0% found this document useful (0 votes)
29 views105 pages

Flight Training Instruction: Naval Air Training Command

The document is a Flight Training Instruction manual for the Advanced E-2 NFOTS curriculum, detailing the structure and operations of the E-2 Airborne Command & Control community. It includes information on the E-2's missions, capabilities, and the organization of Carrier Air Wings, as well as safety notices and effective page listings. The manual is intended for training purposes and outlines various chapters covering mission overviews, operational procedures, and supporting roles within the E-2 community.

Uploaded by

Martin Ackermann
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views105 pages

Flight Training Instruction: Naval Air Training Command

The document is a Flight Training Instruction manual for the Advanced E-2 NFOTS curriculum, detailing the structure and operations of the E-2 Airborne Command & Control community. It includes information on the E-2's missions, capabilities, and the organization of Carrier Air Wings, as well as safety notices and effective page listings. The manual is intended for training purposes and outlines various chapters covering mission overviews, operational procedures, and supporting roles within the E-2 community.

Uploaded by

Martin Ackermann
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 105

NAVAL AIR TRAINING COMMAND

NAS CORPUS CHRISTI, TEXAS CNATRA P-877 (Rev. 12-20)

FLIGHT TRAINING
INSTRUCTION

ADVANCED E-2 NFOTS


2020
FLIGHT TRAINING INSTRUCTION

FOR

ADVANCED E-2 NFOTS CURRICULA

E-2

P-877

iii
LIST OF EFFECTIVE PAGES

Dates of issue for original and changed pages are:


Original...0...10 Feb 15
Revision...1...14 Dec 20

TOTAL NUMBER OF PAGES IN THIS PUBLICATION IS 105 CONSISTING OF THE FOLLOWING:

Page No. Change No. Page No. Change No.


COVER 0 6-1 – 6-10 0
LETTER 0 7-1 – 7-38 0
iii – x 0 8-1 – 8-4 0
1-1 – 1-4 0 9-1 – 9-4 0
2-1 – 2-3 0 A-1 – A-9 0
2-4 (blank) 0
3-1 – 3-6 0
4-1 – 4-10 0
5-1 – 5-5 0
5-6 (blank) 0

iv
INTERIM CHANGE SUMMARY

The following changes have been previously incorporated in this manual:

CHANGE
REMARKS/PURPOSE
NUMBER

The following interim changes have been incorporated in this change/revision:

INTERIM
CHANGE REMARKS/PURPOSE ENTERED BY DATE
NUMBER

v
SAFETY/HAZARD AWARENESS NOTICE

This course does not require any special safety precautions other than those normally found on
the flight lines.

vi
TABLE OF CONTENTS

LIST OF EFFECTIVE PAGES .................................................................................................. iv


INTERIM CHANGE SUMMARY ...............................................................................................v
SAFETY/HAZARD AWARENESS NOTICE ......................................................................... vii
TABLE OF CONTENTS .......................................................................................................... viii
TABLE OF FIGURES ................................................................................................................. ix

CHAPTER ONE - THE E-2 COMMUNITY .......................................................................... 1-1


100. INTRODUCTION ..................................................................................................... 1-1
101. AIRBORNE COMMAND & CONTROL COMMUNITY OVERVIEW ................ 1-1

CHAPTER TWO - AIRBORNE COMMAND & CONTROL MISSION OVERVIEW.... 2-1


200. INTRODUCTION ..................................................................................................... 2-1
201. AIRBORNE COMMAND & CONTROL (ACC) MISSIONS ................................. 2-1
202. AIRBORNE COMMAND & CONTROL MISSION RESPONSIBILITIES ........... 2-3

CHAPTER THREE - DETECT-TO-ENGAGE SEQUENCE .............................................. 3-1


300. INTRODUCTION ..................................................................................................... 3-1
301. DETECT-TO-ENGAGE OVERVIEW ..................................................................... 3-1
302. FIND, FIX, TRACK, TARGET, ENGAGE, AND ASSESS (F2T2EA) .................. 3-3

CHAPTER FOUR - AIRBORNE COMMAND & CONTROL ............................................ 4-1


400. INTRODUCTION ..................................................................................................... 4-1
401. SYSTEM CAPABILITIES AND LIMITATIONS ................................................... 4-1
402. AIRBORNE COMMAND & CONTROL RADIO COMMUNICATIONS ............. 4-2
403. AIRBORNE EARLY WARNING TRACKING ....................................................... 4-6

CHAPTER FIVE - SURFACE SURVEILLANCE COORDINATION ............................... 5-1


500. INTRODUCTION ..................................................................................................... 5-1
501. SURFACE WARFARE ............................................................................................. 5-1

CHAPTER SIX - INTRODUCTION TO OFFENSIVE AIR SUPPORT ............................ 6-1


600. INTRODUCTION ..................................................................................................... 6-1
601. PRINCIPLES AND CONCEPTS .............................................................................. 6-1
602. TERMINOLOGY ...................................................................................................... 6-7

CHAPTER SEVEN - AIR INTERCEPT CONTROL ........................................................... 7-1


700. INTRODUCTION ..................................................................................................... 7-1
701. THE BIG 3 ................................................................................................................. 7-1
702. AIR INTERCEPT CONTROL CHARACTERISTICS ............................................. 7-1
703. THE INTERCEPT TIMELINE ................................................................................. 7-8
704. LABELING AND NAMING THE PICTURE ........................................................ 7-15
705. VISUAL IDENTIFICATION (VID)/INTERCEPT AND ESCORT ...................... 7-32
706. CHANGES TO THE PICTURE .............................................................................. 7-33

vii
CHAPTER EIGHT - AIR DEFENSE TECHNIQUES .......................................................... 8-1
800. INTRODUCTION ..................................................................................................... 8-1
801. AIR DEFENSE CONTROL ...................................................................................... 8-1
802. ENGAGEMENT ZONE PRINCIPLES ..................................................................... 8-3

CHAPTER NINE - STRIKE COMMAND AND CONTROL .............................................. 9-1


900. INTRODUCTION ..................................................................................................... 9-1
901. STRIKE PACKAGE .................................................................................................. 9-1
902. COMMAND AND CONTROL FOR A STRIKE MISSION.................................... 9-2
903. RETURN TO FORCE PROFILE .............................................................................. 9-4

APPENDIX A - GLOSSARY ................................................................................................... A-1

viii
TABLE OF FIGURES

Figure 1-1 Active ACC Squadrons as of 2019.................................................................... 1-2


Figure 1-2 Carrier Air Wing Fly Over ............................................................................... 1-3
Figure 1-3 Carrier Air Wing Fixed Wing Squadrons ....................................................... 1-4
Figure 1-4 Carrier Air Wing Rotary Wing Squadrons..................................................... 1-4

Figure 2-2 E-2 Community Missions, Responsibilities, and Roles .................................. 2-3

Figure 3-1 Typical Shipboard Detect-to-Engage Sequence .............................................. 3-2


Figure 3-2 F2T2EA ............................................................................................................... 3-3

Figure 4-1 AIS ....................................................................................................................... 4-2


Figure 4-2 Reporting a Track via Voice Communications Example Call ....................... 4-4
Figure 4-3 MNPOPCA Memory Aid .................................................................................. 4-4
Figure 4-4 Specific Aspects .................................................................................................. 4-6
Figure 4-5 Intercept Geometry ............................................................................................ 4-7
Figure 4-6 Target Aspect Formulas .................................................................................... 4-8
Figure 4-7 Computing the Collision Course....................................................................... 4-9
Figure 4-8 Air Intercept Control Computing the Collision Course ............................... 4-10

Figure 5-1 Operational Area ............................................................................................... 5-1


Figure 5-2 Joint Force Maritime Component Commander Mission Descriptions ......... 5-2
Figure 5-3 Commander’s Call Signs ................................................................................... 5-3

Figure 6-1 Forward Line of Own Troops and Fire Support Coordination Line ............ 6-3
Figure 6-2 Global Area Reference System ......................................................................... 6-5
Figure 6-3 Blue Kill Box....................................................................................................... 6-6
Figure 6-4 Purple Kill Box ................................................................................................... 6-7
Figure 6-5 CAS Life Cycle ................................................................................................... 6-9
Figure 6-6 High-Priority Task List ................................................................................... 6-10

Figure 7-1 Core Information (BRAA call) ......................................................................... 7-2


Figure 7-2 COMM Priority ................................................................................................. 7-6
Figure 7-3 Air-to-Air Timeline ............................................................................................ 7-8
Figure 7-4 Single Group ..................................................................................................... 7-16
Figure 7-5 Two Groups, Range ......................................................................................... 7-17
Figure 7-6 Two Groups, Azimuth ..................................................................................... 7-18
Figure 7-7 Three Groups, Wall ......................................................................................... 7-19
Figure 7-8 Three Groups, Champagne ............................................................................. 7-20
Figure 7-9 Three Groups, Vic ............................................................................................ 7-21
Figure 7-10 Three Groups, Ladder ..................................................................................... 7-22
Figure 7-11 Three Groups, Vic, Opening ........................................................................... 7-23
Figure 7-12 Two Groups, Azimuth, Closing ...................................................................... 7-24
Figure 7-13 Single Group, Stack ......................................................................................... 7-25
Figure 7-14 Two Groups, Range, Echelon NW ................................................................. 7-26

ix
Figure 7-15 Two Groups, Azimuth, Echelon NE ............................................................... 7-27
Figure 7-16 Three Groups, Champagne, Weighted East .................................................. 7-28
Figure 7-17 Leading Edge Comms ...................................................................................... 7-29
Figure 7-18 Exclusion Comms ............................................................................................. 7-30
Figure 7-19 Two Groups, Range with Additional Groups ............................................... 7-31
Figure 7-20 Maneuver in Range .......................................................................................... 7-34
Figure 7-21 Maneuver in Azimuth ...................................................................................... 7-35
Figure 7-22 Lead Group, Trail Group, Passing ................................................................. 7-37
Figure 7-23 East Group, West Group, Crossing................................................................ 7-38

Figure 8-1 Littoral Air Defense ........................................................................................... 8-1


Figure 8-2 Air Defense Identification Zone ........................................................................ 8-3
Figure 8-3 Engagement Zones ............................................................................................. 8-3

x
CHAPTER ONE
THE E-2 COMMUNITY

100. INTRODUCTION

This chapter provides an overview of the E-2 Airborne Command & Control (ACC) community.
The basic ACC community organization, structure, and geographic distribution to support
normal operations are presented in this chapter.

