3 01 Afdp Counterair
3 01 Afdp Counterair
3 01 Afdp Counterair
COUNTERAIR OPERATIONS
15 JUNE 2023
Air Force Doctrine Publication 3-01, Counterair Operations
Table of Contents
“The Air Force organizes, trains, and equips forces to be an air component to a
joint force commander (JFC). As part of the joint force’s air component, our
forces must be prepared to accomplish JFC objectives. The air component
commander’s administrative authorities are derived from Title 10, U.S. Code,
and exercised as the commander, Air Force forces (COMAFFOR). The air
component commander’s operational authorities are delegated from the JFC
and exercised as both the COMAFFOR, over Air Force forces, and as the
functional joint force air component commander (JFACC), over joint air forces
made available for tasking. Thus, the air component commander leads Air Force
forces as the COMAFFOR and the JFC’s joint air operations as the JFACC. This
duality of authorities is expressed in the axiom: Airmen work for Airmen and the
senior Airman works for the JFC.”
--Air Force Doctrine Publication (AFDP) 1, The Air Force
Since the COMAFFOR and JFACC are nearly always the same individual,
this AFDP will use the term “air component commander” when referring
to duties or functions that could be carried out by either or both, unless
explicit use of the term “COMAFFOR” or “JFACC” is necessary for clarity.
Air Force Doctrine Publication 3-01, Counterair Operations
FOREWORD
Doctrine embodies the fundamental principles by which military forces guide their actions
in support of national objectives. It is a body of carefully developed, authoritative ideas
that have been officially approved and establishes a common frame of reference for
solving military problems. However, to be an effective guide, the challenge for doctrine is
to be simultaneously focused on the past, applicable in the present, and facing toward
the future; all in equal measure.
The United States Air Force must prepare for a new reality, one in which decision
advantage, freedom of maneuver, and freedom of action are increasingly challenged. To
deter, compete, and win across the competition continuum, Airmen must advance
solutions that allow us to conduct operations in highly contested environments. Broadly,
the joint force’s approach to meeting this challenge is encapsulated in joint all-domain
operations (JADO). Together with joint all-domain command and control, JADO provides
a JFC the means to integrate, synchronize, and deconflict the convergence of effects
across all domains to achieve operational advantage.
AFDP-1, The Air Force, supports this effort by establishing mission command as the
Airman’s philosophy for the command and control of airpower. Despite our advances,
adversaries will likely retain an ability to deny or degrade our communications. Therefore,
decision makers at all echelons should have the ability to develop understanding, make
decisions, and converge effects when disconnected from higher echelons. Mission
command embraces centralized command, distributed control, and decentralized
execution as the foundation for the responsiveness, flexibility, and initiative necessary to
ensure capabilities continue to function, even when information is degraded or denied.
AFDP 3-01, Counterair Operations, though firmly rooted in the past, also looks to the
future, adapting where needed to ensure continued utility and efficacy for the challenges
to come. Properly planned and executed, counterair operations are a crucial element of
the fires and protection joint functions that enable achievement of joint force commander
objectives in cooperation, competition, and conflict. Airmen should be trained to plan and
execute operations in a distributed and decentralized manner and execute missions when
isolated from higher-level decision makers. Airmen at all levels should be comfortable
making decisions and operating based on the commander’s intent and the tenet of
mission command.
Though not completely adapted to the challenges identified here, this doctrine represents
what we believe based on the best evidence to date. As we continue to advance our
capabilities, it is critical we continue to evolve our doctrine. Throughout history, innovative
Airmen have developed methods of employment to meet operational challenges. We will
continue to do so.
Air Force Doctrine Publication 3-01, Counterair Operations
1Joint doctrine provides broad guidance for countering air and missile threats (see JP 3-01, Countering
Air and Missile Threats), but does not describe the entire continuum of control of the air, as this
publication does.
1
Air Force Doctrine Publication 3-01, Counterair Operations
Air parity is a condition in which no force has control of the air. It is a situation in
which both friendly and adversary land, maritime, and air operations may encounter
significant interference by the opposing force. Parity is not a standoff, nor does it mean
aerial maneuver or ballistic missile operations have halted. On the contrary, parity may
be typified by fleeting, intensely contested battles at critical points during an operation
with maximum effort exerted between combatants in their attempt to achieve some level
of favorable control.
Air superiority is that degree of control of the air by one force that permits the conduct
of its operations at a given time and place without prohibitive interference from air
and missile threats. Air superiority may be localized in space (horizontally and vertically)
and in time, or it may be broad and enduring.
Air supremacy is that degree of control of the air wherein the opposing force is inca-
pable of effective interference within the operational area using air and missile threats.2
Air supremacy may be localized in space (horizontally and vertically) and in time, or it
may be broad and enduring. This is the highest level of control of the air that air forces
can pursue. Air supremacy may be difficult to achieve in a peer or near-peer conflict.
Control of the air hinges on preventing prohibitive or effective interference to friendly
forces from enemy forces in the air domain. Air supremacy prevents effective interfer-
ence. It does not imply that no interference exists. Rather, any attempted interference can
be easily countered or should be so negligible as to have little or no effect. While air
supremacy is most desirable, it may not be operationally feasible. Air superiority, even
local or mission specific, may provide sufficient freedom of action to create desired ef-
fects. Commanders should determine the minimum level of control of the air required to
accomplish their mission and assign an appropriate level of effort to achieve it.
