zotero-db/storage/YIMZ9RN8/.zotero-ft-cache

1926 lines
346 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

FM 3-01
U.S. Army Air and Missile Defense Operations
DECEMBER 2020
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited. This publication supersedes FM 3-01, dated 2 November 2015.
HEADQUARTERS, DEPARTMENT OF THE ARMY
This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard).
Field Manual No. 3-01
*FM 3-01
Headquarters Department of the Army Washington, D.C., 22 December 2020
U.S. Army Air and Missile Defense Operations
Contents
Chapter 1 Chapter 2 Chapter 3
Chapter 4
Page
PREFACE..................................................................................................................... v
INTRODUCTION ........................................................................................................ vii
ARMY AIR AND MISSILE DEFENSE ...................................................................... 1-1 Overview.................................................................................................................... 1-1 ADA Role and Capabilities ........................................................................................ 1-2 AMD Foundational Principles and Tenets ................................................................. 1-4 AMD Principles .......................................................................................................... 1-4 AMD Employment Tenets.......................................................................................... 1-6 ADA Operations......................................................................................................... 1-7 ADA in Support of Unified Action .............................................................................. 1-7 ADA in Support of Unified Land Operations .............................................................. 1-9 Training.................................................................................................................... 1-11
AIR AND MISSILE DEFENSE OPERATIONS PROCESS ...................................... 2-1 AMD Operations Framework ..................................................................................... 2-1 Force Operations ....................................................................................................... 2-2 Engagement Operations............................................................................................ 2-7
THREAT .................................................................................................................... 3-1 Operational Environment........................................................................................... 3-1 Threat Tactics and Objectives ................................................................................... 3-2 Theater Air and Missile Threats ................................................................................ 3-3 Ballistic Missiles......................................................................................................... 3-3 Large-Caliber Rockets............................................................................................... 3-4 Aerodynamic Missiles ................................................................................................ 3-4 Hypersonic Weapons ................................................................................................ 3-5 Unmanned Aircraft Systems...................................................................................... 3-5 Manned Rotary-Wing Aircraft .................................................................................... 3-7 Manned Fixed-Wing Aircraft ...................................................................................... 3-7 Rockets, Artillery, and Mortars .................................................................................. 3-8 Electronic Warfare and Cyber ................................................................................... 3-8 Strategic Missile Threats That May Impact The Theater .......................................... 3-9 Summary ................................................................................................................. 3-10
COMMAND AND CONTROL OF ADA FORCES..................................................... 4-1 Mission Command ..................................................................................................... 4-1 Command of ADA Forces.......................................................................................... 4-2 Commmand Relationships ........................................................................................ 4-3
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-01, dated 2 November 2015.
FM 3-01
i
Contents
Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9
Elements of Command ............................................................................................. 4-3 Control and Coordination of ADA Forces.................................................................. 4-5 Elements of Control................................................................................................... 4-5 Coordination .............................................................................................................. 4-6 Authorities: Command and Control.......................................................................... 4-6 Air and Missile Defense Operations are Inherently Joint and Interdependent ......... 4-7 Army Air and Missile Defense Operations Require an Integrated and Networked Command And Control System ................................................................................ 4-7 Command of Air Defense Artillery Forces is Exercised by Army Commanders ....... 4-8 Control of Army AMD Fires is Exercised in accordance with Joint Force Commander Directives and by Delegated Authorities ................................................................... 4-8 Positive and Procedural Measures of Control ........................................................ 4-10
ARMY AIR AND MISSILE DEFENSE COMMAND.................................................. 5-1 Roles and Capabilities .............................................................................................. 5-1 AAMDC Composition ................................................................................................ 5-2 Command and Control .............................................................................................. 5-3 Force Operations ...................................................................................................... 5-4 Engagement Operations ........................................................................................... 5-7 Sustainment Operations ........................................................................................... 5-7
ADA BRIGADE......................................................................................................... 6-1 Roles and Responsibilities ........................................................................................ 6-1 Brigade Composition................................................................................................. 6-2 Command and Control .............................................................................................. 6-3 Force Operations ...................................................................................................... 6-4 Engagement Operations ........................................................................................... 6-5 Sustainment Operations ........................................................................................... 6-6
ADA BATTALION..................................................................................................... 7-1 Roles and Responsibilities ........................................................................................ 7-1 Support to Joint Air and Missile Defense .................................................................. 7-2 Support to Unified Land Operations.......................................................................... 7-2 ADA Task Force Composition................................................................................... 7-3 Command and Control .............................................................................................. 7-6 Force Operations ...................................................................................................... 7-8 Engagement Operations ......................................................................................... 7-11 Sustainment Operations ......................................................................................... 7-12
ADA BATTERY ........................................................................................................ 8-1 Roles and Capabilities .............................................................................................. 8-1 Support to Joint Air and Missile Defense .................................................................. 8-1 Support to Unified Land Operations.......................................................................... 8-2 Battery Composition.................................................................................................. 8-2 Command and Control .............................................................................................. 8-3 Force Operations ...................................................................................................... 8-5 Engagement Operations ........................................................................................... 8-7 Sustainment Operations ........................................................................................... 8-7
ADA PLATOON........................................................................................................ 9-1 Roles and Capabilities .............................................................................................. 9-1 Support to Joint Air and Missile Defense .................................................................. 9-1 Support to Unified Land Operations.......................................................................... 9-2 Platoon Composition ................................................................................................. 9-2 Command and Control .............................................................................................. 9-3 Force Operations ...................................................................................................... 9-5 Engagement Operations ........................................................................................... 9-6 Sustainment Operations ........................................................................................... 9-7
ii
FM 3-01
22 December 2020
Contents
Chapter 10
Chapter 11 Chapter 12 Appendix A Appendix B
ADAM CELL ........................................................................................................... 10-1 Roles and Capabilities ............................................................................................. 10-1 Support to Joint Air and Missile Defense ................................................................ 10-2 Support to Unified Land Operations ........................................................................ 10-2 ADAM Cell Composition .......................................................................................... 10-2 Command and Control ............................................................................................ 10-3 Force Operations ..................................................................................................... 10-4 Defense Planning and Employment Considerations ............................................... 10-4 Airspace Coordination and Management ................................................................ 10-5 Engagement Operations.......................................................................................... 10-6 Sustainment Operations .......................................................................................... 10-7
COMBINED ARMS FOR AIR DEFENSE ............................................................... 11-1 General .................................................................................................................... 11-1 Command and Control ............................................................................................ 11-2 Planning and Employment Considerations ............................................................. 11-3 Engagement Considerations ................................................................................... 11-3
ADA DATA AND COMMUNICATIONS ARCHITECTURE .................................... 12-1 Major Networks........................................................................................................ 12-1 AMD Supporting Networks ...................................................................................... 12-1 Link 16 ..................................................................................................................... 12-2 LANDWARNET ....................................................................................................... 12-3 Communications and Data Architecture Connectivities .......................................... 12-3 Engagement Operations Connectivity..................................................................... 12-5
ARMY AMD STRATEGIC ORGANIZATIONS AND SYSTEMS ............................. A-1
AIR DEFENSE ARTILLERY SYSTEMS .................................................................. B-1
GLOSSARY ................................................................................................ Glossary-1
REFERENCES ........................................................................................ References-1
INDEX................................................................................................................ Index-1
Figures
Introduction figure-1. Logic chart for FM 3-01 ................................................................................... x Introduction figure-2. Hierarchy of ADA Doctrine publications ..........................................................xi Figure 1-1. ADA echelons in support of a theater of operations .................................................... 1-9 Figure 2-1. ADA echelons-planning versus execution ................................................................... 2-2 Figure 4-1. Theater AMD control relationships .............................................................................. 4-9 Figure 5-1. AAMDC organization ................................................................................................... 5-3 Figure 5-2. AAMDC AMD control relationships .............................................................................. 5-4 Figure 6-1. ADA brigade AMD control relationships ...................................................................... 6-4 Figure 7-1. ADA task force AMD control relationships ................................................................... 7-7 Figure 8-1. DPICC at the task-organized battery ........................................................................... 8-4 Figure 8-2. ADA task-organized battery AMD control relationships............................................... 8-5 Figure 9-1. Platoon AMD control relationships............................................................................... 9-4 Figure 10-1. ADAM cell AMD relationships .................................................................................. 10-4 Figure 12-1. Communications and data architecture supporting AMD forces ............................. 12-4 Figure 12-2. Communications and data architechture supporting ADA forces ............................ 12-5
22 December 2020
FM 3-01
iii
Contents
Figure A-1. Ground-based midcourse defense.............................................................................. A-2 Figure A-2. Command and Control Battle Management and Communications ............................ A-3 Figure A-3. Joint Tactical Ground Station ...................................................................................... A-4 Figure A-4. AN/TPY-2 radar........................................................................................................... A-5 Figure B-1. Patriot radar set........................................................................................................... B-2 Figure B-2. Patriot launching station.............................................................................................. B-3 Figure B-3. THAAD launcher ......................................................................................................... B-5 Figure B-4. THAAD radar............................................................................................................... B-6 Figure B-5. Avenger ....................................................................................................................... B-7 Figure B-6. Land-based Phalanx weapon system ......................................................................... B-8 Figure B-7. Sentinel radar.............................................................................................................. B-9
Tables
Introduction table 1. New terms and definitions................................................................................ ix Introduction table 2. Modified and rescinded Army and joint terms.................................................. ix Table 2-1. AMD planning and preparing tasks .............................................................................. 2-7 Table 2-2. AMD engagement tasks ............................................................................................. 2-10 Table 3-1. UAS Groups.................................................................................................................. 3-6 Table 3-2. Air, missile, and electronic warfare/cyber threats to surface targets .......................... 3-11 Table 5-1. Distinctive responsibilities of the AAMDC and ADA brigade ........................................ 5-2 Table 11-1. Summary of actions against air and missile threats ................................................. 11-5
iv
FM 3-01
22 December 2020
Preface
FM 3-01 is the Army-specific air and missile defense (AMD) publication outlining doctrinal AMD principles and guidelines. It describes how air defense artillery (ADA), the Armys dedicated component for AMD, and its organizations prepare for and conduct operations. It presents the AMD roles in support of joint unified action operations and Army unified land operations, addressing offensive and defensive, stability, and defense support of civil authorities tasks. The strategic, operational, and tactical levels of war are discussed, and AMD operations are defined in terms of their contributions to Army operations, as expressed in FM 30, the Army operational concept of unified land operations, and the joint counterair mission as presented in JP 3-01. FM 3-01 provides doctrinal guidance for commanders, staffs, leaders, and trainers at all levels in the operational and institutional forces, and is the basis for curricula development in the U.S. Army Air Defense Artillery School.
The primary target audience for this manual is the ADA community and Army/joint leaders and staff personnel. Other services and joint organizations may use this manual to gain insight into Army AMD operations.
Commanders, staffs, and subordinates must ensure their decisions and actions comply with applicable U.S., international, and, in some cases, host-nation laws and regulations. Commanders at all levels must ensure their Soldiers operate in accordance with the law of war and the rules of engagement (see FM 6-27).
FM 3-01 uses joint terms where applicable. Joint and Army terms and definitions appear in both the glossary and the text. Terms for which FM 3-01 is the proponent publication are marked with an asterisk (*) in the glossary. Definitions for which FM 3-01 is the proponent publication are boldfaced in the text. For other definitions shown in the text, the term is italicized and referenced to the proponent publication number. All ADA-unique acronyms, with the exceptions of ADA and AMD, are spelled out the first time they are used in each of the chapters to enhance readability. Common Army acronyms are spelled out only once, the first time they are used.
FM 3-01 applies to the Active Army, Army National Guard, and United States Army Reserve forces unless otherwise stated.
The proponent for FM 3-01 is the Commandant, U.S. Army Air Defense Artillery School. The preparing agency is the United States Army Fires Center of Excellence, Directorate of Training and Doctrine, Doctrine Division. Send comments and recommendations on Department of the Army (DA) Form 2028 (Recommended Changes to Publications and Blank Forms), to Directorate of Training and Doctrine, 700 McNair Avenue, Suite 128 ATTN: ATSF-DD, Fort Sill, OK 73503; by email to usarmy.sill.fcoe.mbx.dotddoctrine-inbox@mail.mil; or submit an electronic DA Form 2028.
22 December 2020
FM 3-01
v
This page intentionally left blank.
Introduction
Department of Defense Directive 5100.01 charges the Army to “conduct air and missile defense to support joint campaigns and assist in achieving air superiority.” FM 3-01 describes the contributions of the ADA, the Armys dedicated AMD component, to the planning, coordination, and execution of AMD operations in support of joint and Army forces in large-scale combat operations.
Air and missile defense is the direct (active and passive) defensive actions to destroy, nullify, or reduce the effectiveness of hostile air and ballistic missile threats against friendly forces and assets (JP 3-01). It includes actions that may be taken on the land, in the air, at sea, and in cyberspace and space. AMD is a key element of the defensive counterair construct for defeating air and missile threats. AMD operations are generally integrated with other offensive and defensive counterair missions within the overall counterair framework. While this manual addresses aspects of offensive counterair and passive AMD, it focuses on active AMD tactics and procedures.
FM 3-01 addresses today's operational environment which envisions threats to the Army and joint force that these forces have not faced in twenty-five years. In this environment, ADA units must adapt and prepare for large-scale combat operations in a highly contested air domain. FM 3-01 provides a doctrinal approach for ADA forces to fight future conflicts, explaining how the ADA echelons contribute to the four Army strategic roles: shape operational environments, prevent conflict, conduct large-scale ground combat, and consolidate gains.
This FM 3-01 version is organized in terms of the ADA echelons, unlike previous versions which were presented from the ADA systems perspectives. It presents the roles, functions, and foundational principles and employment tenets of ADA echelons, from the Army Air and Missile Defense Command (AAMDC) to the air defense airspace management (ADAM) cell. It further depicts the ADA echelons in current or nearterm operations, with respect to their AMD force operation and engagement operation actions, and discusses continuing challenges to these operations.
This version introduces and defines new AMD terms. It also defines older terms that are repeatedly used, but never defined, in other doctrinal AMD publications.
FM 3-01 consists of 12 chapters.  Chapter 1 provides an overview of Army AMD. It introduces a new ADA role statement and identifies five key ADA essential capabilities. It introduces the AMD foundational principles and employment tenets. It summarizes ADA actions in support of joint and unified land operations. Chapter 1 reintroduces short-range air defense (SHORAD), a key contributor to the protection of maneuvering forces. The chapter concludes with a discussion of the training of ADA Soldiers and leaders. Numerous definitions and expanded explanations of terms are presented throughout the chapter to facilitate understanding of AMD actions and language which are applicable to all ADA echelons.
 Chapter 2 discusses the Army operations process from an AMD perspective. AMD force operations generally consist of planning and preparatory actions required to support engagements of air and missile threats. AMD engagement operations consist of all actions to execute and assess the engagements.
 Chapter 3 addresses the operational environment, focusing on air and missile threats, from rockets, artillery, and mortars to intercontinental and submarine-launched ballistic missiles, and their generic capabilities. It also addresses the challenges that U.S. forces may face from space and cyberspace threats.
 Chapter 4 describes mission command and also command and control (C2) as related to Army AMD. It discusses the principles of mission command through the AMD lens. It also presents the applicable authorities and C2 elements resident in the conduct of engagements.
22 December 2020
FM 3-01
vii
Introduction
 Chapters 5 through 10 address the application of the AMD operational framework and foundational principles and tenets to ADA echelons, from the AAMDC to ADAM cells in maneuver brigade formations, respectively. Each chapter presents the roles and capabilities, composition, and operations in terms of C2, force operations, engagement operations, and sustainment operations for the respective echelon.
 Chapter 11 describes the contributions of non-AMD Army forces to the execution of AMD operations. It summarizes C2, planning and employment, and engagement considerations with respect to air and rocket, artillery, and mortar (RAM) threats. It introduces doctrinal and operational information on the employment of maneuver force Stinger teams.
 Chapter 12 presents an overview of the ADA data and communications architecture and the linkages between Army, joint, and multinational AMD elements.
 Appendices A and B present the Army AMD strategic organizations and systems and the ADA systems (those systems that normally support the operational and tactical levels), respectively.
Based on current doctrinal changes, certain terms for which FM 3-01 is the proponent have been added, modified, or rescinded. A listing of these terms is presented in introduction tables 1 and 2 on page ix. The glossary contains the defined terms.
Introduction figure-1 on page x illustrates the logic chart for FM 3-01. Introduction figure-2 on page xi illustrates the ADA Doctrine publications hierarchy.
viii
FM 3-01
22 December 2020
Introduction
Introduction table 1. New terms and definitions
Term Alert state
Assess Classification Complex integrated attack
Cover Discrimination Engage Hold Engagement operations Engagement sequence Fire control quality data Firing doctrine Force operations Keep-out altitude Keep-out range
Kill chain Lower tier Methods of fire Out-of-sector Primary target line Resilience Secondary target line Short-range air defense Threat evaluation Upper tier
Reasoning New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition New term and definition
New definition New term and definition New term and definition
Introduction table 2. Modified and rescinded Army and joint terms
Term Active air defense Attack operations Defended asset list Passive air defense Rules of engagement
Track Weapons control status
Weapons free
Reasoning Modifies the term per JP 3-01 Adopts the definition in JP 3-01 Adopts the definition in JP 3-01 Modifies the definition in JP 3-01 Adopts the definition in JP 3-01 Adopts the definition in JP 3-01 Modifies the definition in JP 3-01 Adopts the definition in JP 3-01
22 December 2020
FM 3-01
ix
Introduction
Introduction figure-1. Logic chart for FM 3-01
x
FM 3-01
22 December 2020
Introduction
Introduction figure-2. Hierarchy of ADA Doctrine publications
Publication Date
FM 3-01
xi
This page intentionally left blank.
Chapter 1
Army Air and Missile Defense
This chapter provides an overview of Army air and missile defense (AMD). It presents the role and capabilities of air defense artillery (ADA) and the AMD foundational principles and tenets. It continues with a brief discussion of ADA contributions to todays unified action (joint) operations and unified land operations and to tomorrows multi-domain operations. The chapter concludes with a discussion of ADA training.
OVERVIEW
1-1. The Army supports joint unified action by conducting unified land operations. While operating as part of the joint force and working with interorganizational and multinational partners, the Army forces gain, sustain, and exploit control over land to deny its use to an enemy. They do this using combined arms formations and capabilities to defeat an enemy and establish control of areas, resources, and populations (FM 3-0). AMD is one of the Armys critical contributions to these efforts. Confronted by decentralized, networked, and adaptive enemies in dynamic and uncertain environments, the Army must possess a versatile mix of capabilities, formations, and equipment to conduct AMD. The ADA force must deter and defeat air and missile threats in support of joint campaigns and assist in achieving air superiority to assure victory in a complex and uncertain world.
1-2. Air and missile defense is the direct (active and passive) defensive actions taken to destroy, nullify, or reduce the effectiveness of hostile air and ballistic missile threats against friendly forces and assets (JP 3-01). AMD is embedded in the defensive counterair portion of the joint counterair operational framework. (See paragraph 1-3) AMD is used consistently throughout this document to refer to defensive counterair actions and to the capabilities of other service and multinational partners involved in the counterair fight (for example, Navy AMD). Though not specifically addressed in the AMD definition, AMD implies an interdependency of capabilities across the services and, often, with multinational forces. Air defense artillery is defined as weapons and equipment for actively combating air targets from the ground (JP 3-01); more precisely, ADA is the dedicated Army systems, personnel, and forces that provide active, land-based defense against air and missile attacks. ADA forces execute AMD operations. ADA is used consistently throughout the document as the Armys dedicated AMD force; however, there are occasions where “Army AMD” appears in lieu of ADA, generally when addressed in connection with other service AMD capabilities, such as Navy AMD, or when referring to ADA and other Army elements that conduct AMD operations, such as the Joint Tactical Ground Station (JTAGS).
1-3. The joint counterair operational framework is based on the integration of offensive and defensive counterair operations. Offensive counterair are offensive operations to destroy or neutralize enemy aircraft, missile launch platforms, and their supporting structures and systems both before and after launch, and as close to their sources as possible (JP 3-01). Attack operations are the predominant offensive counterair operations mentioned throughout this document. Attack operations include offensive action by any part of the joint force in support of the offensive counterair mission against surface targets which contribute to the enemys air and missile capabilities (JP 3-01). Offensive actions may be conducted before, during, and after launch and, though focused on surface targets in the above definition, can include attacks against airborne command and control (C2) platforms. Defensive counterair are all defensive measures designed to neutralize or destroy enemy forces attempting to penetrate or attack through friendly airspace (JP 3-01). Defensive counterair consists of two operational elements: active AMD and passive AMD.
 Active AMD operations. Direct defensive actions taken to destroy, nullify, or reduce the effectiveness of air and missile threats against friendly forces and assets. Active AMD includes air defense (defensive measures designed to destroy attacking aircraft and aerodynamic missiles,
22 December 2020
FM 3-01
1-1
Chapter 1
or to nullify or reduce the effectiveness of such attack [JP 3-01]) and ballistic missile defense (defensive measures designed to destroy attacking enemy ballistic missiles, or to nullify or reduce the effectiveness of such attack [JP 3-01]). Though not included in the definition of active AMD operations, counter-rocket, artillery, and mortar (C-RAM) is a fundamental part of active AMD. C-RAM operations are defensive measures to destroy, nullify, or reduce the effectiveness of rocket, artillery, and mortar (RAM) threats. For, simplicity sake, air, ballistic, and RAM threats are generally referred to as “air and missile threats” hereafter.  Passive AMD operations. All measures, other than active AMD, taken to minimize the effectiveness of hostile air and ballistic missile threats against friendly forces and critical assets These measures include detection, warning, camouflage, concealment, deception, dispersion, hardening, and the use of protective construction (JP 3-01).
Note. Fixed-wing aircraft, rotary-wing aircraft, cruise missiles, and unmanned aircraft systems (UAS) have traditionally been referred to as "air-breathing threats," or more commonly as "ABTs" by ADA Soldiers. The term "air-breathing threat" has evolved over time to "air threat" in joint doctrine. Neither term has been formally defined in joint or service doctrine; they are described simply in terms of the threat set that they both encompass. Air threat is used consistently throughout this document to refer to these collective threats.
1-4. In general, while active AMD is the more prevalent counterair operational element in the early phase of campaigns, attack operations reduce the capacity of the enemy to launch air attacks over time, thus decreasing the demand for active AMD munitions in the later stages of the campaign. C2 systems link the planning and execution activities of the other operational elements.
1-5. All defensive and offensive counterair operations are enabled by joint and Army C2 elements and further facilitated by mission command. Mission command is the Armys approach to command and control that empowers subordinate decision making and decentralized execution appropriate to the situation (ADP 6-0).
1-6. While all of the operational elements are mentioned in this document, the focus throughout is active AMD and C2 as executed by ADA organizations primarily at the operational and tactical levels. Some discussion of strategic AMD capabilities is presented in appendix A, but most is deferred to FM 3-27 and JP 3-27. The combination of active AMD, attack operations, and passive AMD optimize the use of AMD capabilities in the protection of Soldiers, equipment, and other military and geopolitical assets.
1-7. “Air defense artillery (ADA) units conduct air and missile defense (AMD) operations in support of both the protection, fires, and movement and maneuver warfighting functions” (ADP 3-19). Commanders must execute and integrate fires, in combination with the other elements of combat power, to create and converge effects and achieve the desired endstate. Fires tasks are those necessary actions that must be conducted to create and converge effects in all domains to meet the commander's objectives. For example, a commander may simultaneously employ offensive cyberspace fires to attack an enemy air defense network, air support to destroy air defense C2 nodes, and land- and sea-based AMD fires to defend against air and missile threats. The converged effects provide reduced risk to allied operational aircraft.
1-8. AMD planners at all echelons from AAMDC (Army theater level) to SHORAD battery (division and below tactical level) dialogue with respective protection cell planners to finalize the echelon's defended asset list. Regular coordination is conducted to ensure that the critical assets are protected from air and missile attack and surveillance. Respective AMD organizations should actively participate in protection working groups and provide all working group personnel advised of pertinent AMD directives, actions, and the overall AMD picture.
ADA ROLE AND CAPABILITIES
1-9. The role of ADA is to deter and defeat the range of aerial threats in order to assure allies, ensure operational access, and defend critical assets and deployed forces in support of unified land operations.
1-2
FM 3-01
22 December 2020
Army Air and Missile Defense
1-10. ADA forces conduct AMD operations to support U.S. forces across the range of military operations, from military deterrence and engagement through large-scale combat operations. The primary ADA capabilities in executing AMD operations are:
 Defeat the full range of enemy air and missile threats encountered in current and future geostrategic, operational, and tactical fights. The threat spectrum encompasses ballistic missiles, ranging from intercontinental to close-range ballistic missiles; cruise missiles; UASs; RAM; tactical air-to-surface missiles; and fixed- and rotary-wing aircraft. Threat details are provided in chapter 3.
 Integrate with Army, joint, interorganizational, and multinational elements. ADA forces establish and maintain tactical data linkages to other service and multinational forces conducting AMD operations. This includes the ability to integrate across multiple weapon systems, sensors, effectors, and C2 nodes at echelon.
 Provide early warning. ADA forces provide early warning by employing sensors to detect air and missile attacks and disseminating attack warnings to forces and, where appropriate, civilian populations. C2 elements disseminate early warnings (and all clear) only to at-risk forces and, when appropriate, to at-risk populations.
 Enhance situational awareness. ADA sensors provide extended range surveillance of the airspace and detect, acquire, track, classify, discriminate, and identify aerial objects from near-ground level to high altitudes, in difficult terrain and in adverse weather conditions.
 Contribute to airspace management. Army airspace management and control functions involve identifying, coordinating, integrating, deconflicting, and regulating the Army need for and use of joint airspace. Army airspace management ensures that airspace users are synchronized in time, space, and purpose interdependently with joint and multinational forces. Air defense airspace management (ADAM) cells in brigade combat teams (BCT) and AMD sections in divisions and corps work with airspace control elements to support management of the airspace.
1-11. ADA forces consistently operate in a joint environment, maintain forward presence, and preserve joint operational access, protecting critical specified military and geopolitical assets throughout each operation. However, given the limitations in force structure as noted in para 1-16, ADA forces are unable to defend all of the critical assets dispersed throughout the theater.
1-12. AMD is inherently a joint and interdependent endeavor. Each component of the joint force contributes capabilities necessary for mission success. In addition, service capability and force structure development reflect a purposeful reliance on all components to maximize complementary and reinforcing effects while minimizing relative vulnerabilities (JP 3-01).
1-13. An ADA task force is a flexible deterrent option, showing U.S. resolve and commitment to our partner nations. For this reason, ADA forces are often called upon to maintain a forward presence. These ADA forces contain high-to-medium altitude air defense capabilities such as those found in the Patriot, Terminal High Altitude Area Defense (THAAD), and AN/TPY-2 forward-based mode radar systems. Thus, ADA forces project national power and set the conditions within the theater for projection of additional combat power.
1-14. Entry operations are likely to be contested, as the time of greatest vulnerability is in the early phases of deployment. Enemy forces are expected to concentrate on access points with air and artillery munitions to deny U.S. build-up of forces. Forward deployed or early entering ADA forces provide defense of these access points to support U.S. massing of critical combat power to seize the initiative. As the campaign progresses, ADA forces, with supporting joint and multinational AMD elements, continue to protect access points, enabling the flow of combat power, logistics, and sustainment elements.
1-15. ADA forces of appropriate strength are allocated to defend critical high value military and geopolitical assets. AMD principles and employment tenets provide a means of assessing the allocation of ADA forces to provide the right force in the right place to adequately defend these assets.
1-16. The number and dispersal of critical assets will exceed the ability of the ADA force to defend against the air and missile threats. The criticality, vulnerability, and threat methodology is used in the planning process to prioritize the assets on the critical asset list and allocate forces to evolve a defended asset list. The methodology enables an understanding of risk to undefended or under-defended assets, and operation plans can be adjusted in accordance with the risk and the AMD defensive coverage available. See chapter 2 for
22 December 2020
FM 3-01
1-3
Chapter 1
additional details. Mitigation of some of the capacity shortfalls can be achieved through contributions by the other services AMD components. In addition, the Army is standing-up additional ADA SHORAD forces and reintroducing them into maneuver formations. Short-range air defense are capabilities that provide air defense against low-altitude air threats. The ADA force is also introducing the Integrated Air and Missile Defense Battle Command (IBCS) system in the near term. IBCS provides a common C2 capability across all ADA echelons. It will allow for efficient task force tailoring of system components, vice complete systems, and the defense of more assets by the same number of ADA units.
AMD FOUNDATIONAL PRINCIPLES AND TENETS
1-17. Fundamental to the planning and employment of ADA forces and the execution of the tasks cited above for joint and unified land operations are the AMD principles and employment tenets. ADA commanders use these to design AMD defenses. When applying the principles and tenets, planners must consider the tactical and technical capabilities of each weapon and sensor system and the relevant factors of mission, enemy, terrain and weather, troops and support available, time available, civil considerations (METT-TC), intelligence preparation of the battlefield (IPB), and AMD priorities.
1-18. The principles provide an underlying rule set. The tenets identify criteria for the positioning of ADA systems.
AMD PRINCIPLES
1-19. Armed with a thorough understanding of the operational environment that is further focused through the lens of current METT-TC conditions, commanders apply AMD principles when planning active AMD operations. A principle is a comprehensive and fundamental rule or an assumption of central importance that guides how an organization or function approaches and thinks about the conduct of operations (ADP 1-01).
1-20. The AMD principles are mass, mix, mobility, integration, flexibility, and agility. Mass, mix, mobility, and integration are traditional principles that have stood the test of time. The new principles, flexibility and agility, are inherent considerations for how ADA forces organize and operate on future battlefields.
MASS
1-21. Mass is the concentration of combat power sufficient to achieve the commanders intent. Mass, when applied to AMD, is achieved by assigning enough AMD firepower to successfully defend the force or the asset against aerial attack or surveillance. To mass AMD combat power in one area, commanders may have to accept risks in other areas of the battlefield.
1-22. AMD mass may also be achieved by the launching of more than one missile against a target. In todays system-centric architectures, missile-on-target mass is achieved by assigning the target to an engaging fire unit and that fire unit selecting a method of fire, such as ripple or salvo fire, for assigned launchers to achieve the desired mass. See paragraph 2-32 on page 2-9 for additional discussion of methods of fire.
Note. A fire unit is the smallest group of personnel and equipment capable of conducting a complete engagement, from detection to destruction. In Patriot and THAAD, a firing battery is a fire unit. In Avenger, an Avenger platform constitutes a fire unit.
MIX
1-23. Mix is the employment of a combination of weapons and sensors to protect the force and assets from the threat. Mix offsets the limitations of one system with the capabilities of another and complicates the situation for the attacker. Joint, interorganizational and multinational AMD capabilities are considered when applying this principle. Proper mix causes the enemy to adjust tactics. Enemy tactics designed to defeat one system may make the enemy vulnerable to another system. Mix is achieved by assigning multiple systemcentric architectures within a defense design, with each system controlled by its C2 architecture, and coordinating with other systems in the defense. The principle of mix addresses both threat susceptibilities and vulnerabilities and ADA system limitations. For example, complex integrated attacks by enemy forces
1-4
FM 3-01
22 December 2020
Army Air and Missile Defense
seek to find out-of-sector opportunities to defeat friendly AMD defenses. Out-of-sector is defined as that part of the air and missile defense footprint which cannot be covered by a sensor or defended by a shooter. Some ADA systems can provide 360-degree coverage but are limited in the altitude which can be covered or defended. Other ADA systems are limited in azimuth (sectored).
MOBILITY
1-24. Mobility is a quality or capability of military forces which permits them to move from place to place while retaining the ability to fulfill their primary mission (JP 3-17). ADA units should have mobility that matches that of their supported units or defended assets. Current ADA units cannot match the cross-country mobility of maneuvering forces. However, Avenger systems can move with and maintain defense of the maneuver forces semi-fixed assets, and Patriot and THAAD units have sufficient mobility to move from position to position to continuously extend protection over the supported force on the move. Mobility of ADA units increases their survivability as well as that of their supported assets.
INTEGRATION
1-25. Integration is the arrangement of military forces and their actions to create a force that operates by engaging as a whole (JP 1). As an AMD principle, integration constitutes the combination of ADA and other joint counterair forces, systems, functions, processes, and information acquisition and distribution required to efficiently and effectively perform the mission. Integration combines separate systems, capabilities, or functions in such a way that they can operate singly or in concert without adversely affecting other elements. Integration has three sub-elements. Each of these can be applied to the Army architecture or larger joint or multinational AMD architecture.
 Functional integration consists of those activities associated with the allocation, distribution, and synchronization of AMD functions into the Armys theater architecture. These activities are the basis for establishing both the information required and the means to acquire, produce, exchange, and distribute that information for planning, coordination, and execution purposes.
 Operational integration consists of those activities associated with enabling and optimizing the performance and collective effectiveness and efficiency of AMD within the total theater resources.
 Architectural integration consists of those activities associated with establishing, assuring, and enhancing the information interchange within the AMD component elements (organizations, weapons, and communications systems and components) and with the Army theater information architecture (hardware, software, operations, and personnel).