101. AIRBORNE COMMAND & CONTROL COMMUNITY OVERVIEW

Airborne Command & Control Community Mission

The E-2 Hawkeye is the Navy’s all-weather, carrier-based, tactical battlespace management
ACC aircraft. The E-2’s primary mission is to deliver dominant airborne command and control
from the Carrier Strike Group. Missions that the E-2 is involved in include Air Intercept Control
(AIC), Strike, Search and Rescue (SAR), Offensive Air Support (OAS), and Surface
Surveillance Coordination (SSC).

The E-2 uses a combination of Radio Detection and Ranging (RADAR), Identification Friend or
Foe (IFF), and electronic surveillance sensors to provide early warning threat analysis of
potential targets. The ACC community uses its airborne radar system to carry out the following
functions:

1. Detect aircraft at long ranges.

2. Control the battlespace during an air engagement.

3. Perform surveillance, including ground based targets.

4. Implement functions similar to Air Traffic Control (ATC).

5. Distinguish between friendly and hostile aircraft at extended distances.

6. Direct fighter aircraft to potential target locations.

7. Respond to attacks by enemy forces.

Airborne Command & Control Squadrons

The E-2 fleet is composed of 10 squadrons, which are located in Norfolk, Virginia; Point Mugu,
California; and Iwakuni, Japan.

THE E-2 COMMUNITY 1-1


CHAPTER ONE ADVANCED E-2 NFOTS

Squadron Nickname Location Logo

VAW-113 Black Eagles NBVC Point Mugu

VAW-115 Liberty Bells NBVC Point Mugu

VAW-116 Sun Kings NBVC Point Mugu

VAW-117 Wallbangers NBVC Point Mugu

VAW-120 Fleet
Replacement Greyhawks NS Norfolk
Squadron (FRS)

VAW-121 Bluetails NS Norfolk

VAW-123 Screwtops NS Norfolk

VAW-124 Bear Aces NS Norfolk

VAW-125 Tigertails MCAS Iwakuni

VAW-126 Seahawks NS Norfolk

Figure 1-1 Active ACC Squadrons as of 2019

A typical E-2 squadron consists of 10-12 pilots, 15-18 Naval Flight Officers (NFOs), several
officers working support in maintenance, an intel officer, and approximately 120 enlisted
personnel.

Carrier Air Wing Organizational Structure

A Carrier Air Wing (CVW) is composed of multiple aircraft squadrons and several detachments
of fixed wing and rotary wing aircraft. CVWs are trained, organized, and equipped to conduct
modern carrier air operations while embarked aboard United States Navy (USN) aircraft carriers.
The variety of aircraft and their missions allows for flexibility across multiple domains.

1-2 THE E-2 COMMUNITY


ADVANCED E-2 NFOTS CHAPTER ONE

Figure 1-2 Carrier Air Wing Fly Over

Capabilities – When combined with the detection and C2 capabilities of the E-2, a CVW can
execute the following types of missions:

1. Strike

2. Offensive Counter Air (OCA)/Defensive Counter Air (DCA)

3. Offensive Air Support (OAS)

4. SAR/Combat SAR (CSAR)

5. Anti-Surface Warfare (ASUW)

6. Anti-Submarine Warfare (ASW)

7. Humanitarian Assistance/Disaster Relief (HADR)

Staff – A CVW is led by the Strike Warfare Commander (AP), a Navy Captain who is
commonly referred to as “CAG.” The term CAG is a holdover from when the Air Wing was
once called a Carrier Air Group. CAG is supported by a staff of 40 officer and enlisted
personnel that includes the following:

1. Deputy Commander of the Air Wing (DCAG)

2. Operations Officer

3. Warfare specialists

THE E-2 COMMUNITY 1-3


CHAPTER ONE ADVANCED E-2 NFOTS

4. Landing Signal Officers (LSOs)

5. Intelligence Officer

6. Maintenance Officer

NOTE

CVWs are often supplemented with squadron personnel, such as


the squadron Intelligence Officer and additional LSOs.

A modern CVW typically consists of the fixed wing squadrons listed in the figure below.

Number of
Number of Aircraft
Squadrons Aircraft
Squadrons (per
Squadron)
Strike Fighter (VFA) Super Hornet 3-4* F/A-18E/F 12–14
Strike Fighter (VFA) Joint Strike
0-1* F-35C 10
Fighter
VFA Legacy Hornet (when
provided by a Marine Fighter 0-1* F/A-18C 10–12
Attack [VMFA] squadron)
Electronic Attack (VAQ) 1 EA-18G 6
Carrier Airborne Command &
1 E-2C/D 4–5
Control (VAW)
Fleet Logistics Support (VRC) 1 C-2 2

Figure 1-3 Carrier Air Wing Fixed Wing Squadrons

*Note: Four total VFA squadrons per CVW. Composition of variants changes between Air
Wings.

A modern CVW typically consists of the rotary wing squadrons listed in the following figure.

Number of
Number of Helicopters
Squadrons Helicopters
Squadrons (per
Squadron)
Helicopter Sea Combat (HSC) 1 MH-60S 8
Helicopter Maritime Strike (HSM) 1 MH-60R 6

Figure 1-4 Carrier Air Wing Rotary Wing Squadrons

1-4 THE E-2 COMMUNITY


ADVANCE E-2 NFOTS CHAPTER TWO

CHAPTER TWO
AIRBORNE COMMAND & CONTROL MISSION OVERVIEW

200. INTRODUCTION

This chapter covers the various ACC roles and missions which support fleet and expeditionary
operations. The first section of this chapter defines various ACC missions, including OAS,
DCA, OCA, SAR/CSAR, Carrier Air Traffic Control Center (CATCC) Casualty Approach, and
SSC. The last section of the chapter summarizes the E-2’s responsibilities during these missions.

201. AIRBORNE COMMAND & CONTROL (ACC) MISSIONS

Offensive Air Support

OAS is the process of managing air assets in support of ground forces. OAS support is provided
by properly pairing CAS assets with target requests that are received over the Joint Air Request
Net (JARN) and through the Joint Tactical Air Strike Requests (JTARs).

Dynamic or Time Sensitive Targets (TSTs) are also managed through proper asset assignment
and coordination with the theater Air and Space Operations Center (AOC).

The E-2’s role in OAS involves coordinating with airborne assets, ground forces, and higher
theater authority to ensure the proper ordnance arrives on target and on time in support of ground
operations.

Defensive Counter Air

DCA is the process of coordinating surface and airborne assets to prevent potentially hostile air
threats from maneuvering within their weapons release range to friendly forces.

This mission is accomplished through the proper management of Advanced Electronic Guided
Interceptor System (AEGIS) cruisers and destroyers as well as land-based surface-to-air missile
systems (e.g., Patriot Missile Batteries), and fighter Combat Air Patrol (CAP) stations.

The E-2 will typically manage the CAP station(s) assignment(s) during a DCA mission.
Additionally, the E-2 is responsible for detecting and reporting all air contacts outside the
Line- of-Sight (LOS) of friendly surface DCA participants, contributing vital information to the
Single Integrated Air Picture (SIAP) used by the Air Defense Commander (AW) when making
tactical decisions.

NOTE

The E-2 is frequently relied upon as the first line of defense in the
detection of inbound air threats.

AIRBORNE COMMAND & CONTROL MISSION OVERVIEW 2-1


CHAPTER TWO ADVANCED E-2 NFOTS

Offensive Counter Air

OCA is the process of utilizing fighter configured aircraft and surface to air missiles to attrite as
many airborne hostile aircraft as possible. OCA can be used in preparation for follow-on strikes
and ground force offensives that require air superiority. This mission is typically conducted over
enemy controlled territory.

Search and Rescue /Combat Search and Rescue

SAR, a subset of Personnel Recovery, involves locating, identifying, and recovering persons in
distress. SAR is typically associated with rescue efforts such as locating and rescuing the crew
of disabled vessels or recovering downed aircrew in a non-combat environment. The CSAR
mission refers to search and rescue operations that are carried out near or within combat zones.