2 JP 3-01.
2
Air Force Doctrine Publication 3-01, Counterair Operations
3
Air Force Doctrine Publication 3-01, Counterair Operations
The counterair framework, illustrated in the figure “Counterair Framework,” shows typical
friendly actions taken to create effects in support of counterair operations. It lists and
categorizes numerous distinct tasks or missions conducted within the larger framework.
The finer distinctions do not substantially change the way operations are conducted but
may help Airmen understand the elements of offensive counterair (OCA) and defensive
counterair (DCA). Note that in many cases the distinctions between the categories may
blur. For example, an attack on an enemy SAM site may be considered an attack opera-
tion or suppression of enemy air defenses (SEAD).
(Source: JP 3-01)
OFFENSIVE COUNTERAIR
OCA operations seek to dominate enemy airspace and prevent the launch of threats,
resulting in greater freedom from attack and increased freedom of action. It includes four
operations used to achieve specific counterair effects: attack operations, SEAD, fighter
escort, and fighter sweep. Tasked units normally have decentralized execution authority
and are given significant latitude to plan and coordinate tasks. OCA efforts should be
properly planned for, directed, and integrated with other offensive operations.
Attack operations. Attack operations are intended to destroy, disrupt, or degrade
counterair targets on the ground and may be accomplished through kinetic or
non-kinetic actions. These missions are directed against enemy air and missile
threats, their C2, and their support infrastructure (e.g., airfields, launch sites,
launchers, fuel, supplies, and runways). The main goal is to prevent enemy employ-
ment of air and missile capabilities.
4
Air Force Doctrine Publication 3-01, Counterair Operations
DEFENSIVE COUNTERAIR
DCA operations defend friendly lines of communication, deny the enemy the freedom to
carry out offensive attacks from the air, and provide a secure area from which all elements
of the joint force can operate. DCA operations can be conducted in conjunction with, or
independent of, OCA operations. Effective OCA greatly reduces the DCA requirement,
freeing assets for more offensive operations. However, some degree of DCA is normally
necessary in every operation. In some cases, DCA may be the only means to counter air
and missile threats due to political constraints. Generally, DCA is classified into two
categories: active and passive air and missile defense (AMD).
AMD—both active and passive—is direct defensive action taken to destroy, nullify, or
reduce the effectiveness of hostile air and ballistic missile threats against friendly forces
3For additional information on SEAD, see AFTTP 3-2.28, Multi-Service Tactics, Techniques, and
Procedures (MTTP) for Joint Suppression of Enemy Air Defenses.
5
Air Force Doctrine Publication 3-01, Counterair Operations
and assets. It includes actions to counter enemy manned and unmanned aircraft (UA),
aerodynamic missiles (cruise, air-to-surface, and air-to-air), and ballistic missiles. Several
DCA tasks help provide a permissive environment for friendly air action.4
Active air and missile defense. Active AMD consists of air defense (AD) and ballistic
missile defense (BMD). The aggregation of these elements—a mix of weapon and
sensor systems across the joint force—form an IADS, supported by secure and highly
responsive C2 systems, to find, fix, track, target, and destroy or reduce the
effectiveness of hostile airborne threats. The IADS is unique to each operational area
and contributes to defense in depth, with the potential for multiple engagements that
increase the probability for success.
Air defense. AD includes defensive measures designed to destroy attacking
aircraft and aerodynamic missiles, or to nullify or reduce the effectiveness of such
attack. It includes the use of aircraft, SAMs, antiaircraft artillery, electromagnetic
warfare (EW) (including directed energy), multiple sensors, and other available
weapons or capabilities.
Ballistic missile defense. BMD includes defensive measures designed to
destroy attacking enemy ballistic missiles, or to nullify or reduce the effectiveness
of such attacks.
These actions are closely integrated to form essential DCA capabilities, but may involve
different defensive weapon systems or tactics, techniques, and procedures.
Passive air and missile defense. Passive AMD includes all measures, other than
active AMD, taken to minimize the effectiveness of hostile air and missile threats
against friendly forces and assets. Passive AMD is often an additional means of
defense should active AMD efforts fail. Passive AMD measures are considered the
same for air and missile threats, with one exception: detection and warning of ballistic
missile attack is normally provided by supporting assets from outside the theater in
concert with deployed C2 systems and sensors. These are briefly summarized in the
section on execution considerations for passive defense:
Detection and warning.
Chemical, biological, radiological, and nuclear (CBRN) defenses.
Camouflage, concealment, and deception (including countermeasures
designed to reduce electronic and infrared signatures, and stealth technology).
Hardening.
Reconstitution.
Dispersion.
4 For additional information on AMD, see AFTTP 3-2.31, MTTP for Air and Missile Defense.
6
Air Force Doctrine Publication 3-01, Counterair Operations
Redundancy.
Mobility.
(Source: JP 3-01)
At the theater level, IAMD combines OCA attack operations and DCA operations to
achieve the JFC’s desired effects. Within the IAMD approach, OCA attack operations are
commanded by the JFACC and DCA is commanded by the area air defense commander
(AADC). The JFACC is responsible for integration between the OCA and DCA compo-
nents of IAMD. It is important to note that the OCA attack operations component of IAMD
are not planned and executed in isolation but are part of a wider offensive effort against
a variety of enemy targets. Additionally, OCA attack operations include missions that con-
tribute to air superiority (e.g., attacks on enemy fighter airfields) which are not part of the
IAMD approach. At the tactical level, IAMD incorporates counter rocket, artillery, and
mortar activities. These tactical level activities are the responsibility of the ground
commander; not the JFACC or AADC. Beyond the theater level, IAMD supports global
missile defense, homeland defense, and global strike.
