAC should always back up
the FAC(A) if tactically feasible, and be ready to assume control if the FAC(A) is
unable to obtain the proper position for a Type I control, given a dynamic tactical
scenario requiring significant aircraft maneuvering. In this case, the FAC(A) should
clearly communicate intentions to the JTAC as soon as possible, to allow the JTAC
the ability to assume terminal control. In the case of a FAC(A) receiving control
authority, similar to autonomous marking, the FAC(A) can release ordnance by
effectively controlling him/herself, if prior coordination takes place with the JTAC.
However, in this scenario the FAC(A) should exercise utmost care to perform all
necessary measures to mitigate risk of friendly fire and, at a minimum, the FAC(A)
shall telegraph intentions by communicating an IN call prior to releasing ordnance,
allowing the JTAC to abort the FAC(A) if tactically necessary.
With this enhanced knowledge of the overall game plan, the FAC(A) will be better
prepared and able to support the ground commander. Other information to be
passed to FAC(A) should be any present or developing target areas. If the JTAC
has CAS briefs available, complete or incomplete, they should pass as much to the
FAC(A) as the tactical situation allows. Routine “nice to know” information for a CAS
asset should be considered and passed as “need to know” information for a FAC(A),
as it may become critical for effective execution as the tactical situation changes.
While the emphasis is usually placed on the “control” in FAC(A), recent combat experience
has shown that the most important utility in having a FAC(A) overhead may lie with the mission-
essential tasks, other than terminal control, that the FAC(A) can provide to the supported
commanders. The FAC(A) may be given TAC or, by focusing on the other mission essential
tasks (radio relay, reconnaissance, calls for fire, asset coordination/deconfliction, BDA, target
marking, designation, coordinate generation, and SEAD), may become the critical link that
allows a JTAC to provide weapons release approval. In recent counterinsurgency operations,
TAC has been a low-percentage task for the FAC(A)s, whereas the requirement for the
coordination aspects of the FAC(A) mission have increased. The requirement for the FAC(A)
to seamlessly assume control and coordinate with the ground commander for fires approval
and weapons release authority during terminal attack operations has not diminished. The
increased role of the FAC(A) executing the coordination missions allows the FAC(A) to act as
a facilitator between agencies maintaining and expediting the kill chain. As the TACPs and
JTACs operate at greater distances from the supported ground maneuver units, the
requirement for aircrew to be well versed in the finer details of CAS has increased. Whether
delivering sophisticated ordnance in close proximity to friendly troops, dropping new classes
of weapons through increasingly complex airspace, or operating as part of the air-ground team
against an enemy mindful of collateral damage and political impact, the FAC(A)s must bring to
bear all of the knowledge and equipment necessary to best contribute to the commander’s
success on the battlefield.
The responsibilities of the JTAC and the FAC(A)s must be determined prior to the attack.
These responsibilities may include coordination with maneuver elements, attack aircraft
briefing, target marking, airspace deconfliction, SEAD execution, and who provides final attack
clearance.
a. Communication Techniques.
Communication often becomes complex, with a FAC(A) and numerous CAS assets
on station simultaneously. Several options and techniques are available to maximize
the use of verbal communication, while preserving radio time for critical weapons
release authority, mission approval, and passing information.
Establish two or three separate frequencies for CAS coordination and execution.
One will serve as the primary AO/ALO frequency on which all CAS target-attack
missions may be passed and coordinated, and final weapons release permission
may be passed. All players including the JTAC, FAC(A), and CAS aircraft should be
on the frequency. This frequency will normally be the TAD net assigned to the JTAC.
The auxiliary frequency(UHF or VHF) can be used as a coordination frequency
between the AO/ALO, JTAC, and the FAC(A) to pass administrative details, situation
updates, new targets, coordination for SEAD, coordination for marks, and CAS
mission approval. In a Marine operation, this is often the TACP (local) net. A third
frequency could be established if numerous aircraft are anticipated within an
b. Holding.
The FAC(A)’s holding pattern will vary greatly throughout the time on station in order
to accommodate such tasks as target identification, coordinate generation, or visual
acquisition of CAS assets. If the threat and weather allows, the FAC(A) may wish to
orbit over or near the target. This will allow the FAC(A) to be in a position to mark,
accomplish talk-ons, provide final clearance, and conduct other tasks previously
listed. The JTAC should provide the FAC(A) with as much airspace as possible, both
laterally and vertically, consistent with existing limitations, to allow the FAC(A) to
manage the airspace deconfliction between him/herself and the other CAS aircraft.
This flexibility is necessary for the CAS assets and the FAC(A) to effectively employ
ordnance consistent with existing tactics and threat considerations.
c. Marks.
The requirement for JTAC clearance for FAC(A) marks must be clearly stated real-
time. Consideration should be given to providing blanket approval for FAC(A) target
marking. If the TACP determines that they will provide clearance in the form of a
Type 1, 2, or 3 control for FAC(A) marks, the FAC(A) should request blanket
approval for the use of nonlethal marks (e.g., IR pointers/markers). Ultimately, the
decision will rest with the ground commander, and as such, the TACP must provide
guidance that will allow an informed decision.
d. Attacks
During medium altitude operations, with JTAC approval, the FAC(A) can execute all
tasks listed above, including briefing the CAS aircraft, bringing them into the target
area, providing the talk-on, marking, and providing final clearance. The JTAC must
continually monitor the mission, provide necessary corrections, retain abort
authority, monitor artillery and RW activities, and work with the ground commander
and representatives to further refine target priorities in support of the commander’s
objectives.
During low-altitude or RW operations, with TACP approval, the FAC(A) will normally
remain at the BP/IP, brief the CAS aircraft, provide them holding instructions for
deconfliction, confirm a common time hack, and possibly provide target marks.
A FAC(A) can use several techniques to aid the JTAC with flexible and lethal aviation
fires. One such technique is to initiate a CAS attack window with a visual mark
followed by either a Type 1 or 2 control for the first weapon to be employed to ensure
that all members of the attacking flight have the target TALLY/CAPTURED. Once
the attacking aircraft are TALLY/CAPTURED, the FAC(A) may then request a
transition to Type 3 on the specified target set, allowing the FAC(A) to continue
monitoring the engagement while assisting the JTAC with any of the other FAC(A)
capabilities or tasks listed earlier.
e. Post Attack.
If the FAC(A) is providing deconfliction at the IP and/or in the target area, they will
continue to do so for the CAS aircraft egressing the area. Whoever has the best
observation of the attack and weapons effects should provide the CAS aircraft with
BDA. If communications are interrupted by terrain, the JTAC should plan to relay
BDA through the FAC(A) to the CAS asset.
f. Battle Handover.
Prior to the FAC(A) checking out with the JTAC, a handover brief shall be conducted
with the JTAC or oncoming FAC(A). Information should include, but is not limited to:
(a) Location.
(c) Established deconfliction plan for assets within the operational area.
a. Target Nomination.
Targets may be nominated for attack by unit leaders (e.g., platoon commanders,
squad leaders) via maneuver frequencies or by JFO via TACP frequencies or
surface fires frequencies. It is imperative that the communications plan is understood
by all.
b. Initial contact.
Once established in the assigned location/area, the JFO will contact the
JTAC/FAC(A) on the briefed communications net. Upon initial contact, the JFO
should communicate the situation to the JTAC/FAC(A) using the observer lineup
brief. The JFO should periodically update the JTAC/FAC(A) as the battlefield
situation changes.
c. Situation Update.
Depending on the tactical situation, the JFO situation update brief should use the
same format as the CAS situation update brief, only including those items that are
applicable. JFOs may pass the situation update directly to the JTAC/FAC(A) or may
require the CAS aircraft to relay. Clearance authority is not briefed by the JFO. JFOs
should break the situation update into manageable transmissions using the brevity
term BREAK when passing to their JTAC/FAC(A).
Observer Lineup
Notes:
1. The JFO should be prepared to describe how the target coordinates were derived for each
CAS brief. For example: LRF coupled with a GPS, or map and compass. This information
provides the JTAC and supporting aircrew situational awareness regarding the accuracy of
the target coordinates provided.
When the decision has been made to attack the target using CAS, the JFO shall
contact the JTAC/FAC(A) and provide targeting information. A target brief should be
prefaced by “advise when ready for JFO target brief.” JFOs should ensure that they
are ready to pass the entire target brief prior to transmission. The target brief should
be prefaced by stating the first line number, “Line 4:” Additional line numbers are not
transmitted unless there is an omission. After Line 8 is read, the JFO will state
“Advise when ready for remarks.” At a minimum, JFOs should recommend final
attack restrictions.
FAH
LTL/PTL
Threat Direction/Distance
SEAD Int/Cont/Non-Stan
Restrictions
TOT Readback
(1) If any lines between 4 and 8 are omitted from the brief, the line must be
prefaced with the line title to identify the location of the information within the
attack brief, followed by either “None” or “Unknown.” Lines 4 and 8 shall not be
omitted. Line 7 of the target brief should specify which type of correlation the
JFO will be using, i.e., map, GRG, visual talk-on.
(2) JFOs shall ensure that Line 8 references the closest friendlies to the
target, which may or may not be their position. It is incumbent on the
JTAC/FAC(A) to verify the direction and distance by all available battle-tracking
methods.
(3) Remarks may include, but are not limited to, LTLs, IR pointer-target lines,
threats to aviation, recommended/requested attack geometry (e.g., FAHs),
ordnance, etc.
(4) Readbacks. During the JFO target brief, the JFO will receive readbacks
of all mandatory readback items from the TAC. The JFO should respond to
correct readbacks with “Chief 21, readback correct,” or “Chief 21, good
readback.” If the readback is not correct, the JFO should restate the portion in
question correctly, using voice inflection to draw attention to the portion that had
been read incorrectly, e.g., “Chief 21, correction, FAHs 1-8-0 through 2-1-0.”
The JTAC/FAC(A) shall verify the target location, friendly location and attack geometry.
After the JFO target brief, the JTAC will pass instructions and the intended plan of action.
a. Consider requesting an “IN with direction” or “heading” radio call from the
aircrew. This can increase the JFO’s SA of the attack and allows timely aborts
from the JFO if required. (See Figure V-17).
c. The intended plan of action communicates the details of the CAS attack so
that the JFO can brief the supported unit leader.
d. The JTAC will direct the JFO to switch to the TAD frequency to monitor the
CAS brief. During the execution of the CAS attack, the JFO will provide TGO,
correlation, or target/situation updates, as required for mission success.
JTAC conducts the CAS mission using the execution template. Execution template
considerations specific to JFO integration are:
b. CAS Aircraft Check-In. The JFO should be on TAD and monitoring the
communications between the TAC and the CAS aircrew. This will enable the JFO
to brief the ground commander on CAS mission status. JFOs must take care to
copy the check-inaccurately the first time it is passed, whether from their JTAC
or from monitoring transmission to the JTAC from the aircrew.
d. Game Plan. The JFO monitors the game plan to provide the ground
commander with pertinent information.
e. CAS Brief. The JFO monitors the CAS brief to validate accuracy.
k. BDA. JTACs working with a JFO in a Type 2 control scenario will generally
have the JFO pass BDA directly to the attacking section of aircraft over TAD while
monitoring for accuracy. In some cases, aircrew with various sensors may be
better situated to aid the JFO in assessing hit results. JFO monitors and updates
ground commander on CAS mission status.
Correlation may be required to refine target location to a high enough fidelity for mission
approval. Target correlation can occur either between the JFO and the JTAC or between the
JFO and the CAS aircrew. Some correlation considerations follow:
(2) The JTAC should verify the coordinate source (i.e., PSS-SOF, Vector 21,
GRG) during BOC employment if the JFO is the sole source of targeting
information. The JTAC should cross-check the intended aim point against the
coordinates provided.
(3) JFO can continue to search for additional targets once target correlation
occurs.
(4) While not required, it is recommended that the JFO utilize the TAD
frequency.
It is required for BOT attacks when JFO is the individual that is tally and when visual
marking is the means to affect target correlation (e.g., IR sparkle, smoke, direct fire).
(4) IR Pointer. The JFO will use appropriate IR and VDL brevity terms in
response to aircrew or the JTAC. When the JFO is using an IR sparkle to mark
a target, the JTAC must ensure that all proper IR terminology is utilized. IR TGO
communication should occur on TAD between the aircraft and JFO.
The JFO should be kept informed as the mission progresses. The JFO must know CAS mission
specifics that may include when aircraft are prosecuting attacks, how many aircraft are
attacking the target, when they release ordnance, and approximate time of weapons impact.
While the JFO will not issue weapons release authority (i.e., CLEARED HOT), informing him
of weapons release from the aircraft allows the JFO time to notify ground forces to seek cover
if required. Due to extended time of fall associated with PGM employment, the JTAC should
notify the JFO of weapons release and time of fall if the JFO is unable to monitor TAD. This
will give the JFO SA and allow him time to notify others in the target area of pending weapons
impact.
The JFO will pass pertinent information to the JTAC, while maintaining
communications with the on-scene maneuver commander. This includes, but is not
limited to:
(1) Target updates, target location refinement, target movement, and change
in target priority.
(3) Friendly location updates and maneuver plan after the attack.
(5) Weapons impact correction and/or new desired aim point. The JTAC
should be proactive and ensure the JFO provides timely corrections.
b. Aborting.
The JFO should use active listening and take care to practice TAD discipline during
the terminal phase of a CAS attack and be prepared to provide an ABORT call to
prevent friendly fire, ensure safety of flight, or satisfy commander’s intent. While not
certified to assess aircraft attack geometry, the JFO should monitor the aircraft’s
employment profile if the situation dictates.
In instances where a JFO facilitates CAS without a terminal attack controller present, the JFO
will inform the aircrew they are a JFO upon aircraft check-in, ensure aircraft safety of flight,
and adhere to procedures outlined in Chapter V, Section V - Emergency Close Air Support.
X Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
This part provides AI tactics, techniques, and procedures (TTP) for the conduct of air
interdiction against targets developed from both deliberate and dynamic targeting processes.
For the purposes of this publication, all AI missions (AI, GAI, XAI, and SCAR) will be referred
to as AI. Exceptions to this rule will occur only as specifically required for proper understanding
of a specific mission type. This publication serves as a reference for planners and a checklist
for planners and aircrew to execute AI missions. Specific focus areas include command and
control (C2), planning, and execution with best practices for engaging air interdiction targets.