The role of an E-2 in SAR and CSAR is to provide assistance in locating personnel in distress
and coordinate the air and sea space for all other assets attempting to locate and recover
survivors. The E-2, due to its onboard sensors and extended on station time, often acts as the
Airborne Mission Coordinator (AMC) for SAR missions and is responsible for the safe and
effective conduct of rescue operations.

Carrier Air Traffic Control Center (CATCC) Casualty Approach

A CATC Casualty Approach (CCA), also known as a Hawkeye Controlled Approach (HCA),
involves the safe coordination and recovery of aircraft on board an aircraft carrier. These
missions are conducted in situations when a ship’s casualty or equipment failure prevents the
ship’s company from performing normal recovery operations. During the performance of a
CCA, the E-2 crew will assume the roles of the carrier air traffic controllers, which include
marshal, approach, departure, and final controllers.

Surface Surveillance Coordination (SSC)

SSC is the process of managing air assets in the identification and prosecution of surface
contacts in the vicinity of friendly surface units or designated High Value Unit(s) (HVUs).
SSC involves the actions of classification, identification, and (if required) engagement. The goal
of SSC is to provide an integrated surface picture to the Sea Combat Commander (AZ) so they
can make timely and informed tactical decisions.

The role of the E-2 in SSC focuses on locating surface contacts to be investigated and
coordinating with air assets to identify those contacts properly and in a timely manner. In SSC
situations where engagements are required, the E-2 coordinates with the appropriate warfare
commander and provides necessary airspace and sea space management, which is used for the
effective prosecution of contacts.

2-2 AIRBORNE COMMAND & CONTROL MISSION OVERVIEW


ADVANCE E-2 NFOTS CHAPTER TWO

202. AIRBORNE COMMAND & CONTROL MISSION RESPONSIBILITIES

E-2 Community Mission Responsibilities

The following figure provides a summary of the types of E-2 missions, the corresponding
responsibilities during the execution of each mission, and the specific aircrew roles when
conducting these E-2 community missions.

E-2 Mission Responsibilities Crew Position – Mission Role


 Mission Commander (MC)

 Air Director (AD) – Target


OAS Pair air assets with targets. Manager

 Sensor Operator (SO) – Air Asset


Manager
 MC – MC/Warfare Commander
Provide Situational Awareness (SA) Coordinator
for all friendly fighters in its Area
DCA of Responsibility (AOR) when  AD – AIC Primary Controller
participating in strike group air
defense missions.  SO – SSC Controller and
Secondary AIC Controller
 MC – AMC
Conduct preplanned missions or
SAR/CSAR immediate response to emergency  AD – Primary Controller
rescue.
 SO – Secondary Controller
 MC – Strike/Supervisor
Perform typical CATCC Agency  AD – Final Controller Alpha
CATCC
roles: marshal, approach, final, and
Casualty
Approach
departure control. Exists anytime  SO – Final Controller Bravo
the Air Wing is embarked.
 Copilot – Marshal Controller

 MC – Warfare Commander
Coordinator.
Locate surface contacts, assign air
assets to identify those contacts, and  AD – Data Link Manager, Strike
SSC
coordinate with Warfare Control
Commander.
 SO – Surface Search Asset
Controller, SSC Log.

Figure 2-2 E-2 Community Missions, Responsibilities, and Roles

AIRBORNE COMMAND & CONTROL MISSION OVERVIEW 2-3


CHAPTER TWO ADVANCED E-2 NFOTS

THIS PAGE INTENTIONALLY LEFT BLANK

2-4 AIRBORNE COMMAND & CONTROL MISSION OVERVIEW


CHAPTER THREE
DETECT-TO-ENGAGE SEQUENCE

300. INTRODUCTION

This chapter describes the Detect-to-Engage sequence to include the associated terminology,
procedures, and required action items in support of ACC operations.

301. DETECT-TO-ENGAGE OVERVIEW

Weapons System Functions

Weapons system is a generalized term that encompasses a broad spectrum of components and
subsystems. These components range from simple devices (operated manually by a single
person to perform one specific function) to a complex array of subsystems that are
interconnected by computers and data communication links and capable of performing several
functions or engaging numerous targets simultaneously. Although each subsystem may be
specifically designed to solve a particular part of the fire control solution, it is the combined
functionality of the components that allow the system to achieve the ultimate goal of destroying
the target.

All modern naval weapons systems, regardless of the environment in which they operate or the
type of weapon they employ, consist of the basic components that allow the system to detect,
track, and engage the target. Sensor components must be designed for the environments in
which the weapons system and the target operate. These components must also be capable of
coping with varying target characteristics such as range, bearing, speed, heading, size, and
aspect.

Every weapons system performs the functions of detecting, resolving or localizing, classifying,
tracking, selecting a weapon, and neutralizing the target. The target can be surface or airborne,
stationary or mobile, manned or unmanned, guided or unguided, and maneuverable or in a fixed
trajectory. The target may also travel at speeds that range from a few knots to several times the
speed of sound.

Detect-to-Engage Sequence

The Detect-to-Engage sequence, which is an integral part of the modern fire control problem,
involves the action steps of detecting, tracking, engaging, and neutralizing the target.

DETECT-TO-ENGAGE SEQUENCE 3-1


CHAPTER THREE ADVANCED E-2 NFOTS

Figure 3-1 Typical Shipboard Detect-to-Engage Sequence

Detect the Target – Target detection by a weapons system includes three phases. The first
phase is surveillance and detection. This phase involves an active and/or passive search of a
predetermined area to detect a target. In an active search, the system radiates energy into the
medium and processes any returns or echoes (e.g., radar). In a passive search, the system listens
for energy that is transmitted from the emitting target. During the second phase, the target is
measured or localized. This phase involves estimating the target’s behavior or motion relative to
the detecting platform by taking a series of measurements that include range, bearing, and depth
or elevation. In the third phase, the target is classified. This is accomplished by interpreting the
target’s various parameters and behavior in order to estimate its type, number, size, and identity.

Weapon system sensors’ capabilities are evaluated with respect to the maximum range at which
they can reliably detect a target, plus their ability to distinguish individual targets in a multi-
target group. Additionally, sensor subsystems must be able to detect targets in a noise-cluttered
environment. Noise and clutter are terms used to describe any unwanted radar returns. They are
usually caused by ground, sea, rain, and/or other atmospheric reflections. They may also be the
result of deliberate radio interference or jamming. Some level of noise or clutter is always
present in the environment. Noise may also be self-generated, such as that occurring within the
electronic circuitry of the detecting sensor itself.

Track the Target – Target detection is the essential first step in resolving any fire control
problem, but to successfully engage and neutralize the target its relative position and velocity
must be updated continuously. This information is used to evaluate the potential threat
represented by the target, predict the target’s future position, and determine a weapon intercept
point so that the proper weapon can be effectively and efficiently deployed. A successful fire
control solution is the convergence of the target’s predicted position with the weapon intercept
point.

The modern battlefield is one in which sensors detect numerous contacts (friendly, neutral, and
hostile), and continually gather information on them. The extreme high speed, precision, and
flexibility of modern computers enable the weapons systems and their operators to compile,
coordinate, and evaluate the data before initiating an appropriate response. Using computers, a
weapons system can establish the target’s presence, track, and predict target motion

3-2 DETECT-TO-ENGAGE SEQUENCE


ADVANCED E-2 NFOTS CHAPTER THREE

automatically, and ultimately define how, when, if, and with what weapon the target will be
engaged.

Engage and Neutralize the Target – Effective engagement and neutralization of a target
requires that a destructive mechanism, such as a warhead, be delivered in the vicinity of or
actually impact the target. When delivering the warhead, the following factors must be
considered: aiming, launch point, propulsion system type, and the external forces experienced
by the weapon enroute to the target. The weapon’s capability to be guided or controlled after
launch dramatically increases its accuracy and Probability of Kill (Pk). Different types of
guidance systems also significantly impact weapon system designs. These factors, combined
with the type of warhead, the fusing mechanism, and other warhead design considerations, all
contribute to the effectiveness of a modern weapon.

NOTE

The type of warhead and the type of target determine how close to
the target a warhead must be delivered.

302. FIND, FIX, TRACK, TARGET, ENGAGE, AND ASSESS (F2T2EA)

F2T2EA, commonly referred to as the “kill chain,” is the process used to perform the Detect-to-
Engage sequence.

Figure 3-2 F2T2EA

DETECT-TO-ENGAGE SEQUENCE 3-3


CHAPTER THREE ADVANCED E-2 NFOTS

Find – During this step, emerging targets are detected and characterized for further prosecution.
The find step involves detecting the presence of a potential target by sensors and/or through
intelligence, surveillance, and reconnaissance (ISR) methods can be used for the detection of a
target. Traditional ISR includes platforms or systems dedicated to the ISR mission, such as
human intelligence (HUMINT), electronic intelligence (ELINT) assets, space intelligence assets,
unmanned aerial systems (UAS), etc. Non-traditional ISR (NTISR) refers to ISR collection by
other means, such as a strike aircraft using their targeting pod to locate and identify a target.

Fix – The fix step of this phase includes actions to determine the location (fix) of the potential
target. The fix step begins after potential targets are detected. When a potential target is
identified, sensors are focused to confirm target identification and its precise location. The
correlation and fusing of data confirms, identifies, and locates the target.