7
Air Force Doctrine Publication 3-01, Counterair Operations
Airmen should expect most counterair operations to be joint or combined efforts. As the
supported commander for counterair operations, other component assets capable of
performing counterair missions are normally made available to the JFACC for tasking.
Therefore, it is essential Airmen understand other joint force components and participat-
ing allies’ counterair capabilities and how to integrate them in joint and combined coun-
terair operations.
8
Air Force Doctrine Publication 3-01, Counterair Operations
6 For additional information on ROE, see JP 3-84, Legal Support and CJCS Instruction (CJCSI)
3121.01B, Standing Rules of Engagement / Standing Rules for the Use of Force for US Forces
7 For additional information, see AFDP 3-30, Command and Control.
9
Air Force Doctrine Publication 3-01, Counterair Operations
Effective integration of surface-to-air weapons into the DCA plan requires a reliable link
with air operations and a reliable identification (ID) process. All available surface-to-air
assets in the AOR should be incorporated into the DCA plan and are subject to the
integrated procedures, ROE, and weapons control measures directed by the AADC. The
AADC should be granted the necessary authority to deconflict and control engagements
and to exercise real-time battle management when required.
Area air defense and airspace control plans. Together with service or functional
component commanders, the AADC develops, integrates, and distributes the area air
defense plan (AADP). Planners should strive to create a reliable and consistent common
operational picture (i.e., a fused and correlated air, ground, maritime, space, and cyber-
space picture) available to all supporting C2 facilities. The AADP should arrange a lay-
ered, overlapping defense to allow for multiple engagement opportunities, contain
detailed weapons control and engagement procedures, and specify coordination
measures required for AMD.8
Combat identification. One of the AADC’s most critical responsibilities is to provide guid-
ance and articulate combat identification (CID) procedures for counterair. CID is the
process of achieving an accurate characterization of detected objects in the operational
environment sufficient to support an engagement decision.9 The objective of CID is to
obtain the highest confidence positive identification (PID) possible. Lacking PID, the
objective is to reach the level of confidence in an ID that can be supported by the ROE
for an engagement authority to decide. ID can be accomplished through several recog-
nized methods. The JFC approves the procedures used for ID and designates who may
be delegated that authority in the AADP, special instructions (SPINS), and airspace
control plan (ACP).
Accurate and timely ID enhances real-time tactical decisions by allowing timely, beyond-
visual-range engagement of enemy aircraft and missiles while conserving resources and
reducing the risk to friendly forces. CID information may be obtained from various land-,
air-, and space-based systems, along with coordination measures documented in the
ACP or the airspace control order (ACO). To be effective, this CID “system of systems”
requires effective guidance from the AADC and a common data link architecture with the
goal of near-real-time information sharing among platforms. To avoid a single point of
failure, no single node acts as an exclusive conduit of all CID information. Electronic
methods, which provide the most rapid and reliable means of ID, are normally used when
available. Visual and procedural means of ID are not as practical but may be required in
some situations. Some individual weapons systems retain an autonomous CID capabil-
ity.10
AIRSPACE CONTROL AUTHORITY
The air component commander is normally designated as the ACA. The ACA is respon-
sible for airspace control, coordinating airspace use, developing airspace control policies
10
Air Force Doctrine Publication 3-01, Counterair Operations
and procedures, and directing required coordination among theater airspace users. The
ACA establishes an airspace control system for the JFC, integrates that system with host
nations, and coordinates user requirements. A key responsibility of the ACA is to provide
the flexibility needed within the airspace control system to rapidly employ forces.
The ACA incorporates these procedures into an ACP and, after JFC approval, promul-
gates it throughout the theater. The ACP should be integrated closely with the AADP and
is implemented through the ACO. The ACO is published either as part of the air tasking
order (ATO) or as a separate document to implement specific control procedures for
established time periods. The ACO may include airspace coordinating measures, fire
support coordinating measures, and AD measures such as minimum risk routes, combat
air patrols, fire support coordination lines, fighter engagement zones, and missile engage-
ment zones.11
REGIONAL AND SECTOR AIR DEFENSE COMMANDERS
During complex operations conducted in a large theater, the AADC may recommend, and
the JFC may approve, the division of the operational area into separate AD regions. The
AADC and regional air defense commander (RADC), as approved by the JFC, may
choose to further divide regions into sectors, each with a sector air defense commander
(SADC) with authorities appropriate for their responsibilities. Generally, regions and sec-
tors are based on geographic size and terrestrial features. When RADCs/SADCs are em-
ployed in support of BMD operations, regional and sector boundaries are normally
assigned according to predicted ballistic missile impact points.12
IDENTIFICATION, COMMIT, AND ENGAGEMENT AUTHORITIES
In counterair operations it is imperative that the command lines, engagement authorities,
engagement procedures, ROE, and terminology be standardized, documented, clearly
understood, and rehearsed (if possible) before an engagement decision is necessary.13
Identification authority. ID authority is the authority to assign an identity classifi-
cation to an unknown contact, if possible. The AADC establishes the policy for ID
authority, with JFC approval. Execution of the ID policy is normally delegated to the
tactical level, but care must be taken that the tactical commander is capable of
performing the ID function in real time.