FLEXIBILITY
1-26. Flexibility is the employment of a versatile mix of capabilities, formations, and equipment for conducting operations (ADP 3-0). Flexibility enables adaptive forces, facilitates collaborative planning and decentralized execution, and fosters individual initiative (ADP 3-0). The AMD principle of mix (see paragraph 1-23 above) discusses the combination of ADA systems as task force tailored formations. The principle of flexibility is applied in AMD terms primarily within a systems capability to be adapted to different (changing) threat conditions. While ADA systems have a system-centric architecture, each of the architectures enables some flexibility to tailor the defense design to METT-TC conditions. Patriot can defeat ballistic missile threats, cruise missile, and other air threats. The defense can be tailored to primarily defeat a specific threat or to achieve a balance across the full threat set. Balancing across the full threat set may result in less than optimal defense against a specific threat set. Likewise, SHORAD systems can optimize against a specific threat or balance across their full threat set. The C-RAM system can defeat rockets, artillery, and mortars in the air. Optimization against mortars could result in some compromise with its ability to defeat larger caliber rockets. System architectures allow for some ability to task force tailor. Additional launchers can be assigned to a battery or platoon to attain sufficient mass to defeat anticipated heavy attack scenarios. SHORAD systems at battery and platoon can also accept augmentation of sensors. Patriot requires one, and only one, radar per battery. Thus, if one radar is insufficient in accordance with METT-TC, an additional battery must be incorporated into the defense. Unique C2 capabilities and data link architectures within each of the systems limit task force tailoring across systems.
22 December 2020
FM 3-01
1-5
Chapter 1
AGILITY
1-27. “Agility is the ability of friendly forces to react faster than the enemy” (ADP 3-90). Automated battle management aids in ADA systems enable operators to execute engagements in a timely manner within the planned defense design and its branches and sequels. Dynamic replanning to respond to unanticipated enemy avenues of ingress, however, is less responsive primarily due to system centric architectures that do not allow cross-leveling of resources across ADA systems.
AMD EMPLOYMENT TENETS
1-28. While commanders should always start AMD employment planning by applying the principles described above, they should also strive to adhere to employment tenets (desirable attributes) when planning and positioning their ADA resources. A tenet is a belief, dogma, or doctrine generally held to be true. The AMD employment tenets are mutual support, overlapping fires and coverage, balanced fires, weighted coverage, early engagement, defense in depth, and resilience.
1-29. The application of a specific tenet or tenets is METT-TC dependent. In some cases, the application of one tenet may only be achieved at the expense of another, as noted below.
MUTUAL SUPPORT
1-30. Weapons are positioned so that the fires of one weapon can engage targets within the dead zone of the adjacent weapon. For guns, this dead zone is usually small. For missiles, the dead zone may be large, and mutual support is a critical element. Mutual support can also cover nonoperational weapons or weapons at lower states of readiness. Mutual support, when applied to sensors has the same connotation; that is, sensors are deployed to cover the dead zone of adjacent sensors. The application of sensor mutual support is challenging due to the need to pair weapons and sensors by system and the scarcity of ADA systems.
OVERLAPPING FIRES AND OVERLAPPING COVERAGE
1-31. Weapons are positioned so that their engagement envelopes overlap. Because of the many altitudes and ranges from which the enemy can attack or conduct surveillance operations, defense planners must apply mutual supporting and overlapping fires vertically and horizontally. Overlapping coverage is the positioning of sensors such that their coverage does not leave any seam in the defense that might be used by ingressing threats. Overlapping fires and overlapping coverage should be planned during defense design. Achieving overlapping coverage against ballistic threats is a challenge because of the need to orient primary target lines toward ballistic launch zones and the system architectures that require system-specific sensors to support system-specific weapons. Overlapping coverage against low altitude non-ballistic threats is challenged by terrain impacts on ground-based sensor visibility and the aforementioned system-specific limitations.
BALANCED FIRES
1-32. Weapons are positioned to deliver an equal volume of fires in all directions. This is necessary for AMD in an area where the terrain does not canalize the threat or when the avenues of approach are unpredictable. Against cruise missiles and other non-ballistic missile threats, balanced fires is a desired characteristic of defense design.
WEIGHTED COVERAGE
1-33. Weapons coverage is combined and concentrated toward the most likely threat air avenues of approach or direction of attack. Based on the tactical situation, a commander may risk leaving one direction of attack unprotected or lightly protected to weight coverage toward another direction. Weighted coverage is generally desirable when designing defenses to defeat ballistic threats. Weighted coverage and balanced fires are not mutually achievable, requiring the defense designer to give up most aspects of one to achieve the other.
1-6
FM 3-01
22 December 2020
Army Air and Missile Defense
EARLY ENGAGEMENT
1-34. Sensors and weapons are positioned so they can engage the threat before ordnance release or friendly target acquisition. Early engagements enable destruction of enemy platforms over enemy forces and unoccupied areas, thereby reducing the possibility of friendly collateral damage and fratricide. As with weighted coverage, early engagement is achieved at the expense of balanced fires.
DEFENSE IN DEPTH
1-35. Sensors and weapons are positioned so that the threat is exposed to a continuously increasing volume of fire as it approaches the friendly protected asset or force. Defense in depth decreases the probability that attacking missiles, aircraft, or RAM will reach the defended asset or force.
RESILIENCE
1-36. Resilience is the quality of the defense to maintain continuity of operations regardless of changes in or unanticipated tactics by enemy air or losses of critical air and missile defense components. ADA planners must understand the capabilities of the system(s) that are being deployed in a defense design, and plan for deployment and employment of components to enable these capabilities to be exploited during mission execution. Resilience is a key determinant when considering which tenet (or tenets) to use in in maintaining the defense.
ADA OPERATIONS
1-37. Unified action (joint) operations entail the participation of the appropriate joint forces operating as a cohesive team. AMD is an inherent function in joint operations, requiring the interdependent capabilities of each services AMD component.
1-38. The ADA force is the primary land-based contributor to AMD. It executes its role and missions within the context of unified land operations, as discussed below.
ADA IN SUPPORT OF UNIFIED ACTION
1-39. “Threats to U.S. and allied interests throughout the world can sometimes only be countered by U.S. forces able to respond to a wide variety of challenges along a conflict continuum that spans from peace to war” (JP 3-0). Within the conflict continuum, the range of military operations extends from military engagement, security cooperation, and deterrence in times of peace, through crisis response and limited contingency operations, to large-scale combat operations in times of war (see FM 3-0 for discussion of these operations). Joint operations constitute the integrated actions of the U.S. armed forces in all of these.
1-40. ADA forces provide concerted defensive capabilities in the air domain and in the littoral areas of the sea domain in support of Army operations. The following paragraphs discuss ADA actions and activities in support of the four broad categories of Army operations: operations to shape, operations to prevent, largescale ground combat operations (defense and offense), and operations to consolidate gains, all of which ultimately lead to winning.
1-41. Operations to shape. “Operations to shape consist of various long-term military engagements, security operations and deterrence missions, and actions intended to assure friends, build partner capacity and capability, and promote regional stability” (FM 3-0). Army shape operations, though most prevalent in military engagement and security cooperation activities, are executed continuously throughout all of the joint phases. ADA forces help shape operations by supporting the assurance of friends, building partner capacity and capabilities, and promoting regional stability. Shaping actions are generally planned and coordinated at the AAMDC or ADA brigade levels and executed by ADA battalions. AMD is a key capability our joint forces and allies want on the ground to build partner capacity in advance of hostilities. ADA forces build partner capacity through security cooperation activities such as joint air defense exercises, on-going training, and leader development of multinational AMD forces. Partner capacity and capabilities are further enhanced through their procurement of technologically advanced ADA systems and the enrollment of our partners AMD Soldiers in ADA schools.
22 December 2020
FM 3-01
1-7
Chapter 1
1-42. Operations to prevent. Operations to prevent “include all activities to deter an adversarys undesirable actions. They are typically conducted in response to activities that threaten unified action partners and require the deployment or repositioning of credible forces in a theater to demonstrate the willingness to fight if deterrence fails” (FM 3-0). ADA forces are a preeminent means of deterrence in support of the U.S.s commitment to preserve the peace by providing assurance of protection for our forces and allies. In that regard, ADA forces frequently serve as flexible deterrent options to demonstrate U.S. resolve. Forward stationed ADA units, such as Patriot battalions, THAAD batteries, and AN/TPY-2 forward-based mode radar batteries, further serve as a deterrent to our enemies by dramatically reducing their expectation of success. The deployed ADA forces are generally tailored as task forces with the right sizes and mix of capabilities to deter or, when required, defeat the projected air and missile threats.
1-43. Presence, profile and posture define and describe the means by which ADA units can shape the security environment through physical and visual actions. Both profile and posture address the manner that units, systems, and Soldiers are present. Profile is the degree of presence, both in terms of quantity and quality. In offensive and defensive operations, ADA units can tailor their profiles in the number of forces or effects. Military deception can play a significant role by allowing commanders to make their force appear larger or more substantial than it is or to keep the profile to a minimum. Posture dictates how units or Soldiers appear to others and how they act towards them and is determined by the operational environment. See FM 3-13 for additional information.
1-44. While prevent as discussed above focuses on an overseas theater, operations to prevent for joint AMD forces begin in the homeland. Prevent in the homeland denies an enemys ability to successfully attack a geopolitical area or installation. Army ground-based midcourse defense (GMD) systems are deployed in the United States to counter potential long-range ballistic missile threats, such as intercontinental ballistic missiles (ICBMs). ADA systems are emplaced in and around Washington D.C. to protect the National Capital Region against air threats. Navy and Air Force elements add capabilities to protect against air and ballistic missile threats.
1-45. Large-scale ground combat operations. “Large-scale combat operations require the execution of multiple tasks synchronized and converged across multiple domains to create opportunities to destroy, dislocate, disintegrate, and isolate enemy forces” (FM 3-0). Army forces conduct decisive action to seize the initiative and dominate the enemy.
1-46. “Joint force commanders (JFC)s strive to achieve air, maritime, space, and cyberspace superiority early to allow the joint force to conduct land operations without prohibitive enemy interference” (FM 3-0). Conditions preceding large-scale ground combat operations vary depending on the threat. Some adversaries possess significant capabilities to employ anti-access and area denial strategies. ADA has a critical role in countering anti-access/area denial activities and assuring access into a given region. The joint warfighting forces ability to conduct force projection is reliant on ADAs ability to provide force protection. When deployed, ADA units will be integrated with joint and multinational AMD forces to improve and extend surveillance and defend land, air, and sea bases that support operations in an anti-access and area-denial environment.
1-47. ADA is a significant enhancer in the battle to achieve air superiority, or at a minimum, maintain air parity throughout large-scale ground combat operations. Large-scale ground combat operations require the employment of a considerable amount of ADA forces to protect the most critical theater assets, as designated by the JFC. An AAMDC will be positioned in the theater of operations to provide overall command of deployed ADA forces. ADA brigades and battalions may be placed in supporting roles to Army corps and divisions in accordance with mission, enemy, terrain and weather, troops and support available, time available, civil considerations (METT-TC) conditions and the JFCs directives. In addition, ADA forces at battery and platoon levels may be deployed with BCTs. See chapters 5 through 10 for further discussion of the roles, capabilities, and AMD operations conducted by the ADA echelons, from the AAMDC to ADA platoon.
1-48. Operations to consolidate gains. Consolidate gains are activities to make enduring any temporary operational success and to set the conditions for a sustainable security environment, allowing for a transition of control to other legitimate authorities (ADP 3-0). Consolidation of gains generally signifies a greater focus on security and stability tasks than on combat operations. ADA forces support operations to consolidate gains by maintaining protection of friendly forces and critical assets as areas are secured. ADA formations, in
1-8
FM 3-01
22 December 2020
Army Air and Missile Defense
accordance with the priorities for defense and available assets, may be positioned in corps or division consolidation areas to defend against enemy residual air and missile capabilities. While an enemy may possess few of these capabilities the majority having been destroyed or disabled during the dominate phase (large-scale ground combat) of an operation, an attack by a single missile may have a catastrophic impact on a maneuver formation, C2 facility, or geopolitical asset.
ADA IN SUPPORT OF UNIFIED LAND OPERATIONS
1-49. Unified land operations apply “landpower as part of unified action to defeat the enemy on land and establish conditions that accomplish the joint force commanders (JFCs) objectives” (ADP 3-0). Within the context of unified land operations, an operational framework is used to describe operations by echelon in time and space for an area of operations and areas of influence or interest. Land force commanders establish close, deep, support, and consolidation areas within their areas of operations to describe the physical arrangement of their forces over time and their forces respective roles and missions. Figure 1-1 displays ADA organizations overlaid across the areas.
Figure 1-1. ADA echelons in support of a theater of operations
1-50. SHORAD forces are positioned with division or brigade maneuver formations in the close area, where the majority of subordinate maneuver forces conduct close combat. ADAM cell personnel in the BCT plan and coordinate the support of SHORAD or other ADA forces and relay pertinent AMD information and early warning of enemy air activity to maneuver formations. Patriot units may add supplementary protection of the maneuvering forces from their designated locations in the corps or theater areas and/or may be repositioned to sustain coverage. In support of the fight in the corps or theater deep area, the AAMDC or ADA brigade calculate prospective launch areas for ballistic missiles and nominate said areas for subsequent targeting by long-range artillery and aviation assets. The AAMDC and ADA brigade will also assess likely enemy air avenues of approach and missile operating areas from the corps deep area into the close, support, and consolidation areas and design defenses that are positioned to negate surveillance or attack. ADA forces in the support and consolidation areas provide continuous defense of sustainment facilities and participate in the requisite security and stability tasks. SHORAD forces generally protect assets in the division and brigade areas, while Patriot and THAAD units maintain coverage of assets in the division, corps, and theater areas. See FM 3-0 for additional discussion of the operational framework, its various considerations, and its operational areas.
22 December 2020
FM 3-01
1-9
Chapter 1
1-51. The role of ADA forces spans the full range of operations and is a critical enabler in the Armys ability to execute its tasks. ADA forces support Army, joint, and multinational forces in the execution of offensive, defensive, stability, and defense support of civil authorities operations. They facilitate the conduct of decisive and sustainable land operations by Army and other land forces. As with joint operations, the tasks may vary by type of operation and across the strategic, operational, and tactical levels of war. However, irrespective of type operation, ADA forces fundamentally defend friendly forces and other designated critical assets and engage and destroy air and missile threats, ranging from ICBMs to RAM munitions.
1-52. ADA key tasks in support of the defense include:  Providing AMD coverage of designated critical assets.  Providing and disseminating early warning to all affected forces.  Providing situational awareness of the airspace.  Contributing to engagement information (classification, discrimination, and identification).  Determining, predicting, and reporting enemy air and missile launch points and impact points.  Proactively engaging threat air and missile platforms before they attack or surveil.  Integrating joint and multinational capabilities into the defense design.
1-53. ADA is a key enabler to forces conducting offensive operations. ADA tasks include:  Providing AMD coverage of maneuver forces and their critical assets, to include denying surveillance by threat air platforms.  Developing targeting information in support of attack operations.  Defending forward-based infrastructure, such as lines of communications and command nodes, from air and missile attacks.  Determining, predicting, and reporting threat air and missile launch points and projected impact points.  Providing early warning and surveillance.
1-54. ADA key tasks in support of stability operations include:  Providing forward deployed or forward stationed ADA forces to serve as flexible deterrent options. This is a prelude to unified land operations and serves as an initial condition for shaping operations.  Supporting security assistance and building partnership capacity efforts through training, education, participation in exercises, and related activities with multinational AMD forces.  Providing AMD protection for deployed forces and civilian assets and areas from aerial threats, such as RAM attacks.  Providing or supporting Army-common tasks related to essential governmental services, emergency infrastructure reconstruction, and humanitarian relief efforts.
1-55. ADA key tasks in defense support of civilian authority operations focus on:  Providing sensor surveillance in support of civilian law enforcement agencies primarily to U.S. Customs and Border Protection organizations along the U.S. borders. ADA sensors are ideally suited to provide surveillance support to counter-drug operations. Sentinel radars can detect and track low-flying aircraft approaching and penetrating the border.  Deploying sensors (for example, Sentinel) in support of National security special events and special event assessment rating events, such as the Olympics and Super Bowl.  Planning for transition to active defense capabilities when properly directed and authorized.
1-56. Fulfilling the ADA role hinges on the ability of ADA forces to conduct effective C2 across both engagement operations and force operations. Engagement operations are functions and activities required to execute the air, missile, and counter-surveillance battle. Force operations are actions and functions required to plan, coordinate, prepare for and sustain the total air and missile defense mission. See paragraphs 2-3 (on page 2-2) through 2-24 (on page 2-6) for additional discussion of force operations and paragraphs 2-25 (on page 2-7) through 2-38 (on page 2-10) for engagement operations.
1-10
FM 3-01
22 December 2020
Army Air and Missile Defense
TRAINING
1-57. The ADA branch requires agile and adaptive Soldiers and Leaders, who are masters of their craft and who are comfortable operating in complex, often ambiguous, environments. Only through an outcome-based training and education system that stresses the development of cognitive skills will this requirement be met.
1-58. The foundation for individual and collective training is the education provided by the Armys institutional education system. Instructors in the various institutional courses introduce, facilitate, or enhance the knowledge of ADA systems, ADA organizations, and AMD operations to resident students. The institutional domain is responsible for providing Soldiers and Leaders with the qualification and preparation for entry into a unit - they teach the ADA competencies.
1-59. Operational force training focuses on collective training conducted at home station, at maneuver combat training centers, during joint exercises, at mobilization centers, and while operationally deployed. Live, virtual, and constructive methods of training are used to attain the desired realism and synchronization of critical tasks across echelons that will facilitate the levels of readiness required to execute wartime missions. ADA Leaders and Soldiers, as individuals and in teams, must be knowledgeable of and capable of executing the actions associated with mission command and C2 the principles of mission command and the authorizations and directives of Army, joint, and multinational C2 elements, particularly with respect to the AMD kill chain; force operations planning, coordinating, and sustaining activities for the total AMD mission; and engagement operations coordinating and executing the engagements of air and missile threats.
1-60. Commanders at all echelons are responsible for ensuring that their units are capable of performing their missions. Commanders cannot delegate this responsibility. Commanders are directly responsible and accountable for all aspects of unit training including the certification/qualification of their individuals, sections, platoons, batteries, and battalions. They understand and employ the principles of unit training and leader development. Through guidance and direction, commanders drive the training management process. They directly observe and participate in the unit's training and leader development to better assess mission readiness and help their subordinates improve. They understand that unit training and leader development are inextricably linked that good training can develop good leaders, and good leaders are the key to good unit training. They focus the unit's efforts to optimize available time, ensuring their units train the right tasks to meet mission requirements and to support the next higher commander's intent. Each commander determines what essential supporting collective tasks must be trained to attain the required levels of objective training requirements for mission-essential task list proficiency. Commanders look for every opportunity to coach and teach subordinates as they plan, prepare, execute, and assess training, employing the mission command philosophy. They give their subordinate leaders the commander's intent and the resources including timeto plan, prepare, and conduct the training necessary to develop unit proficiency. Leaders are also trained and educated in the Army Ethic, culture, and character development. They personally create and sustain a positive command climate in their ADA units and organizations. Commander/leader involvement makes a quantitative and qualitative difference in unit training and leader development.
1-61. The proficiencies of individual Soldiers, Leaders, and teams/crews in the operational force are gauged through a certification program. The certification process uses gunnery tables and guidance from higher echelons in the conduct of formal evaluations. In preparation for these periodic formal evaluations, informal assessments are generally conducted by standardization officers at ADA battalions and Leaders at lower echelons. Soldiers and Leaders receive their individual certifications by their units. Teams require certification by the next higher command or a command two levels higher based on the ADA system they use. Re-certification is conducted periodically and is also required if an individual is assigned to a new unit or team, notified of deployment, experiences a major system change to his/her assigned equipment, or as directed by the command. While it is optimal to certify as crews, commanders have the flexibility to retain unit/crew certification as individual crew members rotate in/out, as long as proper evaluation protocols are in place.
22 December 2020
FM 3-01
1-11
This page intentionally left blank.
Chapter 2
Air and Missile Defense Operations Process
This chapter addresses the planning, preparing, executing, and assessing phases of the Armys operations process. These are presented in terms of force operations and engagement operations. General aspects and applications of both follow. ADA echelon-specific discussions of force and engagement operations are presented in chapters 5 through 10.
AMD OPERATIONS FRAMEWORK
2-1. The Army's framework for exercising C2 is the operations process - the major C2 activities performed during operations: planning, preparing, executing, and continuously assessing the operation (ADP 5-0). Integral to AMD C2 are force operations and engagement operations. Force operations set the conditions for successful and sustained engagement operations. They include all actions needed to conduct parallel and collaborative planning, coordination, and integration with Army, joint, and multinational forces. Engagement operations constitute the process of engaging air and missile threats. Engagement operations include establishing an air picture, determining the classification and identification of all tracks, evaluating the threat these tracks pose to the defended assets, and exercising engagement control over subordinate units. Categorization as force operations or engagement operations provides a framework to assist in defining/establishing responsibilities and conducting activities. However, not all activities or tasks are clearly distinguishable as force or engagement operations; some may span both categories depending upon the phase of operation or METT-TC considerations.
2-2. Figure 2-1 on page 2-2 depicts the planning and execution focus of the ADA echelons; the two curves represent the traditional activity level of the ADA echelons as they carry-out the AMD fight. Force operations and engagement operations for each ADA echelon are described in greater detail in its respective chapter, beginning with chapter 5.
22 December 2020
FM 3-01
2-1
Chapter 2
Figure 2-1. ADA echelons-planning versus execution
Note. With the introduction of IBCS, the force and engagement operations curves “flatten” somewhat, though the AAMDC and ADA brigade remain primarily planning headquarters and ADA battalion and below execution organizations. Enhanced engagement operations capabilities are provided to the AAMDC and the ADA brigade. Each may now apply dynamic engagement control over radars and sensors, though generally this control will continue to be exercised at the ADA battalion and below level. The AAMDC and the ADA brigade commanders may also be given engagement authority as METT-TC dictates. (See page 4-9, para 4-53 for more information.) Force operations capabilities are increased at battery and below levels.
FORCE OPERATIONS
2-3. Force operations begin with detailed planning within and between the ADA echelons and synchronization of such plans with other affected Army, joint, and multinational elements. Planning is a continuous process that begins with the receipt of a mission and the commanders guidance and is done as thoroughly as time allows. Successful planning requires an appreciation of the simultaneous nature of operations, awareness of the mission, anticipation of future events, and an understanding of the operational framework.
2-2
FM 3-01
22 December 2020
Air and Missile Defense Operations Process
2-4. Force operations continue, as described below, with such other tasks as designing defenses, task organizing a unit to meet mission requirements, initiating support relationships, moving the unit to the area of operations, establishing communications networks, and sustaining the unit. Each task may be executed before, during, or after the initiation of engagement operations.
AMD PLANNING AND DESIGN PROCESS
2-5. ADA commanders and staffs develop AMD plans based on the guidance of their higher headquarters and in accordance with their supporting or supported relationships. The military decision making process integrates the activities of the commander, staff, subordinate headquarters, and unified action partners to understand the situation and mission, develop and compare courses of action, decide on a course of action that best accomplishes the mission, and produce an operation plan or order for execution (ADP 5-0).
AMD Planning and Design Process
 Military Decision Making Process.
 Integrated Defense Design.  Criticality, Vulnerability,
Threat.
 Troop Leading Procedures.
2-6. Any AMD operation begins with detailed planning in collaboration with joint and multinational AMD partners. Coordinated planning, such as war-gaming, is conducted in anticipation of future operations to identify potential issues or concerns and plan the way ahead. Planning considers all AMD operational elements, as appropriate, across the levels of war. Planning considerations at the operational level may be more extensive than those at the tactical level as a primary threat could be ballistic missiles, and coordination and integration must be conducted with joint and multinational AMD elements. Planning at the tactical level is nevertheless necessary to develop defenses against those aerial platforms that may threaten tactical units. At the operational level, the AAMDC directs ADA planning priorities and focus. The AAMDC identifies the geostrategic picture and provides suitable guidance to deployed ADA forces in concert with directives from the area air defense commander (AADC) to enable operational and tactical level planning. The result of this planning process is an integrated defense design that leverages all available joint AMD capabilities to most effectively defeat aerial threats from ballistic missiles and high-performance aircraft down to UASs and RAM threats at the tactical level. At the tactical (maneuver) level, much of the planning resides with the ADAM cell in BCTs to enable AMD where feasible and to leverage inherent non-dedicated, active AMD capabilities (combined arms fires and maneuver force Stinger teams) for protection of the maneuver forces. The ADA personnel in ADAM cells assist the brigade commanders and their staffs in planning support by ADA forces or general coverage by SHORAD sensors and shooter systems, if such support is allocated.
2-7. AMD planning involves joint, multinational, and Army units including service or functional component commands, AAMDCs, ADA brigades, and ADA battalions. Defense design tools are available in an array of planners, ranging from Command and Control Battle Management and Communications (C2BMC) planner at the strategic level to the air and missile defense workstation (AMDWS). The Patriot tactical planning workstation and THAAD portable planner at the operational and tactical levels provide automated means to develop effective plans and alternative plans and to respond to dynamically changing tactical situations. These design tools are domain specific (C2BMC in ballistic missile defense planning) or system specific (Patriot tactical planning workstation for Patriot AMD planning, AMDWS for general defense planning and specific Avenger planning, and THAAD portable planner for THAAD planning.), thus inducing a strong hierarchical planning structure.
2-8. The criticality, vulnerability, and threat methodology is used to allocate ADA forces to mission requirements. This methodology begins with the combatant commanders nomination of high value assets across all deployed forces and considers political and geographic aspects as well as military assets. These high value assets are incorporated into a critical asset list a prioritized list of assets or areas, normally identified by phase of the operation and approved by the joint force commander, that should be defended against air and missile threats (JP 3-01). After receiving all nominated critical assets, the methodology considers and ranks the importance of these assets based upon:
 Criticality how critical is the asset to the JFC in the execution of the mission and plan for accomplishing that mission? Criticality can change over the course of a campaign. For example, early entry may place a higher value on a limited number of access points, but, as the theater matures and more access points are opened, the criticality of a particular access point may diminish significantly.
22 December 2020
FM 3-01
2-3
Chapter 2
 Vulnerability how vulnerable is the asset? Vulnerability assesses an assets susceptibility and recoverability. Susceptibility includes such factors as the assets or forces hardness and its ability to disperse or displace to another position. Recoverability includes such factors as the time it would take to repair or recover from damage by enemy attack and if the asset can be replicated elsewhere should it be damaged by enemy attack.
 Threat how likely is the asset to be surveilled and/or attacked by enemy air and missile threats? By what types of threats? In what quantities?
2-9. Missions and threats are analyzed, and forces are sized, matched, and allocated accordingly. The resulting linkage of ADA forces to designated critical assets constitutes the defended asset list a listing of those assets from the critical asset list prioritized by the joint force commander to be defended with the resources available (JP 3-01). The JFC further defines the required level of protection for each asset on the critical asset list based on mission variables. For ballistic missile defense, for instance, the levels range from level 0 (no active defense; accept risk) to level 4 (near leak-proof defense requiring upper and lower tier systems operating in an integrated defense). The AADC implements the JFC-directed protection level for each asset on the defended asset list based on METT-TC.
Note. As formally defined and used hereafter, the critical asset list and defended asset list present formalized lists of prioritized assets at the theater level that require defense against air and missile threats. However, commanders/leaders at all echelons and in all services identify their most critical assets that require protection. These assets are compiled into prioritized lists, which though having different names, are the equivalents of the critical asset and defended asset lists. For instance in the Army corps, the protection cell and work group develop a protection prioritization list and protected asset list. See ADP 3-37 for more information.
2-10. ADA battery commanders and subordinate leaders use troop leading procedures to translate the integrated plan into executable actions to achieve an integrated defense. Troop leading procedures are a dynamic process used by small-unit leaders to analyze a mission, develop a plan, and prepare for an operation (ADP 5-0). See ADP 5-0 for process details.
TASK ORGANIZATION
2-11. The METT-TC variables provide the basis for analyzing and selecting the right capabilities to be deployed and employed. Knowing the mission, threat, and operational environment allows commanders to identify and plan for an optimal capability package. Deployment considerations must also factor in the availability of strategic lift the deployment carriers and a suitably packaged ADA force to facilitate an operational defense as rapidly as possible. This package may consist of a complete battalion-level task force, a task-organized battery, or sub-sets of a battery. Task organization must consider elimination of exploitable seams in the defense coverage. Seams can be created in azimuth (for example, Patriot sectored coverage), in altitude (ingress below or above a sensors coverage), and by threat capabilities (for example, use of a threat mixed package that includes platforms with capabilities that exceed those of the sensor or shooter in a defense).
2-12. Current capabilities to task organize enable coordinated but not integrated defenses. Coordinated defenses are fought at the system level; for example, a system such as Patriot or Avenger is selected to engage a threat and other systems in the defense monitor the engaging systems engagement sequence to decide the need for follow-on actions.
SUPPORT RELATIONSHIPS
2-13. Support relationships define specific arrangements and responsibilities between supporting and supported Army units. Though traditionally focused on Army missions, these relationships are also applicable to ADA support of joint and multinational forces. There are four support relationships: direct support, general support, general support-reinforcing, and reinforcing. Commanders specify and change support relationships through task organization. ADP 5-0 provides expanded details on Army support relationships.
2-4
FM 3-01
22 December 2020
Air and Missile Defense Operations Process
2-14. ADA units in a direct support role provide dedicated support to a specific element of the force. Supporting ADA units coordinate their movement and positioning with the supported unit. A SHORAD platoon, for example, may be placed in direct support of a mechanized task force. The platoon will provide dedicated support to the task force, and the platoon leader will position the platoon in accordance with the task force commanders concept of the operation. Additionally, a Patriot battalion can be placed in a direct support mission to the AADC.
2-15. ADA units in a general support role provide support to the force as a whole and not to any particular subordinate echelon unit or element. ADA units in general support commonly protect theater, corps, or division level assets. They are positioned by the ADA commander.
2-16. ADA units with general support-reinforcing missions provide support for the force as a whole and, secondarily, augment the support provided by other ADA units. ADA units must coordinate with the augmented ADA units to reinforce the coverage of assets in the area of operations
2-17. ADA units in reinforcing roles augment the coverage of other ADA units and strengthen AMD capabilities of the force. Reinforcing ADA units are positioned to protect one or more of the reinforced units priorities as specified by supported ADA unit commanders.
MOVEMENT
2-18. Movement is executed by the most expedient means needed, in accordance with the JFCs requirements for AMD. Strategic lift may be designated to transport sub-sets of ADA batteries or entire ADA units. Due to the large size of many ADA components and systems, and when time is available, transportation by means of self-movement, rail movement, or sea vessels for overseas deployments is likely to be more economical and efficient.
2-19. When such stationing or deployments cannot be achieved within a timely manner, the JFC will rely on Navy AMD assets to protect early entry assets until land-based ADA capabilities can be deployed.
POSITIONING
2-20. ADA units are forward deployed to an area of operations and positioned to best protect the designated assets against the projected air and missile threats in accordance with detailed defense designs. Sensor and launcher placements are selected to maximize surveillance, tracking, and engagements. In designing a defense, sensors are positioned to provide surveillance and fire control tracking capability sufficient to protect assigned assets and prevent gaps in the coverage. Sensors are emplaced on terrain that provides the best longest range line-of-sight in all directions. Shooters are then positioned to optimize the defense of the defended assets, enabling lethal coverage over the assigned assets and extending firepower through as much of the defense coverage area as possible. The AMD employment tenets and latest intelligence reports inform the defense design. Patriot and THAAD forces may use a weighted defense to counter ballistic missile threats from known locations or areas, or a balanced defense when there is a potential for multiple types of threats coming from various approaches. Because of the nature of their target set, SHORAD forces may be able to rely more heavily on the tendency of low flying threats to be canalized by terrain due to their flight level and maneuverability. This may allow SHORAD forces to predict the air avenues of approach for enemy air threats and position forward of the defended asset, weight coverage, and achieve early engagement before the threat is able to reach its ordnance release line. Communications assets interconnect launchers, sensors, and C2 nodes to enable an integrated defense. Tools embedded in C2 capabilities, such as the Patriot tactical planning workstation and AMDWS, enable automated support to defense planning and defense design to both optimize component emplacement and to evaluate defense design alternatives. Software functionality is system specific, requiring manual steps to develop an integrated defense design across a task force containing multiple system capabilities. When planning, positioning, and determining how often ADA units will be required to conduct survivability moves, units take into account the range of enemy indirect fires.
2-21. Positioning ADA units with maneuver forces (generally the case for SHORAD units) or on or near installations (generally for Patriot and THAAD units) allows the units to take advantage of security measures and forces on those installations. ADA units have limited self-defense capabilities and thus must rely on others for that protection. Antiterrorism and force protection considerations are extremely important given the ever present threat of terrorist attacks and the need to protect ADA units at all echelons from becoming
22 December 2020
FM 3-01
2-5
Chapter 2
targets of opportunity. Once in place, ADA forces should implement passive defense measures, such as camouflage and protective works, and continuously improve them as long they remain at a location. Deception, camouflage, and concealment should be used as much as possible to deny or limit the ability of enemy surveillance assets to identify sensor, shooter, and C2 components and ultimately target them. Emission control measures should be initiated to reduce the electromagnetic signatures of the sensors and command posts (CP).