Sensors help to classify the target and interpret its behavior in order to estimate the type, number,
size, and identity. Many of the sensors used in the detection process aid in determining the exact
identity of the contact, or Positive Identification (PID). Electronic and physical parameters are
gathered on the contact and are used to characterize the contact. These parameters include, when
possible, the point of origin, altitude, and speed.

A contact is typically identified as one of the following:

1. Friendly – A positively identified friendly aircraft, ship, or ground position. You can use
the following methods to help identify friendly aircraft:

a. Home country or coalition aircraft originating from a friendly base or aircraft carrier

b. Broadcasting appropriate IFF or data link IAW SPINS and ATO

2. Neutral – A positively identified aircraft, ship, or ground position whose characteristics,


behavior, origin, or nationality indicate it is neither supporting nor opposing friendly forces.
Some identifying characteristics include:

a. IFF signature of a valid Mode III and Mode C

b. No associated Electronic Support Measures (ESM)

c. Civilian airfield departure

d. Commercial Air profile (altitude, airspeed, on a known air route)

3. Bandit – Using an Identification Matrix, a contact may be identified as a bandit for threat
evaluation if the target has characteristics, such as:

a. No IFF

b. ESM associated with a threat RADAR system

c. Enemy airfield origin

3-4 DETECT-TO-ENGAGE SEQUENCE


ADVANCED E-2 NFOTS CHAPTER THREE

NOTE

Most Rules of Engagement (ROE) require committing a hostile act


or demonstrating hostile intent in order for the contact to be
declared hostile. All hostile declarations are based on ROE for a
particular theater or operation. A hostile declaration indicates
clearance to engage the contact. An enemy aircraft for which a
clearance to engage has not been granted, based on ROE is
declared a “bandit.”

Track – During this step, the target is observed, and its activity and movement are monitored.
The track step begins once a definite fix is obtained on the target and ends when the
engagement’s desired effect upon the target is determined. Note that some targets may require
continuous tracking upon initial detection as an emerging target. Sensors may be coordinated to
maintain situational awareness or track continuity. If track continuity is lost, the fix step will
likely have to be repeated (and potentially the find step as well).

Target – During this step, the decision is made to engage the target in some manner to create
desired effects and the means to do so are selected and coordinated. The target step begins with
target validation. That is, operation personnel ensure that all vetted targets meet the objectives
and criteria outlined in the commander’s guidance. Additionally, validation reviews the target’s
compliance with law of war and ROE and ensures that it is not otherwise restricted. The target
phase matches available engagement and sensor assets against the target are coordinated and
deconflicted, and a risk assessment is performed. The target is weaponeered, engagement
options are formulated, a recommendation is nominated, an option is selected to affect the target,
and assessment requirements are submitted. The target phase can be time-consuming due to the
large number of requirements to satisfy. Target step actions can be initiated and/or completed in
parallel with previous phases to enable timely decisions.

Engage – In this step, action is taken against the target. During the engage step, the engagement
is ordered and transmitted to the selected asset. Engagement orders must be transmitted to,
received by, and understood by those engaging the target. The engaging component manages
and monitors the actual target engagement. The PID process is conducted prior to target
engagement, and continues throughout the engagement, in coordination with the controlling
agency for any changes to the operational environment that may affect the engagement decision.

Assess – In this step, initial assessment of action against the target is performed. During the
assess step, initial assessment of the physical or functional status of the target takes place. For
attacks in the physical environment, the assessment confirms impact of the weapon on the target
and makes an initial estimate of the damage. For nonlethal weapons, the initial assessment
attempts to detect changes in functionality indicating a successful engagement.

For both lethal and nonlethal weapons, this initial assessment is part of battle damage assessment
(BDA), phase I. Attack recommendations are generally not made during BDA phase I
information. However, in cases of confirmed miss, a re-attack may be authorized based on target
priority and weapon availability. This completes the F2T2EA cycle. However, further

DETECT-TO-ENGAGE SEQUENCE 3-5


CHAPTER THREE ADVANCED E-2 NFOTS

assessment will take place following this cycle to determine actual effectiveness of the
engagement.

3-6 DETECT-TO-ENGAGE SEQUENCE


CHAPTER FOUR
AIRBORNE COMMAND & CONTROL

400. INTRODUCTION

This chapter addresses the characteristics of the E-2 weapon system and explains the
terminology, capabilities, and limitations of surveillance and identification systems in support of
ACC operations. Information on how to communicate using basic radio terminology, brevity,
and procedures in support of ACC operations is also discussed. In addition, this chapter provides
an explanation of the terminology and concepts associated with AEW tracking, including manual
tracking and Near Collision Intercepts (NCIs) to support ACC operations. This chapter
concludes with an introduction to the terms, concepts, and procedures associated with Air
Intercept Control (AIC), and communications procedures.

401. SYSTEM CAPABILITIES AND LIMITATIONS

The E-2’s IFF, ESM, and Data Link systems operate similarly to those discussed during VT-4
Intermediate training. One exception is that in the E-2 strand, ESM’s confidence percentage will
not be taken into account before considering that line of bearing valid. As soon as an emitter
populates the gutter on the scope, its information can be used. In this section, we’ll discuss
differences in the E-2’s radar system as well as an additional system called Automatic
Identification System (AIS).

E-2 Surveillance RADAR Types

APS-145 – The E-2C is equipped with the APS-145 radar. This mechanically scanned array
airborne surveillance radar is capable of tracking about 20,000 targets simultaneously and
identifying distance, azimuth, velocity, and altitude for each target. Even with these extensive
capabilities, this radar type exhibits limitations in overland or high clutter environments that
make coordinating with fighters during AICs crucial.

APY-9 – The E-2D is equipped with the APY-9 radar. The APY-9 is an electronically and
mechanically scanned radar system which improves upon the APS-145 and is able to identify
smaller targets at a greater distance in a variety of clutter environments. The system is capable
of focusing the radar on select areas of interest and provides a higher degree of accuracy over the
APS-145.

Automatic Identification System Capabilities

In order to support SSC operations, the E-2 utilizes Automatic Identification System (AIS) data
to aid in the identification of maritime ships. AIS is a commercial maritime digital broadcast
system that continually exchanges vessel data among network participants over a VHF radio
frequency. The data includes vessel identity, position, speed, course, destination, flag, and other
information of critical interest for navigation safety and maritime security.

AIRBORNE COMMAND & CONTROL 4-1


CHAPTER FOUR ADVANCED E-2 NFOTS

International commercial vessels over a specified Gross Tonnage (GT) are mandated to use AIS
by the 1974 International Maritime Organization (IMO) International Convention for the Safety
of Life at Sea (SOLAS) Treaty. The IMO Performance Standards for AIS (IMO Resolution
MSC.74 [69]) (IMO 2002b) require that these systems be capable of functioning in the ship-to-
ship mode (to assist in collision avoidance), and ship-to-shore mode (as a means for littoral states
to obtain information about a ship and its cargo and as a Vessel Traffic Service [VTS] tool).
Ship-to-ship mode is the most important mode because of its ability to assist in collision
avoidance.

Figure 4-1 AIS

AIS is intended to enhance the SOLAS, safety and efficiency of navigation, and protection of the
marine environment. The system assists in vessel identification, target tracking, and
simplification of information exchange by reducing verbal mandatory ship reporting. Providing
additional information to assist SA is another characteristic of the AIS.

AIS has many advantages for those vessels that are equipped with this system, but it also has
limitations. Carrying vessels simply disappear from the surveillance picture without notice when
the equipment is not operational, or the vessel turns it off. In addition, the information is only as
accurate as what the user inputs, allowing for information to easily be spoofed or faked. For
example, a combatant vessel could have an AIS system on board and input information as if it
was an oil tanker. To all other AIS users, the combatant would appear as an oil tanker.

402. AIRBORNE COMMAND & CONTROL RADIO COMMUNICATIONS

This section provides details on how E-2 aircrew can communicate using the basic ACC aircraft
radio procedures and terminology.

4-2 AIRBORNE COMMAND & CONTROL


ADVANCED E-2 NFOTS CHAPTER FOUR

The two main entities an E-2 will communicate with are AW over ADC C&R net and fighters on
a FAD (Fighter Air Direction) net via standardized Air Intercept Control (AIC) comms. Fighters
will check in with a standardized check in format, and through AIC comms, be directed to
intercept contacts inbound to the strike group.

ADC C&R Net Voice Reporting Procedures

The ADC C&R net is the communications network for all units participating in CSG Air
Defense. Participants will normally include the Air Defense Commander (AW), aircraft control
units (ACUs), and all ships within the CSG. The net is used to communicate all facets of air
defense, such as relaying AW’s intentions to all units, voice reporting all air tracks entered into
the data link, and coordinating the use of DCA assets and/or surface to air missiles. The high
frequency (HF) band is normally used for the ADC C&R net, due to its over the horizon
capabilities, although J-voice may be used as well.

The ADC C&R net is often referred to as a “formal” or “directed” net, which means that
communications are strictly controlled. Every transmission on the net should begin with the call
sign of the unit being called, the call sign of the unit calling, and end with either “over” or “out”.
“Over” is used when the transmitter is expecting a response from the unit(s) being called. If a
response is not expected, “out” should be used, denoting the conversation is assessed to be
complete.