Commit authority. The area defense echelon with commit authority is permitted to
authorize assets to prepare to engage an entity (e.g., position a DCA fighter to inter-
cept or direct an air defense artillery [ADA] unit to track and target). Commit authority
does not imply engagement authority.
Engagement authority. This authority may be delegated to a subordinate
commander. The AMD entity with engagement authority is permitted to authorize
engagement of an air or missile threat. For AMD engagements within the theater, the
11 For more information see AFDP 3-52, Airspace Control, and AFTTP 3-2.78, MTTP for Airspace Control.
12 For more information on RADC and SADC, see JP 3-01.
13 For more information on these authorities, see JP 3-01.
11
Air Force Doctrine Publication 3-01, Counterair Operations
authority is normally delegated to the AADC who may further delegate the
engagement authority to tactical levels (e.g., RADC or SADC).
14 For additional information on each TACS element, see AFDP 3-52; AFTTP 3-3.TACS and AFTTP
3-2.17, MTTP for the Theater Air-Ground System.
15 Other service control systems include the Army air-ground system, the Navy tactical air control system,
the Marine air command and control system, or the special operations air-ground system.
12
Air Force Doctrine Publication 3-01, Counterair Operations
airborne orders, performs data link management functions, and manages AMD activities
within its sector. Additionally, the CRC provides C2 liaison, mission control, CSAR
support, aircraft threat warning, and coordinates ADA through a collocated ADA fire
control officer. The CRC may further delegate control of surveillance areas to subordinate
radar units or airborne warning and control system (AWACS) aircraft within its sector.
When assigned RADC or SADC roles, the CRC establishes operating procedures for
initial assignment of airborne targets to ADA and fighters, ensuring defensive assets are
employed in mutually supporting roles. The AADC may delegate engagement authority
to the CRC as part of RADC or SADC responsibilities. In a CID-constrained environment,
the CRC may be the lowest tactical level with engagement authority for enemy air and
missile threats.
Air support operations center. As part of the TACS ground element, the ASOC is the
functional air component responsible for planning, coordinating, controlling, and execut-
ing air operations that directly support ground combat forces. The ASOC can affect the
counterair battle through coordination for SEAD missions, management of some airspace
control measures, CAS, and others. The ASOC is usually collocated with the senior Army
tactical echelon and coordinates operations with the permanently assigned tactical air
control party, Army fires cell, and the AOC.
13
Air Force Doctrine Publication 3-01, Counterair Operations
Battle control center. The battle control center (BCC) is a ground-based fixed element
of the TACS, comprised of four major systems: a C2 processing and display system—
Battle Control System-Fixed; primary and secondary radar capabilities; flight-plan
processing and identification systems; and communication and data link connectivity. The
BCC fuses all-source sensor and intelligence data into a common tactical picture and
disseminates tactical warning and attack assessment information to the appropriate users
and decision-makers. It can perform all tasks that facilitate the full spectrum of airpower
including ATO execution, airspace management and integration, surveillance and CID,
and data link management. The BCC can find, fix, track, and target airborne threats and
exchange air picture data with other C2 systems and combat aircraft (to include
aerospace control alert fighters on the ground in scramble status) through tactical data
link (TDL) systems.
The USAF employs four BCCs as the primary tactical C2 nodes for homeland defense
and defense support of civil authorities (DSCA) in support of the Commander, North
American Aerospace Defense Command (NORAD) and US Northern Command
(USNORTHCOM) and US Indo-Pacific Command (USINDOPACOM) Combatant
Commanders (CCDRs). BCCs operate continuously to provide wide-area surveillance,
early warning, battle management, target detection and tracking, and non-lethal warning
and weapons control functions. In the event of lost connectivity, BCCs can operate au-
tonomously and provide immediate mutual support and redundancy if another BCC
becomes inoperative.
THEATER AIR CONTROL SYSTEM AIRBORNE ELEMENTS
Airborne Warning and Air Control System. The AWACS provides the TACS with a
flexible and capable airborne radar platform. It provides battle management, C2, and is
normally among the first systems to arrive in theater during contingency operations.
Through voice and data connectivity, AWACS issues threat warnings, directs aircraft on
counterair missions, manages air refueling, provides a common tactical picture, and
coordinates CSAR efforts. AWACS can detect and identify hostile airborne and SAM
threats and assign weapon systems to engage enemy targets.
AWACS may carry an airborne battle staff or airborne command element authorized to
redirect forces under the authority of the JFACC and AADC. When employed with an
airborne command element, AWACS can scramble and divert aircraft conducting coun-
terair operations and recommend changes in AD warning conditions. The AWACS can
perform many, but not all, CRC functions.
Joint Surveillance Target Attack Radar System. The Joint Surveillance Target Attack
Radar System (JSTARS) is a long-range, airborne sensor system that provides real-time
radar surveillance information on moving and stationary surface targets via secure data
links to air and surface commanders. JSTARS information builds situational awareness
for the JFC and JFACC to direct air operations, update target information, and provide
real-time dynamic targeting. JSTARS can play an important role in the effort to gain
control of the air. When combined with other intelligence, surveillance, and recon-
naissance (ISR) sensors, JSTARS contributes to the commander’s overall situational
awareness by identifying and locating targets such as SAMs, launchers, radars, and
14
Air Force Doctrine Publication 3-01, Counterair Operations
antiaircraft artillery sites. JSTARS provides updates on enemy force disposition and
performs limited battle management functions, which may be important in managing the
OCA effort.