DECEPTION
2-22. Deception operations are designed to mislead enemy decision makers by distorting, concealing, and falsifying friendly intentions, capabilities, and dispositions. The objective is to mislead the enemy commander, inducing the enemy to conduct activities that unwittingly serve friendly purposes.
2-23. ADA units plan and conduct deception activities in conjunction with movement, cover, concealment, and other passive defense operations to disguise friendly capabilities and counter enemy capabilities. In the context of tactical deception, ADA units may position weapons systems in locations forward of those typically associated with a point defense. For example, Avengers, employed with Patriot in an integrated defense of a fixed or semi-fixed asset, are generally positioned to deny an enemy low-level access to the asset and to defend the Patriot system. Moving Avengers forward along likely enemy air avenues of approach provides early and unexpected (to the enemy) engagement opportunities. ADA units conduct deception in support of operations security by emission control, “blinking” sensors, and employing countercountermeasure. Emission control of sensors in the defense limits sensor radiation until the last moment in an engagement sequence, thus reducing or denying enemy targeting. Radiating multiple sensors in a defense at different times and different locations hinders potential lock-on by anti-radiation missiles. Employing counter-countermeasure capabilities mitigates the effects of enemy jamming or other electromagnetic deception. See FM 3-13.4 for additional information on Army military deception operations.
2-24. A summary of the key force operations tasks, with respect to planning and preparing for aerial engagements, is presented in table 2-1. The tasks are representative of those that are conducted across the ADA force, though not necessarily be each of the ADA echelons. See chapters 5 through 9 for additional discussions of force operations by each.
2-6
FM 3-01
22 December 2020
Air and Missile Defense Operations Process
AMD CAL DAL IPB OPLANs ROC ROE
Pla n
Prepare
Table 2-1. AMD planning and preparing tasks
AMD Planning and Preparing Tasks  Perform criticality, vulnerability, and threat assessment.  Support development of CAL by phase.  Provide AMD running estimates.  Develop ROE/identification matrix.  Conduct AMD IPB.  Assess availability of AMD assets by conducting a defense laydown.  Determine levels of risk and means to mitigate.  Propose DAL to commander.  Request additional AMD resources if levels of protection cannot be achieved.  Allocate AMD assets.  Establish command and support relationships for subordinate units.  Develop supporting scheme of maneuver.  Develop initial defense design.  Nominate targets for attack operations in support of offensive counter air development.  Support refinement and adjustment of CAL/DAL.  Develop sensor and communication plans.  Plan deception techniques.  Develop AMD plans/AMD appendices to OPLANs.  Plan engagement zones with joint and Army commanders.  Implement identification and engagement authorizations, weapons control statuses, air
defense warnings, and ROE.  Coordinate with supported commander.  Position sensors and shooters and implement appropriate deception measures.  Coordinate with joint and multinational AMD forces.  Refine defense design and adjust positions as required.  Establish sensor communications and early warning network.  Conduct ROC drills with supported force.  Implement airspace control order and special instructions.  Conduct surveillance of airspace.  Implement alert states or readiness conditions. air and missile defense critical asset list defended asset list intelligence preparation of the battlefield operation plans rehearsal of concept rules of engagement
ENGAGEMENT OPERATIONS
2-25. ADA systems generally do not fight as independent AMD fire units. They are employed in integrated defenses with other ADA systems, such as Patriot and Avenger, or with the AMD systems of other services or multinational partners (for example, THAAD and the Navys Aegis). While SHORAD systems can fight as independent fire units, their capabilities are greatly improved by fighting as integrated formations with Patriot and THAAD forces or joint and multinational partners.
2-26. Defenses are designed to provide the greatest degree of protection of designated assets against probable air and missile threats. Ideally, defenses have the requisite capabilities to overmatch threat capabilities and deny an enemys expectation of successful air and missile operations. Integrated defenses are developed for the JFC or Army commanders designated assets and planned to ensure the required amount and types of
22 December 2020
FM 3-01
2-7
Chapter 2
protection. Integrated active AMD measures are established and executed concurrently with attack operations and passive defenses.
EXECUTION
2-27. Ground-based or aerial sensors, or combinations of both when available, are employed to perform surveillance of the airspace and provide focused early warning to at-risk forces. The sensors provide engagement authorities the time to make engagement decisions that deny threat platforms the ability to see or impact the defended assets.
2-28. These engagement authorities function as a vertically and horizontally integrated kill chain. The kill chain is the successive linkage of commanders who can authorize engagements of air and missile threats. Engagement decisions are made by the designated engagement authority in the kill chain, providing operational control of and, ultimately, directions to the shooter. Integrated sensors, shooters, and C2 networks will allow for greatly increased engagement options. As such, engagement authorization must be delegated to the lowest level possible.
2-29. Proactive engagements are conducted in accordance with theater-level rules of engagement (ROE) and complementary directives. Engagements are conducted by the best shooter, that weapon system that can best deliver the appropriate effects to achieve maximum attrition at the right time and place, and as far forward as possible, to ensure keep-out ranges and keep-out altitudes. Keep-out range is the horizontal distance from a defended asset at which a successful engagement denies an adversary's desired weapons effects against the defended asset. A keep-out range is a key defense design consideration for cruise missiles. It also allows AMD systems to counter enemy aerial surveillance and reconnaissance platforms beyond the range at which they can surveil an asset and beyond the engagement capability of a defending AMD system, contributing to the overall ability of friendly forces to see first. Keep-out altitude is the vertical distance above a defended asset at which a successful engagement denies an adversary's desired weapons effects against the defended asset. A keep-out altitude is a major design consideration for ballistic missiles. Shooters may use shoot-new target-shoot, shoot-look-shoot, salvo, or ripple methods of fire, depending upon the type of system. The method of fire may be stipulated in operation plans, directed by the kill chain, or influenced by the situation. Coordination is effected by the AMD C2 elements to ensure the threats are overmatched by the AMD weapons, facilitating their destruction while simultaneously mitigating the potential for fratricide of friendly and neutral aircraft.
2-30. Combined arms for air defense constitutes another element of Army AMD that can provide vital protection from air threats and contribute to the freedom of maneuver for friendly forces. (See chapter 11 for a fuller discussion of combined arms contributions to AMD). Maneuver forces can effectively engage hovering or slow-moving helicopters within their weapon systems' ranges. Stinger teams organic to maneuver formations further enhance this capability. The ADAM cell (see chapter 10) in the maneuver brigade links the maneuver forces to the kill chain to implement appropriate ROEs. Intelligence enables cyber and electronic warfare elements to electronically attack air targets. Intelligence elements can also provide or assist in the surveillance, identification, and classification of air targets, facilitating early warning.
ENGAGEMENT SEQUENCE
2-31. The engagement sequence is the successive actions taken by all of the services air and missile defense systems in the engagement of aerial threats. Terms in the sequence differ by service but capture similar actions. The ADA engagement sequence terms are surveil, detect, track/identify, threat evaluation and weapons assignment, engage, and assess.
 Surveil. Surveil is the systematic observation of airspace by electronic, visual, or other means, primarily for the purpose of identifying and determining the movements of friendly and enemy aircraft and missiles in the airspace.
 Detect. Detect in tactical operations is the perception of an object of possible military interest but unconfirmed by recognition. For ADA units, detect is the acquisition of an aerial object of possible military interest by sensor systems.
 Track/identify. Track is the process of displaying or recording the successive positions of a moving object. Identification is the process of determining the friendly or hostile character of an unknown
2-8
FM 3-01
22 December 2020
Air and Missile Defense Operations Process
detected contact (JP 3-01). Identify attains an accurate characterization of detected objects with high confidence so that timely application of weapons can occur. Embedded within the overall process of identification are distinct tasks dealing with classification and discrimination.
 Classification is the process of characterizing a detected object by its type, model,
variant, nationality, and any other distinguishing feature or attribute. Classification, for instance, would establish a track as a cruise missile.
 Discrimination is the process to distinguish real objects of interest from other objects or
phenomenon and military objects from those that are not. For example, discrimination would differentiate between an enemy air platform and a decoy.  Threat evaluation and weapons assignment. Threat evaluation is the process of determining the intended target of the threat, the threats predicted impact point upon the defended asset, and the timing of the threats arrival. Weapons assignment provides the right unit, launcher, or missile to engage the threat paired to an appropriate sensor, if needed, to support the engagement. Weapons assignment can be based on the location of the unit or ADA system, preferred area where an engagement should be conducted, or ADA systems capability. Sensors may be able to support multiple types of weapons (for example, Sentinel can support Avenger and C-RAM detection and acquisition) or may be designed to specifically support engagements of one weapon system, such as the Patriot. Weapons may need in-air engagement support from a sensor, such as the Patriot radar or may be “fire and forget”, such as the Stinger missile, meaning that once the missile is launched it uses on-board guidance and homing capabilities to close with and intercept the air and missile threat.  Engage. Engage is defined as “In air and missile defense, a fire control order used to direct or authorize units and/or weapon systems to attack a designated target (JP 3-01)”. Engage commences with the initiation of missile launch or trigger pull of a gun and concludes with the impact of a missile or bullets (hit-to-kill) or impact of fragments from a detonating warhead (arming and fusing of the kill mechanism, explosion of the warhead, dispersal and travel of warhead fragments, and impact of fragments). It can also encompass the use of non-dedicated AMD assets to commit resources to disrupt or destroy air and missile threats.  Assess. Assess in the air and missile defense engagement sequence, the analysis of the effectiveness of the engagement and of the potential for reengagements.
METHODS OF FIRE
2-32. The operational environment, level of protection required, and time considerations determine the method of fire used by ADA units during engagements. Methods of fire are the firing options for air defense artillery interceptors employed against aerial threats. There are four methods of fire: shoot-new target-shoot, shoot-look-shoot, ripple, and salvo. The method of fire selected provides the statistical probability of achieving the defense design goals, such as achieving less than 10-percent leakage.
 Shoot-new target-shoot. A shot (missile launched or volley of gun rounds fired) is taken against one threat, and the shooter immediately is assigned to a different target without consideration of the effect of the preceding shot. This method of fire primarily applies to fire-and-forget weapons (such as Stinger) in heavy saturating attacks or when the engagement timeline does not permit a re-engagement of the threat just engaged.
 Shoot-look-shoot. After the first shot has been fired, the operator/gunner/system evaluates the engagement. If the target is not destroyed and the operational environment and time permits, another shot is fired.
 Ripple. Two or more missiles or volleys of gun rounds are fired in predetermined intervals from the same or multiple launchers or guns based upon the threat. This method of fire is used to achieve a desired probability of engagement effectiveness or to negate threat tactics (for example, one shot fired against a ballistic missile at relatively high altitudes before aerodynamic maneuvers are likely and one fired at medium altitudes after aerodynamic maneuvers have likely been completed).
 Salvo. Two missiles or volleys of gun rounds are fired near-simultaneously from different launchers or guns. This method is used if there is insufficient time for a shoot-look-shoot or ripple
22 December 2020
FM 3-01
2-9
Chapter 2
engagement and when multiple engagements are necessary to achieve the desired probability of engagement effectiveness.
FIRING DOCTRINE
2-33. Firing doctrine is the application of the methods of fire to achieve the required level of engagement effectiveness. It is implemented in accordance with the priority of the defended assets and the number of available interceptors relative to the number of attackers. It may have situational variations from the method of fire selected.
2-34. Patriot, for example, may select ripple fire against a ballistic missile that is part of a massed raid. The first shot of the ripple will occur in accordance with the selected method of fire. The second shot may be preempted by the need to shoot higher priority threats. THAAD may use a shoot-look-shoot, but may conduct the first or the last shot as a ripple fire or salvo fire depending upon engagement timelines and supporting ballistic missile defense fires.
SECTORS OF FIRE AND PRIMARY/SECONDARY TARGET LINES
2-35. A sector of fire is that area assigned to a unit, a crew-served weapon, or an individual weapon within which it will engage targets as they appear in accordance with established engagement priorities (FM 3-901). Sectors of fire are specified by left and right limits in azimuth and are normally designated at ADA battalion level for Patriot and THAAD units and platoon level for SHORAD units. Sectors of fire are a part of a comprehensive sensor and shooter plan that provides optimum radar coverage of the defined area and effective use of available ADA weapons.
2-36. A primary target line is an azimuth assigned to a weapon system or unit along which the system fire control personnel and or gunners focus their attention. Primary target lines are established along the centerline of the assigned sector of fire to assist in the distribution of AMD fires.
2-37. A secondary target line is a pre-planned alternative target line used to shift the orientation of fires to assure all likely threat avenues of ingress are adequately defended. Secondary target lines are designated to supplement the effects of an ADA unit to defend adjoining areas on both sides of the primary target line. These sectors of fire are clearly defined by right and left boundaries. The assignment of primary and secondary target lines for Patriot, which has a sectored radar, is critical to mission success. However, THAAD, which also has a sectored radar, does not plan for or assign secondary target lines. Other sensors, such as Sentinel, provide 360-degree coverage; assignment of secondary target lines are less critical but do enable operators to concentrate attention within assigned sectors based upon likely enemy air avenues of approach.
2-38. A summary of the key engagement operations tasks is presented in table 2-2. The tasks are representative (not inclusive) of those that are conducted by Patriot, THAAD, and SHORAD fire units. See the echelon chapters for additional discussions of engagement operations.
Table 2-2. AMD engagement tasks
AMD Engagement Tasks  Detect aerial objects.  Classify/discriminate/identify aerial objects.  Determine appropriate weapon system to conduct the engagement.  Determine impact area.  Clear the target area.  Order the engagement.  Conduct the engagement in accordance with the control measures.  Monitor and assess the engagement.  Reengage as necessary.  Update air and missile defense tactical orders and reports as necessary.
AMD air and missile defense
Execute
Assess
2-10
FM 3-01
22 December 2020
Chapter 3
Threat
This chapter summarizes the operational environment, presents existing and emerging threat aerial tactics, and identifies the air and missile threats facing the Army and joint warfighting forces. The air and missile threats, the focus of this chapter, are addressed in terms of generic capability descriptions. The air and missile threats to be countered by ADA systems are ballistic missiles, large-caliber rockets, cruise missiles, air-tosurface missiles, hypersonic weapons, UASs, manned fixed- and rotary-wing aircraft, and rockets, artillery, and mortars. Electronic warfare and, cyber, and threats from space are also addressed.
OPERATIONAL ENVIRONMENT
3-1. An operational environment is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). The operational environment encompasses the five domains of air, land, maritime, space, and cyberspace. Space and cyberspace are relatively “new” domains that individually impact all other domains. Space technologies are proliferating throughout the world. “Adversaries have developed their own systems, while commercially available systems allow almost universal access to some level of space-enabled capability with military applications. Army forces must be prepared to operate in a denied, degraded and disrupted space operational environment” (FM 3-14). Cyberspace supports, enables, and integrates operations for Army and joint forces. Cyberspace includes and considers friendly, enemy, adversary, and host nation networks, communications systems, computers, cellular phone systems, social media web sites, and technical infrastructures. While cyberspace enables friendly communications capabilities, it also creates critical vulnerabilities which adversaries and enemies can attack or exploit. “Cyberspace and the electromagnetic spectrum will grow increasingly congested, contested, and critical to successful operations. Army forces must be able to effectively operate in cyberspace and the EMS [electromagnetic spectrum], while controlling the ability of others to operate there” (FM 3-0).
3-2. Army forces must also be able to operate in degraded conditions in the other domains. The worldwide availability of advanced military and commercial technologies and information may allow adversaries opportunities to acquire, develop, and employ chemical, biological, radiological, and nuclear (CBRN) weapons. Such situations could also expose U.S. forces to CBRN threats and hazards. CBRN threats and hazards have the potential to cause personal injury, illness, or death, equipment or property damage or loss; or mission degradation. CBRN threats include the intentional employment of, or intent to employ, weapons or improvised devices to produce CBRN hazards (FM 3-11). CBRN hazards are those elements that could cause an adverse effect through accidental or deliberate release, dissemination, or impacts (FM 3-11). CBRN hazards present physical and psychological effects well beyond the immediate target area. See FM 3-11 and JP 3-11 for more information.
3-3. As noted in FM 3-0, the operational environment is in a constant state of flux for each commander in their respective operational area, when, at any time, friendly or enemy operations are initiated or curtailed. What is more of a given, regardless of the turmoil inherent in these environments, is that the United States will face a peer threat. In the past, U.S. forces have enjoyed relative advantages over their adversaries with superior capabilities in each of the domains. However, adversaries of the past have become peer threats, capable of challenging U.S. operations in all domains. Peer threats generate tactical, operational, and strategic challenges that are an order of magnitude more challenging militarily than other adversaries.
22 December 2020
FM 3-01
3-1
Chapter 3
3-4. Potential adversaries are investing in anti-access strategies and area-denial capabilities to counter the U.S. ability to project military force into an operational area with sufficient freedom of action to accomplish assigned missions. The concept of anti-access/area denial is to control the access into and movement within a region. Preclusion, the combination of anti-access and area denial methods, seeks to influence the ability of an enemy, outside the region, to introduce forces into the theater and sustain combat power. Many countries are pursuing weapon systems, such as ballistic or cruise missiles, which enable anti-access/area denial. To deter current and potential adversaries from achieving these objectives, the United States must maintain its ability to project power in areas where access and freedom to operate are challenged.
3-5. From a pure ADA perspective, operational environment considerations are focused on the air domain, while maintaining an awareness and understanding of the potential impacts of actions within the other domains on AMD operations. The air domain challenges to Army operations include:
 Increased threats from traditional ballistic missile capabilities. The ballistic missile threat has increased both quantitatively and qualitatively, and is likely to continue to do so over the foreseeable future. Our known and potential adversaries will continue to challenge both the proficiency and sufficiency of U.S. ballistic missile defenses due to the resulting improvement in ballistic missile technical sophistication, increase in inventories, advancement of countermeasures, and growing proliferation.
 Expanding spectrum of air and missile threats. Within the last decade, the air and missile arsenal of todays adversaries has become more robust, diverse, and complex. Not only do our adversaries have access to the increasingly sophisticated ballistic missiles, but they also have a growing array of cruise missiles, UASs, and easily attainable and lethal RAM. All of these air and missile threats must be addressed by Army and joint AMD forces within the context of anti-access/area denial operations and of defeating increasingly sophisticated countermeasures, electronic attack, and cyber efforts.
THREAT TACTICS AND OBJECTIVES
3-6. The threat will attempt to develop an overmatch in an area to mitigate the capabilities of the U.S. force. Traditional tactics of massing fires to overwhelm a defense and surveilling or attacking from any direction and altitude will continue to be employed. In massing fires, for instance, the threat will launch more missiles against a defense than the defending Army or joint AMD force can engage. Cruise missiles, UASs, and fixedand rotary-wing aircraft have freedom of maneuver through 360 degrees in support of both attack and intelligence, reconnaissance, and surveillance operations. Threats will prioritize AMD forces and control elements as high priority targets.
3-7. Advanced electronic attack, in which a threat system jams or spoofs across the electromagnetic spectrum in an attempt to hamper an ADA systems ability to detect or engage a threat system or missile, will also be employed. And, as the ADA force becomes more network centric, a sophisticated cyber-attack could potentially hamper the AMD networks ability to support the detection, identification, or engagement of a target.
3-8. The threat will continue to exploit the use of countermeasures tailored to the attacking platform and the AMD capabilities being countered. Ballistic missiles may employ decoys, in-atmosphere maneuver (which may also aid accuracy of delivery), and electronic jamming pods. Air threats may employ electronic jamming and spoofing, flares, chaff, and other penetration aids. Penetration aids are devices carried on air and missile objects and/or tactics used to counter AMDs. ADA forces must be knowledgeable of the various types of countermeasures that could be employed and prepared to defeat them.
3-9. An emerging tactic is a complex integrated attack which is designed to overwhelm defense of a site by the employment of different capabilities. Simple attacks that send one threat type at a time against a defense are more easily defeated in detail, as a defense can concentrate its capabilities against the specific operational characteristics of that type of threat. For example, when ballistic threats attack within a sector of the defenses coverage, the defense is able to concentrate surveillance and firepower into that sector. However, when outof-sector cruise missiles are integrated with ballistic missile attacks, the defense must counter the combined effects of the total attacking force. A complex integrated attack is a synchronized attack of a friendly asset by a mix of air and missile threats arriving near-simultaneously from different directions, altitudes, and
3-2
FM 3-01
22 December 2020
Threat
ranges. This mix may include any and all air and missile threats, from ballistic missiles to RAM. The defending forces surveillance and firepower must be capable of defending throughout the entire 360 degrees; if focused on only one threat or sector (for example, the ballistic sector of attack), the complex integrated attack will destroy or significantly damage the defended asset. Complex integrated attacks will likely be supported by enemy activities in other domains, such as jamming efforts in the cyberspace domain and special operations forces attacks in the land domain.
THEATER AIR AND MISSILE THREATS
3-10. The emerging air and missile threats encompass a wide range of missiles, rockets, projectiles, and air platforms. The number of countries developing weapons of mass destruction is unconstrained, and delivery systems with increasing range and accuracy are being sought and developed. Compounding these threats is the potential for or initiation of electronic and cyber-attacks.
3-11. Air and missile threats encompass ballistic missiles, air threats, and rockets, artillery, and mortars. A ballistic missile is any missile that does not rely on aerodynamic surfaces to produce lift and consequently follows a ballistic trajectory when thrust is terminated (JP 3-01). Air threats include manned fixed- and rotarywing aircraft, UASs, and aerodynamic missiles. Rockets, artillery, and mortars comprise the indirect fire threat.
BALLISTIC MISSILES
3-12. Ballistic missiles are a means to project power in regional and strategic contexts, and they provide a capability to launch an attack from a distance. Ballistic missile proliferation continues and countries are acquiring a greater number of ballistic missiles, increasing their range, incorporating ballistic missile defense countermeasures, and making them more complex, survivable, reliable, and accurate. Ballistic missiles can be used as anti-access weapons by potential regional adversaries. These weapons can be used to reduce military options for combatant commanders and threaten the survivability of regional military assets. There is an increasing threat of the technologies falling into the hands of other countries and hostile non-state groups.
3-13. Ballistic missiles include close-range ballistic missiles with ranges up to 300 kilometers, short-range ballistic missiles with ranges up to 1,000 kilometers, medium-range ballistic missiles with ranges from 1,000 to 3,000 kilometers, and intermediate-range ballistic missiles that range from 3,000 to 5,500 kilometers. These are surface-launched missiles with ballistic trajectories. Ballistic missiles, often launched from highly mobile, difficult-to-detect transporter erector launchers, can carry nuclear, biological, and chemical weapons. Most are single-stage missiles with an estimated circular error probable accuracy of one-tenth of one percent of the range. State-of-the-art guidance technologies, such as the Global Positioning System, can increase this accuracy to less than 50 meters. The most proliferated of these missiles are the close- and short-range ballistic missiles which are available to more than 30 states and non-state actors worldwide. Ballistic missiles are inherently difficult to defend against. Characteristics that increase their survivability include a small radar cross section, high terminal velocity, short notification time for defending forces, a variety of difficult-to-kill warheads, and an all-weather launch capability. With the introduction of penetrations aids such as decoys, chaff, and maneuvering warheads, ballistic missiles have become increasingly sophisticated, accurate, and more difficult to defeat.
3-14. Iran has steadily increased its ballistic missile force, deploying next-generation short- and mediumrange missiles with increasing accuracy and new submunition payloads. It is continuing to develop new missiles and working to enhance lethality and effectiveness of existing systems with improvements in accuracy and warhead designs, to include maneuvering reentry vehicles and submunition payloads.
3-15. North Korea has expanded the size and sophistication of its ballistic missile forces - from close-range to intercontinental variants - and has conducted an unprecedented level of nuclear tests and ballistic missile launches since 2016, including its short-range, medium-range, intermediate-range, long-range, and submarine-launched ballistic missile (SLBM) launches. In February 2016, Pyongyang launched a satellite launch vehicle. The technology involved in a satellite launch would be applicable to North Korea's other long-range missile programs. In 2016 and 2017, North Korea conducted an aggressive testing campaign, launching multiple intermediate-range ballistic missiles, with a range greater than 3,000 kilometers. Today,
22 December 2020
FM 3-01
3-3
Chapter 3
North Korea fields hundreds of Scud and No Dong missiles that can reach U.S. forces forward deployed in the Republic of Korea and Japan.
LARGE-CALIBER ROCKETS
3-16. Large-caliber rockets, classified as those of 200 millimeters and greater, are unguided, surface launched, indirect fire rockets with ranges greater than 40 kilometers. They can be fired from single or multiple launch platforms. In the past 20 years, large-caliber rockets have increased in range (some as much as 300+ kilometers) and now, with enhanced guidance packages, are morphing into close- and short-range ballistic missiles.
3-17. Rockets can deliver high rates of fire and a variety of warheads, making them ideal weapon systems for fire support missions. The highly mobile launchers can rapidly move around the battlefield. This mobility, coupled with the rockets short burn time, gives maneuver forces little warning. Their short range and salvo capability complicate engagement by current AMD systems.
3-18. Like ballistic missiles, large-caliber rockets are found in many countries. They are inexpensive and have been used against United States forces in Iraq and against Israel forces and its general population. North Korea has a 300-mm multiple launch rocket systems that can easily range Seoul and many U.S. forces stationed in South Korea, including those at Osan Air Base.
AERODYNAMIC MISSILES
3-19. Aerodynamic missiles use lateral surfaces to maintain their flight path. Aerodynamic missiles include cruise missiles and tactical air-to-surface missiles.
3-20. Cruise missiles are unmanned, self-guided vehicles that maintain sustained flight at one or more predetermined constant (cruise) altitudes and have ranges from 30 to 3,000 kilometers. Tactical air-to-surface missiles are similar to air-launched cruise missiles, but are smaller, have shorter ranges, lack the wings and aerodynamic lifts associated with cruise missiles, and are launched by tactical fighter-bomber aircraft. Though regarded as distinctly separate threats, the application of new technologies has given cruise missiles and tactical air to-surface missiles virtually identical capabilities.
CRUISE MISSILES
3-21. Modern cruise missiles can travel at low-to-supersonic or high subsonic speeds, are self-navigating, and can fly non-ballistic trajectories at very low to very high atmospheric altitudes. Cruise missiles can be found in two general categories: land attack and anti-ship. Cruise missiles are generally very expensive and have complicated navigation devices, two considerations which minimized their proliferation; regardless, many nations have shown an increased interest in obtaining the ability to produce these missiles after seeing the U.S. success in employing the land attack variants. Cruise missiles are the hardest air target to detect and intercept which makes them particularly well suited against static ADA systems.
3-22. Cruise missiles are reliable, accurate, survivable, and lethal. They can be launched from the land, air, or sea. They are difficult to detect, can fly indirect routes at low altitudes to avoid heavily defended areas, and can attack from any direction. Todays cruise missile can hit a target with remarkable accuracy; tomorrows smarter, maneuverable, more accurate missile will pose a far greater threat. Cruise missiles are ideal for striking high-value targets in highly defended areas, since aircraft and aircrews are not put at risk.
3-23. The use of air-breathing turbojet and turbofan engines has given cruise missiles a longer range and the capability to fly at high, subsonic speeds and altitudes lower than 50 meters above ground level. Their flight paths can be programmed using sophisticated guidance systems, such as the Global Positioning System, inertial navigation systems, and terrain contour matching. Their guidance systems contribute to overall accuracy, optimize surprise, and help avoid air defenses. A terminal guidance seeker increases accuracy to less than 10 meters. A wide array of conventional warheads, including individually targetable submunitions, allows targeting of both soft and hard targets. In addition, cruise missiles may carry weapons of mass destruction warheads.
3-4
FM 3-01
22 December 2020
Threat
3-24. Many countries have cruise missiles in their arsenal. Some countries have nuclear-capable cruise missiles.
3-25. Technological advances are now making hypersonic glide vehicles and missiles flying non-ballistic trajectories practicable. Hypersonic glide vehicles are a new class of weapon propelled to hypersonic velocity by ballistic missile boosters. After launch, they are essentially unpowered cruise missiles.
TACTICAL AIR-TO-SURFACE MISSILES
3-26. These missiles are air-launched, precision-guided munitions designed to strike ground targets. They are ideal against targets such as bridges that are difficult to destroy with conventional dumb bombs. Tactical air-to-surface missiles are an extremely lethal threat because of their versatility and pinpoint accuracy.
3-27. Most variants employ radio-command, laser, anti-radiation homing, or electro-optical guidance systems. Missiles that employ anti-radiation homing systems are referred to as anti-radiation missiles; they represent the greatest threat to radars such as those employed by ADA forces. An aircraft firing an antiradiation missile will usually launch from outside the lethal envelope of the ADA system defending the asset. Laser-guided systems provide the least standoff range, generally less than 10 kilometers. Electro-optical or video-guided systems and anti-radiation missiles offer the greatest standoff range and aircraft survivability. Some electro-optical systems have ranges of approximately 100 kilometers.
HYPERSONIC WEAPONS
3-28. Technological advances are now making hypersonic weapons practicable. There are two main types of hypersonic weapons: hypersonic cruise missiles and hypersonic glide vehicles. Hypersonic cruise missiles, which are powered by scramjet, are restricted below 100,000 feet; hypersonic glide vehicles can travel higher. Hypersonic weapons, by definition, travel five or more times the speed of sound.
3-29. Some weapon systems have characteristics of both ballistic and cruise missiles. For example, ballistic missile-launched hypersonic glide vehicles are essentially unpowered cruise missiles. Future supersonic/hypersonic powered cruise missiles may be launched by large rocket boosters that have traditionally been associated with ballistic missiles.
3-30. Hypersonic glide vehicles are being developed as a new type of ballistic missile payload. They are maneuverable vehicles that travel at hypersonic (greater than Mach 5) speed and spend most of their flight at much lower altitudes than a typical ballistic missile. The combination of high speed, maneuverability, and relatively low altitude makes them challenging targets for missile defense systems.
UNMANNED AIRCRAFT SYSTEMS
3-31. An unmanned aircraft system is that system whose components include the necessary equipment, network, and personnel to control an unmanned aircraft (JP 3-30). Threat UASs are categorized in groups (see table 3-1 on page 3-6), typically based on weight, operating altitude, and speed. Groups 1 through 3 are further categorized as low, slow, small systems.
22 December 2020
FM 3-01
3-5
Chapter 3
Table 3-1. UAS Groups
Group 1
Micro / Mini UAS
Speed / Altitude
Normally operates below 1,200 feet AGL at speeds less than 100 knots
Group 2 Small Tactical
Normally operates below 3,500 feet AGL at speeds less than 250 knots
Group 3 Tactical
Normally operates below 18,000 feet MSL at speeds less than 250 knots
Group 4 Persistent
Normally operates below 18,000 feet MSL at any speed
Group 5 Penetrating
Normally operates higher than 18,000 feet MSL at any speed
AGL ASM LOS
above ground level air-to-surface munition line-of-sight
Characteristics
 Generally hand-launched.
 Real time video and control.
 Operates within LOS of user (limited range).
 Small payloads; focus on reconnaissance, surveillance, and intelligence gathering.
 Launched in unimproved areas by a small number of personnel.
 Medium range and endurance.
 Payload focus: reconnaissance, surveillance, and intelligence gathering; may add weapons.
 Requires LOS to ground control station.
 Launched in unimproved areas by a small number of personnel.
 Range and endurance vary significantly.
 Payload focus: reconnaissance, surveillance, and intelligence gathering; may add weapons.
 Requires larger logistics footprint than Groups 1 and 2.
 Can be used both strategically and tactically.
 Requires a runway for launch and recovery.
 Extended range and endurance.
 Payloads: reconnaissance, surveillance, intelligence, gathering, and ASM weapons.
 Operates at medium-to-high altitudes.
 Strategic-level asset.
 Requires an improved runway for launch and recovery.
 Greatest range, endurance, and airspeed.
 Payloads: suite of optics for targeting and weaponry for engagements.
 Operates at medium-to-high altitudes.
 Logistical footprint similar to that of a manned aircraft.
MSL UAS
mean sea level unmanned aircraft system
3-32. UASs include drones, characterized by preprogrammed flight paths and patterns, and remotely piloted vehicles controlled by ground-based operators. Some UASs may implement both drone and remotely piloted flight control types. Each can perform a variety of missions, ranging from reconnaissance and battlefield surveillance to attack and electronic warfare. UASs have extensive commercial applications and, as a result, are readily available and arguably the most developed system in many armies around the world. Due to the prolific use of unmanned systems, commercial off-the-shelf UASs are readily available and can be weaponized with relative ease. There are over 1,000 current and developing UAS programs worldwide. UASs are typically comprised of a control element, communication systems, support elements, an unmanned aircraft, a payload or pod, and a human element.
 The control element typically consists of UAS operators and leaders providing aircraft control, payload control, weapons control, and communications supporting the commanders and staffs planning/execution requirements. It also includes the control station itself from which the unmanned aircraft receives its commands. The control station can be mounted on tactical vehicles, in stationary and static structures, on civilian vehicles such as vans or trucks, and on ships; it could even be placed in orbit around the Earth.