As an ACU, the role of the E-2 on the ADC C&R net is primarily to report new air tracks and
coordinate DCA assets. All new air tracks shall be reported in the data link and voice reported to
AW using the format detailed below. Any changes to existing tracks should be reported, as well.
When controlling DCA assets, AW should be informed whenever the status of a CAP station
changes. For example, the E-2 crew should communicate with AW whenever the CAP is
initially manned, whenever they are committed to take an intercept, the results of the intercept
upon resetting, any updates to fuel states, or when the CAP is otherwise unmanned. The ACU
can also coordinate with AW to have tracks “covered” with “birds” (friendly SAMs) in the event
of a “leaker”.

In most cases, even when not directly supporting air defense, the E-2 is still performing AEW,
contributing to the air defense mission by building and maintaining the single integrated air
picture.

Reporting a Track via Voice Communications Procedures

When reporting a track using voice communications on the air warfare commander net, use the
following format:

1. Unit being called – Refers to the warfare commander to whom the information is reported
(AW)

2. Unit Calling – Refers to the call sign of the unit reporting the information

AIRBORNE COMMAND & CONTROL 4-3


CHAPTER FOUR ADVANCED E-2 NFOTS

3. Track number – Data Link track number being reported, either “new” or “update”.

4. Checkprint – Checkprint line and item that the contact is evaluated to have.

5. Evaluation – What the E-2 evaluates the contact as, using applicable code words.

6. Intentions – If required, this is where you relay intentions to AW related to the contact.
Such intentions can include intend to intercept with a CAP station (“…intend to intercept with
Eagles”).

Unit Being Track


Unit Calling Checkprint Evaluation Intentions
Called Number

Evaluate Intend to
Alpha Update Checkprint intercept
Tango Cardinal
Whiskey Track 3652 line 2 with Miami
Heron

Figure 4-2 Reporting a Track via Voice Communications Example Call

More examples of this and how to apply it during an E-2 mission are further explained in
FTI P-813 Student Guide.

Fighter Aircraft Radio Communications Check-In Procedures

Air assets use a standard check-in brief in order to transmit their identity and capabilities to the
airspace controlling authorities. The fighter aircraft radio communications check-in procedure is
executed using the following memory aid, MNPOPCA.

Figure 4-3 MNPOPCA Memory Aid

4-4 AIRBORNE COMMAND & CONTROL


ADVANCED E-2 NFOTS CHAPTER FOUR

Terminology

The fighter aircraft use the following terminology during AIC radio communications:

1. Bullseye – An established reference point from which the position of a contact can be
referenced by bearing (magnetic degrees) and range (nm).

2. Bearing, Range, Altitude, and Aspect (BRAA) – A tactical communication format used by
the fighter aircrew or controller to provide the location and direction of the contact relative to the
specified friendly aircraft. This information provides the fighter SA to the location of the contact
with respect to the fighter’s position in space and aids in correlation of groups.

3. CAP station – A point in space established during pre-mission planning used to position
friendly fighters. The CAP is denoted by a code name, often the name of a city.

4. On station – An informative call indicating that a unit or aircraft has reached its assigned
station.

Air Intercept Control and Communications Procedures

Air Intercept Control communications are conducted between either the Ground Control
Intercept (GCI) or AIC controller and the fighter. This type of intercept procedure is known as
Tactical Air Intercept Control (TACAIC). The comm format is standardized and governed by
the TOPGUN manual which is maintained and updated by the Navy Fighter Weapons School in
NAS Fallon, NV. These comms are introduced via BRAA “picture” calls for NCIs and will be
covered in much more detail in AIC phase and chapter 7 of this FTI. Defining and making a
picture call is discussed in this section.

The NCI procedure utilizes the picture call, which serves to build a fighter’s SA. A picture call
defines the position of bogeys and other aircraft in relation to an anchor point, either bullseye or
the fighter (BRAA). A picture call does not include comm air traffic. While performing NCIs,
the picture call will be given in BRAA format.

AIC: “Enforcer 11, single group BRAA 100/28, 29 thousand, flank south, bogey, spades.”

With only a few exceptions, this basic communication format remains unchanged. BRAA
format will be used at the beginning of each NCI procedure to communicate the position of the
bogey. Since the BRAA format uses the fighter as the reference point, the call will always begin
with the fighter call sign. It can be assumed that each bogey in the NCI procedure will be named
“single group” and their declaration will be “bogey, spades”. Specific aspects (Figure 4-4) will
be given when using the BRAA format. Specific aspects are hot, flank (cardinal or sub-cardinal
direction), beam (cardinal or sub-cardinal direction), and drag (cardinal or sub-cardinal
direction). This specific aspect is from the bogey to the fighter, or the angle that the fighter is off
the bogey’s nose. This is called target aspect (TA).

More detail on NCI comm procedures are given in FTI P-813.

AIRBORNE COMMAND & CONTROL 4-5


CHAPTER FOUR ADVANCED E-2 NFOTS

Figure 4-4 Specific Aspects

403. AIRBORNE EARLY WARNING TRACKING

The following sections cover terminology and concepts associated with AEW tracking, including
manual tracking and Near Collision Intercepts (NCI) to support AEW operations. For more
details on the procedures, refer to FTI P-813.

Manual Tracking

If the processor fails to build a track on a RADAR contact, an operator must determine the
contact’s course and speed in order to manually build, update, and report a track in the data link.
Manual tracking is accomplished by measuring the course and distance traveled of a contact over
time by using the raw radar return (video).

Manual Tracking Procedures

Complete the following steps to manually track a contact:

1. Detect the presence of a contact.

2. Evaluate the contact’s course and speed.

a. Mark the location of the center of the radar return.

b. After 36 seconds, or 6 sweeps of the radar, mark the new position.

c. After 1 minute from the initial mark, or 10 sweeps of the radar, mark the new
position.

4-6 AIRBORNE COMMAND & CONTROL


ADVANCED E-2 NFOTS CHAPTER FOUR

d. Measure the bearing and range from the initial position to each subsequent mark to
compare and calculate the course and speed. The bearing from the initial position to each
subsequent mark is the course. For the 36 second calculation, (distance traveled)
* 100 = speed. For the 1 minute calculation, (distance traveled) * 60 = speed.

3. Manually build an air track and input the course and speed.

4. Classify the contact using available sensors.

5. Report the contact via link and via voice to AW.

6. Continue to track the contact.

a. After 3 minutes from the initial mark, mark the position a final time.

b. Measure the bearing and range from the initial position to the final position and
calculate the course and speed. The bearing from the initial position to the 3 minute
mark is the course. The speed is (distance traveled) * 20.

c. Update the manual track with the final course and speed calculation.

d. Monitor the manual track for any changes.

Fundamentals of Intercept Geometry

During an intercept, the fighter will maneuver relative to the bogey in preparation for weapons
employment or a visual identification (VID). Correctly orienting the fighter to the bogey’s flight
path will allow aircrew to advantageously position the fighter aircraft. The information below
provides definitions of the terms used in intercept geometry.

Figure 4-5 Intercept Geometry

AIRBORNE COMMAND & CONTROL 4-7


CHAPTER FOUR ADVANCED E-2 NFOTS

1. FH – Fighter’s Magnetic Heading

2. BH – Bogey’s Magnetic Heading

3. BB – The magnetic bearing from the fighter to the bogey is known as the Bogey Bearing.

4. BR – Bogey Reciprocal Heading (BH minus180°)

5. TA – This is the angle by which the bogey sees the fighter. This angle, which is the LOS
angle from the target’s nose to the fighter, is measured in direction right or left of the bandit’s
flight path. TA is important for the fighter to monitor because it is the primary method of
determining if the fighter or other friendly assets are being targeted by the bandit.

The following primary formulas are used for determining TA:

a. TA (Left [L] or Right [R]) = BR heading to BB

b. TA (L or R) = Cut to AO

Figure 4-6 Target Aspect Formulas

Both formulas use BR (cut) as the starting point and BB (AO) as the finishing point to determine
TA in degrees and direction. The TA formula is stated in two ways in order to help aircrews
determine TA under different circumstances.

6. Cut – FH to BR (Expressed in Magnitude and Direction)

7. AO – Angle Off (FH to BB)

8. DTG – Degrees to Go (FH to BH)

Near Collision Intercept Procedures

Establishing the Collision Course (CC) is the initial long-range objective of the fighter. With
this information, the fighter can close on the bogey in the quickest way possible.

4-8 AIRBORNE COMMAND & CONTROL


ADVANCED E-2 NFOTS CHAPTER FOUR

Figure 4-7 Computing the Collision Course

AIC will compute a CC and direct the intercept using the steps below:

1. Determine BH: 290 for the example in Figure 4-6

2. Calculate BR (BH plus or minus 180°): 110 for the example in Figure 4-6

3. Determine BB: 075 in the example in Figure 4-6

4. Compute TA: TA = BR to BB. For the example in Figure 4-6, 110 (BR) minus 075 (BB) =
o
35 Left Target Aspect, and add (for a right TA) or subtract (for a left TA) the amount equal to
TA to the BB to obtain a CC. 075 (BB) minus 35 (Left TA) = 040 (CC). Direct the fighter to
turn to this heading.

5. Monitor the BB for drift as the fighter closes on the bogey and make appropriate heading
adjustment calls to the fighter.

AIRBORNE COMMAND & CONTROL 4-9


CHAPTER FOUR ADVANCED E-2 NFOTS

Figure 4-8 Air Intercept Control Computing the Collision Course

This procedure is further explained in FTI P-813.