CONTROL ELEMENT AUTHORITIES, ROLES, AND ORGANIZATIONAL
ALIGNMENT
Common Control Authorities. According to the nature of the operation and specific
asset or organizational capabilities, the air component commander may delegate all
or portions of ID, commit, engagement, and airspace control authorities to the CRC,
AWACS, JSTARS, and BCC to dynamically execute commander’s guidance and
intent. These entities are not certified to perform ATC services.
The BCC may be delegated data link control authority.
Common Roles and Alignment. The CRC, AWACS, and JSTARS can accept dele-
gated responsibility to execute missions and tasks for offensive and defensive air
operations.
The CRC and AWACS may be RADC or SADC responsibilities and are a key C2
element for DCA operations.
The CRC, AWACS, JSTARS, and BCC are under the operational control of the air
component commander and vertically integrated with the AOC. They may be
employed alone or horizontally integrated with other C2 and surveillance and recon-
naissance elements of the TAGS.
15
Air Force Doctrine Publication 3-01, Counterair Operations
16 For additional information on JIPOE, see Joint Guide, Joint Intelligence Preparation of the Operational
Environment.
17 For additional information on EBAO, Targeting, and parallel attacks, see AFDP 3-0, Operations and
16
Air Force Doctrine Publication 3-01, Counterair Operations
against the larger enemy system will likely yield greater effects and may cause cascading
failures within the IADS. However, significant threats to the OCA effort (aircraft, missiles,
antiaircraft artillery, electromagnetic attack) may force the employment of sequential
attacks (vice parallel) and necessitate substantial emphasis on neutralizing or disrupting
them prior to striking other targets.
17
Air Force Doctrine Publication 3-01, Counterair Operations
to another but should provide effective target priorities and aid efficient use of assets.
Consideration should be given to those most likely to generate second and third-order or
cascading effects.
Against fixed, highly defended targets deep within enemy territory, employment of all-
domain solutions (e.g., space, cyberspace, EW, information warfare, etc.) may achieve
desired effects while minimizing risk to friendly forces. For instance, jamming
communications and radars may achieve short term, localized suppression. Likewise,
both kinetic and non-kinetic attacks against C2 nodes, communication channels, and net-
works used to integrate the enemy’s AD system may force sites to operate independently,
thereby reducing their effectiveness and threat to friendly forces.
TARGET PRIORITIZATION
In early operational phases, the number of OCA targets may likely exceed the capacity
to engage them. Proper target prioritization is key to ensuring economy of force. The
following considerations are important for determining OCA targeting priorities and meth-
ods:
Threat. The threat posed by specific enemy capabilities (aircraft, missiles, etc.)
includes an assessment of the urgency or the need to counter that threat. Systems
capable of weapons of mass destruction delivery would normally merit prioritization
over other immediate threats, such as a SAM site.
Direct effects—the immediate, direct results of actions characterized by simple and
clear cause and effect. Direct effects are typically physical and readily recognizable
(e.g., weapon employment results). Planners should avoid a target servicing mindset.
Targets should be chosen according to the potential for intended, direct effects against
them to achieve desired objectives; whether directly or through intended, second and
third-order effects.
Indirect effects—second, third, or higher-order effects created through intermediate
effects or causal linkages. These may be physical, psychological, functional, or
systemic in nature. They may be created in a cumulative, cascading, sequential, or
parallel manner. They are often delayed and are typically more difficult to recognize
and assess.
Forces available. The forces available are assessed against the number, types, and
priority of targets that can be attacked. Sufficient and capable forces should be pro-
vided to ensure the desired results are obtained.
Time available and time required. Time constraints are integral to prioritization and
planning. The time allowed to achieve the direct and indirect effects, as well as the
duration required of those effects, will influence the number and type of forces
required.
Risk. In determining the ALR, commanders consider the anticipated risk to friendly
forces against expected gains from a given COA weighed against the cost of inaction
18
Air Force Doctrine Publication 3-01, Counterair Operations
18For additional information on MOE and MOP, see JP 2-0, Joint Intelligence and AFDP 3-0.
19For more information on integrated planning considerations, see AFTTP 3-3.IPE, Combat Aircraft
Fundamentals—IPE.
19
Air Force Doctrine Publication 3-01, Counterair Operations
should understand the ROE that apply to the accomplishment of their missions and
include both the ROE and SPINS in mission planning.
Weaponeering. Effective target and weapon pairing is critical to achieve desired
effects.
Deconfliction. Airspace, mission routing, effects, timing, and numerous other aspects
of OCA execution require deconfliction. The theater SPINS, ATO, ACO, and other
operational guidance provide the primary means for doing so. However, deconfliction
equally applies to individual missions and force packages. Thorough planning is key.
However, procedures and C2 structures and mechanisms should be established to
enable real-time deconfliction of all planned missions, including space, cyberspace,
and information warfare.
Environmental conditions. Environmental conditions and weather can limit sensor
or seeker sensitivity, limiting available munitions. Likewise, varying terrain can be a
challenge to pilots or offer refuge to an adversary. Terrain will often limit munitions
selection. Adverse environmental factors may increase the weight of effort required to
achieve OCA objectives. Planners should address the need for sufficient counterair
assets to offset the loss of capability and desired effects due to environmental factors.