 Communication within an UAS is normally conducted via line-of-sight communications or satellite control; it is often encrypted to increase information protection and survivability. UASs
3-6
FM 3-01
22 December 2020
Threat
also make effective platforms for communications relay stations due to their potentially high mission endurance and ability to avoid (over-fly) terrain that ground-based vehicles with relay components would be unable to navigate.  The support element includes all logistical systems required to deploy, transport, recover, enable, and generally sustain the UAS.  The unmanned aircraft can manifest itself in a variety of types to include fixed-wing, rotary-wing, aerospace, and even balloons. Typically, the larger the aircraft the higher its endurance and the higher the altitude in which it can operate. Low, slow, and small UAS are particularly dangerous due to the challenges which they present to friendly sensor systems for detection and identification and for weapon systems to consistently defeat them given their low/slow kinematic profile. UASs are also easily obtained commercially and inexpensive, making them even more of a threat.
3-33. UASs serve as intelligence, surveillance, and reconnaissance platforms for target detection, identification, and location; weapon targeting; target designation; and battle damage assessment. UASs can assist commanders with early warning to develop friendly courses of actions. State-of-the-art sensors and data links provide real-time targeting for fire support systems, maneuver forces, and aircraft. UASs equipped with laser designators provide immediate targeting assistance and terminal guidance of munitions. UAS platforms also can serve as a means for weapons delivery or may themselves serve as the weapon, and have been used extensively to attack high payoff targets without endangering pilots. Threat actors consider UASs expendable.
3-34. UASs have relatively low radar cross sections, low speed, and low thermal signatures, thus making them difficult to detect, track, and engage. Mission-dictated flight profiles take full advantage of terrain, increasing system survivability and optimizing coverage. Flight altitudes for UASs vary by their size and mission and can range from meters to thousands of kilometers. UASs conducting intelligence, surveillance, and reconnaissance missions operate at altitudes consistent with their sensor systems. They normally fly at altitudes safe from small arms fire and can stand off and detect from up to 25 kilometers.
3-35. UAS optical payloads consist of daylight television, infrared video, and recording cameras (for reconnaissance missions). Other major payload categories include electronic warfare (jammers), electronic intelligence, radar, communications relay and attack warheads. Several nations are developing and fielding anti-radiation homing UAS capabilities with the primary mission of attacking battlefield radio frequency emitters (radars and communications). These platforms have a variety of launch options and are usually fireand-forget systems.
MANNED ROTARY-WING AIRCRAFT
3-36. Most countries maintain helicopter fleets to support military operations. While the majority of helicopters can be armed to perform a variety of roles, the attack helicopter poses the greatest threat to maneuver forces. The versatility of helicopters make them ideal for use in most combat areas.
3-37. Threat ground force commanders rely primarily on helicopters to fulfill direct air support requirements. Helicopters can perform a variety of missions. Hovering and low-flying helicopters, taking full advantage of terrain masking, are difficult to acquire and target. An especially challenging ingress technique is nap-of-theearth flying, in which a helicopter hovers at a masked point, dashes to the next mask point, and hovers again. This technique is challenging because of short exposure times and varying between near-zero Doppler and moderate Doppler velocities. Improvements in fire control and weapon capabilities enable helicopters to search, acquire, and fire at ground targets from longer standoff ranges, thus increasing their survivability and effectiveness.
MANNED FIXED-WING AIRCRAFT
3-38. Manned fixed-wing aircraft remain essential to virtually every type of military operation and despite the emergence of ballistic missiles and cruise missiles, it will continue to play a role in future conflicts. There are more than 40,000 operational military aircraft today; of these, some 10,000, many produced during the Cold War era, are in third world inventories. Over 50 countries have an aviation industry of some kind, and over 20 countries design their own aircraft.
22 December 2020
FM 3-01
3-7
Chapter 3
3-39. Manned fixed-wing combat aircraft are highly flexible and can perform a variety of missions in offensive and defensive operations: air interdiction, strategic attack, suppression of enemy air defense, and close air support. Fixed-wing aircraft can employ a variety of munitions, including bombs, guns, rockets, cruise missiles, and tactical air-to-surface missiles. Integrated navigation/bombing computers and related mission equipment provide new combat aircraft with a precision-strike capability, day or night and in bad weather.
3-40. New aircraft incorporate such features as radar warning receivers, on-board jammers, chaff, flares, and a lower radar cross section to improve survivability and mission success rate. In addition, the proliferation of fixed-wing aircraft throughout the world increases the probability that opposing forces may employ the same type of aircraft in a conflict; this exacerbates the already challenging problem of identification.
ROCKETS, ARTILLERY, AND MORTARS
3-41. RAM are traditional indirect fire threats to ground forces. These systems vary in size and effect. Rockets and artillery are usually fired from towed or self-propelled platforms while mortars are frequently transported by dismounted crews.
3-42. Rockets are unguided projectiles with a short boost phase and unpowered flight, and fly ballistic trajectories. The most common type of warhead is high explosive with a point detonating fuse. Rockets are commonly fired from self-propelled platforms known as multiple rocket launchers. Multiple rocket launchers may fire large volleys of rockets (20 to 40) with multiple launchers being used in a volley. Rockets come in many calibers such as 57-millimeter, 68-millimeter, 80-millimeter, 81-millimeter, 107-millimeter, 120millimeter, 122-millimeter, and 127-millimeter. Their high rate of fire and volume of fire make them a stressing threat. Hybrid and irregular forces have used rockets as harassing fire, with improvised firing methods and delays to limit counterfire effects. Large caliber rockets, 200-millimeter and greater, were addressed earlier.
3-43. Artillery and mortar rounds are also unpowered and traditionally fly ballistic trajectories. All armies throughout the world have some form of artillery. The most common artillery calibers are 122-millimeter, 152-millimeter, and 155-millimeter. Unless using rocket assisted projectiles, artillery systems are generally limited to 20 to 30 kilometers. The most common mortar calibers range are 60 to 120-millimeter, but include many variants, such as 81-millimeter, 82-millimeter, 100-millimeter, and 160-millimeter.
ELECTRONIC WARFARE AND CYBER
3-44. Electronic warfare and cyber threats are continuously present throughout the tactical, operational, and strategic realms. Electronic warfare involves the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Electronic warfare includes electronic attack, electronic protection, and electronic warfare support. A threat will attempt to deny, degrade, disrupt, or destroy friendly emitters (radar and communications) and other electromagnetic spectrum dependent devices. Sensors to locate emitters or to listen for information and/or intelligence can be mounted on ground or air platforms. Cyberspace attacks will target technical networks, systems, and data. For more information see FM 3-12.
3-45. The most common form of tactical electronic attack is electromagnetic jamming. Jamming consists of an emitter radiating electromagnetic energy to prevent a radar receiver from discerning the expected return from the background noise or a radio from receiving voice or data. Advanced jamming techniques allow the threat to project false location, speed, and altitude, creating confusion for radar operators.
3-46. The use of an electromagnetic pulse, normally envisioned as produced by a high altitude nuclear explosion, is a threat to friendly electronic systems. Our increasing dependence on advanced electronics systems results in the potential for an increased electromagnetic pulse vulnerability of our forces, and if unaddressed makes electromagnetic pulse employment by an adversary an attractive asymmetric option (Electromagnetic Pulse Commission Report). In addition, several countries are experimenting with generating an electromagnetic pulse from non-nuclear explosives.
3-47. ADA organizations, from the tactical to the strategic level, face multiple types of sophisticated cyber threats, whether in garrison or operating in the field. Regional powers, peer states, and transnational terrorist organizations have personnel with capabilities to conduct cyber-attacks on installations and sites. Cyber-
3-8
FM 3-01
22 December 2020
Threat
attacks are expected against C2 nodes; theater and tactical data and voice networks, information systems, radars and their tracking and targeting systems, and missile guidance packages. The threat is expected to use cyber attacks in conjunction with physical attacks as part of a larger campaign. Cyber threats can prevent target detection, tracking, and engagement of threat munitions and platforms. The threat is likely to also expand attempts to penetrate networks for data collection and exploitation with a growing sophistication to conduct cyber attacks. Strategic organizations, with “on-line” missions, face multiple types of cyber threats on a continual basis.
STRATEGIC MISSILE THREATS THAT MAY IMPACT THE THEATER
3-48. Despite the end of the Cold War, the threat of accidental, unauthorized, or limited strategic strikes against the United States continues to exist. ICBMs and SLBMs are a threat to the United States. They carry nuclear warheads and employ a variety of penetration aids.
3-49. ICBMs and SLBMs pose significant challenges to active defense and attack operations forces. Some ICBMs are road mobile, reducing the time that they can be targeted, while others are designed with countermeasures to ballistic missile defense systems. Some SLBMs may be launched from surfaced and submerged submarines from various launch locations.
INTERCONTINENTAL BALLISTIC MISSILES
3-50. An ICBM is a ballistic missile with a range greater than 5,500 kilometers and typically designed to deliver one or more nuclear warheads. Most modern designs support multiple independently targetable reentry vehicles, allowing a single missile to carry several warheads, each of which can strike a different target.
3-51. Although current ICBM-producing countries are limited, several countries are developing production capabilities. Thus, the threat to the United States continues to grow. Other countries developing ballistic missiles are also likely to build various responses to U.S. defenses. Developing countries would probably rely on available countermeasure technologies such as separating reentry vehicles, spin stabilizing reentry vehicles, radar absorbing material, low-power jammers, and simple decoys such as balloons.
3-52. Rudimentary technologies from earlier versions of missiles are more readily available and are adequate for use by nations not overly concerned with missile accuracy, reliability, or safety. The increased availability of technical assistance from other nations and of classified information related to ballistic missiles and weapons of mass destruction will short-cut development programs. Once launched, ICBMs are difficult to defeat. Their targets may be strategic or political, civilian or military. ICBMs will most likely use nuclear warheads, and many will carry multiple reentry vehicles. Projected ICBM improvements include mobile basing, improved reliability, increased accuracy, and improved penetration aids.
3-53. Iran's progress on space launch vehicles - along with its desire to deter the United States and its allies - provides Tehran with the means and motivation to develop longer-range missiles, including ICBMs. In April 2016 Iran launched a space launch vehicle, which could be capable of ICBM ranges if configured as such. Iran may be able to deploy an operational ICBM by 2020 if the regime chooses to do so.
3-54. North Korea is developing and has paraded two road-mobile ICBMs which, if successfully developed, would likely be capable of reaching much of the continental United States. North Korea launched several ICBMs in 2017 and claims to be capable of ranging most of the continental United States with its ICBMs.
SUBMARINE-LAUNCHED BALLISTIC MISSILES
3-55. Submarine mobility provides launch location options unavailable to ICBM forces and makes detection difficult. SLBMs provide ICBM capabilities with the added advantages of better hiding, shorter flight times, and depressed reentry angles. Targets will generally be identical to those of ICBMs. Projected improvements include more sophisticated payloads and guidance systems, improved reliability, increased range, and improved penetration aids.
22 December 2020
FM 3-01
3-9
Chapter 3
3-56. North Korea conducted multiple flight tests of a developmental SLBM. North Korea tested a new SLBM capability in 2015 and again in 2016. In February 2017, North Korea publicized the launch of a new solid-propellant missile that appeared to be a land-based variant of its SLBM. The missile was launched from a canister carried on a previously unseen tracked launcher.
SPACE
3-57. Space is the new high ground for operations. It is becoming an increasingly congested, competitive, and contested environment. Space systems are critical to the tactical, operational, and strategic levels of warfighting. The quantity and quality of foreign satellites on orbit is rapidly increasing, and foreign countries are developing counters to the U.S. space advantage, including methods to disrupt or deny access to communications; position, navigation, and timing; and intelligence, surveillance, and reconnaissance satellites. Employment of these threat space-based capabilities can have a significant impact on U.S. systems and their ability to execute missions.
3-58. Peer competitors are pursuing space efforts for military, economic, and political objectives. They recognize the strategic value of space and view U.S. dependency on space for projection of military power as a vulnerability. They operate satellites for communications, navigation, earth resources, weather, intelligence, surveillance, and reconnaissance purposes, in addition to conducting manned space and space exploration missions.
3-59. Over the next 10 years, hundreds of commercial or government-sponsored imaging satellites are projected to be launched. The sheer number of these new satellites, and the fact that most are foreign or consortia owned, diminishes the ability of the United States to impose political constraints on the use of satellite imagery products. These new commercial imaging capabilities will allow an adversary to challenge the U.S. forces ability to achieve strategic and tactical surprise and to gain and sustain information superiority.
SUMMARY
3-60. Ballistic, cruise missiles and hypersonic weapons are and will continue to be offensive weapons of choice for many nations. These threats, as standalone systems or complemented with UAS, electronic warfare and cyber, and other capabilities described above, create formidable challenges for Army, joint, and multinational AMD forces. Table 3-2 provides a summary of the air and missile threats, their primary targets, and their capabilities and trends.
3-10
FM 3-01
22 December 2020
Threat
Table 3-2. Air, missile, and electronic warfare/cyber threats to surface targets
System Category
Ballistic Missiles
Targets
 Geopolitical/population centers.
 Airports and seaports.  Logistical areas.  Troop concentrations.
Large Caliber Rockets
 Assembly areas.  ADA/field artillery locations.  Defensive positions.  Chokepoints/routes of
advance.
Cruise Missiles
 High-value military/industrial complexes.
 Airports and seaports.
 Logistical areas.
 C2 centers.
 Maneuver force concentrations.
Tactical Air-toSurface Missiles
 Armored vehicles.  Radars.  Bridges or other point
targets.  ADA sites.
Unmanned Aircraft Systems
 Assembly areas, logistical areas, C2 centers (seeing).
 Troop movements (seeing).
 C2 centers (jamming).
 Maneuver formations/systems (attacking).
Capabilities
 To 5,500 kilometers range.
 Low radar signature.
 Warheads conventional, weapons of mass destruction, submunitions.
 Launch from mobile platforms.
 Penetration aids, decoys, chaff, maneuvering warheads.
 High rates of fire, rapid reload and highly mobile.
 Extended Range300+ kilometers.
 Low signature and flat trajectory.
 Warheads conventional, weapons of mass destruction, submunitions.
 30-3,000 kilometer range.
 360-degree threat; very low radar signature.
 Air, sea, or ground launched.
 Warheads conventional, weapons of mass destruction, submunitions.
 >100 kilometer range.
 Supersonic speeds (Mach 3).
 Extremely accurate.
 Radio-command, laser, anti-radiation, or electrooptical guidance.
 Multi-mission reconnaissance, surveillance, and target acquisition; electronic warfare; attack.
 Range to 1,900 kilometers; altitude nearground to 17+ kilometers.
 Standoff/detection to 25 kilometers.
 Payloads daylight television, cameras, missiles, laser designators, retransmitters.
Trends
 Increased range solid fuel, multi-stage.
 Improved accuracy terminal guidance, global positioning system.
 Increased survivability decoys, signature reductions.
 Course corrected munitions.
 Increased ranges blurring line with close- and shortrange ballistic missiles.
 Increased accuracies with global positioning system guidance.
 Increased number of land attack variants.
 Reduced radar signatures.  Improved accuracy and
increased range.
 Improved accuracy and lethality.
 Lock-on-after-launch or loitering.
 Dual/tri mode seekers increased reliability and all weather capability.
 More missions decoy, suppression of enemy air defenses, and electronic attack.
 Standoff range in excess of 25 kilometers.
 Detection to 40 kilometers; all weather, day/night.
 Perch and stare ability.  Low radar signature.  Low thermal signature.
22 December 2020
FM 3-01
3-11
Chapter 3
Table 3-2. Air, missile, and electronic warfare/cyber threats to surface targets (continued)
System Category
Targets
Capabilities
Trends
Unmanned Aircraft Systems
 Assembly areas, logistical areas, C2 centers (seeing).
 Troop movements (seeing).
 C2 centers (jamming).
 Maneuver formations/systems (attacking).
Rotary-Wing Aircraft
 Troops/armored vehicles.  Convoys.  C2 centers.
Fixed-Wing Aircraft
 Ports.
 Assembly/logistical areas.
 C2 centers.
 Geo-political/ population centers.
 Maneuver force vehicles/ formations.
Rockets, Artillery, and
Mortars
 Troops/armored vehicles.  Fixed/semi-fixed sites.
 Multi-mission reconnaissance, surveillance, and target acquisition; electronic warfare; attack.
 Range to 1,900 kilometers; altitude nearground to 17+ kilometers.
 Standoff/detection to 25 kilometers.
 Payloads daylight television, cameras, missiles, laser designators, retransmitters.
 Multi-role attack; reconnaissance, surveillance, and target acquisition; electronic warfare.
 Combat diameters out to 460 kilometers; terrain masking/hovering.
 Payloads daylight TV, cameras, missiles, laser designators, retransmitters.
 Multi-role close air support; reconnaissance, surveillance, and target acquisition; electronic attack; interdiction; strategic attack; suppression of enemy air defenses.
 Precision strike.
 Equipment missiles, rockets, bombs, submunitions, guns.
 Variable payload.
 Saturation of airspace.
 Mass fires.
 Easily moved/relocated.
 More missions decoy, suppression of enemy air defenses, and electronic attack.
 Standoff range in excess of 25 kilometers.
 Detection to 40 kilometers; all weather, day/night.
 Perch and stare ability.  Low radar signature.  Low thermal signature.
 Modular upgrades to airframes.
 Expanded night/adverse weather capability.
 Improved fire control systems/engagement capability at greater ranges.
 Improved countermeasures.
 Multi- versus single- mission aircraft.
 Greater use of standoff and precision.
 Reduced radar and infrared signatures.
 Integrated electronic attack.  Proliferation increases
identification challenges.
 Extended ranges.  Improved accuracy.  Greater lethality.
3-12
FM 3-01
22 December 2020
Threat
Table 3-2. Air, missile, and electronic warfare/cyber threats to surface targets (continued)
System Category Electronic
Warfare and Cyber
Intercontinental
Ballistic Missiles
Submarinelaunched Ballistic Missile
Space Systems
Targets
 C2 nodes.  Tactical data and voice
information, networks, and systems.  Theater data and voice information, networks, and systems.  ADA radars.  ADA tracking and targeting systems.  Missile and UAS guidance systems.
 Large fixed military installations.
 Capitals and other population centers.
 Major industrial sites/regions.
 Intercontinental ballistic missile sites.
 Large fixed military installations.
 Capitals and other population centers.
 Major Industrial areas/sites.
 Intercontinental ballistic missile sites.
 Lodgment areas.  Massed troops.  Ships.  Missile launch sites.
ADA air defense artillery
Capabilities
 Disrupt data and voice communications.
 Locate C2 nodes for targeting.  Disrupt targeting and guidance
systems.  Electronic warfare techniques, such
as interception and spoofing, to gain information on planning and operations.  Radar jamming.  Electromagnetic pulse to incapacitate electronic systems.
 Mobile launchers.  Multiple warheads nuclear.  Penetration aids.
Trends
 Cyber-attacks in conjunction with physical attacks.
 Expanded attempts to penetrate networks for data collection and exploitation.
 Growing sophistication of threats.
 Increased exposure of tactical systems to cyber threats as office systems are combined with tactical systems.
 Mobile basing.
 Improved reliability and accuracy.
 Improved penetration aids.
 Mobile.  Hide/wait/launch from anywhere.  Worldwide targeting.  Multiple warheads nuclear.  Penetration aids.
 More sophisticated payloads and guidance systems.
 Increased range and accuracy.
 Improved reliability and penetration aids.
 Functions: communications/ navigation support, weather prediction, surveillance, reconnaissance, intelligence collection, and counter-space operations.
 Payloads: synthetic aperture radar, electro-optical, imaging infrared.
 Disrupting communications.
C2 command and control
UAS
 Easy access to improved commercial sources.
 Remote sensing resolution to one meter.
 Advanced data processing/ storage.
unmanned aircraft system
22 December 2020
FM 3-01
3-13
This page intentionally left blank.
Chapter 4
Command and Control of ADA Forces
This chapter describes the elements of mission command, the elements of command and of control, and the authorities exercised through C2. It discusses how ADA forces execute AMD C2 and the C2 relationships exercised across joint elements and ADA echelons in a theater of operations.
MISSION COMMAND
4-1. Mission command is the Armys approach to command and control that empowers subordinate decision making and decentralized execution appropriate to the situation (ADP 6-0). To effectively exercise authority and provide direction, a commander must fully understand the problem, envision the desired end state, and grasp the nature and design of operations that will lead to it. The criticality of understanding cannot be overstated. It is vital to making effective decisions, managing associated risks, and considering subsequent effects.
4-2. A fundamental aspect of Army AMD operations is that AMD fires are defensive in nature. The enemy chooses when to initiate offensive action by air surveillance and attack, and, thus, the enemy commander holds the initiative as friendly ADA forces react to the method, tempo, and volume of air attack. However, ADA commanders, who are skilled in translating mission command into executable plans and effective AMD fires, render enemy air attacks and surveillance ineffective. In so doing, they wrestle the initiative from the enemy commander and translate it into operational and strategic advantages for the Army and JFC. Further, successful countering of enemy air attacks sets the conditions for joint and Army commanders to seize or retake the initiative through offensive action, forcing the enemy commander to react to our actions.
4-3. C2 systems provide the ability to receive and disseminate orders, immediately view friendly activity and supply movement, plan operations, receive situation and intelligence reports, view the airspace, and receive automatically disseminated weather observations, forecasts, and analysis. C2 capabilities ensure commonality across Army operations and standardize planning and execution functions across all echelons. A unique aspect of the ADA force is the degree of integration that exists between the art of command and the science of control. ADA C2 systems, as well as a comprehensive understanding of mission command, are critical enablers for ADA commanders as they determine how, when, and at what level they should impact the tactical engagement sequence.
4-4. AMD operations are complex and require commanders who, through mastery and application of mission command,
 Understand the air and missile threat,  Know how to design air and missile defenses,  Can develop cohesive teams,  Can employ ADA forces to maximize weapon systems capabilities with joint and multinational
AMD partners.
4-5. The Armys principles of mission command enable ADA commanders at all echelons to effectively conduct operations. These principles ̶ competence, mutual trust, shared understanding, commanders intent, mission orders, disciplined initiative, and risk acceptance ̶ allow commanders to cut through the “fog of war” and make timely and effective decisions despite operating in an environment that is both uncertain and often ambiguous.
4-6. Competence. ADA leaders and Soldiers at all echelons must be tactically and technically competent in executing AMD operations masters of their craft as individuals and in teams. Competence is achieved
22 December 2020
FM 3-01
4-1
Chapter 4
through institutional training and education focusing on the individual, operational force training emphasizing team building, and self-development enhancing knowledge. Competence is reinforced through a continuous series of focused and progressively stressing drills and exercises and challenging certifications.
4-7. Mutual trust. Central to creating a functional mission command climate is the need to build cohesive teams. Demonstrated competencies, dedicated leadership, and commitment to mission accomplishment are the cornerstones to building mutual trust. ADA commanders have a unique opportunity to build cohesive teams with joint and multinational partners. Commanders must have a fundamental understanding and appreciation for the unique community cultures of these partners to build cohesive multicultural AMD teams.
4-8. Shared understanding. AMD C2 capabilities at the operational and tactical levels (Patriot C2, Air and Missiles Defense Planning and Control Systems (AMDPCS), forward area air defense (FAAD) C2/C-RAM C2, THAAD C2, AMDWS, and air defense systems integrator) provide information exchanges, automated processing aids, and warfighter/machine interfaces to achieve awareness. Lack of commonality and unique system interfaces complicate the achievement of this objective across all echelons of the ADA force. As such, a greater premium is placed on human cognition when it comes to transforming awareness and sometimes conflicting or ambiguous information into understanding.
4-9. Commanders intent. The ADA commander regularly synchronizes several warfighting functions across multiple joint, multinational, and Army organizations. It is impossible for the commander to specify the task, purpose, and end state for every possible contingency. It is with this backdrop that the commander must issue a clear intent that provides the necessary framework for subordinate and adjacent leaders to execute their short notice warfighting tasks and mission maximum attrition as far forward as possible.
4-10. Disciplined initiative. AMD functions, by their very nature, are complex. A thinking enemy with a wide range of capabilities, combined with a saturated joint or multinational operating environment, creates the conditions for demonstrated disciplined initiative. The key to operating in this environment is for subordinates to demonstrate understanding of the mission, the commanders intent and end state, the AMD concept of operations (to include ROE), and the tasks and purposes of each subordinate unit within that concept of operations. This understanding arms subordinates with the ability to exercise disciplined initiative.
4-11. Mission orders. The AMD environment is fast paced and always evolving. Effective use of mission orders to provide direction and guidance enables commanders to achieve mission accomplishment over a wide ranging, rapidly evolving, and three-dimensional operational environment. Properly constructed and disciplined orders allow commanders to direct change to the concept of the operation, when necessary.
4-12. Risk acceptance. ADA commanders must know where they are facing risk and ensure these risks are understood at all echelons. Commanders, staffs, and subordinate leaders use the risk management process in developing plans and preparing for operations (see ATP 5-19 for more information). The risk management process allows commanders to determine the level of risk, supports their decisions as to how much risk to accept (prudent risk), and facilitates the identification of means to minimize the effects of the risk. It is most important to provide leadership with accurate risk information and for all to understand at what level the responsibility to accept risk resides.
COMMAND OF ADA FORCES
4-13. Command is the authority that a commander in the armed forces lawfully exercises over subordinates by virtue of rank or assignment (JP 1). Command includes the authority and responsibility for effectively using available resources and for planning the employment, organization, coordination, and control of forces for the accomplishment of missions. Direct leadership within a command decreases as the level of command increases.
4-14. Command is more art than science. The art of command is the creative and skillful exercise of authority through timely decision making and leadership. As an art, command requires exercising judgment.
4-2
FM 3-01
22 December 2020
Command and Control of ADA Forces
COMMMAND RELATIONSHIPS
4-15. Army command relationships define superior and subordinate relationships between unit commanders and identify the degree of control of the gaining commander. There are five types of command relationship: organic, assigned, attached, operational control, and tactical control (ADP 5-0).
Note. The joint community identifies four command relationships: combatant command, operational control, tactical control, and support. Operational and tactical control are discussed below. Support Relationships is discussed on page 2-4, paragraphs 2-13 through 2-17. Combatant command (COCOM) is the nontransferable command authority, which cannot be delegated, of a combatant commander to perform those functions of command over assigned forces involving organizing and employing commands and forces; assigning tasks; designating objectives; and giving authoritative direction over all aspects of military operations, joint training, and logistics necessary to accomplish the missions assigned to the command (JP 1).
4-16. Organic are those assigned to and forming an essential part of a military organization as listed in the table of organization for the Army, Air Force, and Marine Corps, and are assigned to the operating forces for the Navy (JP 1). An ADA battalion, for instance, is organized with a specified number of ADA batteries based on its table of organization and equipment. Organic ADA forces have command relationships with all other organic forces organized with the headquarters. Organic ADA forces are positioned by its organic headquarters and have their priorities established by that headquarters.
4-17. Assign is to place units or personnel in an organization where such placement is relatively permanent and/or where such organization controls and administers the units or personnel for the primary function, or greater portion of the functions, of the unit or personnel (JP 3-0). Assigned ADA forces have command relationships with the gaining unit, are assigned positions by that units commander, and have priorities established by that commander or by a subordinate commander if so delegated.
4-18. Attach is the placement of units or personnel in an organization where such placement is relatively temporary (JP 3-0). Attached ADA forces have command relationships with the gaining ADA unit and are assigned positions and have priorities established by that units commander.
4-19. Operational control is the authority to perform those functions of command over subordinate forces involving organizing and employing commands and forces, assigning tasks, designating objectives, and giving authoritative direction necessary to accomplish the mission (JP 1). Command relationships, positions, and priorities are established by the gaining ADA unit. See paragraph 4-51, on page 4-8 for additional discussion.
4-20. Tactical control is the command authority over assigned or attached forces, or military capability of forces made available for tasking, that is limited to the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish missions or tasks assigned (JP 1). Command relationships, positions, and priorities are established by the gaining ADA unit. See paragraphs 4-58 and 459 on page 4-10 for additional discussion.
ELEMENTS OF COMMAND
4-21. The elements of command are authority, responsibility, decision making, and leadership. Commanders exercise their authority by making decisions and leading their command in the implementation of those decisions (ADP 6-0).
4-22. Command requires providing leadership. Leadership is the process of influencing people by providing purpose, direction, and motivation to accomplish the mission and improve the organization (ADP 6-22). Collaboration and dialogue are essential to this process, and effective commanders employ their C2 systems to promote these in order to support decision making.
22 December 2020
FM 3-01
4-3
Chapter 4
AUTHORITY
4-23. Authority is the right and power to judge, act, or command. Commanders exercise authority by virtue of their positions; they sustain authority, in many cases, by their competence and leadership abilities and by the trust and respect with which they are held by superiors and subordinates. Command authority permeates all force and engagement operations. This authority may be, and often is, delegated to subordinates. Commanders must determine how much authority is delegated and when. These determinations are made based on the commanders confidence and trust in subordinates and METT-TC. For example, when significant air threats are imminent or an air battle intensifies, engagement authority for air threats may be delegated to Avenger team leaders. Authority with respect to command and to control is more fully discussed in Authorities: Command and Control, beginning on page 4-6.
RESPONSIBILITY
4-24. With authority comes responsibility. Though commanders may delegate authority, they cannot delegate responsibility. Commanders are legally and ethically responsible and accountable for their own actions and decisions and for those of their subordinates. Responsibility entails fulfilling the assigned task; accountability is about “answerability.” Commanders are responsible and accountable for mission accomplishment; the health, welfare, morale, and discipline of Soldiers; and the use and maintenance of resources. Commanders are always accountable to their superiors for what happens or fails to happen in their command. AMD command responsibility and accountability are inherent in all force and engagement operations irrespective of phase of operation, time, allocation of ADA resources, or aerial threats.
DECISION MAKING
4-25. Given the nature of the AMD operational environment (compressed detection-to-engagement timelines, congested airspace, and ambiguous air pictures), ADA commanders and their staffs must be equipped and trained to make decisions that are both timely and effective. While our AMD capabilities include a variety of automated decision aids, the volume and variety of information presented to commanders and operators require those making decisions to process and understand it quickly enough to allow for the most appropriate response/action. To facilitate this, ADA commanders must train subordinates to realistic standards, organize available assets, establish procedures, and demand focus in order to streamline the information flow and expedite the decision-making process.
LEADERSHIP
4-26. A key ingredient to successful command is the exercise of effective leadership in the inherently stressful, ambiguous, and often chaotic conditions of combat operations. Leadership is the activity of influencing people by providing purpose, direction, and motivation to accomplish the mission and improve the organization (ADP 6-22). Collaboration and dialogue are essential to this process, and effective commanders employ their C2 system to promote these in order to support decision making.
4-27. Effective leadership requires commanders to establish their presence at the critical place and time in battle. Commanders presence at subordinate elements allows them to personally check for an understanding of plans and intent. Their presence also allows them to better understand the operational concerns and challenges of their subordinate commanders and factor those into their decision making. Finally, their presence allows them to assess the overall unit climate, readiness, and morale.
4-28. Commanders at all echelons must exploit opportunities for greater leadership presence and use those opportunities to instill confidence in their Soldiers and cultivate a positive leadership climate. The typically wide dispersion of subordinate units in an AMD defense design makes this extremely challenging. As such, commanders must be deliberate about prioritizing the time spent “on the ground” with their staffs and subordinate units. The face-to-face interaction with subordinate leaders and Soldiers helps to improve the flow of information, both up and down, contributing to a common and shared situational understanding across echelons. Ultimately, this time spent “on the ground” is time well spent; it facilitates building and maintaining trust and confidence, which will result in significant operational dividends during those times when command presence is not possible.
4-4
FM 3-01
22 December 2020
Command and Control of ADA Forces
CONTROL AND COORDINATION OF ADA FORCES
4-29. Control is the regulation of forces and warfighting functions to accomplish the mission in accordance with the commanders intent (ADP 6-0). Control extends over the entire force and is executed in the different domains by various authorities. In the air domain, the JFC designates the AADC to execute AMD operations and the airspace control authority to coordinate the use of the airspace. See paragraph 4-51 on page 4-8 for more information.
4-30. Limited AMD resources, the potentially catastrophic consequences of failed engagements, and the ever present risk of fratricide make effective control of AMD fires a top priority of all personnel involved in engagement operations. The structure and degree of this control varies based upon situational factors, which include span of control, degree of airspace traffic density, operational context (phase of operations), and geopolitical considerations and sensitivities.
ELEMENTS OF CONTROL
4-31. Commanders use control to direct and coordinate the actions of subordinate forces. However, control is not a one-way process it entails the reciprocal flow of information from subordinate elements as well as from higher and lateral sources. There are four elements of control: direction, feedback, information, and communications.
DIRECTION
4-32. Directions are generally transmitted through plans and orders. These may contain amplifying control and coordination measures. AMD documents, such as the area air defense plan, airspace control plan, and airspace control order, may, for instance, identify air routes through the area of operations, specify who is delegated engagement and/or identification authority, activate/deactivate missile engagement zones, and establish the weapons control status.
4-33. Automated C2 tools can enhance the ADA commanders ability to exercise control to account for changing circumstances and direct adjustments within the defense design and ROE to address the new situation. These tools facilitate shortened response times to achieve and implement critical C2 decisions and directives.