This AI part is not designed for targets in close proximity to ground forces, where detailed
integration is required for fire and maneuver. The portion of PART I of this publication (to
include introduction to fire support, legal considerations, etc.) should also be applied to AI
operations as appropriate.
6.2 DEFINITIONS
a. COM JFAC is, normally, the supported commander for the joint force
commander’s (JFC’s) overall AI effort. When designated as the supported
commander, COM JFAC will conduct theater-wide or joint operations area (JOA) wide
AI to support the JFC’s overall objectives. With the preponderance of air assets and
the ability to plan, task, and control joint air operations, COM JFAC can best plan and
execute AI. COM JFAC recommends theater and/or JOA-wide targeting priorities and,
in coordination with other component commanders, forwards the air apportionment
recommendation to the JFC. COM JFAC plans and executes the interdiction effort in
accordance with the JFC’s guidance.
b. AI missions result from the normal targeting cycle against targets in the
approved Prioritized Target List (PTL) and also from preplanned requests during the
normal air tasking order (ATO) cycle and allow for detailed coordination between the
tactical air and ground units involved. Additionally, preplanned requests may result in
AI sorties in an on-call status (either airborne or ground alert) to cover periods of
expected enemy action, respond to immediate requests, or attack dynamic targets. AI
missions use detailed intelligence to attack known or anticipated targets in an
operational area to generate effects that achieve JFC objectives. Dynamic targeting
(DT) provides a responsive use of on-call or dynamically re-tasked AI missions to
exploit enemy vulnerability that may be of limited duration. However, dynamic
targeting may lead to an overall reduction in the probability of success because of
reduced time for mission preparation and target study.
c. The following are air interdiction missions that can be found in the ATO:
(1) AI is a mission scheduled to strike particular targets in response to JFC
or component target nominations.
(2) GAI is the AI term used to identify an on-call mission placed on ground
alert to provide responsive AI throughout the theater in response to emerging
targets
(3) XAI is the AI term used to identify a scheduled mission that provides
airpower to a designated area versus a preplanned target and is flown when
targets are not known or briefed in advance (also referred to as armed
reconnaissance). During these missions the aircrew finds and attacks targets of
opportunity (i.e., enemy materiel, personnel, and facilities) in assigned areas.
6-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(2) Dynamic. Dynamic targets are those that have been identified too late, or
not selected for action in time to be included in the normal targeting cycle, and
therefore have not been scheduled. Dynamic targets have two sub-
classifications: anticipated and unanticipated. An additional type of dynamic
target is a time sensitive target (TST). TSTs are those targets requiring
immediate response because they pose (or will soon pose) a danger to friendly
forces or are highly lucrative, fleeting targets of opportunity. The COM JTF
provides specific guidance and prioritization for TSTs within the campaign.
6.3 AI MISSIONS
The commander may designate AI to fly anywhere in the JOA. AI missions may occur on either
side of the fire support coordination line (FSCL). The JFC or supported commander establishes
target priorities. As there may be multiple supported commanders within a JOA, there may be
more than one AI target priority. In addition, these AI target priorities can change rapidly as the
JFC transitions from one phase to the next (e.g., deter, seize the initiative, dominate, and/or
stabilize). Target priorities established by the JFC or supported commander are defined in the
air operations directive (AOD), special instructions (SPINS), interdiction ROE, and appropriate
operation orders.
6.4 AI AUTHORITIES
a. The authority to conduct AI missions comes from the JFC. Within the land,
maritime, or special operations AO, the authority for interdiction is delegated to the
supported commander. Outside those AOs, the JFC normally designates the COM
JFAC as the supported commander for AI within the JOA.
b. Once an aircrew receives the task to conduct AI, by the ATO or a C2 agency,
no further authorization is required to deliver or direct delivery of ordnance on
appropriate targets. A SCAR has the authority to direct aircraft to proceed against
appropriate targets using search, investigate, target, strike or smack tasking’s. While
smack tasking authority is inherent in the SCAR mission and can enhance mission
effectiveness, smack or other authorities may be restricted by the supported
commander within the JOA/AO, or by the COM JFAC for theater-wide AI operations,
based on force capabilities and/or operational requirements. Any restrictions should
be promulgated via ATO, ROE, SPINS, or in real-time via C2 agencies.
c. It is important to note joint interdiction can be conducted inside an AO in direct
response to a JFC tasking which may not be in support of the AO commander. The
JFC may, for example, designate certain high priority targets located inside an AO
that are not of immediate interest to the AO commander. Any commander executing
such a mission within a land or maritime AO must coordinate the operation to avoid
adverse effects and fratricide. SCAR aircrew need to be aware that an interdiction
tasking may require airspace and target area deconfliction in real time.
(2) Secondary.
(a) Monitor target areas of interest and named areas of interest(NAIs)
to provide timely warning of enemy location and intentions.
(b) Serve as an intelligence, surveillance, and reconnaissance
collection platform.
(c) Attack targets, as required.
(d) Match appropriate ordnance to targets.
(e) Provide target marks (i.e., infrared (IR) pointer, LASER, or
rockets).
(f) Provide terminal guidance for LASER-guided munitions.
(g) Assist with BDA.
(h) Maintain a running tally of targets prosecuted and request
additional assets, as required.
(i) Provide a battlefield handover briefing to the follow-on SCAR.
(j) Provide reports to higher and supported agencies.
INTENTIONALLY BLANK
7.2 TACTICAL C2
b. Tactical C2 Systems/Agencies.
(1) Air surveillance and controls provided by airborne early warning (AEW)
aircraft equipped with search and height finding radar. AEW aircraft, (e.g. the
E-3), provide all-weather surveillance, C2, airborne battle management, and
communications needed by NATO commanders and allied air forces.
(2) Control and Reporting Center (CRC). Air Force CRCs are ground-based
airspace control/air defense, air battle management centers that provide
decentralized C2 execution capability. Critical core competencies of the CRC
include air battle execution, surveillance, combat identification, data link
management, cyberspace security, and theater air defense. The CRC provides
a robust systems and communications hub capability that connects upper,
lateral and subordinate C2 nodes.
(3) Air Operations Coordination Center (AOCC)4. The AOCC is an air control
agency responsible for the direction and control of air operations (if delegated
by COM JFAC) directly supporting ground combat forces. It processes and
coordinates requests for immediate air support and coordinates air missions
requiring integration with other supporting arms and ground forces.
4 For a more detailed discussion on AOCCs, see ACO Directive (AD) 080-065 “Concept of operations
for Air Coordination Centers Land and Maritime in allied command operations”
7-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(5) Ground Moving Target Indicator (GMTI) aircraft, (e.g. JSTARS, Sentinel),
provide ground and air commanders with situation development, attack
planning, targeting, and limited post-attack assessment information. GMTI
aircraft can provide ground surveillance SA and targeting information directly to
the AI assets or it can be relayed through a C2 agency.
c. SCAR. Tactical C2 provides a means for the SCAR to request additional assets,
both air or surface fires, and conduct additional airspace coordination when required
(e.g., when employing stand-off weapons or long range artillery). Depending on
system/agency capabilities and authorities, tactical C2 will coordinate with operational
C2, or fire support agencies to facilitate these requirements.
7.3 AIRSPACE
The use of ACMs and FSCMs is to facilitate efficient use of airspace to accomplish missions,
expedite target attacks and, simultaneously, provide safeguards for friendly forces. More
specific details of ACM and FSCM can be found in AJP-3.3.5 “Allied Joint Doctrine for Airspace
Control” and ATP-3.3.5.1 “Joint Airspace Control, Tactics, Techniques and Procedures”.
a. ACMs increase AI effectiveness by ensuring the safe, efficient, and flexible use
of airspace. ACMs can assist planners in designating AI working areas. These areas
may be formal [established in the airspace control order (ACO)]or informal
(established by tactical C2 during execution). The SCAR may establish additional
5 At the moment, the ASOC concept is not part of the allied doctrine. However, several nations apply
this concept and may offer it for an operation. In such a case, if an ASOC is established, an AOCC will
not.
7-2 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ACMs within the assigned area to facilitate target engagement. Airspace changes or
additions shall be coordinated with tactical C2.
b. FSCMs also increase AI effectiveness, particularly when operating inside a land
component AO. They can reduce and expedite coordination requirements and provide
approval of fires for AI aircraft. When established by the commander of an AO, kill
boxes are the preferred FSCM for AI missions because they are a three-dimensional
measure that accounts for airspace and surface engagement area. Detailed
discussion of kill box use can be found in the Annex A – Killbox.
c. AI aircrews must understand which ACMs and FSCMs are being utilized to
prevent conflicts and potential fratricide between friendly aircraft and indirect fires.
INTENTIONALLY BLANK
CHAPTER 8 - PLANNING
8.1 OPERATIONAL PLANNING CONSIDERATIONS
a. Defined Geographic Areas. These are determined using ACMs and FSCMs.
c. Local control of the air. Theater-wide control of the air is not required to conduct
AI operations. However, AI assets must be free from prohibitive threats when
operating in the target area. The desired level of control of the air should be provided
by additional aircraft tasked to counter air-to-air and/or surface-to-air threats. Based
on allowable risk, AI aircraft with an air-to-air capability may be used to respond to an
unplanned air threat.
d. Effective Communications.
(2) Due to high level of information exchange required for SCAR, the SCAR
must closely coordinate radio frequency allocation with C2. Associated
networks could include threat warning, SCAR primary and kill box (KB)
frequencies. SPINS will dictate what radio networks will be employed for SCAR
missions. Ideally there will be a frequency associated with each SCAR mission
that enables AI assets to have a common frequency for coordination. The SCAR
should consider potential data link capabilities of strike and reconnaissance
assets. Changes to the friendly scheme of maneuver should be communicated
to the SCAR as expeditiously as possible.
(2) Maximum altitude for the bulk of threat systems (risk management).
(5) Weapon / sensor capability. Specific aircraft capabilities may allow assets
to operate in and above negative weather conditions.
f. Capabilities of AI assets.
(2) Ideally, the SCAR should be equipped with advanced targeting capability,
communication suites and mixed weapon loads (including the ability to mark
targets and engage mobile targets). Planners also should consider aircraft loiter
times when selecting the SCAR.
a. An AI mission consists of strike and support (mission enablers, such as, SEAD).
b. SCAR mission design. In addition to the above, a SCAR mission consists of: C2
(beyond ‘normal’ command and control, refers to the C2 of other AI assets inside the
designated area by the SCAR); reconnaissance, surveillance, and target acquisition
(RSTA).
(1) Strike. Consider varying weapon / fuses, aircraft types, and the
capabilities listed in paragraph 2.1.1g, aircraft configuration, to increase
flexibility.
In addition to a geographic area in which to focus their reconnaissance effort and prosecute
targets, the AI assets must be delegated enough airspace to allow for them to hold, maneuver
and deliver ordnance. The use of a KB, because it is three-dimensional, is one method to
8-2 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
achieve this, but is not exclusively required. Regardless of the method to delegate airspace,
the measure should be activated, or in effect, during the entire AI mission and methods of entry
and exit should be defined in the ACO or SPINS.
AI missions are generally complex and aircrew proficiency will have a major impact on mission
success. Units conducting AI missions should consider the following skill sets when selecting
aircrew for the mission:
b. In-theater expertise.
d. The ability to create and execute a complex deconfliction plan between AI,
SEAD players and unmanned aircraft (UA).
AI capable units (both manned and unmanned aircraft) should request the most suitable
loadout for AI missions. AI mission tasks include finding and identifying targets. Additionally,
SCAR missions add the handing targets off to other AI assets, striking a variety of tactical and
potentially mobile targets, and performing BDA. Ideally, aircraft should be configured with the
following capabilities:
(1) Task
(2) Target
(3) Threat
(4) Tactics
SCAR mission planning includes deconfliction / integration of assets, and locating and
identifying targets, considered in the following paragraphs:
(1) Target types. Basic target types for AI are fixed and mobile. Target folders
should be available for fixed targets, but may not be available for mobile targets.
AI assets should analyze the AO to develop specific points of interest (POI) lists
that will facilitate effective searching for mobile targets once airborne.
(2) Imagery. The imagery of specific waypoints or POI can be printed and
carried in flight to help verify search areas. In addition, an AI target folder with
photos of enemy order of battle/visual ID packet may be helpful to achieve PID.
(3) Communication. While the AI assets are on station, other assets such as
JSTARS or SOF may find potential targets and pass the information to the
aircraft. This information may be passed via voice or data link normally using an
attack brief; but as a minimum, should include a target location and a brief
description.
(1) Details of any planned air interdiction strikes that affect the AI mission(s).
8-4 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(5) Assigned airspace based on aircraft capabilities and the priority of those
capabilities to create desired effects.
(6) Entry and exit of the SCAR working area without interfering with other
SCAR/AI assets.
(11) Entry and exit of the SCAR working area without interfering with AI assets.
d. In most cases, SEAD support to AI will fall under the reactive SEAD
category whereby suppression is unplanned and includes aircrew self-defense
and attack against surface-to-air defense targets of opportunity. An aircraft
commander has the inherent authority and is obligated to use all necessary
means available and to take all appropriate actions in self-defense of the aircraft
and other forces in the vicinity, consistent with the ROE and LOAC. SEAD targets
of opportunity are those enemy air defense systems detected by surface or
airborne sensors or observers within range of available weapons and not yet
targeted.
(1) The JFC will establish ROE for reactive SEAD because SEAD operations
require correct ID of enemy systems to prevent fratricide, especially when
launching ARM’s against sources of unknown, spurious electronic signals. If
able, the SCAR should immediately coordinate an attack (versus a surface-to-
air threat) using an AI asset with the highest SA supported by SEAD, if available.
The JFC, or his delegated authority, sets the ALR for all AI missions. During AI planning, it is
important to understand the ALR, the commander’s intent/desired effects, and the expected
threat levels based on intelligence reports. Additionally, the ALR may impact tactics based on
a requirement to maintain sanctuary from threats. Based on the JFC guidance and battlefield
developments, the ALR may change during AI missions.
b. Timely BDA is required after each AI mission and enables COM JFAC to
optimize asset allocation. This is an essential part of the process to be completed
while the AI pilots are in the cockpit. It allows for recording prosecuted and
allocated targets to ensure accurate reporting. Through coordination with the
JFAC, the AI asset’s BDA will assist the JFAC in planning future mission taskings.
c. SCAR considerations.