Distance, timing, and refueling. Counterair assets typically require refueling support
for sustained presence. Refueling coordination requires constant management by
planners.20
20 For additional information on refueling considerations, see AFDP 3-36, Air Mobility Operations.
21 For additional information on critical and defended asset lists, see JP 3-01 and AFTTP 3-2.31.
20
Air Force Doctrine Publication 3-01, Counterair Operations
mind the complexities of airspace control in a DCA environment. DCA engagements may
occur inside friendly airspace, requiring deconfliction between friendly assets, such as
fighters and SAMs. Airspace control in an active AMD environment is extremely difficult
and further complicated by the proliferation of unmanned aerial systems (UAS). A rapid,
reliable, and secure means of ID is critical. Continuous surveillance and reporting of real
time and near real time target track data is required.
Thorough and detailed DCA planning is critical to ensure the establishment of procedures,
C2 structures, and communication methods for air surveillance and track ID. To maximize
engagement opportunities and optimize DCA employment, discrimination of friend from
foe should be rapid and early. All-source sensor data (ground-, air-, sea-, and space-
based sensors) should be fused into an accurate, accessible common tactical picture.
Track data should provide sufficient detail to accurately evaluate the track and designate
the appropriate AMD asset to engage it. This information should be disseminated as
rapidly as possible via datalink, voice, and text as applicable.
To prevent friendly fire, great caution should be exercised when employing auton-
omous CID in DCA operations. If no IADS is established, procedural means should be
established to permit the safe passage of friendly aircraft while still allowing for the use of
available AMD weapons. Since many AMD assets are owned by different services and
coalition partners, standardized integration, coordination, and airspace control proce-
dures are required to enable or enhance the capabilities of the various systems.
An emerging threat to airbase operations arises from the proliferation of low, slow, and
small UAS. These UAS pose a unique challenge to conventional DCA capabilities. As
capabilities are developed to counter this threat, integration with existing DCA C2 systems
must be a priority. Countering this threat is a shared responsibility between DCA opera-
tions and airbase defense.22
PASSIVE AIR AND MISSILE DEFENSE
Passive AMD is similar for air and ballistic missile threats, except for their respective
detection and warning times. Passive AMD measures are designed to provide protection
for friendly forces and assets by complicating the enemy’s identification, surveillance, and
targeting processes and by countering the enemy’s planned effects. The first step of
passive AMD is to hide valuable assets from the enemy or to encourage the enemy to
attack decoys. Like active AMD, thorough passive AMD should include layered defense
in depth. Passive measures can work concurrently to achieve this goal. Measures to
reduce enemy targeting effectiveness include mobility; deception; EW; camouflage,
concealment, and deception; hardening; reconstitution; dispersal; and electronic and
infrared countermeasures.
Per JP 3-01, there are four principal considerations for planning passive AMD:
Detection and Warning Systems and Procedures. Timely detection and warning of
air and missile threats provide reaction time for friendly forces to seek shelter or take
appropriate action. Reliable and redundant connectivity for communications and sen-
21
Air Force Doctrine Publication 3-01, Counterair Operations
sor systems is vital for accurate and timely warning. To be effective, warning methods
and procedures should be established, disseminated, and rehearsed down to the unit
level.
Reduction of Enemy Targeting Effectiveness. Certain measures can be taken to
reduce the effectiveness of enemy targeting and attacks, to include mobility, decep-
tion, EW, and operations security.
Reducing Vulnerability. Four measures that may enable friendly assets to survive
enemy attacks by reducing their vulnerability are hardening, redundancy, dispersal,
and CBRN defense.
Recovery and Reconstitution. Following an air or missile attack, prior planning
should aid the restoration of units to a desired level of combat effectiveness commen-
surate with mission requirements and available resources.
22
Air Force Doctrine Publication 3-01, Counterair Operations
COUNTERAIR ASSESSMENT
Planning and assessment are two sides of the same coin. Effective assessment depends
on thorough planning. Once in execution, planning hinges on the ability to accurately
assess the progress of operations. Assessment evaluates requirements for future action
by addressing two questions: “Are we doing things right?” and “Are we doing the right
things?”
OCA and DCA performance may be measured separately or combined depending on the
course of action selected. In many cases, desired effects for control of the air are
applicable to both DCA and OCA. For example, OCA efforts to shut down enemy sortie
production can have a positive impact on the DCA effort since fewer enemy aircraft will
be available to challenge friendly air defenses. Conversely, successful enemy air attacks
on friendly airfields (due to unsuccessful DCA efforts) will have a negative impact on
friendly sortie generation—affecting both DCA and OCA.
ALIGNMENT OF TASKS, EFFECTS, AND OBJECTIVES
Tasks are designed to create effects, and desired effects lead to the achievement of
objectives. Selected indicators should align with that flow—from cause, to effect, towards
the purpose. Effective assessment should generate as many questions as answers. By
measuring friendly actions (tasks) and changes in the enemy system (effects) separately,
critical review of actions and effects becomes possible, providing the clearest picture of
progress towards achieving the objective. Planners should consider, “Why are my actions
not producing results?”, “Why is the enemy behaving in this manner?”, and “What
24 For additional information on ISR systems and requirements, see AFDP 2-0, Intelligence.
23
Air Force Doctrine Publication 3-01, Counterair Operations
changes should be made to the plan – and why?” When the levels of performance in task,
effect, and objective do not align, it may have a profound effect on future actions in the
OCA or DCA effort.