4-10 AIRBORNE COMMAND & CONTROL


CHAPTER FIVE
SURFACE SURVEILLANCE COORDINATION

500. INTRODUCTION

This chapter discusses concepts and terms associated with Surface surveillance coordination
(SSC) as well as information about Surface Warfare (SUW) in a tactical environment.

501. SURFACE WARFARE

Maritime Employment

Maritime Employment is normally conducted by air and surface command and control platforms
known as Aircraft Control Units (ACUs). An ACU’s function is to provide deconfliction of
controlled assets. Additionally, ACUs must efficiently utilize assets to maximize search volume.
In most cases, SSC assets will be controlled by a designated ACU.

The E-2’s mission, while functioning as an ACU, is to coordinate a search of the Vital Area
(VA) and Classification Identification Engagement Area (CIEA). Controllers vector aircraft
using either bullseye reference points or BRAA calls to investigate all unknown surface vessels
within the VA encompassing the High Value Assets (HVAs).

Figure 5-1 Operational Area

SSC assets determine vessel type, classification, and hull number and report this information to
the E-2. The E-2 then reports this information via link and voice over the command network. If
further inquiry is necessary, the request for clarification will be issued over the command
network and relayed to the appropriate aircraft. The E-2 controller ensures the entire VA has
been sanitized prior to moving outward to the CIEA.

SURFACE SURVEILLANCE COORDINATION 5-1


CHAPTER FIVE ADVANCED E-2 NFOTS

Surface Surveillance Coordination

SSC Assets under ACU control can be made to shadow any surface Contact of Interest (COI) or
Critical Contacts of Interest (CCOI). All SSC is under the purview of the Sea Combat
Commander (SCC), also known as “Alpha Zulu” (AZ). In the instances where an SSC asset
locates a CCOI or COI, AZ will often request additional actions, such as taking pictures
(brownies) during a rig or close-up surveillance of the contact. The objectives of SSC assets are
to identify all contacts in the VA, followed by contacts in the CIEA, and ensure that no
unidentified contacts move within a position where they could pose a threat to a HVA.

Joint Maritime Operations Command and Control

The concept of Air Operations in Maritime Surface Warfare (AOMSW) supports the objectives
of the Joint Force Commander (JFC) by providing the required capabilities and forces. The JFC
normally designates a Joint Force Maritime Component Commander (JFMCC) to command and
control joint maritime operations. As the functional component commander, the JFMCC has
authority to perform operational missions with assigned and attached forces as well as forces and
assets made available for tasking. When the JFC designates a JFMCC Area of Operations (AO),
the JFMCC is the supported commander within the AO, and in this capacity, has the authority to
designate the target priority, effects, and timing of fires within the AO.

In addition, the JFMCC enables effective joint and coalition air participation in planning and
executing the four specific missions of SSC, Maritime Air Support (MAS), Air Interdiction
Maritime Targeting (AIMT), and Maritime Dynamic Targeting (MDT). As the JFC’s maritime
warfighter, the JFMCC integrates coalition and service assets into the missions described in the
following figure.

Mission Descriptions
This mission provides reconnaissance and surveillance in support of the
SSC maritime commander’s objectives by establishing and maintaining the
Common Operational Picture (COP).
These operations, which may cover large areas of open water, provide air
MAS action against hostile surface targets at sea that require detailed integration of
each air mission with the fire and movement of maritime forces.
This mission involves detailed tactical integration where surface forces are not
AIMT required. This mission shares many common similarities with traditional air
interdiction and Strike Coordination and Reconnaissance (SCAR) missions.
This mission allows for the prosecution of Targets of Opportunity. These are
targets that are identified too late or are not selected for action in time to be
MDT
included in deliberate targeting, but meet criteria specific to achieving
objectives.

Figure 5-2 Joint Force Maritime Component Commander Mission Descriptions

5-2 SURFACE SURVEILLANCE COORDINATION


ADVANCED E2 NFOTS CHAPTER FIVE

Warfare Commander Responsibilities

The Composite Warfare Commander (CWC), who is typically the Officer in Tactical Command
(OTC), is responsible for the operational needs of the CSG and Expeditionary Strike Group
(ESG). However, the CWC concept of operations allows an OTC to delegate tactical command
to the CWC. The CWC wages combat operations to counter threats to the force and to maintain
tactical sea control with assigned assets, while the OTC retains close control of power projection
and strategic sea control operations. Subordinate to the OTC and CWC are Principal Warfare
Commanders (PWCs), who are responsible for specific warfare areas. These warfare
commanders are responsible for collecting and disseminating information and, in certain
situations, are delegated authority to respond to threats with assigned assets. Six PWCs,
subordinate to the CWC, are designated by their warfare area. Aircraft may be assigned to more
than one PWC based on perceived threat priorities. The description of PWC–
supported/supporting relationships and assignment of responsibilities are outlined by Operational
Tasking (OPTASK) message.

The CWC and the PWCs are assigned an individual, two-letter call sign. The first letter
identifies the particular strike group, while the second letter identifies the corresponding mission
area. For example, the call sign of the ADC for the Enterprise CSG could be “Echo Whiskey”
(EW). Depending on the situation, the SCC can serve as both the Anti-Submarine Warfare
Commander (ASWC) and the Surface Warfare Commander (SUWC). If the name of the
particular strike group is not known or specified, utilizing “Alpha” as the first letter of the CWC
is appropriate. The CWC would then be AB, ADC would be AW, and so on.

Figure 5-3 Commander’s Call Signs

SURFACE SURVEILLANCE COORDINATION 5-3


CHAPTER FIVE ADVANCED E-2 NFOTS

Areas of Operation

AZ is the sea combat commander responsible to the Composite Commander of the strike group.
In times of high tasking, or if a specific situation requires, he/she can split the duties into SUW
(AS) and ASW (AX). AZ (and AS/X when active) is responsible for the identification, tracking
and prosecution of all surface and subsurface contacts in the surveillance area. The range of the
AO is defined by each PWC; therefore, the VA for “Alpha Whiskey” (AW) may be significantly
larger than AZ’s VA based upon the threats.

The entities and operational areas normally established include the following:

1. HVA – This asset is, in most cases, the Aircraft Carrier (CVN) in a CSG or the
Amphibious Assault Ship (LHA/LHD) in an ESG. It can also be a High Value Airborne Asset
(HVAA), such as an EA-18G Growler in a strike package. It is an asset deemed so important
that the loss of it could seriously impact U.S. warfighting capabilities or provide the enemy with
significant propaganda value. In the case of a HVAA, fighter aircraft can be assigned as HVAA
Protection (HVAAP).

2. VA – This area, which is defined by the expected maximum weapons release range of the
threat, is centered on the HVA. It is possible to have more than one VA.

3. CIEA – This is the area outside the VA, but inside the Surveillance Area (SA), which
includes all of the detected contacts upon which classification, identification, and monitoring
must be performed. Since any potential threat must be monitored prior to entering the VA, the
ability to escort, cover, or engage must be maintained for all contacts in the CIEA.

4. SA – This area, determined by the CSG commander, is where organic and inorganic
sensors keep track of activity to prevent surprise contacts from entering the CIEA.

Operational Tasking Messages

When operating in a particular theater, warfare commanders will issue various messages that not
only define the VA, CIEA, and SA, but also provide listings of important threats, specific
guidance on ROE, and methods of identification.

Operational tasking messages include the following:

1. OPTASK Communications – This document defines the satellite communications channels


and radio (secure and clear) frequencies used by the CSG.

2. OPTASK Link – This document provides all the parameters for link utilization, including
net assignments, track limitations, and crypto.

3. OPTASK Link Identification – This document delineates the appropriate link symbology
for track assignments.

5-4 SURFACE SURVEILLANCE COORDINATION


ADVANCED E2 NFOTS CHAPTER FIVE

4. OPTASK Air Defense and/or ADC Daily Intentions Message (DIM) – This message
outlines which naval vessels are designated as firing units and ACUs as well as listing additional
fleet air defense responsibilities.

5. OPTASK SUW/SCC and/or SCC DIM – This message contains the following priority
contact sets:

a. COI – These contacts have tactical significance, but they may not be a threat to the
force. As an example, COI may be defined as naval combatants operating in a
particular area or unknown surface contacts operating in a designated area. Their
presence has no real impact on mission completion.

b. CCOI – These types of contacts present a threat to the force, and their locations must
be identified for successful completion of the mission. The CCOI could be a
potential adversary suspected of either terrorist or smuggling activity.

Alpha Zulu Aircraft Support

From an aviation standpoint, aircraft support AZ by sanitizing, influencing, and prosecuting


possible threats found within the VA, CIEA, or SA. The mission of the E-2 is to assist AZ in the
sanitization of the VA and CIEA through the use of its sensors and the control of SSC assets.
Providing a clear picture of surface contacts in the outer SA, which may be outside the LOS of
the CSG and ESG surface assets’ sensors, is the entrusted role of the E-2.

The E-2 control of fighters and Maritime Patrol and Reconnaissance (MPR) aircraft, such as the
P-8, is typically regulated using a bullseye format, which is similar to AIC communications.
When determining where to send assets, the E-2 will prioritize contacts based upon their location
and perceived threat. Any unidentified contacts in the VA are a priority over other contacts in
the CIEA, followed by unknown contacts in the SA.