(1) The SCAR should be familiar with the general capabilities and limitations
for strike assets. This includes standard weapons load out, data link capabilities,
sensor capabilities and loiter potential. Time permitting the SCAR can directly
contact assigned assets for an expanded capabilities brief specific to the ATO
tasked mission.
(2) The SCAR should maximize all available capabilities to perform accurate
and timely BDA. This includes all available sensors within their formation as well
as UAS, reconnaissance aircraft, SOF and electronic intelligence to confirm the
effectiveness of the strikes.
8.2.7 Contingencies
(b) SCAR assets fallout. Identify the best qualified asset to assume the
SCAR responsibilities in case of ATO designated SCAR falls out.
e. Non PID / CDE capable aircraft. In some cases, SCAR aircraft may need
to find targets for other ATO-assigned aircraft that can strike a target but cannot
conduct PID or CDE due to system limitations, degraded systems or
environmental factors. The SCAR will have to complete all of the requirements
for PID and/or CDE to allow non PID / CDE capable assets to engage their
designated targets. In these cases, the SCAR will have to use smack authority.
If smack authority has been restricted by ROE or a C2 agency, it must be
requested.
a. The SCAR mission coordinating instructions (CI) are used to convey the
SCAR’s plan to all assets. The SCAR should attempt to provide a face-to-face
mission brief (MB) (to include video teleconferences or phone conversations)
which will allow for questions and discussion among all assets. Often, it will not
be feasible for the SCAR to conduct face–to-face briefings, so the SCAR shall
issue CI digitally to ensure widest dissemination. Timely issuance of CI is a key
factor for success and will allow assets to incorporate the CI into mission
planning. Attempt to disseminate the CI/MB as early as possible prior to execution
to ensure it reaches all assets prior to their mission planning cycle. This would
include UAS, bombers and C2 assets with long transit and on-station times who
may be unavailable just prior to the mission, for example.
b. The CI/MB should begin with an overview of the ATO mission, objectives,
package composition and load out, and administrative procedures (i.e., routing,
holding, and communications). The overview should include the commander’s
intent and will aid in the smooth transition between SCARs during the mission.
Refer to the SCAR/AI Mission Briefing Guide (Annex B) for specifics to include in
CI/MB. The SCAR should focus on tactical execution and ensure assets are
provided fire support plans to integrate fires.
c. The CI/MB should cover an overall plan but must remain simple to increase
tempo on the battlefield. A complex CI may result in confusion during the
execution of SCAR. The SCAR should realize that some assets will check into
the AO without having received the CI/MB; that information will have to be passed
real time on the battlefield.
CHAPTER 9 - EXECUTION
9.1 AI MISSION EXECUTION
AI mission is normally executed according to plan were all mission aspects should have been
taken into account. Often is also platform-specific. Refer to AOO- / platform specific
documentation for AI mission execution particularities.
As the SCAR is required to perform a set of specific functions and have specific responsibilities,
the following paragraphs are dedicated to the SCAR-specific mission execution.
The initial situation update from the C2 agency to the SCAR should be as thorough as possible
to increase the SCAR’s SA. The C2 agency should pass any applicable updates. Close
coordination between the SCAR and C2 agency will help to reduce the SCAR’s workload.
9.2.1.2 En route
The SCAR should attempt to gain as much information as possible from the current or outgoing
SCAR and C2 assets. Additionally, the SCAR should check own aircraft situation displays,
when available, for data link information on flights working in the AO. SCARs should ensure
they receive a battlefield handover using the situation update format from the departing SCAR.
a. En route the AI asset will check-in with C2 agencies in accordance with the
appropriate SPINS. Before entering the SCAR working area, flights must check
in with the SCAR to receive routing and safety of flight. An example of the check-
in brief can be found in table 6-1. Entry into the SCAR working area without
routing is prohibited.
b. When requested, the AI asset will check in with the SCAR using a pre-
defined format given in the SPINS. It is important that the SCAR evaluate
information such as playtime and ordnance to maximize the efficiency of
assigning aircraft capabilities toward desired target effects. The intent is to
generate and sustain as high a tempo as practical against the enemy. This high
c. Following check-in, the SCAR will pass a situation update to the AI asset
as required. The SCAR should pass this situation update and only pass
appropriate information to keep the tempo high.
d. When working with UAS, the SCAR should expect the UAS to pass a lost
link plan in the remarks section at check-in. The lost link plan may change
throughout the mission; the more complex the ACMs and deconfliction, the more
complicated the lost link routing may become. This information may be passed
over voice or data link. In the event of an actual lost link situation, the UAS may
be unable to pass the status of the aircraft to the SCAR via voice. In these
situations this information may be routed through a C2 agency.
a. The outgoing SCAR will execute a battlefield handover with the incoming
SCAR when relinquishing the SCAR role. Considerations for selecting a
replacement SCAR should include SA, TOS, and available
sensors/communications. If a replacement SCAR is not available, the SCAR will
execute a battlefield handover with C2. If possible, handovers should be
accomplished on lower density communications networks that do not detract from
ongoing operations.
b. The outgoing SCAR should tailor the battlefield handover to the situation. If
passing SCAR responsibilities to an aircrew that have been on station for a
significant period of time, with sufficient SA, the battlefield handover should be
brief. However, if the handover is passed to an inbound SCAR or aircrew that has
yet to build sufficient SA, the battlefield handover should be more robust.
9.2.2 Holding/Deconfliction
a. The SCAR holding plan should avoid leaving AI assets idle. The SCAR
should utilize the available AI assets’ sensor/weapon capabilities while holding
and during execution. When required, the SCAR has numerous techniques for
de-conflicting aircraft including altitude, lateral, timing, or a combination of the
three. There are advantages and disadvantages to each depending on the
situation.
b. The SCAR holding and deconfliction plan should take into consideration
enemy capabilities, target orientation, weather, threats, and AI asset capabilities.
The following is a list of techniques available to the SCAR for holding and de-
conflicting AI assets:
(2) Timing. If the SCAR wants multiple AI assets to attack the same target
array/area, the SCAR should assign a time on target (TOT) to each AI asset.
Assigning a TOT will ensure a time separation of each aircraft conducting
attacks. The SCAR should assign a TOT window to each AI asset that supports
the type and number of attacks required. Assigning separate AI asset TOT
windows will require a one minute minimum separation. If de-conflicting AI
assets with significantly different ground speeds, more separation may be
required. This technique serves to prevent timing mistakes and target
obscuration from reducing the AI asset’s effectiveness. If slower tempos are
acceptable, the SCAR may decide to employ AI assets one at a time with each
element working until they report “Winchester”. If the SCAR determines an AI
asset requires more time to execute attacks than planned, the SCAR should
direct that AI to egress. The coordination to direct an egress will enable a more
capable asset to engage the target array.
(3) Altitude. If the target array requires operations in a small area, it may be
necessary to stack multiple elements in the same airspace and deconflict them
by altitude. The SCAR should stack all aircraft to optimize sensor performance,
expedite deconfliction of fires, and mitigate the threat. An example is:
“Arrow 31 (AI), Killer 11 (SCAR), maintain current altitude, proceed into hot open
blue kill box 006AB quadrant 4, once established, descent and maintain block
18-20”.
(a) SCAR stacked low. This technique is used when stacking at the top
of the block would prohibit the SCAR from locating targets. The SCAR can
conduct immediate attacks on targets without further weapons
deconfliction. The SCAR is required to deconflict from fires falling through
the SCAR altitude.
(b) SCAR stacked high. This technique is used when stacking at the
bottom of the block is not required for finding targets. Stacking high
provides the SCAR the autonomy to move within the SCAR working area
without further deconfliction. However, the SCAR must deconflict his
weapons if conducting strikes through elements holding at lower altitudes.
c. Additional instructions.
(2) Surface-to-surface (S/S) and long range, air-to-surface (A/S) fires can be
deconflicted through lateral, altitude and timing techniques.
Dynamic targeting (DT) F2T2EA (Find, Fix, Track, Target, Engage and Assess) is a process
which facilitates tactical SCAR mission execution. During SCAR mission execution, this
process may be abbreviated and should occur rapidly to increase the battlefield tempo.
Specific platforms may be better suited to execute the six steps of the DT process. This
9-3 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
process involves targeting, from search through BDA. The following paragraphs will explain
the different steps in DT as they apply to SCAR/AI assets and provide amplifying
data/considerations for the joint targeting process.
(1) Use off-board sensors, such as JSTARS, SOF reconnaissance teams and
UAs, to acquire targets. Additionally, use on-board sensors including targeting
pods, A/S radars, binoculars, night vision devices, and unaided visual searches
to acquire/refine targets. The effective use of all platforms to include wingman
and AI assets is important to maximize search potential and find targets. Use
off-board sensors and targeting information to increase SCAR working area
tempo and eliminate the requirement for strike capable assets to search for
targets.
(2) The SCAR should focus on areas where the enemy may choose to
conceal or fortify his position due to doctrinal or physical constraints.
Identification of the focal points can be found during mission planning and
updates to the intelligence estimate. In the absence of known target locations,
the SCAR should use all available assets to maximize sensor coverage. The
SCAR should assign search responsibilities to assets through sensor POI,
quadrants, keypads, geographic features, or LOCs.
(a) The task to SEARCH may be given to aircraft to search for potential
targets or points of interest within a killbox, named area of interest (NAI),
geographic area, or set of coordinates. A SEARCH tasking does NOT
imply clearance to engage.
(3) Once a target is found, the focus shifts to fixing, which consists of
identification and prioritization. This is the bookkeeping portion of the mission;
and organization is crucial. As targets are found, they need to be identified,
plotted, annotated, and compared to where they fit in the priority list. The SCAR
should balance target engagement with target priorities, asset and ordnance
availability, and remaining TOS. For example, a prioritized list may contain
artillery, tanks, and infantry. If these targets are all located in the assigned
geographic area, the SCAR should focus the search to locate the highest priority
targets. If those searches fail to acquire artillery targets, the SCAR may begin
engaging located lower priority targets. If off-board target cueing is provided for
lower priority targets, the SCAR should not reorder their search priorities or
deviate from the target list to engage those targets. If there is a question
regarding target priority, the SCAR will need to contact C2 for clarification, which
will lengthen the DT process. A well planned cockpit organization flow will
significantly reduce the workload while increasing efficiency and SA.
(4) PID is normally a requirement of the theater ROE. PID helps to determine
where a target ranks on the priority list. There are many techniques to
accomplish a PID, often requiring maximum sensor availability.
(5) The next consideration is to refine target location to the accuracy required
for strike coordination. Using sensors, avionics or map plots can facilitate target
location refinement. For visual or sensor Talk-On, rough coordinates may
suffice and, if necessary, the SCAR can communicate the location via C2 asset.
If an area of uncertainty exists for the target location, then this information
should be communicated to C2.
(1) Track. The SCAR uses available sensors to continuously track the target.
Reasons to delay engagement and continue tracking include the need to
gather/exploit more information, observe enemy activity, delay for guidance, or
prosecute higher priority targets. The SCAR maintains SA by recording the
target location for later revisits, assigning an AI asset to monitor, or handing the
track off to a C2 agency. Evaluation of the target’s window of vulnerability is a
requirement throughout the tracking process. Mobile targets may require
immediate engagement. Destruction of all targets may not necessarily be
required. However, timely and accurate reporting of all targets will help build SA
and provide intelligence for further exploitation. As a minimum, the SCAR must
be able to report suitable detail for every target found. Collecting and sharing of
information while tracking targets may provide important intelligence on enemy
activity or intentions. This intelligence can assist the supported commander in
making decisions about enemy courses of action.
(2) Asset-to-Target Pairing. The SCAR should decide the best way to engage
the target with available assets by determining which combination of AI assets
and weapons will provide the highest probability of success. The final decision
making should be based on an understanding of specific asset/weapon
capabilities and limitations along with the desired weapons effects for the target.
Other considerations include:
(b) FSCMs/ACMs.
(c) Playtime.
(3) Threat Considerations. The SCAR’s SA of threats will affect how AI assets
are tasked or packaged to create desired effects.
(a) Threat relay. Threat information will be passed to the SCAR via the
SPINS designated frequency. In the event of a pop-up threat within the
assigned geographic area, the SCAR should retrograde all AI assets
away from the threat. Once sanctuary is reestablished, it is the SCAR’s
responsibility to determine if operations can continue. The following are
threat considerations:
(4) SEAD Execution. The SCAR should coordinate with C2 for SEAD assets.
If a SEAD asset is available, the SCAR should coordinate reactive SEAD.
Ultimately, the SCAR will need to determine if the SCAR mission should be
continued or aborted. If the threat is affecting the mission to the point that more
time is spent dealing with the threat than the SCAR mission, the SCAR should
consider neutralizing the threat prior to continuing with SCAR. The SCAR
should retain the flexibility to prioritize and target emerging threats. However,
the PTL should be followed to the maximum extent possible to mirror the ground
commander’s intent.
c. Attack (Engage).
(1) Target Engagement. There are four types of tasking the SCAR should use
to facilitate rapid engagement of targets. The SCAR may pass attack authority
at any time. INVESTIGATE, TARGET and SMACK are three brevity words
associated with the tasking.
(2) Attack Briefs. The SCAR may be the best asset for conducting an attack.
When circumstances indicate the SCAR is not the best asset, a target hand off
to an AI asset could be the best option. Techniques for passing target location
include data link, NAI, geographic reference, or passing coordinates. In all
cases, the SCAR will communicate his intent to the AI asset via an attack brief.
The remarks portion of the attack brief should include coordinating instructions
identifying deconfliction measures, ordnance, final attack heading, and TOT
windows. Non-applicable items can be omitted. The 9-Line Attack Brief is used
as the standard format. An example of this brief can be found in table 6-2. Other
formats may applicable to a specific theatre or operation. Those should be
included in the relevant SPINS. Aircrews must check what is applicable to their
operating area.
(a) While all the lines of the 9-line attack brief may be necessary to
successfully conduct an attack, it is important to note that only the
necessary information should be passed. For example, only lines 4-6 may
be required. The SCAR should keep the attack brief as permissive as
possible but as restrictive as required to allow AI asset flexibility and
increased tempo.