FEEDBACK
4-34. Feedback may come from higher headquarters or adjacent, subordinate, or supporting forces, and it may occur before, during, or after operations. Feedback conveys concurrence/approval of existing plans or activities, or it may recommend/direct changes. Feedback promotes common situational understanding.
INFORMATION
4-35. The ability to gather and process information from multiple sources (for example, sensor data, situation reports, and unit movement reports) allows commanders and their staffs to see and understand the air battle. While this holds true for all phases of the fight, it is particularly critical as maneuver forces look to seize the initiative and execute decisive action against the enemy. Given the pace of these operations, this information must be timely and unambiguous. While this has proven to be a challenge across all domains, the ability to gather and process this information as it pertains to the airspace has been particularly daunting. The lack of a real-time air picture at BCTs and functional brigades forces these commanders to accept what amounts to incalculable risk when factoring in the enemys ability to influence (interdict, delay, or disrupt) their schemes of maneuver to achieve decisive action. ADAM cells must establish communications and information exchange procedures with ADA units and other AMD assets, within their assigned brigades areas of operations, in order to leverage the capabilities those assets provide. Even if they do not have all the assets to defeat the potential air threat, identifying and understanding it allows brigade commanders to assess the risk and implement measures to mitigate it.
22 December 2020
FM 3-01
4-5
Chapter 4
COMMUNICATION
4-36. Effective communication is essential when operating in the complex and ever evolving AMD operational environment. The information being transmitted must be timely, relevant, and, most importantly, must equal the information being received. Due to these requirements, every effort must be made to ensure voice and data communication networks are established and maintained through all phases of operations. Outages to networks must be addressed immediately. When outages do occur, established degraded communication procedures must be followed to ensure safe and effective continuity of operations until networks are restored.
4-37. One way to deal with degraded communications is through primary, alternate, contingency, and emergency (also known as PACE) communication planning. PACE plan establishes the methods of communications, typically from higher echelons to lower echelons. A good plan establishes redundancy so that communications are always available, while ensuring that an alternate or contingency method of communications does not rely on the primary.
COORDINATION
4-38. Inherent in command and control relationships is coordination of efforts. Coordination is a continuous process extending from initial planning for AMD operations through their execution. Coordination of functions and actions is effected by ADA officers in organizations and elements at the various Army, joint, and multinational levels. The primary AMD coordinators are the AAMDC commander; AAMDC and ADA brigade air defense artillery fire control officer (ADAFCO); AMD section chiefs in the theater, corps, and division headquarters; and the ADAM cell ADA officers in BCTs and other specified brigades. However, all ADA officers down to platoon level execute coordination tasks with their supported and supporting commanders.
4-39. AMD coordinators ensure that ADA plans and operations are synchronized with and integrated into the plans and operations across the land, sea, and air domains. Key coordination tasks (echelon dependent) include:
 Advise commanders and their staffs of the AMD capabilities, unit locations and statuses.  Assess air and missile threats and supported commanders priorities in order to optimize defense
planning.  Inform protection cells in corps and below of current operations and future AMD plans.  Assist the fire support coordinator in integrating attack operations priorities into the forces
targeting process.  Request and disseminate AMD information to include airspace control measures or restrictions.  Develop the AMD appendix in the operations plan.  Assist in facilitating force protection and sustainment support for ADA units.
4-40. Additional discussion of the specific responsibilities of individual AMD coordinators are contained in section IV, below, and in chapters 4 through 9.
AUTHORITIES: COMMAND AND CONTROL
4-41. Command and control is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission (JP 1). Command of AMD forces and the control of AMD fires are derived from separate authorities. Army commanders exercise legal authority and responsibility for the ADA formations assigned to them or otherwise placed under their operational control. However, because AMD fires occur in the airspace, they are controlled by the AADC. The area air defense commander is the component commander with the preponderance of air defense capability and the required command, control, and communications capabilities who is assigned by the joint force commander to plan and execute integrated air defense operations (JP 3-01). The AADC establishes the AMD ROE for the theater of operations. The separation of command responsibility from the authority to control AMD fires presents unique challenges for ADA commanders. They must command their ADA forces in the planning, preparation, and execution of the AMD mission, but at the same time, they engage air threats
4-6
FM 3-01
22 December 2020
Command and Control of ADA Forces
according to specified authorities and controls promulgated by the AADC. This complex environment results in the following set of conditions, which characterize nearly all AMD operations:
 AMD operations are inherently joint and interdependent.  Army AMD operations require an integrated and networked C2 system.  Command of ADA forces is exercised by Army commanders.  Control of Army AMD fires is exercised in accordance with JFC directives and by delegated
authorities.
AIR AND MISSILE DEFENSE OPERATIONS ARE INHERENTLY JOINT AND INTERDEPENDENT
4-42. The JFC counters air and missile threats to ensure freedom of action, provide protection, and deny enemy freedom of action (JP 3-01). The service component commands of the joint force normally are tasked to conduct operations in support of the counterair mission to maximize the complementary and reinforcing capabilities that each service brings to joint warfighting while minimizing relative vulnerabilities.
4-43. The U.S. Army provides the primary land-based AMD to the joint force. The JFC depends on the Army to execute AMD of critical assets from the land within the context of a larger joint counterair mission, which includes offensive and defensive operations. As the land AMD force to the larger joint defensive counterair effort, ADA forces depend on other service capabilities to provide space-, air-, and land-based intelligence, surveillance and reconnaissance to detect, track, provide early warning of air and missile threats, and cue ADA weapon systems to effectively counter these threats. The combination of Army AMD capabilities brought to the joint counterair effort, coupled with the support required of other services, make AMD operations inherently joint and interdependent.
4-44. ADA commanders must build a cohesive Army team that understands joint doctrine, tactics, techniques and procedures, and that is trusted by other members of the joint force. Further, through joint training and exercises, collaboration, and regular interaction, ADA commanders and those of other service components foster shared understanding that is critical to the execution of the joint counterair mission.
ARMY AIR AND MISSILE DEFENSE OPERATIONS REQUIRE AN INTEGRATED AND NETWORKED COMMAND AND CONTROL SYSTEM
4-45. ADA forces dependence on other service capabilities, as well as on each other, requires that all contributing systems (or sensor and shooter components) be networked and integrated to the greatest extent possible to facilitate a shared understanding of the operational environment for the air domain. Current capabilities are somewhat limited in the extent to which they are able to network and integrate due to their unique system interfaces. These capabilities rely on joint tactical data links to share track data and coordinate engagements. The Army has established an interface control officer position in the AAMDC, ADA brigades, corps, and divisions to focus on the planning and integration of the many Army and joint systems, networks, and information exchange capabilities. The Army interface control officer works with the designated joint interface control officer who is normally located at the joint air operations center (JAOC). The joint interface control officer is responsible for planning and managing the links over which critical force operations and engagement operations data is passed between joint AMD capabilities. See chapter 12 for more information on the networks and the Armys interface control officer.
4-46. To overcome the inherent system-centric limitations to integration, the Army is developing the Integrated Air and Missile Defense Battle Command (IBCS) system, a comprehensive and common networked C2 capability package that will leverage all relevant external data links for full joint integration; integrate all Army AMD sensor, shooter, and C2 platforms; employ an integrated defense design planning capability; provide a robust tool set to manage both force and engagement operations; and, allow for dynamic task organization of previously stove-piped ADA systems and major components into tailored force packages. By employing these capabilities, ADA forces will be able to overcome many of the inherent
22 December 2020
FM 3-01
4-7
Chapter 4
challenges associated with the complexities and ambiguities that characterize the wide range of air and missile threats they must defeat.
COMMAND OF AIR DEFENSE ARTILLERY FORCES IS EXERCISED BY ARMY COMMANDERS
4-47. Although AMD operations are inherently joint and interdependent, the command of ADA forces is always retained by Army commanders and cannot be delegated. Similarly, while the control of AMD fires is usually retained by the designated AADC, that control does not lessen the fundamental responsibility of ADA commanders for mission accomplishment and leading their formations.
4-48. Army command policy and mission command/C2 doctrine apply to all commanders regardless of unit type. Command of ADA forces includes the authority and responsibility for effectively using available resources and for planning the employment of, organizing, directing, coordinating, and controlling forces for the accomplishment of assigned missions. The ADA commander issues the commanders intent which expresses the purpose of the operation and the desired military end state, provides focus to the staff, and helps subordinate and supporting commanders act to achieve the commanders desired results.
4-49. Operational control is inherent in command authority and may be delegated within the command. Operational control, as previously defined in paragraph 4-19 on page 4-3, includes the authoritative direction over all aspects of military operations and joint training. Operational control normally provides full authority to employ those forces as the commander in operational control considers necessary. However, operational control does not give the commander in operational control the implied authority to direct logistics or administration, discipline, internal organization, or unit training. These authorities reside with the commander pursuant to service directives. ADA forces may receive operational control of subordinate organizations, and may also be placed under the operational control of higher level Army organizations or another service component in support of a joint force or component commander.
4-50. The Armys overarching framework for exercising C2 is the operations process. The operations process drives AMD mission planning and the execution of AMD operations in accordance with a units command structure (for example, ADA brigade to battalion) and collaboration with joint and multinational partners. Within the operations process, the analysis process continuously collects and evaluates all available information on friendly and enemy forces to support decisions made by the commander. Throughout the operations process, ADA commanders apply leadership to translate decisions into actions and operations. This process culminates when operations orders are published, thereby initiating the execution activity.
4-51. ADA commanders make decisions and direct assigned ADA forces or those placed under their operational control. The planning, preparation, execution, and sustainment of the total AMD mission (force operations) is conducted before, during, and after commencement of combat operations. Guided by the principles of mission command, ADA commanders, assisted by their staffs, direct the operations of subordinate forces. The net results of force operations are units ready to perform the AMD mission and ADA capabilities integrated with, and under the control of, the designated engagement authority to execute AMD engagement operations.
CONTROL OF ARMY AMD FIRES IS EXERCISED IN ACCORDANCE WITH JOINT FORCE COMMANDER DIRECTIVES AND BY DELEGATED AUTHORITIES
4-52. Control of Army AMD fires is exercised according to JFC directives and delegated authorities. The separation of command responsibility from the control of AMD fires can appear problematic given that ADA commanders can only direct the engagement of air threats under their command authority in compliance with the promulgated ROE and designated engagement authority; yet, they possess the mission to defend critical assets. This challenge is overcome by the joint common operating precept of unity of effort in the accomplishment of the JFCs objectives.
4-53. Control of AMD engagements is executed through various personnel and agencies that collectively constitute the engagement authorities in the kill chain (see figure 4-1). An engagement authority is an
4-8
FM 3-01
22 December 2020
Command and Control of ADA Forces
authority vested with a joint force commander that may be delegated to a subordinate commander that permits an engagement decision (JP 3-01). Figure 4-1 depicts both positions (for example, regional air defense commander [RADC]) and organizations (for example, Army corps), and thus does not necessarily imply the physical locations of ADA organizations nor parallelism between ADA organizations in the center of the figure and the Army maneuver echelons shown on the right.
Figure 4-1. Theater AMD control relationships
4-54. The JFC appoints a joint force air component commander The commander within a unified command, subordinate unified command, or joint task force responsible to the establishing commander for recommending the proper employment of assigned, attached, and/or made available for tasking air forces; planning and coordinating air operations; or accomplishing such operational missions as may be assigned. (JP 3-0). The joint force air component commander (JFACC) normally has operational control of their Services component forces and tactical control or direct support of the other forces made available for tasking. The JFACC, or the joint force maritime component commander in some circumstances, also typically serves as the airspace control authority and AADC, though these functions may be assigned to different individuals. As the airspace control authority, the JFACC coordinates use of the airspace through the airspace control plan and synchronizes/deconflicts all airspace user requirements through the airspace control order (see JP 3-52 for more information). As the AADC, the JFACC plans, coordinates, and integrates the joint forces defensive counterair operations. The AADCs responsibilities include developing and implementing identification procedures and authorities, developing and implementing engagement procedures, developing and executing plans for joint AMD operations, developing and transmitting AMD weapon control procedures and measures, and establishing air defense regions or sectors to enhance decentralized execution of defensive counterair missions. RADCs and subordinate sector air defense commanders (SADC)s may be appointed within large theaters of operations and are delegated responsibilities and decision-making authority for defensive counterair operations within their region or sector (JP 3-01). The AAMDC commander, as discussed in chapter 4, has responsibilities at the AADC level (for example, deputy AADC for AMD) and frequently is collocated with the AADC. The AAMDC headquarters may be collocated with the AADC at
22 December 2020
FM 3-01
4-9
Chapter 4
the JAOC, with the joint force land component commander (JFLCC) headquarters, or as shown in figure 41 on page 4-9, separately in accordance with METT-TC.
4-55. The ADAFCO coordinates/integrates Army AMD fires within the joint AMD architecture. An ADAFCO team consists of a fire control officer, a control assistant, and an operations assistant. ADAFCO personnel must have proper clearances for the specified operation and duty location. They conduct continuous 24-hour operations and ensure effective control of AMD fires. Typically, ADAFCO requirements are identified by the responsible ADA headquarters staff during the mission analysis step of the military decision making process with consideration for the joint air operations plan, the area air defense plan, and the supported commanders requirements. The ADAFCO must be collocated with the commander possessing engagement authorization for air and missile threats. As depicted in figure 4-1 on page 4-9, the AAMDC ADAFCO is positioned with the JFAAC/AADC and the ADA brigade ADAFCO with the RADC/SADC. Once embedded within that commanders organization, the ADAFCO provides for the rapid engagement of airborne targets/platforms, coordinates and controls AMD engagements, and assists the controlling authority with friendly protect functions and fratricide prevention. When AAMDC and brigade ADAFCOs are deployed, it is essential that they have access to a display of the integrated air picture at the hosting unit (for example, JAOC, Aegis, or Airborne Warning and Control System [AWACS]), voice and data communications with subordinate ADA battalions and separate batteries, and access to the senior weapons officer at the hosting unit, such as the senior air defense officer at the joint AOC or senior director on AWACS.
4-56. Under the precept of unity of effort, both ADA commanders and the AADC are unified in their efforts to execute joint AMD operations in support of the JFCs objectives. The practical application of unity of effort is the delineation of operational control authorities, described above, and the tactical control of ADA fires.
4-57. In the context of joint AMD operations, the designated component commander, usually the JFACC/AADC, is supported by ADA forces. The designated component commander is granted the necessary authority (in this case tactical control) for controlling and directing ADA fires. Because ADA forces are not typically assigned or attached to a commander of a different service, tactical control provides sufficient authority for controlling and directing the application of force or tactical use of ADA assets within the assigned mission or task.
4-58. Tactical control and the near-real-time exercise of the kill chain, as depicted and described above, generally do not apply to Army Avenger and C-RAM units. Avenger and C-RAM engagements of threats, such as low, slow, small tactical UASs (groups 2 and 3) and rockets, are very time sensitive and cannot wait for authorizations through the various elements comprising the kill chain. Their engagements are delegated to the lowest level as established by the ROE, fire control orders, and weapons control status (see procedural control discussion in paragraphs 4-59 through 4-60, on pages 4-10 through 4-11). The employment of Avenger and C-RAM must fully exploit the capabilities of early warning systems in conjunction with a functional airspace control plan to reduce risk to friendly aircraft while facilitating successful engagements. To ensure success, units must conduct in-depth planning and integration of the area air defense plan nested with the standing airspace control plan at the appropriate echelon. The airspace control plan is the document approved by the joint force commander that provides specific planning guidance and procedures for the airspace control system for the joint force operational area (JP 3-52).
POSITIVE AND PROCEDURAL MEASURES OF CONTROL
4-59. AMD fires may be controlled through positive and procedural means and measures. Positive control is a method of airspace control that relies on positive identification, tracking, and detection of aircraft within an airspace, conducted with electronic means, by an agency having the authority and responsibility therein (JP 3-52). Positive control is enabled by a common air picture that synthesizes data from multi-service intelligence and AMD sensors, correlates air tracks, and identifies them based on an integrated airspace control plan and established identification criteria. Positive control is exercised through fire control orders. Procedural control is a method of airspace control which relies on a combination of previously agreed and promulgated orders and procedures (JP 3-52). Procedural controls include air defense warnings, ROE, published identification criteria, and weapons control status.
4-10
FM 3-01
22 December 2020
Command and Control of ADA Forces
4-60. Regardless of the echelon, positive and procedural control are exercised through the fire control element (FCE), which is a subset of the current operations section in ADA units; it is responsible for air battle management, airspace C2, and engagement operations. The composition of an FCE is echelon and METTTC dependent. The FCE manning crew accomplishes five functions. A single manned position may execute more than one function when the pace of combat operations permits. Conversely, some functions may require distribution across more than a single manning position or possibly across multiple C2 nodes. The five FCE functions are:
 Fire control function encompasses the overall management of the air battle and engagement decisions.
 Surveillance function provides for clarity in the air picture.  Identification function focuses on proper combat identification. The identification and fire control
functional positions may be combined into a single manned position during light to moderate levels of combat operations.  Weapons control function addresses actions from receipt of an engagement decision from the fire control officer to execution of that engagement. Depending upon span of control and pace of combat operations, more than a single weapons control functional position may need to be manned. Allocation between multiple weapons control positions may be based on threat type (for example, one position for the ballistic missile fight and one for the air fight), a geographical division (for example, one controlling all engagements occurring in the northern sector of the defense and one controlling those occurring in the southern sector), or along system type lines (for example, one controlling Patriot fires and one controlling Avenger fires).  Information control function addresses the maintenance of networks and information flow across the task force and with higher, adjacent, and supported units.
Note. The term “fire control element (FCE)” is used generically throughout the ensuing chapters to address those elements, sections, and centers (such as fire direction centers in Patriot battalions, air battle management operations centers in Avenger battalions, and fire control elements in THAAD batteries) that manage or control AMD engagements.
ALERT STATES
4-61. An alert state is a condition that prescribes the amount of resources required to achieve ready to fire and desired radar emissions, and which specifies manning requirements and equipment configurations. Alert states are METT-TC dependent and are determined by the senior ADA commander, in coordination with the AADC and RADC/SADC.
4-62. The AAMDC governs subordinate units readiness levels through the use of alert states. In addition, alert states provide maintenance and training opportunities for subordinate units.
AIR DEFENSE WARNING CONDITIONS
4-63. An air defense warning condition is an air defense warning given in the form of a color code corresponding to the degree of air raid probability with yellow standing for when an attack by hostile aircraft or missiles is probable; red for when an attack by hostile aircraft or missiles is imminent or is in progress; and white for when an attack by hostile aircraft or missiles is improbable (JP 3-01).
4-64. Warnings conditions are a procedural control used to “posture” units based on the assessed threat. The AADC will establish the baseline air defense warning condition for the joint force during the planning stage. A condition may be different for an air threat and a missile threat. Subordinate air defense commanders may issue higher, but not lower, conditions for their region or sector. Air defense warning conditions are disseminated though C2 channels to all AMD elements, ADA fire units, and supported assets.
22 December 2020
FM 3-01
4-11
Chapter 4
RULES OF ENGAGEMENT
4-65. Rules of engagement are directives issued by competent military authority that delineate the circumstances and limitations under which United States forces will initiate and/or continue combat engagement with other forces encountered (JP 3-84). The JFC approves the theater rules. These established rules enable the AADC to retain control of the air battle by prescribing the exact conditions under which engagements may take place. ROE apply to all warfare participants in the theater and are disseminated to all echelons of air, land, and sea forces. There are six AMD ROE categories: right of self-defense, identification criteria, fire control orders, weapons control status, levels of control, and modes of control.
4-66. Right of self-defense. Commanders at all echelons must take whatever action is necessary to protect their forces and equipment against air or missile attack. When under attack, the right of self-defense is inherent to all ROE and weapons control procedures (JP 3-01).
4-67. Identification criteria. The employment of ADA weapon systems requires early identification of friendly, neutral, or hostile aircraft and missiles to maximize extended-range engagement and avoid fratricide. The problem of distinguishing friendly, neutral, and hostile air objects, while employing various weapon systems against the enemy, is a highly complex task; the same type of aircraft may be flown by friendly and enemy countries. However, since ballistic missiles have a distinct flight profile, ROE for this threat should be based on the trajectory profile. The AADC and the airspace control authority establish measures and procedures within the airspace control system to positively identify all airborne assets and permit the execution of AMD operations. These measures and procedures reduce delays in operations and prevent fratricide. Positive identification of tracks is normally the preferred method of operation. Positive identification is an identification derived from observation and an analysis of target characteristics including visual recognition, electronic support systems, non-cooperative target recognition techniques, identification friend or foe systems, or other physics-based identification techniques (JP 3-01). In the absence of positive identification, procedural identification is used; procedural identification employs previously established and promulgated airspace coordinating measures and rules. Procedural identification separates airspace users by geography, altitude, heading, time, and/or maneuver. Generally, some combination of positive and procedural identification is used.
 Hostile criteria are a description of conditions under which aerial platforms or missiles may be identified as hostile for engagement purposes. For AMD units, they are basic rules that assist in distinguishing between friendly and enemy aerial objects. For example, air platforms such as fixed-wing and rotary-wing aircraft may be declared hostile if they begin to attack an asset, appear to be in an attack posture, or are not providing an appropriate friendly identification code; UASs may be declared hostile if they are surveilling a friendly asset or force; and ballistic missiles and large-caliber rockets are generally considered hostile, allowing for engagement based on the current ROE.
 Commanders having identification authority use hostile criteria to determine the identification of detected air targets. Identification authority is the authority to assign an identity classification to an unknown contact, if possible (JP 3-01). The highest echelon capable of managing engagement operations normally retains identification authority. Upon target detection, fire units with nearreal-time data transmission capability assist the engagement authority by forwarding target information. The engagement authority makes final targeting decisions based on identification (for example, classification and kinematic evaluation) and may delegate the authority to engage. Delegation of engagement and identification authorization to lower echelons is normal for SHORAD units.
4-68. Fire control orders. Fire control orders are commands that are used to exercise positive control over engagements on a case-by-case basis and can be transmitted electronically or verbally. They are given to direct or inhibit firing by surface-to-air weapons units based on the ROE and rapidly changing tactical situation (JP 3-01). However, not all of the fire control orders, presented below, can or will be used by every type of ADA unit.
 Engage is a fire control order used to direct or authorize units and/or weapon systems to attack a designated target (JP 3-01).
4-12
FM 3-01
22 December 2020
Command and Control of ADA Forces
 Hold fire is an emergency fire control order used to stop firing. If technically possible, missiles already in flight must be prevented from intercepting (JP 3-01). Hold fire is primarily used to effect friendly protection or avoid intercepts on neutral tracks.
 Cease engagement or cease fire directs units to stop the firing sequence against a designated target; however, units may continue to track, and missiles already in flight are permitted to continue to intercept (JP 3-01). Cease fire is normally issued to preclude engagement of the same track by two or more weapon systems.
 Engage hold is a fire control order which prevents automatic engagement of the specified target by the system when the system is operating in the automatic mode. Missiles in flight are allowed to continue to intercept. This order is applicable to Patriot and THAAD systems only. Engage hold is primarily used to prevent initiation of a redundant engagement during the time period when an engagement has been initiated until its completion.
 Cover is, in air and missile defense, a fire control order that instructs a unit to assume a posture that will allow engagement of a target. This order can be used for targets that are presently being engaged by another fire unit or for targets that have yet to become significant threats; to execute this command, the unit must report tracking and ready to fire to higher echelons.
4-69. Weapons control status. A weapon control status is an air and missile defense control measure declared for a particular area and time by an area air defense commander, or delegated subordinate commander, based on the ROE, that establish conditions under which fighters and surface air defense weapons are permitted to engage threats (JP 3-01). Weapon control statuses (weapons hold, weapons tight, and weapons free) may be applied to weapon systems, volumes of airspace, or types of air platforms. They prescribe the relative control of AMD fires. The degree or extent of control varies depending on the tactical situation (JP 3-01).
 Weapons hold: the most restrictive status. Units may only fire in self-defense or when ordered by proper higher authority (JP 3-01).
 Weapons tight: the normal status. Units may only fire on targets identified as hostile in accordance with current ROE (JP 3-01).
 Weapons free: the least restrictive status: used to indicate when any target not positively identified as friendly in accordance with current ROE may be engaged (JP 3-01).
4-70. Levels of control. Levels of control describe the AMD commander/echelon permitted to authorize engagement of an air or missile threat (JP 3-01). This can be the AADC, RADC, SADC, ADA battalion, ADA battery, ADA platoon, or ADA team. Different levels of control may be established for ballistic missiles, UASs, fixed-wing aircraft, and rotary-wing aircraft.
4-71. Modes of control. There are three modes of control: centralized, decentralized, and autonomous. The mode of control selected will depend upon the capabilities of the C2 system and weapons employed and both the friendly and enemy air situations.
 Centralized control mode. In this mode, a higher echelon must authorize target engagements by fire units. The executing element seeks permission to engage targets by requesting authorization from that higher authority. Centralized control is used to minimize the likelihood of engaging friendly aircraft while permitting engagements of hostile aircraft and missiles only when specific orders are issued to initiate those engagements.
 Decentralized control mode. In this mode, a higher echelon monitors unit actions, making direct target assignments on a management by exception basis, to ensure proper fire distribution, prevent engagement of friendly air platforms, and prevent simultaneous engagements of hostile air targets. Decentralized control is used to increase the likelihood that a hostile aircraft or missile is engaged as soon as it comes within range of an ADA weapon system.
 Autonomous operations. Autonomous operations are initiated when a firing unit has lost all communications (voice, data link, and tactical chat) to higher tactical headquarters. The fire unit commander assumes full responsibility for control of weapons and engagement of hostile targets in accordance with existing ROE, weapons control status, and previously received directives. In this mode, the unit commander bears the full weight and responsibility of the units actions or inactions with regard to fire control.
22 December 2020
FM 3-01
4-13
Chapter 4
4-72. ADA units will normally be governed by a mix of positive and procedural controls that will vary by weapon system. For example, aircraft engagements by Patriot are typically positively controlled by engagement orders passed through voice and data links from the engagement authority, while those by Avenger may be positively controlled, but are, more commonly, procedurally controlled initiated at the fire unit based on established identification criteria (visual identification) and weapons control status.
4-14
FM 3-01
22 December 2020
Chapter 5
Army Air and Missile Defense Command
This chapter describes AAMDC operations and how this level of command deploys, employs, and supports ADA organizations. The guidance in this chapter is applicable to the role of an AAMDC in all areas of AMD operations and ADA fires supporting the preservation of land and air combat power.
ROLES AND CAPABILITIES
5-1. The role of the AAMDC is to perform AMD planning, coordination, integration, and execution in support of the JFC priorities. One AAMDC is normally assigned to a theater. If not already forward stationed or deployed, an early entry element of the AAMDC initially deploys followed by the remainder of the headquarters. The AAMDC can operate either with the entire force in theater or using split operations. The AAMDC is the primary ADA command organization and lead for Army Theater AMD. The AAMDC strategically deploys combat ready ADA forces. In performing this role, the AAMDC ensures the Armys contribution to the joint AMD fight is architecturally and seamlessly integrated, coordinated, and synchronized with other Army, joint, and multinational units, and supports the JFCs intent.
5-2. In wartime, the AAMDC operates in theater in support of the Army force commander or, if designated, the JFLCC and JFACC. Normally the AAMDC is under the operational control of the JFLCC and in direct support of the area air defense commander (AADC) (JP 3-01).
5-3. The AAMDC commanding general has three primary roles: senior AMD commander, theater Army AMD coordinator, and, if appointed, deputy AADC for AMD. The AAMDC commander is the Army proponent for the AMD combat function and has total responsibility for active AMD planning within Army forces and, when assigned, for the entire land force. As the theater Army AMD coordinator, the commander ensures organic, assigned, and supporting ADA units contributions to accomplish AMD objectives in support of the Army force commanders, JFLCCs (if appointed), and JFCs concept of operations are properly planned, coordinated, and synchronized. These responsibilities include recommending AMD missions for the other members of the joint combined arms team. The AAMDC commander, as the deputy AADC for AMD, ensures that Army AMD operations are properly coordinated and integrated with those of joint and multinational forces. In addition, as the deputy AADC, the commander may chair the theater AMD coordination board which recommends changes to AMD priorities on the defended asset list, adjustments to planned defense designs, and actions across all the operational elements based on threat activities and/or friendly operations.
5-4. While the capabilities of the AAMDC and the ADA brigade have significant overlap, their roles and responsibilities are distinct, as highlighted in table 5-1 on page 5-2. Discussions of each of these roles and responsibilities are provided in subsequent sections addressing command and control, force operations, engagement operations, and sustainment. Additional details are provided in ATP 3-01.94.
22 December 2020
FM 3-01
5-1
Chapter 5
Table 5-1. Distinctive responsibilities of the AAMDC and ADA brigade
Responsibility
AAMDC
ADA Brigade
Planning
 Plans future operations and adjusts existing plans as dictated by METT-TC.
 Plans current operations and makes required plan adjustments and modifications.
Current Operations
 Supports joint air operations center.
 Supports regional/sector air defense center.
 Provides administrative, operational, and sustainment support of deployed forces.
Joint/Multinational Air and Missile Defense
Integration
 Plans for and coordinates integrated operations.
 Executes integrated operations.
Sustainment
 Plans and coordinates joint, Army, and multinational requirements.
 Executes AMD requirements.
Force Provision
 Develops requirements for forces needed.  Certifies brigades for deployment.  Ensures brigades are trained.
 Provides forces to achieve needs.
 Certifies battalions/batteries/ force packages for deployment.
 Ensures battalions and batteries are trained.
Air Battle Management
 Primarily performs upper tier ballistic missile, defense coordination and execution.
 Can link subordinate task forces to the kill chain via the ADAFCO.
 Highest organizational echelon equipped, trained and staffed to operationally integrate multinational land-based AMD forces.
 Primary organization linking subordinate task forces to the kill chain via the ADAFCO.
Force Protection
 Coordinates support for protection from the ground threat with the joint force land component commander.
 Coordinates for support for protection from the ground threat with the local supported commander.
AAMDC ADA ADAFCO AMD METT-TC
Army Air and Missile Defense Command air defense artillery air defense artillery fire control officer air and missile defense mission, enemy, terrain and weather, troops and support available, time available, civil considerations
AAMDC COMPOSITION
5-5. The AAMDC is staffed for its primary role to plan for U.S. and multinational land-based AMD forces and integrate these forces and their defenses into the AADCs overall AMD plan. The AAMDC is an organization of either wholly active or reserve component ADA, fire support, aviation, intelligence, CBRN, signal, and sustainment personnel melded into an effective AMD team. All AAMDCs are constructed based on a core table of organization and equipment but are staffed somewhat differently to meet unique regional challenges in performing their missions. The organizational structure of the AAMDC consists of a command section and twelve subordinate sections: the chief of staff, G-1 (Personnel), G-2 (Intelligence), G-3 (Operations), G-4 (Logistics), G-6 (Communications/Electronics), inspector general, public affairs, staff judge advocate, unit ministry team, battery headquarters, and motor maintenance. Strategic planning and resource management functions (G-5/G-8) are performed by designated personnel from within the existing staff structure. An example of a typical AAMDC organizational structure is shown in figure 5-1.
5-2
FM 3-01
22 December 2020
Army Air and Missile Defense Command
Figure 5-1. AAMDC organization
5-6. AAMDCs are regionally aligned, mission tailored organizations. ADA formations are typically task organized to the AAMDC to conduct AMD operations.
COMMAND AND CONTROL
5-7. The AAMDC serves as an operational command supporting the Army force commander, or JFLCC, and JFACC. In exercising C2, the AAMDC is guided by the seven principles of mission command in training, equipping, supporting, deploying, and fighting relevant ADA formations from brigade (in most operations) to crew level (generally in early entry or small scale deployment operations). See the discussion of the mission command principles in paragraphs 4-5 through 4-12 on pages 4-1 through 4-2.
5-8. Nominal AAMDC control relationships are depicted in figure 5-2 on page 5-4. As noted in paragraph 4-55 on page 4-9, the positions depicted for the ADA organizations do not necessarily imply their physical locations nor parallelism between ADA organizations and the Army maneuver echelons.
22 December 2020
FM 3-01
5-3
Chapter 5
Figure 5-2. AAMDC AMD control relationships
5-9. The AAMDC C2 node links active defense, passive defense, and attack operations functions and provides timely assessment of the threat. It enables rapid dissemination of data fusion, tactical warning, mission assignment, cueing, targeting data, and post-strike assessment to the appropriate AMD element. AAMDCs are equipped with AMDPCS and a Terminal High Altitude Area Defense (THAAD) portable planner. The AMDPCS is capable of exercising C2 functionality for force and engagement operations. The portable planner enables the AAMDC to plan and evaluate THAAD defenses. The AAMDC focuses on force operations across the theater for deployed ADA forces. The AAMDC participates in engagement operations through its ADAFCO. As noted in chapter 4, the ADAFCO team is collocated with the designated engagement authority for air and missile threats.
5-10. The AAMDC assists in coordinating upper and lower tier engagements across the theater and region. This involves coordination between the Navys Aegis, Patriot, and THAAD weapon systems, all of which may be employed in the homeland defense mission as well as in theaters. This responsibility is primarily executed through the ADAFCO who serves as the Armys upper and lower tier coordination officer. The ADAFCO is deployed at the joint air operations center (JAOC) or other appropriate joint controlling headquarters, in conjunction with the naval ballistic missile defense liaison officer; the ADAFCO uses equipment provided by the joint controlling headquarters and organic voice communications.