Data Link Information

Once vectored to a surface contact, SSC assets (typically F/A-18s or P-8s) will use their
platform-specific sensors to try to identify the contact. The ship type, hull number, flag, course,
and speed of the surface contact are reported back to the E-2, which then reports relevant
information via data link and a voice report to AZ.

SURFACE SURVEILLANCE COORDINATION 5-5


CHAPTER FIVE ADVANCED E-2 NFOTS

THIS PAGE INTENTIONALLY LEFT BLANK

5-6 SURFACE SURVEILLANCE COORDINATION


CHAPTER SIX
INTRODUCTION TO OFFENSIVE AIR SUPPORT

600. INTRODUCTION

This chapter introduces the fundamental concepts of OAS, provides definitions of the associated
terminology, and discusses the principles of effective OAS to support these operations.

601. PRINCIPLES AND CONCEPTS

This section describes the basic principles and concepts used to support OAS operations and
missions.

Principles of OAS

The concept of OAS allows a JFC to project command management beyond the range of normal
communications and provide up-to-date, fast-reacting commands to forces on the ground. The
foundation of OAS is based on an airborne mobile command platform, such as an E-2 Hawkeye
or E-3 AWACS, which provides critical relay and communications support between C2 centers
and aircraft in the theater.

Command and Control Structure

When operating in a joint (multi-service) or combined (multi-national) environment, the


command and control structure for air operations will normally follow the Air Force
organizational structure. While there are several more elements to the command and control
structure, we will focus on the ones most often involved with OAS operations.

1. Air and Space Operations Center (AOC) – The JAOC (joint operations) or CAOC
(combined operations) is the senior C2 element and is responsible for the planning and conduct
of component air and space operations within a theater.

2. Air Support Operations Center (ASOC) – The ASOC is the primary control agency
responsible for the execution of air power in direct support of land operations. Its primary
mission is to control air operations short of the Fire Support Coordination Line (FSCL). It is
normally collocated with the senior Army fires element. The ASOC is directly subordinate to the
AOC.

3. Tactical Air Control Party (TACP) – The TACP is an air liaison unit collocated with
ground maneuver units. TACPs report to the ASOC and have two primary missions: to advise
ground commanders on the capabilities and limitations of air operations and to provide joint
terminal attack controllers (JTACs) to support ground units.

4. Joint Terminal Attack Controllers – JTACs are embedded with ground units to provide
final control to CAS attack aircraft. JTACs will assist the CAS attack aircraft with target
correlation and provide information critical to a successful attack.

INTRODUCTION TO OFFENSIVE AIR SUPPORT 6-1


CHAPTER SIX ADVANCED E-2 NFOTS

5. Control and Reporting Center (CRC) – The CRC provides battle management, early
warning and surveillance, weapons control, and data link management. The functions of the
CRC are essentially the same as the OAS platform, but may not be available in an immature
theater.

Airspace Coordinating Measures

Airspace Coordinating Measures (ACMs) are three dimensional areas which can be used to
restrict access to certain areas. This restricted access allows controllers and commanders the
ability to de-conflict air and surface fires. There are two general types of ACMs: pre-planned or
dynamic. Some examples of common ACMs include, but are not limited to:

1. Restricted Operating Zone (ROZ) – Airspace is reserved for specific activities in which the
operations of one or more airspace users are restricted.

2. Close Air Support Area (CAS) – Airspace designated as a holding orbit for rotary or fixed-
wing aircraft supporting CAS operations.

3. Minimum Risk Route (MRR) – A temporary corridor of defined dimensions that presents
minimum hazards to low flying aircraft transiting the combat area.

4. Air Corridor (AIRCOR) – A restricted air route for use by friendly aircraft to prevent being
fired upon by friendly forces.

5. No Fly Area (NOFLY) – Airspace set aside for a specific purpose in which no aircraft
operations are permitted, except as authorized by the appropriate commander or controlling
agency.

Maneuver Coordination Measures

Maneuver Coordination Measures (MCMs) are measures established by the


supported/supporting ground commander to define lines of responsibility in support of
movement and maneuver of friendly forces. Some examples of common MCMs include, but are
not limited to:

1. Forward Line of Own Troops (FLOT) – A line that indicates the friendly forces in the most
forward positions in any kind of military operation at a specific time. The FLOT must be
designated by the ground commander and disseminated to supporting aircraft to prevent potential
friendly fire incidents.

2. Fire Support Area (FSA) – An area assigned to fire support ships by the naval force
commander from which they deliver.

6-2 INTRODUCTION TO OFFENSIVE AIR SUPPORT


ADVANCED E-2 NFOTS CHAPTER SIX

Fire Support Coordination Measures

Fire Support Coordination Measures (FSCMs) are two or three dimensional areas employed by
commanders to facilitate the rapid engagement of targets and simultaneously provide safeguards
for friendly forces. Like ACMs, FSCMs may be pre-planned or dynamic. Some examples of
common FSCMs include, but are not limited to:

1. Fire Support Coordination Line (FSCL) – A line established by the appropriate land or
amphibious force commander support common objectives within an area of operations. The
FSCL is used to coordinate fires of air, ground, or sea weapons systems against surface targets.
Short of the FSCL, all fires must be coordinated with the establishing commander prior to
engagement, due to the close proximity to friendly forces. This is where CAS normally occurs.
Beyond the FSCL, all fires must be coordinated with affected commanders prior to engagement.

Figure 6-1 Forward Line of Own Troops and Fire Support Coordination Line

2. No Fire Area (NFA) – An area designated by the appropriate commander into which fires
or their effects are prohibited.

3. Restricted Fire Line (RFL) – A line between converging friendly ground forces that
prohibits fires or their effects across that line.

INTRODUCTION TO OFFENSIVE AIR SUPPORT 6-3


CHAPTER SIX ADVANCED E-2 NFOTS

4. Restricted Fire Area (RFA) – An area in which specific restrictions are imposed and into
which fires that exceed those restrictions will not be delivered without coordination with the
establishing headquarters.

5. Kill Box – A three-dimensional area used to facilitate the integration of joint fires. Kill
boxes are established to support airborne interdiction (AI) efforts as part of the JFC’s joint
targeting process. Once established, a kill box allows for lethal attack on surface targets without
further coordination with the establishing commander or terminal attack control. Kill boxes can
have restrictions in the case of joint air-to-surface and surface-to-surface indirect (LOS does not
exist between weapon system and target) fires. The goal of a kill box is to reduce the required
coordination for fulfilling support requirements with maximum flexibility, while preventing
friendly fire incidents. Kill boxes are normally established beyond the FSCL. Since friendly
forces are typically not expected to be beyond the FSCL, the kill box structure allows AI assets
to engage targets without the need for CAS or additional coordination.

A kill box should be established with the aid and consultation of any commanders involved. Kill
box requirements and other control measures, which are determined using normal component
targeting and planning processes, are established and approved by commanders or their
designated staff. Information on the attributes of the kill box is then published and disseminated
using existing voice and digital C2 systems. The integration of indirect fires and the presence of
forces are some of the factors that may affect the structure of the kill boxes.

Kill Box Identification

The dimensions of a kill box are defined using a reference system, such as the Global Area
Reference System (GARS). The GARS system uses three numbers followed by two letters to
describe a unique 30 minute by 30 minute area. The origin point for the system is 90 degrees
south (the South Pole) and 180 degrees east/west. The areas are read right (west to east,
001-720) then up (south to north, AA-QZ). The 30 minute by 30 minute areas are subdivided by
quadrant into 15 minute by 15 minute areas, and then further subdivided by a keypad division
into 5 minute by 5 minute areas (Figure 6-2).

6-4 INTRODUCTION TO OFFENSIVE AIR SUPPORT


ADVANCED E-2 NFOTS CHAPTER SIX

Figure 6-2 Global Area Reference System

Kill Box Color Coding

The colors blue and purple are used to represent the two types of kill boxes.

Blue Kill Box – A blue kill box permits air interdiction in the area without further coordination
from the establishing headquarters. If the kill box is active, air-to-surface fires delivered by
aircraft not assigned to the kill box must be coordinated. Additionally, all aircraft not assigned to
an active blue kill box are restricted from entering without proper coordination. Surface-to-
surface direct (LOS exists between weapon system and target) fires are not restricted by a blue
kill box, but surface-to-surface indirect fires are not permitted. Blue kill boxes minimize the
restrictions on air-to-surface fires while also protecting aircraft.

INTRODUCTION TO OFFENSIVE AIR SUPPORT 6-5


CHAPTER SIX ADVANCED E-2 NFOTS

Figure 6-3 Blue Kill Box

Purple Kill Box – A purple kill box also allows maritime and land component commanders to
employ surface-to-surface and subsurface-to-surface indirect fires. This difference from the blue
kill box allows for the maximum use of joint fires, creating the maximum potential for engaging
targets. Surface-to-surface direct fires are not restricted by a purple kill box. The airspace for a
purple kill box also includes a floor and ceiling to enable separation between aircraft delivering
air-to-surface fires, trajectories of surface-to-surface indirect fires, surface-to-air fires, and other
aircraft.

6-6 INTRODUCTION TO OFFENSIVE AIR SUPPORT


ADVANCED E-2 NFOTS CHAPTER SIX

Figure 6-4 Purple Kill Box

602. TERMINOLOGY

The following section provides a summary of the terms used in support of OAS operations.