(b) Other attack brief formats may be used that effectively pass the
required information. The transmission of these briefs can be by voice,
digital or both.
“(Fighter C/S), (SCAR C/S), this is an (Investigate / Target / Strike / Smack) tasking (track
number________)
1. IP / Bullseye
2. Heading
3. Distance
4. Elevation
5. Target description
6. Coordinates
7. Marks
8. Friendlies
9. Egress
Remarks / Restrictions
Coordinate category
CDE
Other amplifying information
Table 9-2: SCAR 9-line attack brief
(3) SCAR Tasking Examples. The following examples illustrate the different
methods of tasking and various attack briefs.
(a) INVESTIGATE:
(b) TARGET:
(c) STRIKE:
Note: Example that follows assume the SCAR has been granted strike engagement authority
within a specified JOA/AO via ATO, SPINS, ROE; or in real-time via C2 agencies.
(d) SMACK:
Note: Examples that follow assume the SCAR has been granted smack engagement authority
within a specified JOA/AO via ATO, SPINS, ROE; or in real-time via C2 agencies.
(5) Guided Munitions Considerations. The final measure the SCAR must
consider during the targeting step is the level of support the AI asset requires.
The SCAR may hand off the target, set up deconfliction, and then clear out of
or remain outside the target area to allow the AI asset to engage the target.
Another option is that the SCAR may integrate into the attack. The more
involved the SCAR becomes in AI asset attacks, the more the overall SA in the
SCAR working area may be degraded. However, some circumstances may
arise when employing IAMs or LGWs, which may require the SCAR to integrate
into the AI asset’s attack.
(a) IAMs. Based on the platform and ordnance, the SCAR may be the
most suitable platform to generate coordinates. This process should be
completed for as many targets as time allows. Based on the desired effect,
a varying level of coordinate accuracy may be required. If the AI assets
can self-target with IAMs, the SCAR may be able to bind a large target set
with one or two target coordinates and a description of the target set. If
the AI assets cannot self-target, the SCAR may be required to provide
coordinates for each desired point of impact in the target set.
(b) LGWs. Conditions may require the SCAR to buddy lase for the AI
asset. In the event this occurs, the SCAR should be aware of factors
involved in such attacks (i.e., proper geometry required, timing,
communication, LASER codes and deconfliction).
d. Assess. Assessing begins when the weapon impacts the target. The
assessment is situation dependent and may be conducted by the SCAR, an AI
asset or a reconnaissance asset. SCAR mission feedback is essential to optimize
subsequent tasking and update intelligence. Unlike a normal mission flow, SCAR
mission feedback needs to be dynamic and continuous to ensure continued
pressure on the enemy.
(2) SCAR Responsibilities. The SCAR will determine if additional attacks are
necessary based on SCAR/AI BDA. If additional attacks are required, the SCAR
will update tasking to on-station AI assets or request additional AI assets or
capabilities from C2. The SCAR is responsible for informing C2 of remaining
targets in the SCAR working area.
(4) SCAR/AI assets should have a plan to capture footage on engaged and
remaining targets. It is often more important to report priority targets remaining
(combined with a threat and weather update) since remaining priority targets
will likely be the deciding factors for C2 to re-task aircraft into the assigned
geographic area. AI assets are required to provide information on the number
of targets prosecuted and the remaining targets to the SCAR upon checkout.
Individual assets are responsible for conveying their detailed INFLTREP to C2
agencies (See table 5 Inflight Report.)
INTENTIONALLY BLANK
KILL BOX
A.1. GENERAL
A.1.1. Description
A.1.2. Purpose
b. All aircrews executing missions within the confines of a kill box will execute in
accordance with ROEs, the Law of Armed Conflict, and SPINS applicable to their
assigned mission. Specific missions found in an air tasking order (ATO) applicable to
this publication are air interdiction (AI) and strike coordination and reconnaissance
(SCAR).
A.2.1. Terminology
a. Killbox Types
(1) Blue kill box (BKB). The primary purpose of a BKB is to facilitate the attack
of surface targets with air-to-surface munitions without further coordination with
the establishing headquarters.
A-1 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(2) Purple kill box (PKB). The primary purpose of a PKB is to facilitate the
attack of surface targets with subsurface-to-surface, surface-to-surface, and air-
to-surface munitions without further coordination with the establishing
headquarters.
c. Effective Time. The killbox effective time begins when the killbox status is
scheduled to become hot and ends when the killbox is canceled.
f. Status. Killbox status is described in two parts: Permitted fires and effects and
airspace status. The fires status addresses fires and effects on the killbox’s target
area. The airspace status addresses the availability and airspace restrictions in the
killbox. See table A-1 for a killbox status cross reference.
AIRSPACE STATUS
OPEN
CLOSED
Aircraft permitted
Aircraft Prohibited
(with coordination)
HOT
Fires permitted Fires permitted
Fires and effects require no
Aircraft permitted Aircraft prohibited
further coordination
FIRES
STATUS COLD Fires require Fires require
coordination coordination
Fires and effects require
coordination Aircraft permitted Aircraft prohibited
Note: This cross reference assumes no other fire support or airspace coordinating measures are
present in the kill box. Restrictive coordinating measures will always have priority when established
in a kill box.
A-2 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(1) Fires and effects. A killbox fires status can either be HOT or COLD.
(2) Airspace status. Within a killbox, the airspace will be designated as either
OPEN or CLOSED.
(a) OPEN. Manned and unmanned aircraft are cleared to operate inside
the killbox ACM or designated segments. See figure A-3 below for an
example.
A-3 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(b) Closed. Aircraft are restricted from operating inside the killbox or
designated segments of it [to include unmanned aircraft system (UAS)
unless otherwise authorized]. See figure A-4 below for an example of
closed killboxes.
A.2.2. Characteristics
a. Target area. The target area is the killbox surface area declared hot for joint
fires. The dimensions of a killbox target area are defined using an area reference
system (i.e., GARS). The standard killbox dimensions using GARS is a single cell [30
minute (min) by 30 min (approximately 44 kilometer (km) by 44 km) area]. The use of
quadrants [15 min by 15 min (approximately 22 km by 22 km) area] and keypads [5
min by 5 min (approximately 7.5 km by 7.5 km) area] inside the killbox facilitate
airspace and fires deconfliction and C2.
b. Airspace. The restricted airspace block above the killbox target area extending
from the surface up to a ceiling. The airspace control authority (ACA) will establish
the ceiling height and ACM parameters through coordination with fire support and
A-4 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
airspace organizations. Once established, the ACA will publish the parameters in the
airspace control plan (ACP), ACO, or SPINS to permit standardized planning for other
airspace uses.
Note: All airspace parameters must be consistently and unambiguously expressed in altitudes
referenced to Mean Sea Level or Flight Levels, as appropriate.
A.2.3. Employment
a. Killboxes are normally used when a support relationship exists between two or
more functional or Service components and a theater-specific concept of operations
(CONOPS) has been established for the integration and de-confliction of fires and
airspace. The goal is to reduce the coordination required to fulfill support requirements
with maximum flexibility while preventing fratricide.
b. Killboxes support the commander’s objectives and CONOPS. As such, all target
engagements within a Killbox must adhere to the establishing commander’s scheme
of maneuver and designated target priorities, effects, and timing of fires.
c. A killbox will not be established for close air support (CAS) missions. If a CAS
mission is required within an established killbox, the responsible C2 element should
change the fires status to cold for the portion of the killbox requiring detailed
integration.
A.2.4. Considerations
a. The JFC or establishing authority makes the decision to use a killbox and
determines size, location, and timing based on careful consideration of the situation
and CONOPS. Other factors for the establishing authority to consider are: disposition
of enemy and friendly forces, anticipated rates of movement, surface-to-surface
indirect weapons capabilities, concept and tempo of the operation.
b. FSCMs are not mutually exclusive so a killbox could contain other measures
within its boundaries to include: no fire areas (NFAs), restricted operations zone
(ROZ), or airspace coordination areas. Restrictive FSCMs and ACMs will always have
priority when established in a killbox.
forces (SOF) teams) and the killbox must remain hot, then establish a restrictive
FSCM (restrictive fire area or NFA) to protect those forces. If a FSCM cannot be
emplaced to protect the ground forces, then the establishing authority must change
the affected quadrants or keypads to cold status or cancel the killbox. The establishing
authority must maintain awareness of maneuvering surface forces in and around
established killboxes to prevent fratricide.
Note: There is currently no digital system available to automatically track surface forces and
manage killboxes. This level of situational awareness requires active monitoring by current
operations personnel and functioning C2 cells.
d. Kill box Coordinator (KBC). When assigning aircraft missions in a killbox, specify
which aircraft is the KBC. The KBC will deconflict aircraft, manage and direct effective
target engagement, and provide bomb hit assessment. When possible, assign KBC
duties to a SCAR capable or forward air controller (airborne) (FAC(A)) qualified
aircrew.
A-6 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
A-I.1. General
(2) Identify killbox supporting ACMs and make them restrictive to surface-to-
surface indirect fires.
(3) Require Advanced Field Artillery Tactical Data System users to pull ACMs
into their system via the ACO.
(4) Optionally define exemptions for UAS employment within closed blue and
below the floor of purple killboxes.
a. Duties. Killbox employment will affect both the execution of fires and
airspace control throughout the JOA to include the AO of the JFLCC and JFMCC.
The JFC develops guidance for killbox employment within the JOA. The JFC will
direct the use of an area reference system (e.g., GARS) to facilitate airspace
coordinating measures associated with killbox planning and employment. Once
defined, killbox procedures within the JOA must be distributed by means of the
JFC’s ACP; the joint force air component’s (JFAC’s) ACO, ATO, SPINS, and
component commanders’ OPORDs; and other releasable documents. These
relationships tie directly to killbox establishing authority through each phase.
Commanders and designated supported commanders with jurisdiction over the
operational area where killboxes are located have the authority and responsibility
to establish killboxes within their assigned areas. Once establishing authority is
given to component commanders, the JFC maintains visibility on all killboxes
A-I-1 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
A-I-2 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
A-II.1. General
b. GARS and killboxes are related topics but not the same. The GARS is a
reference system, not a FSCM or ACM, GARS or a local area reference system
facilitates the structure and coordination requirements for employing killboxes.
c. Killboxes are not ideal for every situation. Through the targeting process,
planners should evaluate the mission, enemy, terrain, weather, troops and
support available, time available, civil considerations, and terminal attack control
requirements to determine the most effective procedures. Killboxes can either be
planned or immediate in support of dynamic targeting. Immediate killboxes are
discussed in paragraph A-II.3.c.
d. All aircraft, ground forces, and fires not assigned to an open killbox are
restricted from entering unless coordinated with the KBC or appropriate C2
nodes.
a. Killboxes can be used in conjunction with other existing FSCMs and can be
established anywhere in the JOA where expeditious target engagement is
required, to include rear areas. Also consider using killboxes in areas where a
traditional FSCM (e.g., the FSCL) is not defined or has not been established.
b. Killboxes are not required for all AI missions. They are only used to reduce
coordination requirements between forces and facilitate the attack of targets.
Killboxes are particularly useful in the following situations:
(3) Focusing joint fires in areas not requiring detailed integration of fires and
maneuver.
A-II-1 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(4) Determine the effective time required for the killbox to accomplish the
commander’s objectives.
A-II-2 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
a. Killbox planning falls under the purview of the joint targeting cycle. Planned
killboxes are established to support JFC or component commander CONOPS,
schemes of maneuver, and corresponding targeting efforts.
A-II-3 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(a) COM JFAC. Killbox development begins when the approved PTL
arrives in the plans division. There, air planners or component liaisons
match PTL targets to available assets and required killboxes become
geographically apparent. Killbox locations developed to support the PTL
prosecution are then passed to combat plans airspace planners to
determine conflicts. Any conflicts are worked out between the identified
organizations.
Note: The term immediate does not imply commanders may dynamically create killboxes, only
that the planning cycle and time available to coordinate and approve the killbox is reduced.
A-II-5 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
a. Prior to operations in a killbox, the C2 agency must change the killbox fires
status from cold to hot. The C2 agency must first verify the killbox is either clear
of friendly air and ground forces or protected by FSCMs or ACMs prior to
changing the killbox status to hot. Exceptions may apply for UAS or remotely-
piloted aircraft (RPA); see paragraph A-III.2.c.(7).
b. Prior to entry into an open killbox, contact the C2 agency [e.g., AWACS, E-
2 Hawkeye, air operations center (AOC)] specified in the ATO or ACO or
published instructions. Expect the C2 agency to push tasked aircraft to either the
SCAR or KBC on station or to be designated as the KBC for that killbox. Use the
killbox check-in brief in table A-III-1 when contacting the SCAR or KBC. This
briefing may be abbreviated for brevity or security (e.g., “as fragged” or “with
exceptions”).
Example:
“Tiger 11(KBC), Star 21(flight)-mission #2301, 4 F-16s entering 134LV from the south,
Angels 15, 4 X GBU 12 ea plus 20 mm, LASER code 1114 in sequence, 35 minutes
time on station, SADL/Litening Pod.”
ATO–air tasking order SADL–situational awareness data link
KBC–Kill box coordinator
Table A-III-1:Killbox Check-in Briefing
a. Coordination is required with the establishing authority and ACA for any
fires originating outside and penetrating a kill box that will require a change in kill
box, or portion of a kill box status to enable those fires (e.g., change in kill box
status from open to closed). See figures A-III-1 and 2 for a graphic portrayal of
this concept. Coordination for fires originating from and remaining inside the kill
box are discussed below in paragraph 2.c. Example fires requiring additional
coordination include:
A-III-1 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
A-III-2 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(1) Tactical recovery of aircraft and personnel missions, combat search and
rescue, or isolated personnel recovery.
c. Air-to-Surface fires.
(2) All aircraft not assigned to an established kill box are restricted from flying
through or delivering air-to-surface munitions into that kill box unless
coordinated with the owning C2 agency.
(3) Aircraft operating within a kill box will be on an assigned kill box frequency
or have a previously coordinated de-confliction plan.