FORCE OPERATIONS
5-11. The AAMDC projects its ADA forces to theater to support the JFC priorities based on METT-TC. This includes all aspects of mobilization and pre-deployment operations, deployment and entry operations, employment and sustainment, and redeployment, as well as the responsibility for training and certifying its task organized forces.
5-4
FM 3-01
22 December 2020
Army Air and Missile Defense Command
5-12. Historically, the AAMDC conducts strategic and operational level efforts, coordinating the administrative, operational, logistical, and special staff requirements for subordinate units, typically brigades. The AAMDC plans future operations and supports current operations by monitoring the execution of its subordinate ADA brigades and conducting appropriate replanning to maintain viability of land-based air and missile defenses as the tactical and operational situations change.
5-13. AAMDC operations focus on coordinating, integrating, and synchronizing the operational elements, C2 nodes, sensors, attack systems, and active/passive defense to effectively counter the air and missile threat and weapons of mass destruction. AAMDC force operations include the following core tasks:
 AMD planning and coordination with and between supported and supporting headquarters.  Coordination of AMD related tasks and liaison with multinational forces.  AMD resource allocation.  Support of critical and defended asset list development and management.  Airspace control measures planning and coordination.  AMD aspects of the IPB referred to as AMD IPB in further discussions.  AMD reporting.  Coordination of force protection requirements.  Dissemination of early warning.  Support offensive counterair (attack operations) during target development and time sensitive
targeting.  Sustainment operations.
5-14. The AAMDC performs AMD planning and coordination with and between supported and supporting headquarters. The AAMDC functions as a theater Army AMD coordinator, coordinating and planning centralized air battle management of tactical through strategic levels of command, as part of the supported commanders objectives and concepts of operations. The AAMDC coordinates with the JFLCC to define the critical assets requiring defense and further coordinates the ground locations where ADA units will be positioned to execute that defense. The AAMDC also coordinates and integrates AMD plans and operations to enable synchronized efforts within designated areas of operation. It supports theater-strategic current operations by providing the AADC up-to-date information on the operational and sustainment status of landbased AMD forces. It supports future operations by participating in air operations planning, gathering intelligence data to predict future threat air activities, and evaluating the JFCs schemes of operations and maneuver. Operation plans and requirements are coordinated with the AAMDC by ADA officers in the corps/division functional cells, air defense airspace management (ADAM) elements within the BCTs, and subordinate ADA brigades. The coordination of plans allows for the assessment, prioritization, and apportionment of resources and further dissemination of orders.
5-15. The supported Army or joint headquarters develops and issues a base plan or order. From the base order, all supporting or subordinate Army echelons prepare estimates and begin planning; this may generate requirements to update the base plan due to modifications received. Based on the final order, AAMDC or ADA brigade representatives assist the corps/division AMD elements in developing the AMD appendix of the fires annex to the operations order. The AMD section coordinates with all supporting echelons, including the AAMDC and supporting ADA brigades and subordinate units, allowing force tailoring of AMD capabilities to satisfy mission requirements. The AMD appendix directs task organization, coordination, integration, and synchronization tasks; informs subordinate units of their specific missions; and allocates resources required to sustain operations.
5-16. The AAMDC coordinates AMD related tasks with joint, interorganizational, and multinational organizations. Additionally, planning and integration requires coordination to economize forces and capabilities and create unity of effort. Optimizing the AMD capabilities of regional partners to contribute to plans also requires synchronization with the overarching theater engagement plans.
5-17. The AAMDC performs AMD resource allocation. As a theater level command supporting the combatant commanders AMD requirements, the AAMDC allocates AMD forces in a manner consistent with priorities established by area air defense plans and commensurate with unified command protection plans in support of national objectives. The AAMDC staff participates in all stages of joint planning while developing
22 December 2020
FM 3-01
5-5
Chapter 5
the AAMDC commanders recommended AMD force allocation to the JFC, JFACC/AADC, and JFLCC. The AAMDC also recommends the allocation of elements to strengthen/establish passive defenses for assets, facilitating the economy of ADA forces.
5-18. The AAMDC supports the development of the critical and defended asset lists. The AAMDC staff works with the JFACC/AADC and JFLCC staffs in developing and managing the critical asset list and defended asset list within a joint operations area. The AAMDC staff receives the nominated critical assets from subordinate Army, joint, and multinational elements, consolidates them into a list, and contributes to the prioritization of this critical asset list. The joint and AAMDC staffs then identify the most critical assets that must be defended, given the amount and availability of AMD forces. Defended assets change throughout an operation, as METT-TC changes. This ongoing integrated process nomination and prioritization of critical assets, AMD force resourcing, and identification of defended assets facilitates the efficient allocation or reallocation of AMD forces to provide the degree of protection desired or risk accepted by the JFC for the most critical assets in theater.
5-19. The AAMDC performs airspace control measure planning and coordination. Airspace control spans joint and multinational activities and can include intergovernmental aspects as well. The AAMDC identifies the most suitable airspace control measures for AMD ground forces and advises the AADC of these. AAMDC personnel then coordinate the measures with the AADC staff, or the joint force maritime component commanders staff as appropriate, to ensure the most effective measures are in place in the area of operations. Coordination is continuous as the requirements for and use of various control measures may change throughout an operation depending on METT-TC.
5-20. The AAMDC performs an AMD IPB. The AMD IPB is an analysis process to continuously assess air and missile threats to the area of operations. AAMDC intelligence personnel and other staff members systematically evaluate the effects of significant characteristics of the operational environment and the anticipated threat characteristics and project the quantities and capabilities of the air and missile forces that may be used against friendly assets. These projections allow the AAMDC commander and staff to identify the degree of protection for designated critical assets and to allocate AMD elements accordingly, facilitating designs of the most capable defenses for the assets. AAMDC intelligence personnel also provide or assist their joint or Army force counterparts in the development of theater-specific threat information. This information assists ADA officers and staff planners, in supported corps or division headquarters, in the development of AMD plans and orders. For additional information on the AMD IPB, see ATP 3-01.16.
5-21. The AAMDC performs AMD reporting. The reporting requirements begin as soon as deployment alerts are received. The reports comprise all aspects of force operations, to include preparation, readiness, certifications, personnel, training, deployments, planning, headquarters and unit locations, communications, weapons statuses, and future planning. Some reporting is formal, and some is more coordination oriented to assure synchronization with supported forces. Some reports are AMD specific and reflect the posture of ADA forces and their capability to defend designated assets in the joint operations area.
5-22. The AAMDC coordinates force protection requirements for ADA forces. ADA forces are not sufficiently manned to provide 24-hour protection from air and missile threats and concurrently force protection against ground threats. The AAMDC coordinates with the JFLCC or other commanders, as appropriate, for forces to provide protection against the ground threat.
5-23. The AAMDC disseminates early warning. The AAMDC, as well as other members of the joint force, develop early warning architectures to detect air and missile threats and warn supported Army, joint, and multinational units, and, when requested, civilian authorities in the operations area. The AAMDC plans, coordinates, and integrates AMD and other external sensor capabilities to maintain situational awareness of the airspace. It generates and disseminates timely early warning and alert of impending attacks for units or areas at risk.
5-24. The AAMDC attack operations section supports the JFLCC and JFACC in the development of targets specifically against the air and missile threat. The section integrates with JFLCC and JFACC targeting teams to address AMD objectives in the JFC targeting strategy, and coordinates through JFLCC or JFACC targeting personnel to implement a coherent joint theater AMD attack plan. The section enables the deputy AADC to support the JFACC by helping to synchronize the targeting efforts against the air and missile threat, and providing AMD focus to Army deep operations and within the JFLCCs operating environment.
5-6
FM 3-01
22 December 2020
Army Air and Missile Defense Command
5-25. The AAMDC performs sustainment operations. The AAMDC plans and coordinates sustainment operations as described in paragraph 5-31 on page 5-7.
5-26. Based on METT-TC, AAMDC elements are forward deployed into an area of operations prior to hostilities. During contingency missions and wartime, the AAMDCs plan/recommend force requirements and task organize the forces again based on METT-TC. The AAMDC may mobilize along with some or all of its subordinate ADA organizations or as a separate AMD C2 capability. Dedicated AAMDC liaison sections or teams deploy to selected major joint operational areas and with Army forces/JFLCC elements to assist in the execution of the mission.
5-27. The AAMDC has the flexibility to organize and employ itself in a variety of ways to successfully support and execute higher headquarters AMD guidance, intent, and concept of operations. Locations of the CPs, as well as the AAMDC commander, are based on METT-TC. The AAMDC may collocate its entire CP or an operations and intelligence-heavy main CP with the JAOC. It may also collocate an administrative/logistics heavy CP or element in the proximity of the Army force/JFLCC headquarters. The AAMDC commander has the flexibility with its modular CP to tailor it to meet mission unique requirements. The placement of headquarters elements requires extensive coordination and determination of force protection support available in that location. Force protection can usually be attained by collocating with supported elements; this must be deliberately addressed during the planning process. Coordination with the supported unit must include a complete understanding of the specific ADA assets that require force protection.
5-28. To plan operations, the AAMDC uses the embedded planning tools within the AMDPCS. The primary planning tool is the air and missile defense workstation (AMDWS), which allows the staff to develop defense design options using algorithms based upon broad system capabilities. To assist in force operations planning, it retrieves situational awareness information from joint headquarters, the Army Battle Command System network, subordinate ADA units, national intelligence assets, all source centers, and tactical and strategic sensors. The AAMDC also uses the THAAD portable planner to plan and evaluate THAAD defenses. Additionally, the AAMDC uses the C2BMC system (see Appendix A) as a means of integrating its assigned theater AMD assets with the United States Strategic Commands global missile defense plan/architecture. C2BMC assists the AAMDC as it works to deconflict competing priorities across the operational and strategic levels, enabling the most effective allocation of AMD resources.
ENGAGEMENT OPERATIONS
5-29. The AAMDC provides a joint air picture and connectivity with the controlling identification and engagement authorities in accordance with the area air defense plan, special instructions, and AAMDC tactical supplement. This connectivity is conducted through the ADAFCO.
5-30. The ADAFCO serves as the Army point of contact between the ADA FCEs and the controlling authority. The AAMDC ADAFCO provides Army AMD operational expertise and monitors, coordinates, and synchronizes surveillance and engagement activities of ADA assets with joint and multinational AMD units. The ADAFCO is also responsible for the coordination and deconfliction of upper-tier engagements by joint and multinational systems in conjunction with the naval liaison officer. The ADAFCO maintains communications with the ADA brigade ADAFCOs at other controlling authorities, sharing tactical air pictures and situational awareness and coordinating for the engagement of upper-tier leakers. The ADAFCO additionally serves as the conduit for the issuing of fire control or engagement orders from the controlling authority to ADA units.
SUSTAINMENT OPERATIONS
5-31. The AAMDC plans and coordinates joint, Army, and multinational sustainment for land-based air and missile defenses and supervises execution of sustainment through its subordinate ADA brigades. Often ADA units or elements are located with supported forces and require sustainment support from them. Required support includes religious, health, financial management, and personnel services, as well as maintenance support by the support maintenance company and signal support by the expeditionary signal battalion. Sustainment support must be coordinated in detail and in advance as much as possible. The AAMDC
22 December 2020
FM 3-01
5-7
Chapter 5
examines sustainment needs to position land-based air and missile defenses in sufficient time and quantities to meet the JFCs needs in seizing and maintaining the initiative to defeat the enemy.
5-32. The AAMDC must provide a sustainable force that enables supported commanders to optimize their operations while minimizing adverse impacts from possible air and missile attack. The AAMDCs organic primary and special staffs provide specialized operational, administrative, and logistical support for its taskorganized ADA forces. This includes all types of support unique to the theater, from force protection to supply chain management, communications and network operations, and diplomatic and host nation coordination.
5-33. The AAMDC analyzes the operational environment to account for ground and air threats that may impact friendly infrastructure and the availability of resources, ensuring that adequate support is planned and available for sustainment, resupply, and reconstitution activities throughout all phases of an operation.
5-34. Sustainment activities focus on how, when, and where to accomplish the functions of manning, arming, fueling, fixing, and moving. Ensuring the adequacy of personnel services, health services, field services, quality of life, and general supply support is also a priority of sustainment activities.
5-35. The AAMDC commander may establish priority supporting efforts by phase of the operation or change priorities during operations to ensure that operational and force sustainment is provided in accordance with their relative importance to accomplishing the mission. Changes by phase to the defended asset list, or reprioritization of critical assets on the list, will normally affect support priorities and require continual assessment by the staff.
5-36. Reconstitution activities, including regeneration and reorganization, are conducted to restore the AAMDC and/or its supporting forces to a desired level of combat effectiveness commensurate with mission requirements and available resources. They are implemented when combat effectiveness has been degraded as a result of enemy activity, battlefield damage, or other environmental factors and hazards. Regeneration involves rebuilding the unit through large-scale replacement of personnel, equipment, and supplies, including the reestablishment or replacement of essential C2 personnel and equipment and the conduct of missionessential training. Reorganization involves the shifting of internal resources within the unit to increase its level of combat effectiveness.
5-8
FM 3-01
22 December 2020
Chapter 6
ADA Brigade
This chapter discusses the ADA brigade headquarters and the AMD capabilities it provides in support of the joint force commander (JFC) and unified land operations. Like all ADA headquarters units, the brigade headquarters is task organized to support the mission based on METT-TC.
ROLES AND RESPONSIBILITIES
6-1. The role of ADA brigades is to command and coordinate the operations of subordinate ADA battalions and other assigned and attached units in the theater army. Normally one brigade is assigned per theater. If not already forward stationed or deployed, an early entry element of the ADA brigade initially deploys as a part of an AAMDC, followed by the remainder of the headquarters. ADA brigades are structured to perform several functions supporting the AAMDCs and those designated geographic command organizations which support AMD integration and operations. ADA brigade functions include C2, integration, planning, and liaison with joint and higher echelon units and subordinate battalions. See table 5-1 on page 5-2 for the brigade responsibilities as compared with the AAMDC responsibilities. The brigade responsibilities are further defined in this chapter. ADA brigades provide forces for the AAMDCs to meet the commanders AMD objectives. ADA brigades, in both the active and reserve components, can integrate a mix of active, reserve and multinational forces. The ADA brigades are aligned under the AAMDCs and exercise C2 of subordinate units in support of unified land operations.
6-2. The ADA brigade focuses on the execution of current operations, while supporting planning through collaboration with the AAMDC. The ADA brigade executes C2 functions in support of force and engagement operations. Consistent with the AAMDC, the ADA brigades level of effort remains more heavily focused on planning and force operations than on engagement operations.
6-3. The ADA brigade provides ground-based AMD command across a large area of operations. It generally commands several ADA battalions/task forces and reports directly to the AAMDC. Like the other ADA echelons, the ADA brigade is normally under the operational control of the AAMDC and in direct support of the AADC for the execution of operational and geostrategic missions. The ADA brigade generally exercises this direct support role through an AADCs subordinate commander, such as a RADC or sector air defense commander (SADC). METT-TC considerations may allow for them to be placed under operational or tactical control of a corps, as has been the case in past conflicts. Support relationships, such as direct and general support, may also be used to provide AMD fires in support of maneuver echelons.
6-4. The ADA brigade commander can serve as the senior AMD commander for land forces in the absence of the AAMDC. In these situations, the brigade may be augmented with capabilities organic to the AAMDC.
6-5. The ADA brigade integrates into the kill chain by attaching the brigades ADAFCO to the designated AADC engagement authority. This authority is usually the RADC or SADC.
6-6. The ADA brigade assists the AAMDC in providing the requisite C2 to specific organizations or geographical areas where multiple joint and multinational AMD forces operate. The brigade is the highest echelon that is properly resourced with the skills, equipment, and staff to integrate multiple ground-based ADA capabilities into the joint and multinational AMD fight and in support of Army maneuver forces.
6-7. Generally, the integration of U.S. and multinational land-based AMD forces occurs with the oversight of the ADA brigade headquarters. The operational, tactical and support relationships in these situations are METT-TC dependent and often support specific bi-lateral agreements between nations.
22 December 2020
FM 3-01
6-1
Chapter 6
BRIGADE COMPOSITION
6-8. Each brigade consists of a headquarters, a brigade staff, and its subordinate battalions and batteries. A brigade headquarters can effectively provide C2 of several subordinate units. ADA brigades differ in their composition, which are driven by METT-TC, and the manner in which their battalions are task organized. The typical brigade can expect to have between two and seven battalions.
6-9. The brigade is comprised of active and/or reserve component personnel. The range of personnel working in the brigade includes intelligence, chemical, air defense, signal, logistic, and special staff personnel.
6-10. The brigade staff consists of a command section and multiple subordinate sections: S-1 (personnel), S2 (intelligence), S-3 (plans, operations, training, and fire control), S-4 (motor maintenance, and support operations), S-6 (information technology and voice/data communications), public affairs, surgeon, chaplain, and brigade judge advocate.
 The brigade staff is led by the brigade deputy commander. The deputy commander is responsible for all coordination within the brigade staff and with higher, adjacent, and subordinate staffs.
 The S-1section provides personnel and administrative support and limited postal services to the battalions and separate batteries. The S-1 manages personnel strengths and actions for all subordinate units, including personnel readiness. The S-1 also performs adjutant duties, including protocol.
 The S-2 section processes battlefield information and coordinates intelligence requirements within the battalions and separate batteries and with the supported units, higher headquarters, and military intelligence assets. The S-2 section leads the staff in the IPB process, identifies threat characteristics, and coordinates with adjacent intelligence assets to provide the commander with a full spectrum threat assessment. The brigade S-2 also performs other functions such as support to Army information and personnel security programs.
 The S-3 section is the focal point for task organization, planning, operations, fire control, and training. The S-3 section conducts current and future planning, operations, and ADA-specific training certifications. As in all headquarters staffs, the S-3 is the central staff that drives the requirements and is supported by the other staff sections. Specific staff sections under the S-3 include the current and future operations cells, CBRN cell, brigade FCE, and ADAFCO element. The current operations cell executes force operations and maintains an accurate awareness of the current situation for the commander. The future operations cell plans and coordinates future brigade operations. The CBRN cell monitors the CBRN environment and integrates passive defensive measures taken to minimize or negate the vulnerability to, and effects of, CBRN attacks. The FCE and ADAFCO elements are addressed in paragraph 6-15 on page 6-4 and paragraphs 621 and 6-22 on page 6-5 and 6-6. The S-3, in coordination with the deputy commander, oversees the brigades controlled substitution plan to ensure it remains deliberately managed and supports the AAMDC commanders specific guidance.
 The S-4 section provides supervision and coordination of logistics; coordination of food services field feeding, and sanitation; coordination of supply and resupply; and coordination of transportation and maintenance support. It operates the admin/log network control station and transports S-1 and S-4 personnel and equipment. The S-4 section provides the full range of logistics support from property accountability, maintenance and readiness, to budget management. The S-4 oversees the brigades property book and the brigades equipment readiness to include coordinating with external logistics support agencies for repairs, upgrades, and modifications. Specific staff sections under the control of the S-4 include the support operations section and the motor maintenance section.
 The S-6 section provides staff planning and supervision of communications for the brigade. It provides for the installation, operation, and maintenance of internal signal communications and electronic equipment in the brigade headquarters. It coordinates frequency allocation and assignments. The section performs field maintenance, internal and external planning, and 24 hour communications and courier services. It conducts network operations to establish, operate, manage, protect, and defend communications networks and information services. The S-6 section manages organic communications capabilities and computers, and coordinates for the use of
6-2
FM 3-01
22 December 2020
ADA Brigade
external communications capabilities based on METT-TC. The S-6 oversees the brigades communications security accounts and equipment.  The special staff section provides the command with the necessary subject matter expertise to ensure medical, legal, public affairs, and spiritual unit readiness. The brigade surgeon provides medical treatment for the brigade. The brigade judge advocate section provides legal expertise pertaining to military, domestic, and international law. It provides advice on laws of armed conflict, interprets ROE, determines the legality of targets and plans, supervises the administration of military justice, and monitors treatment of captured and detained persons and refugees. The public affairs office section assists in conducting briefings for the media on brigade operations and ground rules for media coverage of those operations, reviews material scheduled for release to the media for operational security limitations or requirements, and provides guidance to new media personnel concerning field censorship procedures and guidelines. The unit ministry team provides religious support to all assigned, attached, or authorized personnel, to include ministry for mass casualties and hospitalized members. The team advises the commander on religious, ethical, morals, morale, and soldier welfare issues, and liaises with higher and adjacent unit ministry teams.  The battery headquarters, while not a staff section, provides C2, administrative, and logistical support for headquarters battery personnel.
COMMAND AND CONTROL
6-11. ADA brigades have the primary mission of linking subordinate ADA echelons to the kill chain. The brigade ADAFCO deploys to the appropriate joint C2 facility at which the RADC or SADC operates, and provides voice connectivity with subordinate ADA echelons for engagement operations. The brigade maintains operational control of its organic subordinate ADA units and any attached forces. It also maintains constant communications and coordination with the AMD element at corps and, when required by METTTC, with the AMD element at division. The brigade C2 capabilities are provided by the AMDPCS, Patriot tactical planner, and THAAD portable planner. The AMDPCS gives the ADA brigade a limited capability to operate a FCE to direct subordinate C2 nodes. The AMDPCS provides the means to select and direct a subordinate C2 node to conduct an engagement, but cannot directly execute the engagement. The Patriot tactical planner provides a capability to create and test defense designs of Patriot forces. The THAAD portable planner provides the capability to design and evaluate THAAD defenses.
6-12. Figure 6-1 on page 6-4 presents the nominal brigade control relationships. See ATP 3-01.7 for additional discussions of brigade C2.
22 December 2020
FM 3-01
6-3
Chapter 6
Figure 6-1. ADA brigade AMD control relationships
6-13. As a part of exercising C2 over subordinate ADA organizations, the ADA brigade also focuses on building, and potentially controlling, cohesive joint and multinational teams responsible for executing the AMD mission in a given area of operations. The ability of the ADA brigade to operate in the joint and multinational environment, with ever changing METT-TC factors that influence this environment, is critically important. In situations where an AAMDC is not present, the brigade can expect to coordinate with and support multiple joint, multinational and Army headquarters, including the joint air operations center (JAOC), regional and sector air defense command centers, multinational AMD headquarters, Army division, corps, or numbered Army headquarters, and, in some circumstances, host nation airspace control elements.
6-14. The ADA brigade, through its AMDPCS and via tactical data links, provides the necessary situational awareness to joint and multinational partners which enhances the timely and required decision making to support unified land operations. The AMDPCS provides the ADA brigade with some flexible capability: support to current operations and sustainment, and support to future operations or a capability to support forward operations a jump capability.
6-15. An ADA brigade can provide C2 of subordinate units, to include a multinational task force. Engagement operations are controlled through the ADA brigade ADAFCO deployed with the SADC, for instance. Control of subordinate forces is exercised through tactical data links and voice communications. The brigade may operate an FCE to battle manage engagement operations of subordinate battalions, generally in a management by exception role. The normal mode of operations is for the ADAFCO supporting the SADC to provide engagement authority directly to the battalion/separate battery capable of executing the engagement.
FORCE OPERATIONS
6-16. Historically, the brigade focuses on training and certifying subordinate units to execute their AMD mission while providing and/or coordinating all the administrative, operational, logistical, and special staff
6-4
FM 3-01
22 December 2020
ADA Brigade
requirements for subordinate units. The ADA brigade focuses on dynamic adjustments to current plans during execution to maintain the viability of the defense. It also conducts hierarchical planning with the AAMDC and with subordinate ADA echelons. Brigade force operations mirror those of the AAMDC and consist of the following core tasks: AMD planning and coordination with and between supported and supporting headquarters, AMD resource allocation, critical and defended asset list development and management support, airspace control measures planning and coordination, AMD reporting, AMD IPB, force protection, early warning dissemination, sustainment, and multinational AMD related tasks. Generally, the brigade focuses more on C2 capabilities that enhance force operations and planning than those associated with engagement operations. An exception to this general rule may occur if there is an unacceptable risk to engagement operations within the brigade footprint.
6-17. The ADA brigade assists the AAMDC in projecting its AMD forces to theater to support the JFCs priorities. This includes all aspects of mobilization and pre-deployment operations, deployment and entry operations, employment and sustainment, and redeployment. The brigade oversees subordinate units rear detachment operations, including the effective execution of family readiness groups. Forward ADA brigades participate in portions of the reception, staging, onward movement, and integration process in theater. Following the reception, staging, onward movement, and integration principle of unity of command, a theater sustainment command typically controls the first three stages. The gaining ADA brigades can influence the onward movement stage by recommending tactical assembly areas. Integration is complete when the gaining ADA brigade establishes positive command over the arriving unit, and determines that the unit is combat ready and capable of performing its assigned mission.
6-18. The ADA brigade headquarters can mobilize along with some or all of its subordinate ADA organizations or as a separate AMD capability. Brigade headquarters generally deploy in theater to areas that facilitate joint/multinational coordination and provide the best geographical opportunities to execute C2 of current and future AMD capabilities. It is common, but not necessary, for ADA brigades to collocate with a subordinate unit to benefit from mutually supporting force operations considerations like logistics and force protection. Key to employing an ADA brigade headquarters is a comprehensive understanding of the AMD operation across all phases. Special consideration is given when a brigades C2 responsibilities will significantly change in scope or magnitude while transitioning from one phase of the operation to the next. In this scenario, the brigade should employ in a way that minimizes disruptions to the AMD operation while transitioning across phases.
6-19. ADA forces lack a sufficient physical security capability to protect themselves, so deployment considerations for the ADA brigade includes the support relationships, sustainment operations, and physical security needs. It is frequently advisable for the ADA brigade to collocate with the supported unit, such as the regional or sector air defense command, or with other Army organizations that can supplement the ADA brigades capabilities.
6-20. The ADA brigade is under the operational control of the AAMDC. Additionally, the brigade regularly conducts direct coordination with supporting joint and multinational base commands for mission and Soldier support.
ENGAGEMENT OPERATIONS
6-21. Brigades exercise engagement operations through the C2 systems of subordinate units. ADA brigades also assist in integrating and controlling joint fires by positioning an ADAFCO team with the kill chain controlling headquarters. A brigade ADAFCO normally deploys to a control and reporting center, AWACS, Aegis combat system, JAOC, or combined air operations center, per the regional and/or sector layout.
6-22. ADA brigade ADAFCO functions include:
 Controlling ADA engagements and providing assistance for rapid engagement of airborne targets or platforms by maintaining a continuous communications link with the AAMDC ADAFCO, engagement authority, subordinate FCEs, and THAAD fire control officers, as appropriate.
 Tracking deconflictions between AMD and other joint sensors via the regional/sector air defense commands mission crew to assist in resolving identification and correlation issues.
 Disseminating and complying with air defense warnings, airspace control orders, special instructions, early warning data, real-time intelligence, and air tasking orders.
22 December 2020
FM 3-01
6-5
Chapter 6
 Issuing surface-to-air missile tactical orders which direct ADA fire unit readiness based on the Army headquarters or AAMDC, and AADC, RADC, or SADC guidance.
 Monitoring ADA unit information such as status and engagement reports, to include C-RAM.
6-23. Brigade-level control of sensors generally revolves around coordinated emission control procedures and alert states. The procedures and alert states provide subordinate units predictable maintenance opportunities, emission authorization to achieve the directed alert state, and the opportunity to train with sensors outside of a full radiation condition.
SUSTAINMENT OPERATIONS
6-24. As discussed in the unit composition section, the ADA brigade is resourced to provide all staff functions, including the special staff sections of the chaplain, judge advocate, and surgeon. However, the brigade is dependent upon appropriate elements of the theater for financial management support, force health protection, personnel and administrative services, and supplemental transportation; the expeditionary signal battalion for signal support; support maintenance company for maintenance support beyond organic means; and field feeding company for field feeding support.
6-25. The ADA brigade headquarters generally oversees two sustainment related responsibilities. First, the brigade assesses all the sustainment requirements across subordinate units and direct specific sustainment responsibilities to subordinate headquarters based on METT-TC. It is quite possible that a subordinate battalion will be directed to assume sustainment responsibilities such as logistics support and force protection, for non-organic subordinate batteries. Second, the ADA brigade coordinates sustainment support for joint/multinational AMD forces within the brigades area of operations. The combination of these two responsibilities ensure that all sustainment functions are properly provided for subordinate AMD units. In cases where a particular sustainment function is inadequate for a subordinate unit, the brigade will seek the assistance of the AAMDC to secure the appropriate resources.
6-6
FM 3-01
22 December 2020
Chapter 7
ADA Battalion
This chapter describes the ADA battalion, task organized to form an ADA task force, and its capabilities, firepower, and tactics. The guidance in this chapter is applicable to the role of an ADA battalion in all phases of operations and to ADA fires supporting the preservation of land and air combat power. This chapter is written to a METT-TC tailored task force consisting of multiple sensor and shooter types, providing a coordinated capability to defend against enemy forces employing complex integrated attack tactics. This chapter is also applicable if the task force consists of a single type of sensor and shooter.
ROLES AND RESPONSIBILITIES
7-1. The role of the ADA task force is to protect forces and selected geopolitical assets within a specified geographical area from air attack, missile attack, and surveillance. The ADA task force consists of a mix of sensors and shooters to provide low-to-high altitude, short- to long-range AMD protection of combat land forces and other critical assets. The ADA task force components can defeat the following threats, after launch, in accordance with the METT-TC considerations in which it is being deployed:
 Ballistic missiles.  Cruise missiles.  UASs.  Tactical air-to-surface missiles, to include anti-radiation missiles.  Large-caliber rockets.  Hypersonic weapons.  Fixed-wing aircraft.  Rotary-wing aircraft.  RAM.
7-2. An ADA task force is frequently used as a flexible deterrent option, showing U.S. resolve and commitment to our partner nations. It is often forward deployed or stationed. For example, currently more than 45 percent of the Patriot force is deployed in overseas locations.
7-3. An ADA task force provides the terminal defense for multi-tier joint AMD systems supporting the combatant commanders needs. Its missile defense capabilities (Patriot and/or the THAAD) comprise an element of the Ballistic Missile Defense System (BMDS). When THAAD and Patriot are combined in a task force, a layered (upper and lower tier) ballistic missile defense is achieved. While able to operate as an independent entity consisting of a single systems capabilities, such as Patriot, the task force is optimized when organized with multiple ADA sensors and shooters, such as those organic to Patriot and Avenger units. ADA task forces help to defend the lodgment during entry operations. The ADA task force provides robust defense against ballistic missiles and air threats, and can be augmented with C-RAM capabilities to defeat RAM threats after launch. As the theater develops and entering forces expand into forward positions, ADA task forces support shaping activities and enable decisive action. ADA task forces provide AMD for maneuver forces, their sustainment assets, and resupply routes using overlapping movement and positioning schemes to maintain supportive coverage. This protection provides maneuver force commanders the ability to conduct aggressive, as well as sustained, offensive and defensive tasks.
7-4. ADA task force resources may remain in theater to continue providing AMD of critical assets as a conflict is resolved, preventing residual enemy forces from successfully affecting assets or friendly forces
22 December 2020
FM 3-01
7-1
Chapter 7
that are redeploying. ADA units also promote stability within a country or region by protecting civilians and geopolitical assets from state and non-state actors who may seek to exploit periods of transition.
7-5. ADA task force capabilities can be tailored to counter diverse or specific air and missile threats based on JFC requirements and METT-TC. The nominal task force is generally deployed to counter both air threats and lower tier missile threats.
SUPPORT TO JOINT AIR AND MISSILE DEFENSE
7-6. An ADA task force provides defense of designated joint force command assets at the strategic and operational levels. These include senior CPs, logistic facilities, operating bases, aerial and sea ports of debarkation, and geopolitical assets. The maneuver commanders key assets are also addressed during the planning process. These assets are recommended by the commanders organic AMD section or ADAM cells for inclusion in the critical asset listing from which defended assets are derived.
7-7. The task forces persistent presence facilitates long-term protection of assets against all-altitude air and missile threats. Augmentation with C-RAM sensors and shooters is required for the task force to defend against RAM threats.
7-8. The task force also contributes to aerial surveillance and situational awareness. Its nominal configuration includes sensors capable of detecting low-flying air threats to ballistic missile threats, and publishing track data across Army and joint links to alert the force to impending attacks. Augmented with CRAM sensors, the task force can also provide detection, alerting, and focused warning of RAM threats.
SUPPORT TO UNIFIED LAND OPERATIONS
7-9. The ADA task force counters a wide variety of potential air and missile threats that target assets identified by the joint force land component commander (JFLCC) and selected for the JFCs defended asset list. The main threats that the ADA task force must be prepared to counter are:
 Ballistic missiles.  Cruise missiles and anti-radiation missiles.  UASs, both attack and surveillance.  Hypersonic weapons.  Fixed- and rotary-wing aircraft, jammers and aerial surveillance platforms that penetrate defensive
counterair into the task forces defended area (commonly called leakers).
7-10. The ADA task forces support of ground-based elements varies in accordance with the type of operation, projected threats, amount of deployed maneuver and ADA forces, and other METT-TC considerations. Most ADA task forces are deployed to defend strategic and operational high value assets. ADA task forces may be assigned general support missions or, in rare occasions, placed in direct support of maneuver elements. In a direct support role, the task force commander coordinates with the supported unit commander and the ADAM cell to select the asset(s) to be defended. Direct support assignments are more typically made at the ADA battery or platoon echelons than at ADA task force levels.