For example, OCA missions may be tasked to destroy enemy runways, aiming to degrade
the enemy’s sortie generation capabilities. Though they may successfully achieve the
intended, direct effects, if the enemy remains capable of generating sorties, then the OCA
plan should be re-evaluated—How is the enemy continuing to generate sorties? Are they
rapidly repairing the runways? Have they relocated to other airfields or highway strips?
Perhaps airfield runways are not critical vulnerabilities after all. Targeting other
capabilities, such as fuel or munitions storage, may yield better results.
INDICATORS, MEASURES OF PERFORMANCE, AND MEASURES OF
EFFECTIVENESS
Assessing the degree of friendly control of the air is challenging. Similarly, the inherent
characteristics of airpower—speed, range, and flexibility—apply to enemy air and missile
threats as well, making assessment of adversary actions and intent more difficult.
However, assessment should be guided by counterair objectives—ensuring freedom to
maneuver, freedom to attack, and freedom from attack. Counterair tasks and desired
effects should be logically tied to these three items. For effective assessment, indicators
should be developed at the same time as the objectives, effects, and tasks they
measure—not after the fact. Indicators should be either directly observable or be reliably
inferred from other data.
Quantitative and qualitative indicators should be identified during planning according to
the nature of tasks and desired effects. Planners should choose criteria that describe or
establish when actions have been accomplished, desired effects have been created, and
objectives have been achieved. Indicators are generally classified as either MOP or MOE.
Measures of performance. MOPs are objective or quantitative measures used to
assess task accomplishment. At the tactical level, MOPs are generally related to
weapons effects on individual targets. Operational level tasks and MOPs are typically
broader and system-based (e.g., the number of SAM sites neutralized versus number
of SAM sites operational).
Measures of effectiveness. MOEs are quantitative or qualitative measures used to
evaluate progress of operations toward achieving objectives. MOEs help answer the
question, “Are we generating the effects necessary to meet objectives?"
At the tactical level, MOPs feed combat assessment: Was the mission flown? Were
weapons released as intended? Did they create the desired effect? Within the AOC, the
ISR division’s analysis, correlation, and fusion cell uses tactical data to determine the
status of enemy air systems (operational status of airfields, enemy sorties flown, and SAM
sites destroyed) and feeds the data to the strategy division’s operational assessment
team. Operational level tasks (e.g., neutralize enemy SAM systems) are also measured
by MOPs and provide a big-picture report to the JFACC on task performance.
24
Air Force Doctrine Publication 3-01, Counterair Operations
OFFENSIVE COUNTERAIR
OFFENSIVE COUNTERAIR CAPABILITIES
The following are some of the resources and capabilities used to conduct OCA:
Aircraft. Fighter, bomber, and attack aircraft provide the bulk of the weapon systems
for OCA operations. Other types of aircraft and weapon systems are often critical en-
ablers of counterair operations. Remotely piloted aircraft (RPA) may be used in coun-
terair operations to provide ISR; communication relay; deception; jamming; harass-
ment; or destruction of enemy forces and air defense systems when the situation
permits.
Missiles. These weapons include surface-to-surface, air-to-surface, and air-to-air
missiles, as well as air-, land-, and sea-launched cruise missiles. These weapon sys-
tems may eliminate or reduce the risk of harm to friendly forces by destroying enemy
systems in the air and on the ground.
Missile warning sensors. A combination of air-, space-, and ground-based sensors
may be used to provide missile launch detection and missile tracking functions. These
systems provide tactical missile warning and attack assessment information to oper-
ational command centers.
Space operations. Space provides several capabilities to support counterair opera-
tions. Planners should work closely with their space contacts at the AOC and US
Space Command (USSPACECOM) to ensure effects are incorporated into the overall
planning scheme. Considerations include enhanced position, navigation, and timing
(PNT); Global Positioning System (GPS) product charts; electro-magnetic
interference (EMI) detection and mitigation; space EW; missile warning; space
weather; commercial satellite support, etc.
Special operations forces. Special operations forces (SOF) can conduct direct
action missions, special reconnaissance, and terminal guidance for attacks against
valuable enemy targets. Planners in the AOC coordinate with the special operations
liaison element (SOLE) to coordinate the use of special operations assets in support
of counterair missions. Planners should coordinate with the SOLE to ensure OCA
operations are deconflicted with SOF operations and activities.
25
Air Force Doctrine Publication 3-01, Counterair Operations
Surface fire support. Artillery and naval surface fire support may be employed in
OCA operations. AOC planners should coordinate the use of these fires with the Army
and Navy liaison elements early in the planning process.
Command and control systems. C2 systems enhance OCA operations by providing
early warning, intelligence, ID, and targeting data, as well as C2 of friendly forces.
Electronic warfare assets. EW assets are frequently used to suppress enemy C2,
IADS, and other significant military use of the electromagnetic spectrum.25
Cyberspace operations. Cyberspace operations can enhance counterair operations
and may reduce the demand for sorties. Offensive cyberspace operations (OCO) may
be employed to target enemy C2 nodes, communications and network infrastructure,
theater missiles and support infrastructure, IADS, and airfields or operating bases. To
employ cyberspace operations, planners should address required authorities, ROE,
availability of access, and time available to generate a desired effect.26
ISR systems. ISR systems and resources provide intelligence, surveillance, recon-
naissance, deception, and other effects against enemy forces and air defense sys-
tems. These activities include the use of air, space, cyberspace, and ground assets.