A-III-3 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
C2 Agency Briefing
(Information Passed from C2 Agency to Aircraft)
Kill box name and status: “_____________”
Kill box floor: “_____________”(not required for blue kill box)
Targets: “_____________” (priorities, targets being worked, etc.)
Threats: “_____________”
Restrictions: “_____________”(Air and ground friendlies/FSCMs/ACMs/Ordnance)
Coordinator: “_____________” (call sign and net)
Remarks: “_____________” (Restricted targets, hazards munitions, UAS operations, etc.)
Example—Planned AI mission assigned to a hot kill box:
First aircraft assigned to a hot kill box:
“Star 21, cleared to hot open blue kill box 132LN, working frequency TAD 15.”
Follow-on aircraft assigned to a hot kill box:
[Airborne Warning and Control System (AWACS)] “Arrow 22, contact Elvis for re-
tasking.”
[Elvis (AOC)] “Arrow 22, proceed into hot open blue kill box 132LN. Target priorities are
tanks, self-propelled, and towed artillery. Possible SA-8 in quadrant 2. NFA keypad 132LN
14. Contact kill box coordinator, Star 21 on TAD 15.”
ACM–airspace coordinating measure NFA–no fire area
AOC–air operations center UAS–unmanned aircraft system
FSCM–fire support coordination measure
Table A-III-2:C2 Agency briefing
(4) When multiple flights or formations are conducting operations within the
same kill box, de-confliction of attacks and airspace is required. Aircrew
employing weapons within a kill box should ensure that the entire trajectory of
the munition and its effects remain within the lateral and vertical limits of the kill
box unless previously coordinated.
(a) Ideally, the C2 agency will assign a SCAR to a kill box to de-conflict
attacks and airspace within the kill box. In support of kill boxes, the SCAR
is able to perform the following tasks.
A-III-4 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(b) When a SCAR is unavailable, the first flight to enter a given kill box
is designated the KBC. Any manned combat aircraft and some UAS or
RPA crews can perform the basic duties of the KBC. The primary
responsibility of the KBC is to de-conflict attacks and airspace within the
kill box. When possible, this includes all duties listed above except,
prioritizing and engaging targets and PID. As the complexity of operations
within a kill box increases, C2 nodes should make every effort to assign
SCARs to the kill box. KBCs (manned or unmanned) should relinquish
control to SCARs checking into the kill box.
(c) The SCAR or KBC will relay specific kill box and target information
to strike aircraft using table A-III-3, the kill box attack briefing. The de-
confliction portion of the attack brief, including general attack flow from
SCAR or KBC to striker aircraft, is directive. Strike aircraft must comply
with de-confliction instructions or coordinate otherwise.
(d) If a strike aircraft enters a kill box with a previously assigned target,
the SCAR or KBC is only responsible for providing airspace de-confliction.
Under the ATO, SPINS, and interdiction ROE, strikers are responsible for
meeting their own target engagement requirements.
(f) When checking out of a kill box, the departing SCAR or KBC will
execute a positive handoff to the appropriate flight, if applicable, and notify
A-III-5 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
C2. If no flights are available, the SCAR or KBC will complete an in-flight
report with C2 in accordance with established procedures.
(a) The KBC must have direct voice communications with all
participating aircraft, manned and unmanned, in the kill box to deconflict
airspace. UASs or RPAs not equipped with voice communication should
not operate within the confines of a hot or open kill box without the further
use of an ACM such as a ROZ to de-conflict their flight path and a FSCM
such as a NFA to protect the UAS or RPA from friendly fires.
(b) Not all UAS and RPA crews can perform SCAR or KBC duties due
to equipment limitations and crew qualifications. RPA pilots will notify C2
on initial check-in if they are unable to perform SCAR or KBC duties.
(c) UAS kill box integration of any size UAS or RPA is no different than
integration in other forms of airspace. UASs and RPAs equipped with
radios will use the same procedural deconfliction methods as manned
aircraft and receive deconfliction instructions from the KBC.
Note: UAS or RPA crews should not assume they have blanket approval to enter a closed kill
box without the responsible commander’s approval. This commander should weigh the tactical
situation against the operational risk to the asset.
(a) Purple kill boxes are intended to integrate subsurface- and surface-
to-surface fires into the kill box using altitude de-confliction with
participating aircraft operating inside the kill box. Coordination of all
subsurface- and surface-to-surface fires from the point of origin to the kill
box (blue or purple) is accomplished in accordance with published theater
clearance of fires procedures.
A-III-6 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(b) Although blue kill boxes are not intended to incorporate pre-planned
subsurface- and surface-to-surface fires, it is possible to employ
immediate subsurface- and surface-to-surface fires, provided the fires
request is coordinated through the appropriate FC and C2 agency. This
may occur when the SCAR or KBC identifies more targets in the kill box
than the available aircraft can engage.
A-III-7 Edition D
NATO UNCLASSIFIED
NATO UNCLASSIFIED
This appendix contains quick reference kill box terminology and briefings for airborne use;
figures A-IV-1 through 6. The pages are sized to fit in a standard flight crew check list.
Terminology
Blue kill box–The airspace included by a blue kill box extends from the
surface up to the limit established by the airspace control authority.
BLUE
Purple kill box–A purple kill box permits the integration of subsurface-
/surface-to-surface, and air-to-surface fires in the kill box using altitude
de-confliction (kill box floor).
PURPLE
permitted
COLD
Fires and Fires require Fires require
effects coordination coordination
require Aircraft permitted Aircraft prohibited
coordination
BLUE
BLUE
BLUE
a. Overview.
b. Air Tasking Order (ATO) breakdown. Scrub the ATO for mission pertinent
data to include determining:
(6) Route:
1/ Location
2/ Formation
B-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
3/ Tactics
(c) Egress
d. Target attackplanningspecifics.
(a) Formation
(b) Altitude
(c) Sequence
(d) Airspeed
(a) Formation
(b) Altitude
(c) Sequence
(d) Airspeed
a. Overview.
b. Friendly Situation.
(1) ATO breakdown. Review the air tasking order (ATO) for mission pertinent
data to include determining:
(2) Contact the ground liaison officer (GLO) for the following information:
c. Communications.
(1) Check in and out and inflight report procedures (i.e., agency, frequency).
d. Intelligence Update.
(4) Review the enemy’s most likely and most dangerous courses of action.
e. Weaponeering.
(3) Threat.
(b) Threat.
(c) Weather.
(d) Terrain.
h. Navigation Plan.
(1) Waypoints.
(c) BULLSEYE.
(2) Overlays.
i. Go/No Go Criteria.
(2) Weather.
INTENTIONALLY BLANK
INTENTIONALLY BLANK
(2) Responsibilities.
(a) Navigation.
(b) Deconfliction.
(3) Systems/Sensors.
(c) Radar.
b. Threat Counter-tactics.
(1) Surface-to-air.
(2) Air-to-air.
(e) Capabilities/limitations.
(a) Unit.
(b) Location.
D-1 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
(d) Capabilities.
(a) Requirements.
e. Cockpit Management.
f. Ingress Routing.
(1) Route.
(2) Formation/altitude/airspeed.
(4) Timing.
(5) Fuel.
(9) Coordination.
(10) Deconfliction.
(1) Overview.
1/ Waypoints.
2/ Sensors.
(c) Search.
1/ Formation/altitude/airspeed.
2/ Aircraft lighting.
3/ Lead/wingman contracts.
4/ Visual/NVDs/binoculars.
6/ Sensor predictions.
(3) Targeting.
(6) Sorting.
h. SCAR Coordination.
(c) Number/type.
(d) Position.
(h) Abort.
(a) Threat.
(d) Artillery.
(e) Coordination.
(f) Hazards.
(g) Remarks/Restrictions.
(3) Reconnaissance.
1/ Deconfliction.
2/ Lateral/geographic.
3/ Altitude.
4/ Timing.
(c) CCIRs.
(a) Holding.
1/ Location.
2/ Orientation.
3/ Altitude.
(b) Deconfliction.
1/ Lateral/geographic.
2/ Altitude.
3/ Timing.
(5) Formation/altitude/airspeed.
(a) Visual/NVDs.
(d) Radar.
(b) Capture/spot.
(13) Off-target.
(d) Deconfliction.
(g) Visual/NVDs.
j. Battlefield Handover.
(1) Threat.
(4) Artillery.
(5) Coordination.
(6) Hazards.
(7) Remarks/restrictions.
k. Egress.
(1) Flow/rejoin.
(2) Route/deconfliction.
(3) Formation/altitude/airspeed
(5) Timing.
(6) Fuel.
(9) Coordination.
l. Contingencies.
(1) DEADEYE.
(4) Weather.
INTENTIONALLY BLANK
a. During mission planning, the SCAR should examine available airspace and
ATO tasked AI assets to formulate a holding/deconfliction plan. This plan should
be as permissive as possible and as restrictive as necessary. As an example,
see figure D-1, which depicts a sectored deconfliction with Global Area Reference
System (GARS), where each 30- by 30-minute area defines one KB. The KB is
then subdivided into quadrants. If attacking a target in quadrant 1, quadrants 2,
3, and 4may be assigned to specific flights for deconfliction.
c. Bombers. Bombers have a large turn radius. Plan a minimum holding area
of 30 by 15 nm (two GARS quadrants), depending on altitude. On station time is
typically longer for bomber aircraft.
e. UAS. UAS holding airspace will vary based on the group category of UA.
UAS typically lack the ability to see and avoid manned aircraft, but may contain
other onboard systems (i.e., radio; tactical data links; or identification, friend or
foe) which allow the SCAR to use standard deconfliction (i.e., altitude, lateral, or
timing) measures. UASs belonging to different groups have different operating
altitude and holding area dimensions requirements. Detailed mission planning
and coordination between the SCAR and the UAS’s aircrew is required to
determine proper holding airspace and optimal UAS operating altitudes. The Lost
Link Plan is a pre-programmed route the UAS will fly if it loses contact with its
control station. The UAS aircrew are responsible for coordinating with and de-
conflicting their lost link routing and altitude with the SCAR.
The SCAR needs to be familiar with all weapon systems capable of reaching the SCAR
working area. With increased capabilities in long-range fire and ability to engage precision and
area targets, long-range artillery systems and naval surface fire support are available attack
options. The SCAR’s information regarding the capabilities of these assets comes from the
BCD, ground liaison detachment, or other liaison officers prior to the mission. The flight path
of each round must be included in the SCAR’s airspace deconfliction plan and will likely require
additional coordination with tactical air C2. Knowing the firing unit location and the range fan
in relation to the SCAR working area will aid in target prosecution and airspace de-conflicting.
INTENTIONALLY BLANK
DT CARD
Tasking: INV / TGT / STRIKE / SMACK INV / TGT / STRIKE / SMACK INV / TGT / STRIKE / SMACK
Track Number:
9-Line Attack Briefing
1. IP/Bullseye
2. Heading
3. Distance
4. Elevation
5. Tgt Descr.
6. Coordinates N/S
E/W
Grid.
7. Marks
8. Friendlies
9. Egress
Remarks
Desired effect / ordnance
CDE
Coord category
Cat 1 (0-20’’) / Cat 2 (21’-50’) / Cat 3 (51’-100’) / Cat 4 (101’-300’) / Cat 5 (301’-1000’)
Amplifying Information
Threats
Support assets
C2 / freq
Escort
SEAD/EA
Tanker
Other
Tgt description
Other
INTENTIONALLY BLANK
FMV systems provide near real time video down link to the ground units for CAS execution. This
means that both air system operator and ground system operator are looking at the same live
image. In CAS, FMV used to build aircrew and JTAC SA (see beyond obstacles), provides precise
coordinates, target verification, friendly fire reduction, collateral damage mitigation, real time
BDAand reduces the engagement cycle time. However FMV provides a soda straw view of the
target area through the aircraft’s electro-optical/infra-red sensors. Both aircrew and JTACs still
need to conduct adequate target talk-on prior to weapon release. FMV systems enhance, but do
not change standard CAS procedures. FMV feeds should not be used as a single-source for target
identification.FMV equipment normally comprises a terminal that provides the capability to receive
real-time sensor-data (in the form of streaming video data) from suitably equipped airborne
platforms (TGP and VDL transmitter). However, to realise this capability, aircrew and ground
forces must operate as a cohesive team. The requirement of the aircrew to understand the ground
scheme of maneuver is essential to success. FMV feed can be provided by various air platforms:
CAS platforms (FW, RW) but also UAS (either in an ISR or strike role).
b. Uplink : some targeting pods and aircraft systems can be equipped and set-
up for receiving data from the ground operator. Range of data goes from a still image
captured from downlinked feed or taken by ground party to a “flag”/geographic
point/ref indicating an SPI/potential target. This is rather emerging and not yet
mature in its technical aspect but also operational usage.
CAUTION
The JTAC must understand that FMV is an extra tool to enhance CAS operations; whilst it is
extremely beneficial, FMV use does not over-ride the need to prosecute an attack using standard
CAS procedures.
Units planning to use Full Motion Video (FMV) need to ensure desired downlink frequencies are
on the joint restricted frequency list. When multiple FMV transmitters are operating within an area,
de-conflict frequencies between transmitters to reduce mutual interference. In multiple aircraft
flights, attempt to keep the FMV transmitter on and set to a constant frequency with the ground
station switching frequencies to view desired FMV from the FMV platform. This provides a quicker
handshake than turning the FMV transmitter on/off.
b. Video type. The signal can be analog or digital, sometime in a specific mode
(linked to baud rate in aircraft, i.e. .466 rate), requiring specific set-up of the ground
system. Almost all platforms transmit video feed in black and white background.
e. Metadata. Some air and ground systems are able to send/receive metadata
through the FMV link. Some of those data can be graphically displayed on the digital
map of a compatible application as icons and/or as text in a table format. They
consist mostly in sensor/platform information (location, altitude, heading), sensor
FOV footprint, markpoint location.
Planned use of metadata must be coordinated as they are not automatically transmitted
and ground station should require specific set-up.
Aircraft holding pattern. Maximize visibility of the target area while minimizing LOS loss between
the FMV transmit antenna and the ground station. Minimizing aircraft maneuvering and
maximizing wings level time during the holding, will increase successful video reception. Consider
orienting the holding pattern so the sensor is viewing the target from the same axis as the
operator. This will enhance operator scene interpretation of the FMV and increase talk-on
effectiveness.