7-11. The ADA task force in a general support role within a corps or, more likely, a division is assigned to defend such key Army assets as corps or division headquarters, fuel and ammunition points, counterfire radars, and forward arming and refueling points. The points to be defended are designated by the supported commander. Offensive tasks and defensive tasks requiring rapid mobility are supported by bounding overwatch, as ADA elements, other than Avenger, lack shoot-on-the-move capability. Bounding overwatch to support offensive tasks places ADA elements behind the maneuver force, as the terrain must be secured prior to its occupation by ADA elements. In retrogrades, ADA elements precede the withdrawal of maneuver units to vacate terrain being surrendered by the retrograde.
7-12. An ADA task force provides warning of impending air and missile attacks. Detections by Patriot and Sentinel radars or other sensors are broadcast to affected units or installations. UAS detections, particularly of low, slow, and small variants, can trigger self-defense actions taken by non-ADA units.
7-2
FM 3-01
22 December 2020
ADA Battalion
7-13. When providing support to maneuver forces, commanders should bear in mind that even though ADA task forces are mobile, they are extremely vulnerable. They require a security contingent and are unable to provide AMD coverage while on the move.
ADA TASK FORCE COMPOSITION
7-14. In peacetime, there are multiple types of ADA battalions, organized according to system types. A peacetime battalion serves as the baseline for an ADA task force, providing the resources from which ADA task forces are tailored and deployed in wartime. A peacetime battalion without further tailoring, once deployed, may be designated as a task force if METT-TC indicates that it is the right size capability to accomplish the mission. However, the battalion will more likely be tailored, adding or deleting similar type capabilities, or adding capabilities from two or more peacetime organizations to deny threats a preferred attack strategy. There are four types of peacetime ADA battalions:
 Patriot battalions are fielded in the active component. A Patriot battalion consists of a headquarters and headquarters battery, four Patriot firing batteries, and a field maintenance company.
 Composite Patriot/Avenger battalions, also in the active component, have the same Patriot force as a Patriot battalion and one organic Avenger battery. The maintenance company is adjusted to include system-peculiar maintenance for the Avenger component of the battalion. This battalion composition constitutes an integrated battalion consisting of Patriot and Sentinel radars, the Patriot family of missiles, and Stinger missiles.
 Composite Indirect Fire Protection Capability (IFPC)/Avenger battalions are fielded in the active component. They consist of a headquarters and headquarters battery, one battery of Avenger missioned primarily to defeat the cruise missile and UAS threats (groups 2 and 3), two batteries of C-RAM with their Land-Based Phalanx Weapon System (LPWS) missioned primarily to defeat the RAM threat, and a maintenance company.
 Avenger battalions are fielded in the Army National Guard and in the active component force. Avenger battalions consist of a headquarters and headquarters battery, three firing batteries with two firing platoons each, and a maintenance detachment.
Note. A fifth type of peacetime battalion, a composite Patriot/THAAD battalion, is being explored.
7-15. Task force composition can be varied. Three factors impact the size of an ADA task force: mission requirements (METT-TC), human span of control, and geographical span of control.
 Mission requirements, based on METT-TC, determine the desirable size of the task force. These requirements may indicate that a force smaller than an equivalent peacetime battalion is adequate. If the requirement is fewer than the equivalent of two peacetime ADA batteries, the task organized element is called an ADA task-organized battery (see chapter 8). Mission requirements greater than the equivalent of six peacetime ADA firing batteries is equivalent to an ADA brigade (-) operation, which is covered in chapter 6.
 Human span of control encompasses both the command and the control functions. While human span of control varies based on the abilities and experiences of the leaders involved, effectiveness diminishes as the number of elements and dispersion of these elements increases. For example, Patriot commanders, commanding the original battalion configuration of six firing batteries, were somewhat overwhelmed by the human span required to cover these six batteries (mainly impacting command functions) and the technical challenges of adequately controlling the AMD operations of the batteries. The Patriot battalion configuration was ultimately reduced to four firing batteries per battalion based on organizational studies and other factors. While human span of control must be considered, it should not dictate task force sizing. If METT-TC requires a greater human span of control, the risks associated with it should be addressed and mitigated by augmenting elements within the task force that facilitate C2.
 Geographic span of control is a combination of two factors: firepower reach and communications and networking. The firepower reach of the task force determines the span in which effective defense can be achieved. Communications and networking design features of ADA systems impact physical separation distances between elements of the defense in order to achieve time
22 December 2020
FM 3-01
7-3
Chapter 7
crucial air battle information exchange. AMD networks are sized to provide assured delivery across a set geographic span of control, within latency constraints, that enable full defense effectiveness. Patriot multi-routes critical ADA data by sending the information across multiple point-to-point links, thus requiring each node to have multiple paired nodes. Each node uses a terrestrial line-of-sight radio, limiting the distance between them. Large geographic spans of control would result in one or more points of failure, thus reducing the probability of successful message transfer between the task force C2 node and the executing firing battery. Avenger fire units have more limited data and communications ranges. Therefore, an Avenger platoon is limited in its geographical dispersal of fire units in order to maintain effective mission control. Patriot and Avenger share information to achieve a coordinated defense across joint air defense linkages, with each system then distributing the shared information to its firing components via their own data interfaces. The terrestrial reach of the radios within each system are a limiting factor in task force composition without significant augmentation from unique ADA communications resources. Standard Army communications can augment non-critical air battle data distribution, but lack compatible interfaces to effect battle management.
7-16. Task force sensors may be of one type, such as the Patriot radar, but normally have at least two types (for example, Patriot and Sentinel radars). Likewise, shooters may be of one type (for example, Patriot), but normally have at least two types (for example, Patriot and Avenger). In addition, the task force has a field maintenance company or detachment.
7-17. Avenger and C-RAM share a C2 framework that allows for full integration across sensors and weapons. C-RAM C2 is a modification of forward area air defense (FAAD) C2 that maintains full backward compatibility across the systems. An ADA task force, composed of Avenger and C-RAM weapons and Sentinel radars, can provide short-range, low-altitude defense against air threats (fixed- and rotary-wing aircraft, UASs, cruise missiles) and incoming RAM. Avenger provides defense against the air threat while C-RAM counters the RAM threat. FAAD C2/C-RAM C2 integrates the defense across the weapons. In such a task force, human and geographic spans of control are the primary limiting factors in ADA task force composition.
7-18. ADA task forces using Patriot as the base capability with augmentation from Avenger or C-RAM forces present greater integration challenges. Each system has a unique C2 capability that does not provide air battle control over the other system. Patriot C2 effects air battle management over Patriot forces and integrates with higher echelons via joint data linkages. Patriot shares air battle management decisions and data with Avenger or C-RAM via these joint linkages, but cannot direct engagements over these linkages. Likewise, FAAD C2/C-RAM C2 cannot plan or execute Patriot engagements. Thus, this type of ADA task force fights a coordinated but not fully integrated air battle. Primary considerations in ADA task force sizing for this type of ADA task force are human and geographic spans of control. This has two implications to task force composition:
 Maximum task force composition is always limited by human span of control, that is, task force size should not exceed six firing batteries. For example, two Avenger batteries, or one Avenger battery and one C-RAM battery, may be attached to a Patriot battalion to form a six firing battery task force.
 Avenger and C-RAM components are directly controlled by their organic FAAD C2/C-RAM C2 node and fight a coordinated, but not holistic, fight through C2-to-C2 interfaces.
 The dual communications architectures require separate network planning, one for Patriot's interconnectivity and one for Avenger's/C-RAM's interconnectivity. Patriot fire units may disperse over a wider area than that which can be spanned by FAAD/C-RAM C2 in connecting firing elements. The Patriot battery communications architecture is incapable of transmitting into joint data linkages; these interconnectivities come directly from the Patriot battalion. Network planning for Avenger units may require that each Avenger platoon individually enter into the joint data networks rather than relying upon the battery to be the point of interface, distributing the data down to the platoon level.
7-19. THAAD batteries may be independently deployed, commanded by their parent ADA brigade and controlled by the AAMDC ADAFCO collocated with the AADC controlling headquarters, such as the JAOC. THAAD interoperates with the ADA task force through its tactical fire control and communications
7-4
FM 3-01
22 December 2020
ADA Battalion
equipment. Interface to the ADA task force is achieved through link 16. A THAAD battery may also be attached to an ADA task force. THAAD operates, whether independently deployed or attached to an ADA task force, as a part of BMDS, and it interfaces with other Army ADA forces via joint linkages. Patriot has the capability to exchange information, to include engagement orders, with the THAAD battery. Neither the Avenger nor C-RAM C2 node has the necessary software to direct THAAD fires. When THAAD is attached to a non-Patriot based ADA task force, tactical control of THAAD fires remains under the authority of the AAMDC ADAFCO, with the ADA task force commander exercising operational control.
7-20. Ten types of ADA task forces may be formed by METT-TC tailoring of peacetime organizations:
 Patriot ADA task forces may consist of two to six Patriot firing batteries capable of providing short-to-medium range lower tier ballistic missile defense and low-to-high altitude air defense against air threats. Additionally, Patriot can provide defense against large caliber rockets, but not other elements of the RAM threat.
 Patriot/THAAD ADA task forces may be composed of two to five Patriot batteries and one THAAD battery. THAAD provides upper tier missile defense and Patriot provides lower tier missile defense and air defense.
 Patriot/THAAD/Avenger/C-RAM ADA task forces may be composed with up to four Patriot batteries, a THAAD battery, and an Avenger or C-RAM battery. This composition enables the defeat of the broadest spectrum of air and missile threats.
 Patriot/Avenger or Patriot/Avenger/C-RAM ADA task forces composed from elements of peacetime composite Patriot/Avenger battalion(s) may consist of up to five Patriot batteries and one Avenger battery, four Patriot batteries and two Avenger batteries, or four Patriot batteries, one Avenger battery, and one C-RAM battery. Patriot provides the ballistic missile defense capability and the most robust air defense capability, with Avenger supplementing Patriot with very lowaltitude, short-range air defense. Composite battalions are equipped with an AMDPCS subset called the air battle management operations center with specific modifications to hardwire to the Patriot C2 node, thus enabling a composite FCE with both Patriot and Avenger (but not C-RAM) weapons control capability. The air battle management operations center can provide higher echelon integration of C-RAM into the ADA task force, but direct control of C-RAM fires is through the C-RAM C2 node.
 Patriot/Avenger or Patriot/Avenger/C-RAM ADA task forces composed from elements of peacetime Patriot battalions and peacetime Avenger or C-RAM battalions or batteries. As above, the ADA task force may consist of up to five Patriot batteries and one Avenger battery, four Patriot batteries and two Avenger batteries, or four Patriot batteries, one Avenger battery, and one CRAM battery. The primary difference in these two forms of ADA task forces is that the hardwired air battle management operations center is not available in non-composite battalions. Thus, the Avenger or C-RAM battery C2 node interfaces via joint linkages to the Patriot C2 node, enabling a coordinated but not integrated fight.
 Patriot/C-RAM ADA task forces may consist of up to five Patriot batteries and one C-RAM battery or up to four Patriot batteries and two C-RAM batteries. Patriot provides ballistic missile and air defense capabilities, and C-RAM provides capabilities to defeat the RAM threats.
 Avenger ADA task forces may consist of up to six Avenger batteries. This task force has only very low- to low-altitude, short-range air defense capabilities.
 Avenger/C-RAM ADA task forces may consist of any combination of Avenger batteries and CRAM batteries up to a maximum of six. This type of task force can defend against low-altitude, short-range air and RAM threats.
 Avenger/THAAD ADA task forces may consist of up to five batteries of Avenger and one THAAD battery. THAAD provides ballistic missile defense and Avenger provides short range air defense.
 Avenger/C-RAM/THAAD task forces may consist of up to four batteries of Avenger, one C-RAM battery, and one THAAD battery. THAAD provides ballistic missile defense, Avenger short range air defense, and C-RAM defeats the RAM threat within the task force.
7-21. Sensing functions, such as detection, acquisition, and tracking, are provided by networked sensors. These sensors include Patriot, Sentinel, or AN/TPY-2 (operating in the THAAD or forward-based mode).
22 December 2020
FM 3-01
7-5
Chapter 7
Patriot has a robust capability for developing an internal air picture in which the ADA task force C2 node receives and processes data from all Patriot radars in the task force tracking the object. Other sensors in the ADA task force use a track reporting schema that has rules for selecting the best sensor track for reporting across the network. Additional sensors, such as the Armys Lightweight Counter-Mortar Radar (LCMR) and Firefinder, Navys Aegis SPY radar, and the Air Forces AWACS radar, may supplement networked sensors by reporting tracks across standard Army or joint linkages. Track reports are received at the ADA task force C2 node, which further distributes the data to subordinate fire units. The THAAD radar reports tracks across joint linkages through the THAAD fire control and communications equipment.
7-22. Engagements are conducted by mixes of missiles carried on Patriot and Avenger launchers or by CRAM guns. Patriot employs three missile variants: PAC-3, missile segment enhancement, and guidance enhanced missile. PAC-3 and missile segment enhancement missiles use inertial midcourse with groundbased target vector updates and radar terminal homing to defeat air and ballistic missile threats from low-tohigh altitudes. Missile segment enhancement missiles are an upgraded version of PAC-3 missiles with greater kinematics to achieve higher altitude and longer range intercepts. Both of these missiles are optimized against ballistic threats but have significant capability against air threats. Guidance enhanced missiles are retrofitted older versions of Patriot missiles that retain midcourse command guidance and track-via-missile terminal homing. Guidance enhanced missiles are optimized against air threats, especially cruise missiles, while retaining good capability against close-range ballistic missiles. Patriot missiles require the support of a “local” Patriot radar (a radar located in a geometric missile capture and guidance relationship with the launcher) for the entire engagement sequence. The shooting function may be augmented by the attachment of Avenger with Stinger missiles and .50 caliber machinegun or LPWS guns. THAAD launchers carrying THAAD missiles may also augment the task force.
7-23. Voice and data communications capabilities enable task force integration with external data and targeting networks supporting Army and joint advanced warning and engagement operations. ADA task force communications operate within the tactical data link networks (for example, link 16 and LandWarNet) for battlefield integration. The ADA task force can operate independent of other U.S. AMD forces, but will normally be employed as a part of a larger joint AMD capability.
COMMAND AND CONTROL
7-24. ADA task forces are normally employed with other ADA assets and organized under the ADA brigade and the AAMDC to support JFC priorities. On rare occasions, an ADA task force may be employed with minimal or no supporting ADA resources and be required to directly integrate with the AADC for control. An ADA task force may also be required to integrate with the JFLCC for command. ADA task forces perform AMD functions as specified by the JFC. The deployed ADA task force performs lower-tier missile defense and air defense in support of joint unified action and Army unified land operations. Figure 7-1 depicts the nominal control relationships for a deployed ADA task force. The figure omits echelons above the ADA brigade level to focus on the ADA task force. Engagement authority is exercised through an ADA brigade ADAFCO, deployed with a joint higher echelon commander, presented as a regional air defense commander (RADC)/SADC in the figure. Engagement authority may be delegated in accordance with METT-TC and promulgated through a surface-to-air missile tactical order or a short-range air defense tactical order; the engagement authority may change dynamically as the battle proceeds. Patriot engagements are planned and managed by the task force C2 node, unless engagement authority is decentralized and executed at the battery, which has direct control of its assigned Patriot radar and launchers. Avenger and C-RAM normally deploy and fight at the platoon level, which has direct control of assigned weapons. Avenger sensors are under the control of the battery C2 node, but may be attached to a platoon and controlled by the platoon C2 node. CRAM sensors are controlled by the platoon. Supported units may vary in accordance with METT-TC. The ADA task force coordinates with the supported unit to pass high quality air picture information and to collaborate on defense design to protect the maneuver elements high value assets.
7-6
FM 3-01
22 December 2020
ADA Battalion
Figure 7-1. ADA task force AMD control relationships
7-25. Each firing echelon in the ADA task force operates a FCE during combat operations. Manning for each echelon varies according to the allocation of C2 functions across the ADA task force and METT-TC. The ADA task force FCE generally mans all five functional positions: fire control, surveillance, identification, weapons control, and information control, with one operator for each position. Under heavy loads, more than one person per function may be required. For example, two or more weapons control operators may be needed when control is decentralized to the ADA task force and the air threat is heavy.
7-26. FCEs in Patriot and THAAD batteries within the ADA task force require a minimum manning of three Soldiers: fire control officer (who also executes identification functions), weapons control operator (who also does surveillance functions), and information control officer. Medium to heavy air threats may require manning the weapons control/surveillance functions with two Soldiers. These positions allow for continuity of operations upon loss of linkage through the higher echelon FCE, while also assuring that communications within the FCE continue to provide requisite performance to maintain data linkages.
7-27. The ADA task force C2 node plans, deploys, operates, manages air battle operations, and sustains combat operations across the task force. When a single type of system is deployed in an ADA task force, C2 components of that type are sufficient. However, when the ADA task force consists of multiple types of systems, its C2 node must contain components of each type to effect coordinated battle management. The following discussion considers an ADA task force consisting of Patriot batteries augmented by an Avenger battery. The same principles hold if the ADA task force is a Patriot battalion augmented by a C-RAM battery:
 Patriot C2 provides for battlefield integration with the joint AMD authority and with the supported land combat component. Planning is coordinated using the combined capabilities of Patriot C2 and FAAD C2/C-RAM C2.
 Each C2 node plans its engagements in accordance with higher echelon control and ROE. The nodes share air picture data and engagement decisions via link 16. Engagement decisions of one capability, such as Patriot, place an engagement hold on the companion capability, such as
22 December 2020
FM 3-01
7-7
Chapter 7
Avenger, until the planned engagement has been completed. This frees the companion system to use resources to engage another threatening track.
7-28. The dismounted Patriot information and coordination central (DPICC) affords Patriot-based ADA task forces flexibility in deployment while retaining full employment functionality. Potential usages of the dismounted capability include:
 Initial deployment. Early entry operations typically see initial ADA task force deployments by batteries. A Patriot battery, with joint data network receive only capability, has no means to directly inject data into the kill chain, necessitating early deployment of the Patriot battalions information and coordination central (ICC). This requires the dedication of precious strategic transport to deploy the large truck-mounted ICC van. However, the fly-away DPICC can be deployed with the battery within the batterys strategic transport requirements, thus enabling a greater tooth-to-tail ratio in the critical early entry periods.
 Sustained operations in a location. The DPICC can be located inside permanent or semi-permanent facilities, enabling greater efficiency and troop protection in operations of the ADA battalion task force FCE along with better coordination across the headquarters staff.
 Mobile operations. The ICC provides functionality not available in a battery engagement control system. When the ADA battalion task force is conducting mobile operations, the DPICC can serve as a base or jump capability while the ICC is relocating, thus retaining full C2 functionality during times of movement.
 Independent battery deployment. A Patriot battery can receive data across link 16, but can only transmit its air picture across the Patriot digital information link (PADIL) network. Thus, when deployed outside the communications range of the ICC, the battery is unable to uplink its internal air picture across the kill chain. By deploying the independent battery with an attached DPICC, full data connectivity with the kill chain is realized. This topic is more fully explored in chapter 7.
FORCE OPERATIONS
7-29. ADA forces are deployable via air, rail, and sea. Due to the size and weight of ADA equipment, the most economical means of transporting into a theater of operations is via sea; however, this requires long lead times. If an AMD capability is required as part of a rapid deployment package, an ADA task force can be deployed via C-17 and C-5 to support the mission or a strategic response.
7-30. An ADA task forces standard to prepare all equipment for movement is a minimum of one hour and another hour once on site to emplace and initialize the unit for tactical operations, except for C-RAM and THAAD. (C-RAM is transportable, but not mobile. C-RAM emplacement is generally into sites that may take weeks to prepare, and actual emplacement requires days. THAAD standards are two hours to prepare for movement and four hours to emplace and initialize.) This standard will vary based upon conditions (for example, day, night, weather conditions, and mission oriented protective posture) and composition of the ADA task force (for example, Patriot timelines are longer than Avenger timelines). Although the ADA task force is fully mobile with all tactical equipment mounted on wheeled trailers or vehicles, much of ADA equipment is both oversized and heavy. When deploying systems in theater, planners must consider route and site suitability. Road surfaces, bridges, and terrain to be negotiated may limit the route taken. Thus, route and site (if possible) reconnaissance are essential prior to movement. Once the initial emplacement is completed, adjustments to the defense can be obtained by moving individual pieces of equipment with minimal disruption of combat operations.
7-31. At the operational level, the AAMDC or ADA brigade determines force allocation, task organization when needed, and ADA areas of operations in defending the JFCs critical assets. At the tactical level, the ADA task force plans and executes defense designs to maximize inherent capabilities against the threat. Planning includes initial and follow-on positions, determining primary and secondary target lines, allocating resources to the designated critical assets, and planning the necessary communications networking. For more information on Patriot technical and system details of defense design refer to ATP 3-01.85 and ATP 3-01.87.
7-32. The ADA task force staff utilizes the tools embedded in its C2 node to assist in the planning process. These tools include the Patriot tactical planning workstation and the AMDWS in the FAAD C2 and C-RAM C2 systems.
7-8
FM 3-01
22 December 2020
ADA Battalion
7-33. The ADA task force commander must translate a defense plan into a defense design. The plan provides information on the mission, critical assets to be defended and their priority, resources allocated to the ADA task force, and other critical METT-TC considerations. Defense design begins by determining optimal sensor positions. Locations for the most capable sensors are selected first; less capable sensors are then positioned to complement the coverage of the more capable sensors. In most ADA task forces, Patriot radars are the most capable sensors and the only sensors currently able to provide fire control quality data against ballistic missile threats (assuming no AN/TPY-2). Fire control quality data is usable guidance updates to a weapon in flight that allows a seeker to acquire the target. Patriot radars available to the ADA task force are allocated to provide for ballistic missile defense as the first priority in accordance with mission orders and the presence of a creditable ballistic missile threat. Secondarily, Patriot radars are sited to provide as much low-altitude coverage as is feasible within the limitations of achieving necessary ballistic missile defense coverage. Once the Patriot radars are sited and their coverage determined, Sentinel radars are positioned to complement Patriot coverage, with a concentration primarily on low-altitude avenues of ingress and, secondarily, on weighted coverage or early engagement.
7-34. Patriot is most effective when it fights as an ADA task force, but it deploys by batteries because of strong system site configuration requirements. The battery fire control section, consisting of the battery engagement control station, battery command post, radar set, electric power plant, and antenna mast group, are physically cabled together and require approximately 500 square meters of moderately level ground. All equipment, other than the antenna mast group, can be emplaced on up to a 10-percent slope. The antenna mast group cannot be emplaced on greater than a 0.5-degree slope. Patriot launchers have limitations on where they can be placed with respect to the radar in order to be available for the air battle. Launchers can be dispersed within these limitations to best provide for effective fires over the defended assets. Patriot missiles must be captured by a Patriot radar. Missile capture is highly dependent upon physical separation distance between the capturing radar and the launcher. The launcher must be in the capturing radars field of view, and that field of view varies between a “local” capture (separation distance less than one kilometer) and remote launch phases 1 and 3.
7-35. Avenger typically fights as a platoon within an ADA task force. The Sentinel radar is positioned to best complement Patriot radars in the task force, as discussed above, while also providing track data to support Avenger fires. Avenger platforms can deploy independently, with no site configuration requirements. The primary factor impacting Avenger platform dispersal is communications connectivity to the controlling FAAD C2 node. An Avenger platform is capable of completing an engagement using visual detection and identification, but is more effective and efficient when alerting data and higher echelon identification data are fed to it through its controlling FAAD C2 node.
7-36. C-RAM typically fights as a platoon within an ADA task force. C-RAM requires extensive site preparation for deployment of its guns. Its effectiveness is optimal when pairs of guns have mutual support and each pair of guns have overlapping fires with an adjacent pair. As a minimum, overlapping fires between guns must be achieved. Site surveys are normally done to optimize C-RAM fires against RAM well in advance of actual deployment. The C-RAM system includes two LCMRs per platoon. These sensors provide C-RAM with detection and alerting of RAM threats. They are positioned to best achieve the C-RAM mission, irrespective of where other sensors in the ADA task force are positioned.
7-37. When an ADA task force includes a THAAD battery, the THAAD radar forms the base piece for sensor emplacement planning, followed by Patriot radars and then Sentinel radars. The THAAD radar provides extended range surveillance and tracking of ballistic missiles. Patriot may have to augment THAAD assets to provide sufficient firepower to counter ballistic missile threats as well as sufficient protection against threats not in THAADs capabilities set. This is a consideration in selecting locations and primary target lines for Patriot radars when THAAD coverage is available to support the task force.
7-38. During the planning of the radar locations and primary target lines, planners must take into account threat air avenues of approach and named areas of interest (formerly called, in AMD applications, ballistic missile operating areas). Many technical aspects are involved with the positioning of the Patriot radar and launchers to ensure the radar can control missiles in flight. The sensors primary target lines are determined based on mission requirements, number of defended assets, and the Patriot units location in relation to the assets. Because Patriot is a sectored system, radar orientation is critical. Sentinel radars rotate to provide 360-
22 December 2020
FM 3-01
7-9
Chapter 7
degree surveillance and track-while-scan capabilities; they may be stopped to stare at fixed sectors. THAAD also provides sectored radar coverage against ballistic threats.
7-39. Patriot radars may be assigned secondary target lines to counter alternate air avenues of approach or to provide mutual support/overlapping coverage for an adjacent radar. Secondary target lines must be planned in advance to allow the proper siting of launchers to accommodate both primary and secondary target line requirements.
7-40. Patriot launchers can be rotated in azimuth via tabular inputs from the engagement control station, but such rotation is done prior to the conduct of an engagement. During the engagement process, Patriot launchers fire at a fixed elevation and azimuth. Patriot missiles must be acquired by a Patriot radar so that in-flight updates can be provided to enable target intercept. Thus, launcher locations must be carefully selected to meet technical requirements and to ensure proper lethality at intercept. Patriot launchers are emplaced within the Patriot radar coverage, or, if secondary target lines are assigned, in such a position as to support fires in this secondary sector. Launchers emplaced to support secondary sectors may not be available in the primary sector, and launchers available in the primary sector may not be available to support secondary sectors. Algorithms in the engagement control station automatically calculate which launchers can support a sector and command appropriate slew actions to enable that support. The first principle in emplacing launchers is that of mass to ensure proper lethality against the anticipated attacks on defended assets. Patriot launchers are emplaced, dependent upon missile load, with sufficient mass to defeat the anticipated ballistic missile threat and support wider area cruise missile defense. Missile load-out is task force tailorable as is the composition of the task force itself. In consideration of defeating the ballistic missile threat, preference is given at emplacement to launchers carrying missile segment enhancement missiles first and then to PAC-3 missiles second, as the hit-to-kill characteristics of these missiles provides greater lethality against ballistic threats. Launchers carrying guidance enhanced missiles should be placed in positions primarily to optimize cruise missile defense and secondarily to support the ballistic missile fight. While other factors are considered in the engagement, decision, and assignment process, missile selection is critical.
7-41. Patriot launchers can be distributed across the area of operations, subject to constraints on the technical requirements of missile capture and uplinks and the need to achieve sufficient mass. Patriot launchers are connected to the network via data link terminals, which are embedded in engagement control stations and communication relay groups. Launchers are directly connected to their controlling engagement control station by data link terminals (local and phase 1 remote) or by launcher data link terminal to a data link terminal in a communications relay group (phase 3 remote), which then connects the launcher to its controlling engagement control station. (When providing control of remote launchers, a communications group is also called a launcher control station.) Fiber optic cable connections can replace the data link terminal connections when time permits site improvements. Since only four communication relay groups are available in a nominal task force, launchers should be grouped either locally with the radar or in distributed remote launch farms such that the demand for relay terminals to place launchers on the net is minimized consistent with achieving desired lethality to protect assets. Patriot launchers located in the vicinity of a defended asset provide for better lethality and shorter time of flight. However, sustainment and security of remote launch farms must be considered when selecting locations for the deployment of launchers.
7-42. Avengers, with a nominal load of eight Stinger missiles, are emplaced to support engagements of the anticipated cruise missile threat through 360 degrees, though Stingers operational range is limited. Avengers rotate in azimuth to point Stinger missiles in the optimal direction. Since Patriot radars, and thus Patriot engagements, are sectored, the emplacement of Avenger considers the out-of-sector attack potential of air threats in a complex integrated attack scenario; Avengers are positioned to deny any ingress routes not already covered by Patriot. Once these routes are defended, any additional Avengers can be positioned to thicken the defense and provide for earlier engagement of very low altitude threats.
7-43. C-RAM deploys and fights as a platoon. When C-RAM is attached to an ADA task force, C-RAM deployment and employment continues to be in accordance with C-RAM doctrine.
7-44. ADA units are high value assets with limited organic security capabilities. ADA task force equipment is vulnerable to both direct and indirect fire and enemy special operations forces. When the mission permits, ADA forces are typically emplaced as part of larger operations bases; however, when a mission requires that ADA components deploy outside of these installations, additional force protection assets, such as engineers and infantry, are required to prepare and secure the new site.
7-10
FM 3-01
22 December 2020
ADA Battalion
7-45. Force protection is an important planning function for distributed elements of the ADA task force. Selection of sites for distributed components, such as communications relay groups and remote launch farms, must consider the availability of other military organizations in the vicinity of the dispersed element to provide force protection and site security.
ENGAGEMENT OPERATIONS
7-46. The ADA task force does not fight the AMD battle alone. Fires are typically controlled by joint C2 authorities, such as the RADC or the SADC, as part of the kill chain. These commanders have a more complete understanding of the air domain as they execute the airspace control plan and offensive/defensive counterair operations on behalf of the JFACC/AADC. While the ADA task force possesses significant functionality to perform active and passive identification of air tracks, these capabilities often fall short of achieving true combat identification for the full spectrum of airspace users. Operating under the centralized control of the kill chain via joint tactical data links ensures that the ADA task force receives a joint air picture and achieves connectivity with the controlling identification authority and engagement authority. ADA task force engagement operations are governed by several documents specific to each theater, such as the area air defense plan, special instructions, and AAMDC tactical supplement.
7-47. Identification authority and engagement authority reside with the AADC; however, these authorities may be delegated to the echelon level that has the greatest amount of situational understanding and the resources to make decisions timely enough to affect an action. For ADA task force aerial engagements, less ballistic missiles and RAM, this authority typically remains with the RADC or SADC. For certain types of threats, such as ballistic missiles and small UASs, identification authority and engagement authorization are commonly delegated to ADA task force level (or below). Against RAM threats, engagement authorization typically resides at the base defense operations center, if operating on an installation, or at firing platoon level if operating in off-base locations. Decentralizing identification and engagement authorization to the task force commander enables more responsive land-based AMD fires; it also allows for greater defense effectiveness as the threat volume increases. However, this decentralization may increase the risk of fratricide to friendly air platforms.
7-48. ADA task force mission readiness is governed through the use of alert states. Alert states, as mentioned previously, prescribe the amount of resources directed to achieve battle stations (ready to fire) and specify manning requirements and equipment configuration. Alert states are METT-TC dependent. Alert states are generally promulgated by the ADAFCOs via the surface-to-air missile tactical order. Utilizing alert states allows for maximum flexibility to conduct training or maintenance while meeting mission requirements.
7-49. The ADA task force fights from stationary locations; therefore, tactics are a matter of the proper positioning, orientation and system configuration of subordinate components with respect to the defended assets and threat, rather than a function of maneuver. Tactics for threat engagements will vary based on the specific threat platforms, such as ballistic missiles, cruise missiles, or fixed-wing aircraft.
7-50. At the ADA task force level, Patriot C2 node is capable of controlling engagements against ballistic missiles within the Patriot and THAAD system. Ballistic missile engagement planning and execution are accomplished at the battery C2 node in both Patriot and THAAD. The ADA task force C2 node performs a threat assessment to the defended assets which are threatened by an in-flight missile and assigns the best battery to conduct the engagement. The engaging battery (Patriot or THAAD) C2 nodes then determines when, where, and how (launcher, missile type) to execute the engagement. Missile engagements are conducted manually or automatically; even in the automatic mode, an operator must validate engagements and may prevent the engagement or, if required, destroy the missile after launch. If a designated defended asset is threatened and the threat is engageable, the system will initiate an engagement when in the automatic mode; however, an operator must initiate engagement in the manual mode.
7-51. When a THAAD battery is attached to a non-Patriot ADA task force, the THAAD battery C2 node provides the capability of planning and executing engagements against ballistic missiles in its threat set. While operational control resides in the ADA task force C2 node, tactical control is exercised through the AAMDC AADFCO, as neither FAAD C2 nor C-RAM C2 has the requisite software to provide adequate fire control orders to THAAD. See ATP 3-01.91 for further discussions of THAAD battery operations.
22 December 2020
FM 3-01
7-11
Chapter 7
7-52. Anti-radiation missiles present an urgent self-defense threat to task force sensors. Depending on the type and launch point, anti-radiation missile trajectories may emulate those of a ballistic missile or a fixedwing aircraft. Patriots C2 node employs special logic to classify a track as an anti-radiation missile. Other system C2 nodes lack the software to specifically declare a threat as an anti-radiation missile. In Patriot, some classification parameters are operator defined and should be a product of the planning process. Like ballistic missiles, anti-radiation missiles may be engaged automatically or manually. System configuration will be METT-TC dependent. For further information see ATP 3-01.85.