Land forces. The ability to destroy, damage, secure, and occupy key OCA targets
(such as SAM sites) can achieve vital counterair effects. Though the bulk of OCA
operations are likely to occur before major ground operations, land forces should still
be considered when their use is an option.
OFFENSIVE COUNTERAIR TARGETS
OCA targets are those that directly or indirectly challenge control of the air. OCA
concentrates on degrading these capabilities as close to their source as possible. The
following are representative OCA targets, and do not reflect the full array for OCA
employment:
Aircraft. This category includes enemy fixed-wing, rotary-wing, and UA. Enemy
aircraft may be targeted while airborne or on the ground but are most vulnerable while
on the ground. Precision weapons with penetration capabilities, combined with timely
intelligence, may be required to counter enemy passive AMD, such as hardened
shelters.
Airfields and operating bases. Damaging runways or taxiways may prevent use of
an airfield for short periods. Destruction of support facilities—hangars, shelters,
maintenance facilities, and fuels—may degrade the enemy’s ability to generate aircraft
sorties over a longer period.
25 For additional information on aspects of EW, see AFDP 3-51, Electromagnetic Warfare and
Electromagnetic Spectrum Operations.
26 For additional information on OCO, see AFDP 3-12, Cyberspace Operations.
26
Air Force Doctrine Publication 3-01, Counterair Operations
Air defense systems. Disruption or destruction of enemy IADS and the personnel
who control, maintain, and operate them may render those systems ineffective against
friendly forces.
Command and control systems. C2 systems are critical to the effective employment
of forces and integration of IADS and should be given a high priority during OCA
targeting. The integral C2 components of an IADS includes intelligence-gathering,
warning, and control systems (ground-controlled intercept, early warning, acquisition,
and other sensors), and associated support facilities. Destruction or nonlethal
disruption of such systems may substantially reduce the enemy’s ability to detect and
respond to attacks.
Electromagnetic warfare capabilities. Early and persistent efforts should be aimed
at defeating enemy EW capabilities that could otherwise create devastating effects on
friendly systems.
Missiles and support infrastructure. Destruction of ballistic, surface- and air-to-
surface, and cruise missiles along with launch platforms, support facilities, and in-
frastructure greatly limits effective enemy missile attacks. OCA operations seek to
destroy or disable these missiles pre-launch due to the increased resources required
to engage them post-launch.
DEFENSIVE COUNTERAIR
DEFENSIVE COUNTERAIR CAPABILITIES
Layering mutually supporting defensive capabilities helps absorb and progressively
weaken enemy attacks. The following are some of the resources and capabilities used to
conduct DCA:
Fighter aircraft. Fighter aircraft use combat air patrols, and may be positioned well
ahead of forces being protected, to ensure rapid reaction to enemy attacks. Employed
in this manner, fighters intercept and destroy hostile aircraft and/or missiles before
they can reach their intended targets.
HVAA. These aircraft provide unique capabilities such as surveillance, early warning,
and electromagnetic attack. Importantly, airborne national assets are generally
considered so important that the loss of even one could seriously impact United States
warfighting capabilities or provide the enemy with significant propaganda value.
Surface-to-air weapons. The bulk, if not all, joint surface-to-air capabilities are
employed by other services. These systems include missiles (e.g., Patriot, Terminal
High Altitude Air Defense [THAAD], or the Aegis BMD System), artillery (e.g., Phalanx
or Counter-Rocket, Artillery, and Mortar [C-RAM] system), and MANPADS (e.g.,
Stinger). These systems provide theater, sector, area, and point defense to defend
critical fixed sites, C2 nodes, and airfields as well as mobile naval surface forces and
land component maneuver units.
27
Air Force Doctrine Publication 3-01, Counterair Operations
27
For additional information on CBRN defense, see AFDP 3-40, Counter-Weapons of Mass Destruction
Operations.
28
Air Force Doctrine Publication 3-01, Counterair Operations
28 For additional information on dispersion and mobility, see AFDN 1-21, Agile Combat Employment.
29
Air Force Doctrine Publication 3-01, Counterair Operations
REFERENCES
All websites accessed 05 April 2023.
Doctrine can be accessed through links provided at: https://www.doctrine.af.mil/
US AIR FORCE DOCTRINE: https://www.doctrine.af.mil/
AFDP 1, The Air Force
AFDP 2-0, Intelligence
AFDP 3-0, Operations and Planning
AFDP 3-12, Cyberspace Operations
AFDP 3-30, Command and Control
AFDP 3-36, Air Mobility Operations
AFDP 3-40, Counter Weapons of Mass Destruction Operations
AFDP 3-51, Electromagnetic Warfare and Electromagnetic Spectrum Operations
AFDP 3-52, Airspace Control
AFDP 3-60, Targeting
AFDP 3-70, Strategic Attack
AFDN 1-21, Agile Combat Employment
JOINT DOCTRINE
Joint Electronic Library (JEL): https://www.jcs.mil/Doctrine/
JEL+: https://jdeis.js.mil/jdeis/index.jsp?pindex=2
30
Air Force Doctrine Publication 3-01, Counterair Operations
MISCELLANEOUS PUBLICATIONS
CJCSI 3121.01B, Standing Rules of Engagement / Standing Rules for the Use of
Force for US Forces
31