Not all aircraft are equipped with suitable sensors to downlink to an FMV receiving terminal;
therefore, if FMV is required to support an operation, this must be highlighted when bidding for air
support using the appropriate air request form, annotating details within the remarks section. The
following should be considered when requesting support:
a. Specify the required and potential elapsed time-on-task as this could influence
which sensor platform is allocated (loiter time of regular CAS FW/RW platform vs
bomber/UAS).
e. JTACs should assess the local operating environment as the range at which
sensor data can be received is dependent upon the aircraft aspect, output power of
its datalink, the FMV antenna type and the guarantee of LOS between the aircraft
and receiver terminal.
f. Also the technical limitations of the systems (both air and ground) need to be
reported with the initial request(ASR) / tasking (ATO).
FMV Limitations. FMV link loss has to be occasionally expected due to air platform and/or ground
platform maneuvers. Operators should anticipate a loss of reception during target attacks and
aircraft threat reactions. Ground operators must be able to identify when the feed is lost and
communicate that to the aircrew with the brevity term “HOLLOW.” In addition, both systems
operators should communicate when they anticipate the feed to be lost due to maneuvers with
the brevity term “EXPECT HOLLOW.” Operators can identify loss of FMV by:
b. monitoring the clock display on video feed. When the image freezes or the
clock stops, reception has been lost.
G.3. EXECUTION
Depending on the ground tactical situation, FMV as an SA and target acquisition tool can slightly
modify the sequence of events. Indeed, like with a non-VDL capable TGP use, sequence may
start by providing an SPI to the air system operator in order to correlate the mark/target. CAS
briefing creation may start then after TGT confirmation (correlation prior to CAS Bfg (Briefing)
procedure).
e. CAS Briefing. If JTAC has no eyes on target and proceed with correlation
prior to CAS Bfg, FMV information can be used to build this last. But caution is
required for the information accuracy and they must be correlated with other
means as much as possible. This is critical if BOC procedure will be applied.
g. Read back. Even if JTAC has used the sensor/FMV information as source
to build his CAS brief and aircrew has maintained target observation, this will
never preclude the mandatory read-back process.
h. Correlation.
(1) Types of Control. FMV can be used to assist in all 3 types of CAS terminal
attack control. Under Type 1 control, the JTAC will be visual with both target and
aircraft, FMV will be used to verify target details and expedite the engagement
cycle. However, if FMV is the primary means of identifying and engaging a target,
then as a minimum, this should be treated as a Type 2 control.
(2) Talk-On. Talk-Ons to specific targets start with the aircrew slewing their
sensor to target coordinates passed by the ground operator. The talk-on should
begin and end with the sensors in a wide enough FOV to allow the confirmation of
the correct target area. Features directly surrounding the target must be confirmed
to ensure proper target correlation and to mitigate collateral damage and friendly
fire prevention. Operators should develop SA by initially viewing the target area
through the sensor in wide FOV, then through narrow FOV, following a “big to
small” progression. Once the target is acquired and identified, the sensor may be
returned to a wider FOV as a confirmation method.
Operators may request aircrew to switch sensors or views through brevity terms.
Operators should understand that aircrew will provide the most appropriate video
available within the limits of their sensor.
Using wide Field of View (FOV) initially, refining down to narrow FOV (big to small)
enables better situational awareness. The ZOOM command can be used in all
FOVs.
Most sensors display a reference for North, but this reference should only be used
as an SA tool.
(a) Technique 1, Battleship. The JTAC employs a series of left, right, and
up, down commands coupled with a unit of measure. Example, “slew left 2
up 1”.
(b) Technique 2, Clock/Unit. The FMV video is viewed with the top of the
screen representing 12 o’clock. A unit of measure needs to be established
with the aircrew prior to proceeding. The recommended unit of measure is
from the center of the crosshair to the outer edge of a horizontal leg. The
JTAC then directs the aircrew to move the cursors using the clock position
and a unit of measure. Example: “Slew 3 o’clock for 2 units.” When the
aircrew is complete with the movement, it will call “SET”. Another technique
is to direct the aircrew to a specific identifiable feature in the video. Example:
“The white hot, inverted L shaped object at 10 o’clock for 2 units is the target.”
(c) Technique, Roadway. This method can be useful in cultural and urban
developments as Lines of Communications (LOC) are prevalent. It
incorporates the basic principles from the clock/unit method. Simply put, the
aircrew uses the sensor to follow the roads that lead to the target. The JTAC
directs the aircrew using the clock method to follow the LOC until they get to
a specific object or point, usually either a road intersection or a building.
Direct the aircrew to call contact at each intersection or point. Continue to
direct the search utilizing the clock method and LOCs until the aircrew comes
to the target area. Then transition to clock/unit and pass a final description
of the target.
(4) Unit of measure. The operator or aircrew will establish a unit of measure for
the talk-on. Movement is based on Unit of measure with direction. Unit of measure
can be:
(a) Yardstick (length from the center of the crosshairs to the outer edge
of a horizontal leg
Avoid using the full screen width or length as a unit measure. Using one-
half screen measure allows viewing of previous references when the
sensor is slewed or the FOV is changed. Movement directions based on
Unit of measure with direction
(5) Target Confirmation. The JTAC should use IR and TV sensors to identify a
target, as each sensor yields different information to the observer. Once the aircrew
identifies the target they should slew the sensor to place the target directly under
the center of the crosshairs. Once complete, the aircrew will state “SET,
CAPTURED” with any additional confirmatory communications. Operator verifies
the correct target is under the crosshairs and responds with CAPTURE”. Invariably,
the target will be positively identified in narrow FOV but operators/JTACs should
request that, prior to final clearance, the FOV is temporarily changed to give greater
coverage of the target area and allow overall situational awareness to be
maintained.
(6) Situational Awareness. Experience has shown that FMV users have a
tendency to become fixated by the TV picture and can potentially lose their overall
SA.
If FMV fails, the JTAC should then transition to having the aircrew describe what
they see through the sensor. This should confirm to the JTAC that the sensor is
positioned on the DMPI or at least in the general target area. From there the JTAC
can utilize a traditional talk-on to guide the aircrew on to the correct DMPI. If the
sensor fails, the JTAC should be prepared to conduct a visual only talk-on.
i. Attack.
It is critical that air system operator maintains target tracking during the whole attack
phase in order to permanently assess the tactical situation in the vicinity of the DMPI.
This will permit final safety check (friendlies’, civilians’ presence) concluding to a
clearance or an abort call.
Forward Firing Weapons. Some platform sensors ‘park’ in order to protect from being
damaged whenever a forward firing weapon is used. While it is possible for the aircrew
to un-park the sensor head during such attacks, it is not recommended and the JTAC
should only request this when necessary.
k. BDA. In order to conduct BDA, JTAC has to request to air system operator to
maintain sensor on the DMPI until the post effect assessment is completed. This will
lead to detailed BDA and needs in eventual re-attack.
CAUTION
Use of brevity terms must be enforced for maximizing FMV use efficiency and not hampering its
advantages.
Joint Terminal Attack Controller, due to his growing tasks and responsibilities, requires significant
and improved situation awareness and the ability to communicate rapidly and accurately in a
highly dynamic and potentially dangerous environment. Recent technologies have brought
innovative capabilities like high precision target acquisition systems, automated processing in
Geographic Information System (GIS) displaying all point of interests (target, friendly location,
IP/CP…) with their characteristics (coordinates, elevation, description…) and with ability to
transmit those data directly to the air platform system, through the standard JTAC radio.
Additionally, the emergence of network enabled warfare has enabled the JTAC to integrate into
a wider network of CAS participating units, from the AOCC to the weapons system. These
systems provide the ability to share targeting data, information and imagery along with near real
time assessment and direction at all levels of command.
These capabilities known collectively as Digitally Aided Close Air support (DaCAS) systems
provide the JTAC, the aircrew and the AOCC/chain of command/C² structure with the ability to
integrate CAS operations more rapidly and accurately over a wider area of operations.
It can also be particularly beneficial in situations involving high operational tempo, language
familiarity/issues, or communications jamming.
DaCAS systems display and manipulate targeting information on a digital GIS display enhancing
the JTAC’s situation awareness (SA) and battle space orientation. GIS information includes but
is not limited to airspace boundaries, restricted areas (e.g. ROZ, NFA), grid references (GRGs
with labels and grids), coordinates/elevation, LASER safety cones, gun/LASER to target lines,
graphical weapons effects(e.g. impact rings/areas), supporting collateral damage
estimation(CDE) and mitigation, while reducing the risk of fratricide.
Due to their nature, those systems also provide an interesting navigation tool (moving map) and
target correlation tool (aerial/Sat pictures).
DaCAS systems provide additional critical SA when conducting type 2 and/or type 3 controls
through the display and tracking of CAS aircraft positions, active kill box boundaries and changes
in the airspace control order (ACO).
DaCAS systems may further integrate NATO Friendly Force Information (NFFI) data from relevant
Combat Identification servers to increase situational awareness of the battle space, specifically
with regard to the location and status of friendly forces.
Finally, DaCAS systems may provide JTACs with options for the targeting of precision guided
munitions (e.g. JDAM) and emerging weapons systems such as the unmanned combat area
system (UCAS) and Network Enabled Weapons (NEW – for which JTACs will be able to update
directly target coordinates to the weapon after launch).
space. These include but are not limited to increased accuracy in the dissemination of target
coordinates and C² direction; enhanced communications and collaboration between multiple
levels of command across a wider area of the battle space and in the reduction of collateral
damage and fratricide incidents by CAS weapons systems.
Currently, terminal control CAS operations still require voice communications and coordination
between the JTAC and the weapons system operator, principally in the critical phases that are
target correlation and attack execution.
But data exchange will definitely demonstrate its effectiveness for the “admin” portions of the
communications: aircraft check-in, CAS briefing, BDA mainly. Technically, the systems are
designed to maintain the voice communications prioritized over the data transfers, so any urgent
call can take precedence on a data message. The term “aided” highlights the notion that DaCAS
systems provide assistance for CAS operations and will not negate or supersede voice
communications. Indeed, CAS TTPs won’t be altered (12 steps template) but slightly tweaked as
required IAW what DaCAS system can additionally provide.
Obviously, not all situations will permit the use of such systems and its use may certainly not
hamper the successful execution of the mission.
Additionally, DaCAS is actually concentrating on the terminal control portion of CAS execution,
but is growing to cover other phases (requesting i.e. : submitting a digital CAS request to C²,
sending data beforehand to air asset while still transiting to AOR).
An important principle of DaCAS is that it has to provide to ground or air player a data that
is immediately exploited by the system and usable as such, e.g. a markpoint displayed on
navigation tool or sensor, and not receiving a text message that must still be understood
and handled prior to usage (cf idiom “Use a picture. It's worth a thousand words”).
DaCAS systems employ both LOS communication and beyond line of sight (BLOS)
communications. When combined, LOS and BLOS digital capabilities provide the higher level C²
element (e.g. AOCC), the JTAC and the weapons system operator greater situational awareness
potentially increasing the efficiency and accuracy of mission execution information being shared
between those entities. It also typically results in less time spent recording and entering mission
execution information into ground/aircraft systems and/or weapons.
Data exchange can occur as a point to point communication (JTAC sending directly to an air
asset) or network based with common data sharing (JTAC “publishing” an information accessible
to all network players).
In addition to FMV, DaCAS can create a quick and efficient process to detect, assess and
prosecute a target (D3A). Indeed, providing digital information automated in aircraft system,
slewing easily sensors (targeting pod, HMCS…) on that point of interest and sending back to the
ground the live feed permits a fast and accurate cycle. Some advanced systems permit interaction
between GIS and FMV feed: extraction of point of interest from the video feed and transformation
in a target/CAS Bfg message, display of targeting pod footprint on the digital map are some
examples.
Other systems have such capabilities but as stand-alone; i.e. data sent per air platform through
the FMV feed, known as metadata, can be displayed in GIS (aircraft position, targeting pod
footprint…).
More and more air platform types are entering the DaCAS arena : rotary wing, bombers,
UAS/RPAs in addition to traditional FW CAS platforms.
Actually, one of the most important limiting factors, affecting the use of DaCAS, is the actual
relatively limited standardization in protocol type/message formats across air and ground
platforms/systems.
That issue is tempered through a thorough process known as coordinated implementation (CI) of
standards, led by US JOINT STAFF – JOINT FIRES DIVISION, involving most of NATO partner
nations, and closely followed by NATO organization. The goal is synchronizing implementation
amongst players and information exchange about capabilities, present and future. Nations
considering DaCAS use and/or implementing DaCAS are therefore encouraged to join those
existing working groups and initiatives. The coordinated implementation across platforms and
nations is hampered by the asynchronous calendars, as those ones are linked to access to
technological evolution, platform update program and funding. In order to establishing robust and
common references, a NATO CONEMP has also been created by NATO Communication and
Information Agency (NCI Agency).Nations are also bringing different national initiatives: USA
DaCAS TTPs, BEL Automated Target Hand-off System SOPs.
In order to reaching maximum efficiency and easiness for operators, critical factors conditioning
the use of DaCAS system, here are the required characteristics of the systems:
Those new technologies definitely require effective and regular training, therefore easy access to
all training resources (hardware, bandwidth…).
This aspect is critical and cannot be neglected otherwise this could lead to misuse of equipment,
or no use at all.
On the other hand, JTACs must be ready to spread their attention between computer screen and
terrain (except if working in a TOC i.e.),”screen fascination” effect can create dangerous situation.
Advantages of DaCAS
Provides greater accuracy with reduced human error through computer-displayed and
computer-generated information, and spend less time developing CAS briefings
(automation)
Higher targeting efficiency when digital systems receive and display aircraft information
such as sensor point of interest (SPI), designated ground target, or aircraft position and
target designation
Potential to increase tempo, reduce time to kill, minimize human error in information
transfer, and reduce the risk of fratricide
Provides line of sight (LOS) and beyond line of sight digital messaging capabilities. When
combined, they provide aircrew greater situation awareness and result in less time spent
recording and entering mission execution information into aircraft systems
Increased SA when friendly and opposing force information is displayed on user systems
Disadvantages of DaCAS
Requires additional time to manage digital communications and interfaces required to enter
information, increasing workload for the operator.