7-53. Cruise missiles, UASs, and fixed- and rotary-wing aircraft are capable of flying similar trajectories. Because of the inherent difficulties in distinguishing between these types of platforms, identification and engagement authorities are typically held at the RADC/SADC and will always be engaged manually.
 Patriot battalion-level C2 node conducts a threat evaluation, assesses engagement options, and assigns an appropriate battery C2 node to execute engagements. In heavy threat scenarios, the battalion-level node may decentralize to allow each battery to plan and execute engagements.
 Avenger fights primarily at the platoon level, with higher echelon C2 nodes providing battlefield coordination, linkage to the joint air picture, and authorization to engage. Avenger engagements occur at the Avenger platform level. See ATP 3-01.64 for further discussion of Avenger battalion and battery techniques.
7-54. ADA task forces integrate with other Army, joint and multinational network systems at ADA task force headquarters level. ADA task force communications capabilities allow for exchange of track messaging over tactical data links via radio frequency transmissions, secure local area networks, or commercial telephone, to include secure and non-secure internet protocol-based applications and C2 networks to send and receive voice, video, and data-related items. The ADA task forces communication capability allows for critical track data to be exchanged among a wide variety of service platforms, such as AWACS, Aegis ships, control and reporting center, and JTAGS.
SUSTAINMENT OPERATIONS
7-55. A maintenance company or detachment is organic to each ADA battalion. The company or detachment has repair personnel for the types of equipment within the battalion and, thus, has a different composition for each type of ADA formation.
7-56. ADA task force tailoring must include pulling the appropriate level of sustainment support from the peacetime organizations of battalions for the composition of the ADA task force. This support includes system-specific maintenance parts and maintainers, as appropriate, for the mix of ADA sensors and weapons in the task force.
7-57. Planning for sustainment of dispersed elements of the ADA task force considers the availability of support from the supported unit. Most supported units can provide some level of common Army support, but do not have the capability of providing system-specific support. For example, a supported unit, with proper planning, coordination and collaboration, can provide fuel support to a distributed Patriot launch farm.
7-12
FM 3-01
22 December 2020
Chapter 8
ADA Battery
This chapter discusses the capabilities, linkages, and tactics and procedures of a generic ADA battery employed as a task-organized battery. An ADA battery is a subordinate element in every ADA battalion; an ADA task-organized battery is a tailored organization based on METT-TC that fights subordinate to an ADA task force or as an independent entity. An ADA task-organized battery consists of sensors, shooters, and command and control (C2) elements; sensors and shooters may be of one type or of multiple types. The guidance in this chapter is applicable to the role of an ADA taskorganized battery in all areas of operations and in support of unified land operations.
ROLES AND CAPABILITIES
8-1. An ADA task-organized battery defends forces and selected assets against air and missile attacks and from the effects of enemy surveillance. To accomplish this, the battery employs sensors and shooters to provide AMD protection within the altitude and range capabilities of its organic and attached weapon systems.
8-2. An ADA task-organized battery may be comprised of a peacetime battery organization with an additional platoon of the same system for instance, but is more effective against complex integrated attacks when augmented with complementary sensors and shooters from another type of organization. For example, a task-organized battery, consisting of a Patriot battery augmented with an Avenger platoon, provides sectored ballistic missile defense and 360-degree defense against air threats such as cruise missiles and UASs. A task-organized battery may initially deploy a minimum element consisting of at least two launchers with ready missiles, a sensor, a C2 node, and a tailored set of support equipment.
8-3. The ADA task-organized batterys roles and responsibilities generally remain the same irrespective of type of operational tasks offensive, defensive, or stability. It may be deployed in tactical to strategic roles, depending on the capability of the team, priority of its defended assets, and commanders intent.
8-4. ADA task-organized batteries promote stability within a country or region by protecting civilians and geopolitical assets. Their presence discourages enemy factions and supports the resident government in essential services and humanitarian efforts. ADA task-organized batteries may remain in theater to continue providing AMD of critical assets as a conflict is resolved, preventing residual enemy forces from successfully affecting assets or friendly forces that are redeploying and supporting the transition to civil authorities.
SUPPORT TO JOINT AIR AND MISSILE DEFENSE
8-5. An ADA task-organized battery provides defense of designated JFACC and joint force land component commander (JFLCC) assets at strategic, operational and tactical levels. These assets include aerial and sea ports of debarkation, senior CPs, logistical facilities, assembly areas, forward operating bases, and geopolitical assets. The battery affords continuous protection of assets against threats within its METT-TC tailored capabilities.
8-6. Defense of these assets requires capabilities, such as those provided by a Terminal High Altitude Area Defense (THAAD) or Patriot battery, to defeat the most likely threats longer range, lethal ballistic and cruise missiles. THAAD, as part of the BMDS, may be tasked to engage ballistic missiles within or across the boundaries of a combatant commanders area of responsibility. An Avenger platoon, added to either battery, supports engagements of other threats, such as fixed-wing aircraft. Engagements are generally controlled and directed by the designated engagement authority.
22 December 2020
FM 3-01
8-1
Chapter 8
SUPPORT TO UNIFIED LAND OPERATIONS
8-7. The ADA task-organized battery is integral to the execution of offensive, defensive, and stability tasks by maneuver formations and other Army elements. Battery participation in each of these facets of unified land operations is METT-TC dependent. Deployment and employment considerations are similar in each.
8-8. An ADA task-organized battery can also be placed in support of a maneuver element or other designated critical asset. The battery may be employed as part of an ADA task force and placed in a general support role within a corps or division, or it may be employed independently, attached to a maneuver unit (most likely no higher than a brigade) and placed in a direct support role. Support relationships are METTTC dependent. In its general support role, it may be assigned to defend such key Army assets as a corps headquarters, major sustainment points, assembly areas, and forward operating bases. When in a direct support role, the battery commander coordinates with the supported unit commander and the air defense airspace management (ADAM) cell to optimize defense of the asset(s) selected to be defended. There may also be circumstances where a reinforcing or general support-reinforcing role may be most suitable.
BATTERY COMPOSITION
8-9. The peacetime ADA battery structure is consistent with that of a traditional Army company-size unit. The battery generally contains some 70-90 Soldiers and is equipped with interceptors, launchers, sensors, C2 elements, and such general Army materiel as vehicles and generators. Peacetime battery organizations vary by type of system:
 The THAAD system is organized in the active component and deployed as a battery. Major organic components of the battery are the AN/TPY-2 radar, six launchers with up to eight missiles per launcher, C2 elements, communications, and a battery support center. THAAD C2 is achieved by the THAAD tactical fire control and communications equipment for engagement operations and components of the Air and Missile Planning and Control System (AMDPCS) for force operations. The THAAD tactical fire control and communications equipment and THAAD portable planner also perform defense design and evaluation.
 Patriot batteries are in the active component and organized as part of Patriot battalions. They generally deploy as part of the battalion or in an ADA task force; when deploying as separate batteries, Patriot C2 assets from the parent battalion are normally attached to the battery to enhance integration with higher echelon units, joint and multinational forces, and the host nation. Organic components of a battery include C2 elements, a radar, six launching stations containing from 4 to 16 missiles per launcher (dependent on the type of Patriot missile), and support equipment.
 Avenger batteries are organized as part of active component and National Guard Avenger battalions or separate batteries in active component composite battalions; they generally deploy with the battalion or as separate batteries and are employed as batteries or platoons. An Avenger battery has two Avenger platoons and appropriate support equipment. The battery in the active component and National Guard battalions contains 12 Avengers and two Sentinel radars; the battery in the active component composite battalions has 24 Avengers and four Sentinels. Each Avenger has eight uploaded Stinger missiles, M3P .50-caliber machine gun, and sensor package, and identification, friend or foe capability. C2 is provided by the FAAD C2 system.
 C-RAM batteries are organized in the active component in IFPC/Avenger battalions, deployed as batteries and employed as platoons. A C-RAM battery has three C-RAM platoons and appropriate support equipment. The battery contains 12 Land-Based Phalanx Weapon Systems (LPWS) 20millimeter gun systems, three Sentinel radars, six LCMR, and three platoon engagement operations sections. C2 is provided by the C-RAM C2 System.
8-10. Peacetime organizations are METT-TC tailored to wartime configurations by attaching or detaching launchers, sensors, and C2 systems. Task-organized Patriot batteries require a Patriot radar, and a taskorganized THAAD battery requires an AN/TPY-2 radar. The Patriot radar can provide sectored alert and cueing support to other weapon systems, but 360-degree coverage against air threats requires the addition of a Sentinel. The AN/TPY-2 radar can provide extended surveillance against ballistic threats and can cue other systems and sensors to the threat. Defense against rocket, artillery, and mortar (RAM) threats requires a Sentinel radar, modified to detect, acquire, and track RAM threats, or a LCMR.
8-2
FM 3-01
22 December 2020
ADA Battery
8-11. The maximum composition of an ADA task-organized battery is a “base” battery plus up to two platoons. Anything larger is, by definition, an ADA battalion task force (see chapter 7). Patriot and THAAD forces have no mission organizational structure smaller than a battery. Possible compositions of taskorganized batteries are driven by the C2 capabilities available in the formation.
 THAAD and Patriot have unique C2 capabilities. When either is used as the base battery, engagement coordination with the supporting platoon(s) is achieved through link 16. Neither THAAD nor Patriot C2 nodes can issue engagement orders to dissimilar systems over link 16, so each system makes its engagement decisions and informs the other to prevent redundant engagements. Planning and force operations is accomplished through Army standard voice and data communications (LandWarNet). THAAD provides ballistic missile defense and the supporting platoon(s) provide Avenger/C-RAM fires. Patriot provides ballistic and cruise missile defense and the supporting platoons augment with Avenger/C-RAM fires. Note that a THAAD/Patriot combination requires the equivalent of two batteries, and is thus by definition an ADA task force.
 FAAD/C-RAM C2 allows task force tailoring of Avenger and C-RAM components, but FAAD/ C-RAM C2 cannot control THAAD or Patriot components. Thus, a base Avenger battery could be augmented with up to two platoons of any combination of Avenger and C-RAM. Although possible to form a task-organized battery with a base battery of C-RAM and additional C-RAM or Avenger platoons, doing so is unlikely since C-RAM fights as a platoon in most operational scenarios.
COMMAND AND CONTROL
8-12. An ADA task-organized battery is under the command of its parent ADA battalion and generally placed under the operational or tactical control of an ADA task force. The ADA task-organized battery exercises traditional command responsibilities, to include planning, resource allocation, and sustainment. Operational linkages for engagement and sustainment operations are established and maintained with the ADA task force, supported unit or asset, and the ADAFCO in the kill chain, as required. The battery commander is responsible for coordinating the support relationship, engagement considerations, and sustainment plans with the supported asset. The batterys data and voice capabilities vary in accordance with its C2 elements.
 Patriot interconnects battery components via its internal communications architecture, a combination of hardwire and radio frequency devices, using voice and the PADIL for data. The battery can receive link 16 but is not authorized to transmit on link 16. Thus, it requires a PADIL connection to its parent battalion or an attached dismounted Patriot information and coordination central (DPICC) to uplink engagement operations data. The parent battalion ICC or DPICC then inserts battery engagement operations data into link 16 in accordance with approved protocols. The battery communications architecture is supplemented by LandWarNet, primarily for communications external to the battery. FAAD/C-RAM C2 data and voice services include FAAD data link and LandWarNet. Sensor networks use the radar enabling subsystem, and weapons use the analog weapons enabling subsystem over the FAAD data link.
 The DPICC may interconnect in one of two ways as illustrated in figure 8-1 on page 8-4. A direct linkage via a copper cable is used when the DPICC is collocated with the Patriot battery. The DPICC can also connect to the Patriot battery across Army communication services or host nation infrastructure through a point of presence package deployed with the Patriot battery. The latter option enables a single DPICC to interconnect up to three independently deployed Patriot taskorganized batteries into the kill chain.
 THAAD interconnects battery components via its internal communications architecture, a link 16 derivative, and uses link 16 to report to other AMD elements. LandWarNet provides additional critical data and voice services.
22 December 2020
FM 3-01
8-3
Chapter 8
Figure 8-1. DPICC at the task-organized battery
8-13. Figure 8-2 focuses on lines of engagement and planning and coordination for the ADA task-organized battery in the joint and Army C2 architectures, when the battery is deployed as a part of a larger ADA task force or is independently deployed. Accordingly, connectivity lines to all higher echelons that are resident in these architectures (for example, JFACC and AAMDC), but not directly connected to the battery, have been omitted. While engagement authorization for most of the air threat is likely initially centralized above the ADA task force, the engagement control in the figure begins with the ADA task force. When the battery operates within an ADA task force, it takes direction from the ADA task force, irrespective of the centralized level of control in effect. When the battery is independently deployed, it enters a link 16 net or connects to a higher echelon network that provides C2 data. When engagement authority is centralized above an independently deployed battery, the ADAFCO provides control orders to the battery. When engagement authority is decentralized to the battery, the base battery C2 node is responsible for target identification (using joint data links and internal battery capabilities) and engagement decisions in accordance with promulgated ROE. Since neither THAAD nor Patriot C2 nodes can issue engagement orders via link 16 to dissimilar systems, voice communications are used to provide engagement control over fires of the supporting platoon(s).
8-14. Sensors and shooters are hierarchically controlled. Patriot and THAAD C2 nodes directly control Patriot and THAAD sensors and shooters. When Avenger deploys as the base battery of an ADA taskorganized battery, the battery C2 node controls Sentinel radars and platoon C2 nodes; the platoon C2 node controls the Avenger platforms. When THAAD or Patriot provides the base battery, the battery C2 node, in addition to directly controlling its organic radar and shooters, controls the attached platoon C2 node. While METT-TC may enable the augmentation of an Avenger platoon to a THAAD or Patriot battery without a Sentinel radar, most situations are likely to see the Avenger platoon augmented with a Sentinel radar from its parent battery. The C-RAM platoon C2 node directly controls its organic and attached sensors and shooters.
8-4
FM 3-01
22 December 2020
ADA Battery
Figure 8-2. ADA task-organized battery AMD control relationships
8-15. Engagement and identification authority in a low intensity air threat environment is generally centralized at the AADC designated level, with the RADC or SADC, and engagement orders are transmitted to ADA units through the ADAFCO. The ADAFCO transmits the engagement orders directly to the ADA task force or ADA task-organized battery, if deployed independently of its parent battalion or task force.
8-16. In a high intensity air threat environment, with significant, simultaneous, and coordinated manned air, cruise missile, and ballistic missile attacks, the AADC may, for instance, decentralize engagement/ identification authority for cruise missiles and manned aircraft in a specified area to an ADA task force or independent ADA task-organized battery.
8-17. The task-organized ADA battery is at the end of the kill chain. The battery executes engagement operations under positive controls positive identification and tracking of airborne objects and control of fires by a designated engagement authority.
FORCE OPERATIONS
8-18. Operation plans are usually prepared by the parent battalion prior to mission initiation. If deployed independently of the parent battalion, the battery commander develops the plan and subsequent changes, as required, in accordance with METT-TC. If operating as part of an ADA task force, the battery commander builds the plan in synchronization with that of the task force. If operating in support of a maneuver unit or other critical asset, the battery commander coordinates the plan with the supported commander.
8-19. An ADA task-organized battery normally defends one primary asset. It may have secondary assets within its area of operations, dependent upon METT-TC factors, such as the criticality of the asset, anticipated threat types and quantities, and available ADA forces. The battery commander uses the Patriot tactical planner workstation, THAAD portable planner, and/or the AMDWS to develop positional options for the
22 December 2020
FM 3-01
8-5
Chapter 8
defense. These planning tools are system specific, so the battery commander must coordinate with dissimilar system platoon leaders and exercise manual integration of options to develop a desired defense design. Patriot and THAAD planning tools provide automated capabilities for determining the “best” defense design, and information can be directly linked into the initiation of these systems. AMDWS provides for the transfer of planning factors and acceptance or rejection of higher echelon mission orders, but requires a manual determination of “better” defense design options. The commander synchronizes the detailed positioning plans with the overall defense design being developed by the parent battalion and supported forces air defense element/ADAM cell, if assigned a direct or other support mission to a maneuver element.
8-20. Once the initial emplacement is completed for ADA task-organized batteries, adjustments to the defense can be executed by moving individual pieces of equipment. Patriot and THAAD C2 tools provide automated assistance in the adjustment of defense designs and can adjust parameters of the design that do not require physical relocation of equipment, with only minor disruptions in combat operations. This includes adjustment of primary target lines, rotation to secondary target lines (for Patriot), and a change in radar search parameters. Patriot, THAAD, and FAAD/C-RAM C2 require manual processes to adjust the defense as components depart and enter the network. Task-organized Patriot and THAAD batteries, with Patriot or THAAD unique C2 equipment, must deploy and redeploy as a battery, with the exception that individual launchers can be redeployed within the defense. Complementary Avenger or C-RAM platoons, forming a part of a task-organized Patriot or THAAD battery, can deploy and redeploy independently of the base battery by individual element.
8-21. ADA task-organized batteries are high value assets with limited organic security capabilities. When the mission permits, they are emplaced on large operating bases, similar to ADA task forces. When a mission requires that they deploy outside of these installations, additional force protection assets may be required to prepare and secure the new sites. IPB and analysis of METT-TC factors determine the force protection requirements. However, batteries must be prepared to implement their own site defenses regardless of other force protection assets.
8-22. The ADA task-organized batterys deployment of its sensors and weapons varies based on the threat and the defended asset. When integrated with its parent battalion, sensor and weapon positioning are determined as a part of the integrated ADA task force defense design. When deployed independent of its parent battalion, a greater responsibility rests upon the battery commander to select the positions. Sensor positioning is generally the first consideration in establishing a defense. The most capable sensor (for example, THAAD or Patriot) is deployed first. Other sensors are then deployed to complement the coverage of the base sensor. Sensors are distributed in the ADA task-organized batterys area of operations to best take advantage of their sensing function. Patriot and THAAD radars are site-configured such that the radar has direct linkage to its controlling C2 node. Sentinel radars have a sensor C2 node that links them into the FAAD C2 data network, allowing greater freedom in their deployment. Identification metrics are supplied by AMD sensors and can be supplemented by data from networked sensors accessed via the battery C2 node. The node correlates track data from multiple air defense sensors into a composite air picture. Sensor data is reported via the standard joint reporting responsibility schema on link 16 to form a common air picture.
8-23. The battery commander uses the ADA employment tenets to position launchers in accordance with METT-TC. THAAD and Patriot launchers are weighted towards ballistic missile defense. A secondary consideration for Patriot launchers is early coverage along potential cruise missile avenues of ingress within the Patriot radars sectored coverage. Avenger and C-RAM weapons are positioned to achieve mutual support and/or overlapping fires (see paragraph 9-34 on page 9-5).
8-24. Sensors and launchers are assigned primary and secondary target lines. When integrated into an ADA task force defense, these lines are established as a part of the task force defense design. When operating independently, the battery commander selects them based on mission requirements and defended assets. Patriot should have secondary target lines to enable rapid reaction to attacks from other than the primary sector. Secondary target lines require careful planning. They must be sufficiently broad to cover all likely avenues of attack. However, launchers must be positioned to support them. Launchers positioned to protect in secondary sectors may not be available to support the primary sector, depending upon system limitations on missile capture by the guiding radar after launch. Avenger and Sentinel use primary and secondary target lines as a means of prioritizing operations in mass attack scenarios.
8-6
FM 3-01
22 December 2020
ADA Battery
ENGAGEMENT OPERATIONS
8-25. When operating as a part of an integrated ADA task force, the ADA task-organized battery C2 node operates under the direct supervision of the ADA task force C2 node. The ADA task-organized battery C2 node directly controls weapons and sensors (THAAD, Patriot, and in some cases Sentinel radars). It supervises the operations of the Avenger and C-RAM platoon C2 nodes which directly control their sensors (unless under battery control) and shooters.
8-26. When operating as a part of an ADA task force, the fire control element (FCE) of the task-organized battery requires accomplishment of four functions: fire control, which has overall responsibility for battery engagement operations, to include identification; surveillance, which is maintenance of the air picture; weapons control, which monitors or controls battery component operations; and information control, which assures continuous information flow between battery components and the task force C2 node. Manning to accomplish these four functions is operational load and operator skill set dependent. Medium to heavy operational loads require four Soldiers. Minimum manning is three Soldiers, with one Soldier executing the surveillance and weapons control functions.
8-27. When operating independent of the task force, the battery executes full C2 through its C2 node. Patriot batteries, with Patriot-unique C2 nodes, cannot transmit to the kill chain (receive only), unless augmented with a DPICC, thus limiting operations to procedural implementation of the ROE and increasing risk of fratricide. All other batteries, pure or task-organized, must establish digital and voice connectivity with the kill chain and fully integrate operations with joint AMD units.
 The ADA task-organized battery C2 node either directly controls sensors and shooters or supervises platoon C2 nodes, as noted in paragraph 8-13 on page 8-4.
 The ADA task-organized battery operates a full FCE which requires five functions to be manned: fire control, surveillance, identification, weapons control, and information control. Multiple functions may be accomplished by a single crew member if the operational load permits. Minimum crew size is three Soldiers, combining fire control and identification into a single position, and surveillance and weapons control into a single position. Medium to heavy operational loads require one Soldier per function. An ADA task-organized battery is not resourced to man a fully staffed FCE in which each of the functions is accomplished by a single Soldier. Thus, when heavy operational loads are expected, the ADA task-organized battery may require augmentation from its parent battalion to operate independent of the ADA task force.
8-28. Battery engagement operations may be conducted in the manual or automatic mode. The manual mode requires the operator to confirm engagement recommendations provided by the automated battle management aids or to manually select targets for engagement. Air threats, such as fixed- and rotary-wing aircraft, UASs, and cruise missiles, can only be engaged in manual mode to reduce the risk of fratricide. For ballistic missiles and anti-radiation missiles, the operator has a choice of engaging in the automatic or manual mode. The automatic mode uses automated battle management aids to evaluate the missile threat, determine engagement eligibility, prioritize the engagement, optimize the engagement timeline, and conduct and monitor execution of the engagement (subject to operator override). Due to the shortened engagement timeline and necessity to optimize the engagement for increased probability of kill, ballistic missile and anti-radiation missile engagements are typically conducted in the automatic mode.
8-29. When a THAAD battery is the base for an ADA task-organized battery, tactical control of fires is more complex. THAAD C2 lacks the software to manage non-ballistic missile components of the air battle; an attached platoon(s) lacks ballistic missile defense software. The THAAD battery assumes operational control of the attached platoon or platoons. THAAD fires are controlled through the AAMDC ADAFCO and managed internal to the THAAD battery. The attached platoon, or platoons, is placed under the tactical control of the SADC or RADC through linkages to the kill chain.
SUSTAINMENT OPERATIONS
8-30. The sustainment concept for an ADA task-organized battery embodies the principles of responsiveness, flexibility, and initiative. Force-projection operations require that the task-organized battery anticipates needs and not wait to react. This is accomplished through constant coordination and detailed planning between the battery and organizations from which it will draw support.
22 December 2020
FM 3-01
8-7
Chapter 8
8-31. An ADA task-organized battery deploys with the ability to sustain itself for 72 hours; after that, it requires external support from higher headquarters or other support systems in general. The ADA taskorganized battery employs the Armys two-level maintenance system, consisting of field maintenance and sustainment maintenance. Field maintenance is characterized by on-system maintenance repair and return to user while sustainment maintenance is off-system maintenance repair and return to supply.
8-32. The ADA task-organized battery commander should be familiar with the diagnostic mandatory parts list, as the Department of the Armys approved supply support method for ADA systems. Its purpose is to maintain the highest possible state of readiness through diagnosis and repair of faults in non-mission capable equipment and to ensure availability of combat/mission essential assets at or near the firing battery to preclude extended downtime for lack of repair parts. The basic objective is to authorize stock of essential diagnostic and repair/replacement parts that may not otherwise be authorized based on demands. If the end item is found to be non-mission capable, the diagnostic mandatory parts list item will be used to repair the piece of equipment and a replacement part for the list will be put on order. Parts carried on the list will be used as required in peacetime operations. Replenishment will be on an as-used basis. Some ADA repair parts are classified and require the appropriate level of security for transport and storage.
8-33. The ADA task-organized battery commander is responsible for all administrative and logistical functions within the ADA task-organized battery, supported by the executive officer, supply NCOs, system and conventional technicians, and, in most cases, system-specific or conventional maintenance warrant officers. The executive officer is responsible for supply, maintenance, services, and transportation of unit personnel and equipment and should organize and take advantage of all assets available. The executive officer is typically charged with bridging unit sustainment and logistics with the commanders intent. Some materiel readiness functions that the executive officer must coordinate are:
 Apprising the commander of materiel readiness.  Providing assistance to the platoon leaders on materiel readiness problems.  Providing liaison with higher headquarters and outside agencies regarding materiel readiness.  Forecasting logistical requirements and support requests during combat. The executive officer
concentrates on seven classes of supply: classes I, II, III, IV, V, VII, and IX. The executive officer and supply NCO coordinate the requisition, receipt, preparation, and delivery of classes I, III, and V.
8-34. The executive officer works with the system warrant officer, NCOs, and Soldiers to ensure unit sustainment supports the unit mission. In a typical ADA battery, the warrant officer is responsible for ensuring system sustainment requirements for the unit are met. The warrant officer accomplishes this through expertise in Army logistics and sustainment, through assigned NCOs and Soldiers, and by ensuring that officers in the unit are fully advised of the employment capability of the weapon system. The warrant officer and maintenance NCOs also coordinate with other units and higher headquarters to ensure ADA unique parts and supplies are available to maintain the best possible mission-capable posture.
8-35. The ADA task-organized battery commander is responsible for the operator/crew maintenance functions in the unit. The commander leverages the senior maintainers technical expertise on all aspects of the maintenance mission, including diagnostics and troubleshooting to isolate faults and expedite the repair and return of systems to operation.
8-36. The battery commander can ensure flexibility by tailoring methods of sustainment and should not allow the organization to be bound by traditional support methods. The commander must know the logistical requirements of the battery and the details of operation plans, and devise innovative ways to support the plans and reduce risks. The ADA task-organized battery must be flexible enough to obtain support from any base arrangement and accomplish its mission.
8-8
FM 3-01
22 December 2020
Chapter 9
ADA Platoon
This chapter discusses the capabilities, linkages, and tactics and procedures of a generic ADA platoon. While the platoon is a subordinate element in every ADA system organization (for example, Patriot battalion/battery and C-RAM battery), the focus of this chapter is an ADA platoon that has traditionally been referred to as SHORAD and currently encompasses Avenger and C-RAM capabilities. Neither THAAD nor Patriot platoons are deployable and employable at the platoon level; they fight as part of the larger battery. The generic ADA platoon, henceforth referred to as a SHORAD platoon, embraces the common capabilities of these systems. When required, the unique capabilities of Avenger or C-RAM are identified.
ROLES AND CAPABILITIES
9-1. Within the context of the overarching ADA role, a SHORAD platoon detects, engages, and defeats short-range, low-altitude air threats to defend designated forces and other critical assets. Low-altitude air threats consist of UASs, fixed- and rotary-wing aircraft, cruise missiles, and RAM.
9-2. Detection is provided by the Sentinel radar in Avenger and C-RAM units, LCMR in C-RAM units, and other Army sensors whose data is available through the FAAD C2 or C-RAM C2 nodes. Engagements of the different threats are dependent upon the platoons unique weapons. An Avenger platoon, with Stinger missiles, predominantly engages fixed- and rotary-wing aircraft and UASs (groups 2 and 3); a C-RAM platoon, with 20-millimeter guns, engages RAM targets.
9-3. SHORAD platoon sensors also provide supported or affiliated units (for example, a task force) situational awareness of the airspace and timely, localized warning of impending attacks. The sensors can classify and aid in the identification of air objects, facilitating situational awareness in proximity to a defended area and reducing the potential of fratricide incidents. In addition, the LCMR, supplemented with data extracted from other Army sensors, determines predicted points of impact for RAM munitions, enabling in-time warnings to at-risk forces and areas through the RAM warn system.
9-4. Though normally employed as an organic element of an Avenger battery, an Avenger platoon may also be employed as an independent organization, as METT-TC dictates. C-RAM normally deploys as a battery and is employed as a platoon. The platoons roles and responsibilities generally remain the same, irrespective of the operational tasks offensive, defensive, or stability.
9-5. SHORAD platoon roles and capabilities are improved in the near term with the fielding of the Maneuver-SHORAD capability and IFPC. The Maneuver-SHORAD capability, mounting a mix of selectable weapons (guns and missiles), will provide protection of Stryker and Armor BCT maneuvering forces against rotary- and fixed-wing aircraft and group 3 UASs. The IFPC system will provide enhanced firepower and extended range protection of critical, more stationary fixed assets (for example, an air base) and semi-fixed assets (transient structures or locations, such as assembly areas) against cruise missiles and UASs, with a residual capability against fixed- and rotary-wing aircraft.
SUPPORT TO JOINT AIR AND MISSILE DEFENSE
9-6. A SHORAD platoon, as either a subordinate element of an ADA task force/task-organized battery or an independent organization, provides defense of designated JFACC and JFLCC assets at strategic, operational, and tactical levels. These may include such key AMD equipment as U.S. Air Force and Marine Corps long-range surveillance radars and THAAD systems low density, operationally critical equipment
22 December 2020
FM 3-01
9-1
Chapter 9
for the AMD fight. The platoons presence facilitates long-term protection of assets against low-altitude threats.
9-7. The SHORAD platoon also provides warning of impending air attacks. Its sensors can detect lowflying threats, such as RAM and “pop-up” rotary-wing aircraft, which may be below the coverage of other AMD sensors, and report their locations. This information can then be furnished via applicable data links for situational awareness and broadcast to at-risk forces, facilities, or populations for appropriate passive defense actions.
SUPPORT TO UNIFIED LAND OPERATIONS
9-8. ADA forces, to platoon level, support Army maneuver forces and their subordinate elements in the conduct of unified land operations. The SHORAD platoons support varies in accordance with the type of operation, projected threats, amount of deployed maneuver and ADA forces, and other METT-TC variables.
9-9. The SHORAD platoon may be employed as part of an ADA task force/task-organized battery, or as an independent platoon placed in support of a maneuver unit (most likely no higher than a brigade), for defense of assets designated by the supported commander. Support relationships are dependent upon the operational environment and METT-TC. Avenger platoons are preferred in offensive operations and those defensive operations that require some movement, against UASs and rotary- and fixed-wing aircraft threats. C-RAM platoons are preferred when there is a preponderance of RAM threats, and defenses are limited to static sites, with no movement required.
9-10. The SHORAD platoon leader, when placed in direct support of a maneuver unit, coordinates with the supported unit commander and the resident ADAM cell to select the asset(s) to be defended. Defense of maneuvering forces against UASs is particularly critical during movements to contact and other offensive operations in the close area. Surveillance by unmanned aircraft system (UAS) platforms may be followed by volleys of RAM or air-to-surface munitions, potentially rendering a maneuver force incapable of fulfilling mission requirements. Avenger platoons may be positioned along routes of march, pre-positioned at potential geographical choke points, or otherwise move with the support elements of maneuver formations.
9-11. Similar to its role in joint AMD operations, a SHORAD platoon supports unified land operations by providing warning of threat actions, most notably RAM attacks and UAS surveillance, to Army elements. Detections by Sentinel radars or other sensors are broadcast to affected units or installations. Passive defense measures can be executed to mitigate RAM attacks. UAS detections, particularly of small variants (group 2), can trigger self-defense actions by non-ADA elements in Army units (combined arms for air defense).
PLATOON COMPOSITION
9-12. A platoon is the smallest echelon that can execute an independent operation for a limited period of time. It requires sustainment support from its parent organization or the supported unit or asset during operations.
9-13. The SHORAD platoon structure replicates that of a “traditional” Army platoon. It contains some 2030 Soldiers and is equipped, in general, with multiple shooters (launchers or gun platforms), one or more sensors, a C2 node, and ancillary mission support equipment.
9-14. The Avenger platoon has six Avengers and FAAD C2, which is embedded in the platoon headquarters. The platoon receives sensor support from the Sentinel radars in the battery headquarters. Each Avenger has eight ready-to-fire Stinger missiles in two turret-mounted standard vehicle missile launchers, an M3P .50caliber machine gun, a sensor package with forward-looking infrared sensor, a laser range finder, and an identification, friend or foe capability. Avenger crews have the additional ability to remove Stinger missiles from the Avenger and attach a gripstock to form a man-portable air defense system. (See ATP 3-01.64 for additional discussion of Avenger capabilities.) The C-RAM platoon has four Land-Based Phalanx Weapon Systems (LPWSs), each with a 20-millimeter, multi-barrel gun and an on-board fire control radar; C-RAM C2 in the platoon headquarters; two LCMRs; RAM Warn; and one Sentinel radar. The LPWS automatically executes search, detection, threat evaluation, tracking, engagement, and kill assessment functions. (See ATP 3-01.60 for additional discussion of C-RAM operations.)
9-2
FM 3-01
22 December 2020