Difficult to accomplish in unexpected time critical situations due to complexity and non-
standard implementation of DaCAS message sets and parameters (at this time)
May require “heads down” operation in a tactical environmentwhile having to maintain eyes
on sensors, targets, or ground threats
Taking additional equipment required for DaCAS (LOS or BLOS) won’t be possible in all
operations.
DaCAS systems are not designed to replace or supplant current processes within the C² chain of
command. DaCAS systems simply provide a more accurate and efficient method for the
coordination of CAS targeting operations.
Usual products/documents will contain critical information relative to DaCAS: JTAC and aircraft
capabilities, addressing details/set-up, will be found in ATO and SPINS.
Nevertheless, DaCAS planning documentation, specifically related to its data link messages is
resident in the Operational Tasking / Operational Tasking data link message
(OPTASK/OPTASKLINK). It contains the station assigned addresses and track block numbers
required for entering the network. Ideally, this electronic document is created in a format that can
be read/exploited by DaCAS air or ground system, loading all required information automatically
in the mission planning systems (this is part of the additional goals of DaCAS standardization and
DaCAS implementation in other phases then just execution).
DaCAS, like CAS in general, is executed by the same C² elements and participants:
a. AOCC
c. Tactical Aircrew
e. JFSE
f. JTAC
g. FAC(A)
Note: airborne digital targeting weapons systems (aircraft/UAS) and ground based DaCAS
systems generally don’t send the same type of messages (as per CAS procedures : aircrew sends
check-in brief while JTAC not but FAC(A), as dual role, will have a mix of those capabilities.
a. Joint Interface Control Officer (JICO). The senior multi-TDL interface control
officer in support of JTF operations. The JICO is responsible for planning and
management of the Joint TDL network within a theater of operations. He will typically
coordinate and issue the OPTASK(LINK).
b. Joint Interface Control cell (JICC). Led by JICO, this entity is responsible for
network architecture design, coordination, maintenance…
Additional protocols do exist (CoT, XML, MTS) aboard specific platforms (AC-130, B-1, AV-8).
Integrating these capabilities requires a DaCAS system with a wider range of protocols. JTACs
and weapons system operators should review the capabilities of their respective systems prior to
engaging in operations.
Currently, VMF and Link 16 are the primary standards being employed in the development of new
DaCAS systems. As a result, further discussions of DaCAS capabilities and employment will
focus on the two protocols. Note that :
H-6 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Some systems don’t require specific hardware/communications means, as they make use of the
standard radios used as voice carrier (AFAPD or VMF on VHF/UHF radio i.e.), but contradictorily,
some other systems do require specific additional equipment and dedicated architecture (unless
working through a gateway): L-16/SADL.
DaCAS system data exchange can be performed in secure and non-secure, frequency hopping
over variable carriers (UHF, VHF, SINCGARS, Have Quick, etc). Short data bursts in non-
permissive environment and when communication quality is poor is a possible technique for
suitably equipped systems.
The possibility exists to transfer data from a specific network into another one configured for
another protocol. This happens typically through a gateway.
This one is a generic term for a C², Communications, and ISR network node designed to provide
interoperability by interfacing between two (or more)
Systems or networks that use different protocols. This system translates in fact a protocol into
another one while being transparent for the user.
Select DaCAS systems further support related ground-ground/surface-surface fires (e.g. artillery,
naval gunfire, etc. These capabilities known as Digitally Aided Fires (DAFS) are nation/service
H-7 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
specific and may not be available to the JTAC depending on the operation and its participants.
Other areas are also explored like Digitally Aided Personnel Recovery (DAPR) i.e.
Planning process for DaCAS is not generally different from a standard CAS mission. The primary
exceptions being the need to coordinate the additional technology and communications issues.
For DaCAS equipped JTACs, the planning phase is even more critical and must encompass the
following considerations:
a. Are CAS participants DaCAS capable (e.g., trained JTAC& weapons system
personnel, compatible systems) ?
c. How can DaCAS be used and in the best possible manner (JTAC on front line
sending information back to a JTAC working from a TOC, preparing/processing the
digital messages i.e., and following better the ground/air situation thanks to his
systems) ?
f. Are all agencies involved in the process and having DaCAS capabilities clearly
identified ?
g. Are all products available for supporting the mission through DaCAS means ?
(digital maps, elevation database, other digital products (overlays, FSCMs,…)
It is also critical that operators have sufficient knowledge of the employed GIS.
As previously stated, data transmission can be done by using Line Of Sight (LOS) or Beyond Line
of Sight (BLOS) capabilities.
(1) VMF
(2) AFAPD
These LOS protocols permit JTACs and aircrew to digitally exchange messages, such
as check-in and CAS briefing. VMF provides the most extensive digital information
exchange between similarly capable platforms and ground based terminal attack
controller kits. VMF is the near-term, LOS DaCAS standard for the terminal attack
control phase of CAS missions. Those different protocols have different message sets,
VMF having the broadest one, going further than the minimum set required for CAS
execution.
LOS DaCAS capabilities have the advantage of increased bandwidth and low latency
for data being shared between the JTAC and the weapons system operator. The
primary disadvantage lies with the aircraft’s need to stay in LOS with the JTAC. In
areas where screening is an issue (e.g. mountainous terrain, urban environments)
maintaining LOS may become problematic. LOS communications are usually between
the JTAC and the weapons system operator (aircrew). The distance to the C² element
(e.g. AOCC) normally precludes this capability.
Examples of common BLOS capabilities are networked Link 16 (L-16) and situation
awareness data link(s) (SADL). BLOS links can be non-nodal and provide many
network participants with situation awareness information simultaneously. JTACs with
access to Link 16 and SADL C² nodes are able to place land tracks reflecting hostile,
friendly, and other points of interest, send free text messages as well as mission
assignments, and receive target sorting messages on data links. Doing so allows link
capable C² elements and aircraft to view the information published and expedite the
target acquisition process. In some cases, this enables C² elements and JTACs with
data link access to provide SA information to CAS aircraft well before they establish
voice communications with the terminal attack controller. The main disadvantage of
BLOS is connection requirement to a gateway, mostly found at AOCC level. This will
impose specific set-up of DaCAS equipment and heavier resources. BLOS DaCAS
capabilities are substantially no different than LOS capabilities, except that the actual
message sets are not specifically designed for CAS operations. The primary difference
being the carrier on which the data is disseminated. BLOS capabilities have the
advantage of range over LOS capabilities and in some cases (e.g. TACSAT), may
H-9 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
provide higher levels of bandwidth and throughout over LOS carriers. The primary
disadvantage lies with the needs for additional infrastructure such as antennas and
radios to contact and share data within the network. BLOS communications are usually
between the JTAC and the C² element (e.g. AOCC).
Each layer/”component” has its own version/revision. But the message type is the
common reference name when talking about VMF standard. So VMF will be found
as 6017 plus the version/revision. The current revision is revision B, then
commonly called MIL-STD 6017B.
Note that many DaCAS systems currently support MIL-STD 6017B with some
systems still on MIL-STD 6017A.
VMF protocol is made of a more complex addressing structure and can be used in
point to point or shared network architecture.
This protocol is typically used for dissemination of data link information within a
larger network of participants. DaCAS employed over Link 16 and SADL entails
the use of messages exchanged over various radio frequency (RF) and non-RF
systems. J-series messages are both fixed format (J3.5 Land Track/Point) and
non-fixed format (J28.2 Free Text). The range of information exchanged and the
greater distances at which data exchange may occur over a network makes J-
series messaging attractive for building situation awareness and providing
command and control.
JTAC planning for DaCAS with Link 16 should coordinate with the appropriate C²
element (AOCC) for assignment of JUs and track blocks. JTAC should be prepared
to reference published track numbers to supporting aircraft and other controllers,
i.e., FAC(A) and JFO.
A thorough study of data link standards found in SPINS is also required. A key item
to look for in the SPINS’s information highlighting the difference in J-series
message implementation between CAS platforms. Understanding the difference
between platforms’ J-series message implementation is important to the CAS
planner as it details what can and cannot be shared between the participants in
the network. For example the length of J28.2 free text messages will vary between
aircraft types.
The following paragraphs have general comments on network construction, mission number and
call signs. The section IV preparation contains the addressing considerations for each of the
DaCAS family of capabilities (VMF, Link 16/ SADL, AFAPD, and MTS) and a section on
considerations for gateways.
(2) BROADCAST method can’t get an ACK but permits to perform the “auto-
learning”, that consists in the ability for the receiving station in reading the message
sender’s addressing details and set these up in own addressing table. This is
specific to broadcast only.
It does not mitigate confusion when two aircraft show up with the same Unit
Reference Number (URN) on the same frequency.
Weapons system operators and JTACs must use only assigned URNs as provided
by the joint interface control cell in the OPTASK Link or Combat Network Radio
(CNR) segment.
b. Network construction. During planning phases, ensure that BLOS and LOS
network architectures are properly constructed. Data links information should be
coordinated at the Joint-service level by the JICO with assistance from the AOCC.
VMF, Link 16 and SADL will have their own segments within the OPTASK document.
The role of developing and managing the “OPTASK LINK, CNR SEGMENT” for the
VMF network has been given to the JICO community; resourcing is still being
determined to provide this capability. The AOCC will need to participate with the
JICO in preparing these products. The JTAC is responsible for programming the
communications nets into his ground kit.
(1) Mission Number: In theater, mission numbers will be assigned per the ATO.
(2) Call sign: Use the Link-16 Standard (First and last letter of the name
component of the call sign, then the call sign number). VMF messages allow for
more characters, but JMPS (aircrew data loading system) can only accommodate
six characters.
Example: Aircraft call sign from the ATO is “TIGER 21”, the digital network call sign is “TR21.”
H.4. PREPARATION
As with all CAS mission preparation, DACA Sand all JTAC related equipment configuration should
be carefully checked:
VMF and Link-16/SADL data links generally require more preparation for the mission planning
side in terms of addressing set-up. CAS weapons systems’ addressing information is obtained
during mission planning from the AOCC, through Ops products (ATO, SPINS, OPTASKLINK..),
a broadcast check-in from aircraft, or verbally from the pilot during check-in.
a. Addressing considerations for VMF. VMF uses K-series message sets. This
protocol is made of different components having their own role in the message
architecture. Those fields are transmitted in the message (like origin address in an
Email), this being part of the auto-learning process.
(f) URN.
Note
Internet Protocol Assignment. Internet protocol is designed for large networks where a message
may pass through several routers before it arrives at its destination. That does not happen in VMF
DaCAS networks. The internet protocol address is for future growth only and serves no specific
purpose at this time. However, an incorrect internet protocol address setup can cause broadcast
and multicast communications to fail. (Broadcasting is the way stations auto-learn; internet
protocol address errors can defeat, and have defeated, auto-learning.) The current
recommendation is to assign a unique internet protocol to each aircraft. The internet protocol
address assignment scheme, in USA, is based on squadron number but NATO still has to define
a similar process. Possible solution based on USA is as follows :
1.1.YYY.XXX 2
YYY is squadron number and is limited to 0-254. If squadron number is higher than 254, divide
by two. VMFA 314 = 157. If squadron number is over 509, divide by three. The JICO may need
to resolve redundancy that may occur where the numbers of two squadrons yield a common
number.
(1) Link Addressing. Link address is the means by which radios uniquely
identify each other on a given channel. Link addresses should not be duplicated
simultaneously on a channel. The Link address is the ATO call sign numeric and
is valid for numbers 05-95, but numbers ending in 5 are reserved for JTACs and
numbers ending in 6 are reserved for FAC(A).
(3) URN Addressing. URNs have the least effect of the three address elements
within the VMF DaCAS domain but are important to friendly force tracker systems.
URNs range between 0 and 16777215 with 16777215 reserved as a broadcast
URN. Each Service has a block of URNs. However, VMF DaCAS specific URNs
are not finalized; thus some ad hoc assignments may be in use. When establishing
VMF digital communications DaCAS systems may automatically learn each other’s
URNs. As noted earlier, while auto learning is a benefit, it does not mitigate
confusion when two aircraft show up with the same URN on a channel.
WARNING
Data Transfer of Coordinates by VMF Messages. When using VMF for digital transfer of
coordinates, either MGRS or latitude/longitude, data is entered, then converted by the
sender’s system using computer language, and then re-constructed at the receiving end.
Because of limits involved with computer language (coordinate value falls between defined
values), coordinated data rounding errors exist and could result in an error of as much as 6
– 10 meters.
A slight roundup (third decimal in Lat/Long (DMT) could also be noticed in AFAPD protocol.
(1) JTIDS [Joint Tactical Information Distribution System] Unit (JU) Number.
Also known as a source track number, this JU defines the platform. Like C²
systems, users will have a “track block” associated with the machine’s JU that
allows the placement of “points” on Link 16 that are identified by numbers within
the track block.
Each JTAC will need to know what platforms will be in the Link 16 segment of the
OPTASK Link in order to configure his system for Link 16 interoperability and know
what track block he has to work from.
Placing digital marks, i.e., friendly position, target, and planned routes of travel and/or
surveillance indicators in the objective area for ready reference during CAS talk-ons, is
a principal advantage of Link 16 and SADL. The effective use of J3.5 Land Tracks as
marks will also require disciplined track management and timely removal of non-
relevant tracks.
NOTE: As with other DaCAS tools, Link 16 use may result in significant “heads-down”
time spent composing free text messages and thus may dictate TAC suite employment
from tactical operation centers. Keep in mind; if a free text message takes a long time
to compose it will also take heads down time for the aircrew to read.
Messaging format is using X-series messages. To establish a link, the JTAC must have
the AFAPD link address for the specific aircraft. The aircraft should use link address
XX where XX corresponds to ATO call sign number.
The aircraft should ensure the link address used is known by the AOCC. The AOCC
should pass the flight’s AFAPD address to the JTAC/TACP to help expedite the
establishment of digital connectivity. Conversely, situation permitting the AOCC should
provide the JTAC/TACP’s AFAPD link address to CAS aircraft as part of the mission
tasking and Situation update.
In a similar fashion as link addresses for VMF, numbers ending in 5 are reserved for
JTACs.
Note :Use of gateway and related TTPs is actually under development. The
following explanations reflects what is actually encountered and this example is
from USA.
Gateways allow the JTAC with UHF SATCOM or HF to communicate digitally BLOS
with link capable aircraft by transmitting a J-series message, such as a J3.5, over CNR
to the gateway. At the gateway, the JTAC’s targeting and situational awareness
information is broadcast to all aircraft in the Link 16/SADL networks. The USAF’s ASOC
H-15 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
gateway provides TACPs with the capability to publish digital reference points and other
information onto the data link network for Link 16 and SADL capable aircraft. The ASOC
gateway includes a joint range extender (JRE) for interface to the Link 16 network and
the JRE JTEP [Transparent Multi-platform Gateway Equipment Package] for interface
to Link 16 and SADL networks. Most USAF CAS fighter platforms and most USN and
USMC fighters are Link 16 capable. All A-10Cs and ANG F-16C+s are SADL capable.
The gateway is capable of sending information from the Link 16/SADL networks back
to DaCAS-equipped JTACs.
Including a gateway in the DaCAS kill chain is extremely beneficial for situational
awareness of the maximum number of platforms in the AO. With this, they employ
BLOS connections that can have latency for real-time decisions. Planning for gateways
in the JCAS mission will require thought of what J-series messages can be published
before air players arrive on station. Coordinate with the ASOC/DASC early to publish
as many J3.5 land track/points and build your J28.2 free-text-messages to send before
this time. Also, it is imperative to understand that the incorporation of a gateway allows
for the gateway owner (ASOC/DASC) to help you publish tracks. A technique of using
the ASOC/DASC follows: During a target nomination, voice over radio to the ASOC to
publish the targets location and report back with the track number assigned to the point.
Once the track number is received, voice to the aircrew of the presence of the track
number, typically by line 5 or 6 of the CAS briefing.
Use of gateway must be supported by a robust management plan depicting which traffic
is allowed IOT avoiding saturation of the network.
DaCAS requires particular attention to the capabilities of digital systems. AOCCs and JTACs must
be aware of aircraft capabilities and their JTAC system’s communication prerequisites to enable
the timely and effective use of digital communications. Not all aircraft or JTAC systems have the
same setup requirements for digital communications.
Thus, it is important that air and ground system operators understand their digital communication
requirements and be prepared to provide that information to others. When practical, the AOCC
should include in the ASR approval the supporting CAS aircrafts’ parameters for digital
communication.
Fighter check-in
X204 K02.34 J28.2 FT
(aka “On-station
OSR(formatted) (formatted) (unformatted)
report”)
K2.35 DPIP
Clearance
Attack N/A TBD standard
K2.58 CAC
by voice !!
(clearance)
X204FT J28.2
BDA K02.28
(unformatted) (unformatted)
Digitally aided CAS systems are not yet fully mature and continue to evolve (i.e. free text used for
situation update could be formatted under the TTFACOR/TEFACHR). Some information used
typically in voice CAS briefing are not yet implemented (egress altitude, keyhole template…) but
current interoperability exercises (BOLD QUEST series i.e.) and tests sessions including thorough
coordination with industry are bringing the required corrections.
Messages are not implemented in the same manner in all air/ground platforms, some fields or
messages (BDA i.e.) are not supported by certain platforms. JTACs can there expect slight
differences and must be mentally be prepared to that required flexibility.
Some messages can’t also actually replace as such the voice equivalent message : best example
is OSR/fighter check-in. Indeed, while one voice message will provide full set of required
information, this is not always the case with a single digital OSR !
Tools like digital messaging, image exchange and FMV help increase participants’ SA but do not
replace the need for voice coordination that typically completes the tactical situation picture
developed by aircrew and JTACs. Where practical, CAS aircrews and JTACs should capitalize
on data link capabilities and the increased SA that their use may bring to a tactical situation. In
some situations, most often driven by gateway availability, the use of data link (Link 16/SADL)
land tracks as “electronic marks” may expedite the target acquisition process. The same “digital
mark” message is also actually under study for LOS.
When using land tracks, aircrew and JTACs must familiarize themselves with potential system
inaccuracies. CAS participants should also use established brevity terms to indicate the
H-17 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
transmission and receipt of digital data. The proper use of brevity terms may reduce the incidence
of voice transmissions interfering with digital communications. Brevity terms are also useful when
working with a mixed force of digital and non-digital CAS aircraft. Using brevity terms clues non-
digital players on when to remain silent so as not to impede data transfer.
WARNING
Digitally aided close air support (DaCAS) has the potential to rely on the information for
traditional terminal control or precise locations. Two key warnings must be adhered to when
employing DaCAS. (1) Presence or lack of digital information does not substitute or constitute
clearance and (2) Digital track quality (the displayed value of the system’s confidence of the
quality of the track) does not necessarily indicate location error (e.g. target location error).
LINK ADDRESS Derived from the air tasking order (ATO)-assigned call sign,
the link address is the two digit number contained in the call
sign. Numbers ending in 5 are reserved for JTACs and
numbers ending in 6 are reserved for FAC(A).
MISSION NUMBER The mission number assigned per the ATO. Note: For
training missions not supported by an ATO mission number,
a training mission number should be designated and
entered into aircraft network.
MULTICAST A message addressed to more than one but not all stations
simultaneously. In VMF DaCAS, each receiving station that
receives and decodes a message multicast to it will issue a
“link ack” in an order determined by each station’s link
address.
TRACK NUMBER Data link information file number (commonly called “track”
or written as TN)
CAPTURE The time at which aircrew has acquired and is able to track
a specified air-to-ground target with an onboard sensor.
CALL READY FOR DATA Aircrew or terminal attack controller is to check setup and
make sure his station is ready to receive data burst.
DATA STAND-BY Data transmission expected shortly.
DATA RECEIVED Data successfully received.
READ BACK CORRECT Terminal attack controller to aircrew call. Aircrew has done
a correct read back of the CAS briefing.
READY FOR DATA Aircrew or terminal attack controller is ready to receive data
(CAS brief, check in brief, mark point, free text message).
TIMBER SOUR L-16 specific :Indicates there are potential problems with
net entry and initiates pre-mission link troubleshooting
(opposite of timber sweet).
ZAP Request for data link information, for example “Zap data or
Zap point”
H.5. EXECUTION
In general, the DaCAS mission sequence of events remains the same as one conducted
exclusively by voice.
Due to the infancy status and use of L-16 in DaCAS Ops, TTP details will be intentionally
omitted in this paragraph, which will concentrate on VMF protocol.
a. Routing/safety of flight.
May be sent via preplanned free text if coordination is made such that routing and safety
of flight instructions are prepared prior to aircraft check-in and all aircraft on station are
a type, model, series (T/M/S) capable of receiving it. Due to the requirement to
expeditiously transmit routing and safety of flight instructions as soon as possible after
aircraft check-in, voice communication and not free text should be used if preplanned
free text was not made prior to aircraft check-in, if any changes to the preplanned free
text are required, or there are different T/M/S aircraft on station that will not receive the
free text message.
b. Aircraft Check-in. The JTAC will provide the weapons system operator with
addressing details if aircrew is not in possession of this already. This will permit
aircraft without auto-learn capability to enter JTAC address network page.
(1) The airborne weapons system operator will send an on station report (OSR)
to the JTAC to establish digital two way COMMS. The aircrew must be able to
expeditiously add the JTAC to the network, collect OSR data from the wingman,
and transmit the OSR back to the JTAC. The JTAC will utilize the OSR to create
an active flight within the kit, if it was not yet existing in the mission planner of the
kit.
NOTE: It should be SOP for the flight lead to collect wingman data as part of
TACADMIN [tactical admin] prior to checking in with the JTAC to expedite
the OSR.
(2) The aircrew will send an additional free text or voice message that contains
additional information that is not contained within the OSR, as applicable (e.g. full
motion video, helmet, LASER code)
c. Situation update.
Sent by free text. Should be brief and include only information that is relevant to the
mission. Most aircraft systems can accept no more than 200characters. Slashes “/”
separate individual portions of the message with a double slash to mark the end. The
following example is 155 characters.
d. Game plan.
JTAC sends free text game plan “TYPE 2 / BOC / 1XGBU-38V4 EA / 2 MIN SPACING//”
NOTE: If the JTAC does not have a digital game plan ready? he should proceed with
voice instructions.
e. CAS Brief.
JTAC should utilize digital CAS briefing, but be prepared to revert to voice if the digital
briefing is not received by the aircraft
f. Read backs. The Aircrew will read back all required information verbally.
(1) Aircraft Position Target Designation (APTD) Information. With VMF, the
JTAC can request a single APTD from the aircraft in order to display a momentary
aircraft position and the designated ground target provided the ground kit displays
single APTD data. An APTD request may also be initiated by the ground station
resulting in continuous tracking of aircraft position and target designation with
updates provided every 5 seconds. The JTAC should disable the APTD once the
designation is verified.
(2) Some aircraft are unable to transmit an APTD. However, SADL and Link 16
only equipped aircraft (F-16C+ and F-15E) can provide similar attack position and
target designation information by publishing their sensor point of interest (J12.6
message) via Link 16.
(3) JTAC and aircrew should confirm format of Lat/Long in use if the transfer of
locations (e.g. Line 6) is grossly incorrect on the read back.
g. Correlation
(1) In a BOC scenario, correlation is complete after the read back requirement
has been met.
(3) Once correlation is complete the AIRCRAFT can send an APTD to the JTAC.
This will show the updated target position on the JTAC’s map.
(1) IP INBOUND Call: The aircraft can send a departing IP (DPIP) message to
the JTAC in lieu of a voice “IP Inbound” call.
(2) IN Call: A voice “IN” call remains the primary method of transmission. If
briefed, “IN” can be indicated by a second DPIP following the initial DPIP (on
departing IP). Another option, if briefed, is an aircraft-initiated APTD following the
initial DPIP (on departing IP). This would be based on prior coordination between
JTAC and aircrew. Another alternative is to transmit a preformatted “IN” free text
message.
(3) The JTAC can initiate a continuous APTD track to graphically display the
aircraft position and target designation. Due to this message reoccurring every 5
seconds, this functionality should be disabled after JTAC is satisfied that aircraft or
target designation location is confirmed depending on type of attack and method
of engagement. This will avoid impact on necessary voice communications.
(6) Continue dry / cleared hot / cleared to engage” and “abort” shall be sent via
voice communication as a primary method and may be sent via digital message as
a secondary method immediately after corresponding voice call is transmitted.
(7) JTAC should utilize a kit specific “End of Mission” function to administratively
remove mission graphics from display and send pre-formatted BDA free text to
aircraft.
Assess and repeat game plan through conducting the attack as required. Re-attack
instructions maybe sent via free text message or voice depending on timing
requirements.
j. BDA.
Summary BDA may be sent via a VMF K02.28, via free text, or via voice if not already
sent at the end of each attack.
DaCAS conducted BLOS via networked links may require a JTAC to employ two radios or to
move between two radio nets; one to access the data link network and the other for strike primary.
Controllers employing Link 16 should have an appreciation of the time required to initiate and
publish to the link all relevant tracks for terminal attack control operations.
Generic CAS execution sequence using DaCAS messages is depicted but doesn’t detail all
regular voice actions. Typically, JTAC/aircrew should send a voice warning order prior to sending
a digital message, by requesting if ready to receive. This will ensure good receipt.
6
If no R&S message possible, following initial verbal contact, broadcast a free text (K01.1) containing a request for
OSR. Strike aircraft that are able can then “capture” (“auto learn”) the JTAC’s ground kit VMF addressing information
if those were unknown.
7
FACs can also capture flight lead’s digital address information from the on station report addressed to the FAC’s
ground kit.
8Some VMF messages permit the JTAC to get some of the required read-back items : K2.57 APTD (Tgt
location) but not all (friendlies i.e.)
9 Aircraft system will generate after aircrew action will generate this message
10JTAC can send a K2.59 message that queries automatically the aircraft system which replies without
aircrew action.
11APTD (K2.57) will display A/C location, target location and LOS line between A/C and Tgt
12
At this point the mission would transition almost entirely to voice as corrections from the mark are passed
and acknowledged, or in the case of LASER weapons employment, the associated LASER
communications, and finally a voice cleared hot or abort, all concurrent with any aircraft status messages
that may be passed for FAC’s SA.
H-25 Edition D Version 1
NATO UNCLASSIFIED
NATO UNCLASSIFIED
Remark :A data hollow will trigger a new digital transmission afterwards. After some
unsuccessful trials, decision has to be made to switching back to voice
: ground to air
V : voice
D: data
D+ V
D+ V
D+ V
D+ V
D+ V
D+ V
D+ V
D+ V
D+ V
13
JTAC ensures APTD is terminated to stop tracking of aircraft. The APTD request should stop once the
JTAC is satisfied the aircraft designation point is correct per the mission. The risk with keeping this message
exchange (continuous APTD) until attack complete is the data bursts associated with the APTD message
exchanges. The data bursts on the TAD net are very disruptive to aircrew and may interfere with voice
communications.
Remarks
Standard : by voice, but can be performed by data as well/in addition
1 As only one type of ordnance is Txed by data, rest of SCL must be passed by voice
2 Data if time permits and can be complemented by voice. Abbreviated, based on
TTFACOR/TEFACHR acronym, see § 3.2 for more details and example
3 Data if time permits and can be complemented by voice. See § 3.2 for more details and
example
4 Normally no voice Tx needed, all required information are possible in data
5 Data if time permits. Free text format. See § 3.3 for more details and example
6 Voice only
7 Voice only a priori
8 Voice only, clearance ALWAYS by voice
9 Voice only
10 Voice a priori, data possible if time permits
11 See 1 above
INTENTIONALLY BLANK
AI Air Interdiction
AO Area of Operation
BP Battle Position
BG Battle Group
CE Circular Error
CL Coordination Level
CP Contact Point
DE Directed Energy
EO Electro Optical
EW Electronic Warfare
FO Forward Observer
FW Fixed Wing
HA Holding Area
HF High-Frequency
ID Identification
IP Initial Point
IR Infra Red
IRP IR Pointer
JF Joint Fires
LO LASER Operator
LOS Line-Of-Sight
LTL LASER-to-Target-Line
RW Rotary Wing
SA Situational Awareness
UA Unmanned Aircraft
INTENTIONALLY BLANK
NATO UNCLASSIFIED
NATO UNCLASSIFIED
ATP-3.3.2.1(D)(1)
NATO UNCLASSIFIED