Close Air Support

CAS is an air action by fixed-wing and rotary-wing aircraft against hostile targets that are in
close proximity to friendly forces and requires detailed integration of each air mission with
the fire and movement of those forces.

CAS can be conducted at any place and time friendly forces are in close proximity to enemy
forces. The word “close” does not imply a specific distance; rather, it is situational. The
requirement for detailed integration because of proximity, fires, or movement is the determining
factor. At times, CAS may be the best means to exploit tactical opportunities in the offense or
defense. CAS provides fires to destroy, disrupt, suppress, fix, harass, neutralize, or delay enemy
forces.

JTAR

Any tasking for CAS will come from the ASOC in the form of a Joint Tactical Air Strike
Request (JTAR). The JTAR will be assigned a number in the form of the two-digit date
followed by the numerical order of JTARs assigned that day. For example, JTAR 13-07 is the
seventh JTAR assigned on the 13th of the month. The JTAR will include target type and
location, desired results, callsign and frequency of the JTAC, as well as more detailed
information.

The JTAR will be relayed to the OAS platform by referencing the line numbers on the JTAR
form, directing to “circle” the applicable letter(s) for that line number and/or filling in blanks.

INTRODUCTION TO OFFENSIVE AIR SUPPORT 6-7


CHAPTER SIX ADVANCED E-2 NFOTS

The ASOC will pass lines 1-7 to the OAS platform. It is important to accurately transcribe the
information. Certain information needs to be read back to the ASOC to ensure they have the
most critical information. The student should read back the request number, line 4, and line 7.
The remaining information is used for selecting the appropriate asset based on the type and
location of the target.

Once a JTAR has been received from the ASOC, it is the responsibility of the E-2 to assign an
appropriate CAS asset to prosecute the target. Consideration should be given to the following
when choosing an asset:

1. Prioritization of targets

2. Location of target in relation to assets

3. Type of target

4. Weapons loadout

5. Desired results

6. Play time (time on station based on ATO or fuel remaining) remaining for assets

Once an asset has been chosen for a JTAR, pass the applicable JTAR information to the asset
and request their Time on Top (TOT). The student should pass the request number, line 4, and
line 7 to the asset. Since the JTAC will pass the CAS 9-line to the asset, there is no need to read
the entire JTAR to the assigned asset. Once the asset calculates their TOT and relays it back to
you, pass that information back to the ASOC. After a JTAR has been prosecuted, the asset
should report back with an In-Flight Report, which should then be relayed to the ASOC. A
JTAR is not considered closed out until the In-Flight Report has been passed to the ASOC.

6-8 INTRODUCTION TO OFFENSIVE AIR SUPPORT


ADVANCED E-2 NFOTS CHAPTER SIX

Figure 6-5 CAS Life Cycle

Close Air Support Stack

A CAS Stack is any number of CAS assets in close proximity to each other that are deconflicted
with regard to altitude. CAS check-in procedures include reporting of information, such as
mission number, number of aircraft, position, altitude, play time, and abort code. Once the

INTRODUCTION TO OFFENSIVE AIR SUPPORT 6-9


CHAPTER SIX ADVANCED E-2 NFOTS

check-in is complete, the aircraft will be assigned targets and times for weapons delivery by the
OAS platform or CRC.

Time Sensitive Target

A TST is a target that requires immediate response from friendly forces. TSTs require a
response either because they pose or will soon pose a danger to friendly forces, or because they
are highly valuable, fleeting targets of opportunity. TSTs may be either planned or immediate.
Some, such as aircraft or submarines, may be handled by separate components. Others may
require detailed inter-service and/or functional component planning and coordination. The JFC
provides specific guidance and prioritization for TSTs within the AO. Since fleeting TSTs may
be difficult to detect or identify due to enemy mobility and/or denial and detection techniques,
they must be engaged rapidly before the enemy can use these techniques.

High-Priority Task List

The High-Priority Task List is a list of important targets that receive priority when TSTs and
direct support targets are not available. This list, which exists to aid warfighters in deciding
mission priority, takes precedence over all priorities except TST and troops in contact.

Date of Date of
Priority Description Location JTAR#
Request Approval
High Mobile RADAR Emplacement Grid D4 T28-33 28/09/2012 01/10/2012
Medium Natural Gas Power Plant Grid C2 T28-05 28/09/2012 04/10/2012
Medium Vehicle Depot Grid C2 T28-11 28/09/2012 03/10/2012
Low Improvised Troop Bunker Grid D5 T28-63 28/09/2012 04/10/2012

Figure 6-6 High-Priority Task List

Role of the E-2 in OAS

The essential role of the E-2 aircrew is to provide friendly assets with C2 for mission success
within the AO. Some of these responsibilities include checking in strike assets; directing
fighters; tracking and directing CAS assets; coordinating tankers; sending and receiving
Situation Reports (SITREPs) with updates to the FLOT, FSCL, kill boxes, No-Fire Areas
(NFAs), and real time targets of opportunity; communicating with C2 agencies (AOC/ASOC);
recording In-Flight Reports/Mission Reports (MISREPs); and providing link information and
procedural air traffic control functions. The E-2 is a critical airborne asset with an extremely
busy pace of operations in the AO.

6-10 INTRODUCTION TO OFFENSIVE AIR SUPPORT


CHAPTER SEVEN
AIR INTERCEPT CONTROL

700. INTRODUCTION

This chapter summarizes the basic layout and proper use of the AIC and tactics timeline. The
associated AIC terminology, information on how to use the timeline in an intercept scenario, and
examples of how to use the timeline and brevity language to make proper communication calls
are also provided.

701. THE BIG 3

The Big 3 concept applies to each element of successful AIC. The Naval Aviator, Air Intercept
Controller, and Fighter Aircraft each have their respective Big 3 concept.

1. Naval Aviator’s Big 3 – The standard aviation priorities of aviating, navigating, and
communicating apply for all missions.

2. Air Intercept Controller’s Big 3 – Controller’s must use the appropriate intercept control
communication and brevity, display proactive involvement in their actions, and maintain proper
situational awareness.

3. Fighter Aircraft’s Big 3 – These aircraft must maintain the appropriate formation, execute
the sensor game plan, and use clear and concise communications.

702. AIR INTERCEPT CONTROL CHARACTERISTICS

The following information provides guidelines and conceptual information used in implementing
AIC functions.

Communication Goals

The communication goals of AIC are as follows:

1. Maximize listening time and comprehension – Listen to transmissions to make sure they
are understood. In a critical situation, a misinterpreted call could result in a mishap or threaten
mission success.

2. Execute clear and concise standardized calls – Make use of standard brevity language and
be as specific as possible. Communication standardization reduces uncertainty and confusion,
while communication brevity provides maximum listening time on the frequency to build SA.

3. Avoid simultaneous transmissions – Be aware of who has communications priority


(depending on the phase of the intercept timeline).

AIR INTERCEPT CONTROL 7-1


CHAPTER SEVEN ADVANCED E-2 NFOTS

4. Avoid unnecessary calls – Do not make nonessential transmissions, which may interfere
with critical communications or induce confusion.

Air Intercept Control Communication Tools

In order to execute AIC successfully and minimize undue errors or stress, the following
communications tools are used:

1. COMM brevity is a communications code language that helps to make communications


clear and concise. When a term is not known, the use of plain English is recommended for
clarity.

2. COMM format delivers AIC core information in the following format:

Core Information

The seven components of AIC core information are call sign, number of groups and/or group
name(s), location and anchor point, altitude, aspect, declaration, and fill-ins. Each one of these
components is represented in the following figure:

29,000 ft

Merlin 11

“Merlin 11, Single Group, BRAA 300/25 29 thousand, Flank South, Bogey Spades”

Figure 7-1 Core Information (BRAA call)

7-2 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

The following are the components of AIC core information:

a. Call sign – This component is the call sign of the element receiving or sending the
information. Every call begins with a call sign. Certain call signs should not be used
to avoid mixing of communication brevity terms. Some examples of call signs that
should not be used are: “Fox” (which is a designation for the firing of missiles), a
call sign that sounds similar to the AIC aircraft’s call sign, or the bullseye. Generally
speaking, during AIC communications, the AIC’s call sign will be used unless a call
is specifically referencing the fighter, such as when using the BRAA format
.
b. Number of groups and/or group name(s) – This will determine the label of the picture
as described later in chapter 7 (i.e., “2 groups range 10”) or to specify the group being
referenced in the call (i.e., “…Single Group, Bull…”).

c. Location and anchor point – This component allows the specified group to be
“anchored”, providing the group’s location in bearing and range from an anchor
point. The chosen anchor point, which is dependent on the situation and timeline, is
related to the type of control format used. These points include digital bullseyes,
bearing and range from the fighters (in the BRAA format), or a geographical
reference point.

i. For bullseye referenced calls, the bearing (stated as separate numbers) and range
(stated as a single number) are given in numerical format from the bullseye
(e.g., 280/17, read as “two-eight zero, seventeen,” means 280 degrees magnetic
at 17 miles). This allows for correlation of the groups by the fighters’ sensor
systems. The bullseye will be assigned a code word. Before a commit, groups
in the area are typically anchored to the bullseye alone. If a group is within 5
nm of the bullseye, the group is stated as “at” the bullseye. After commit, the
bullseye is referenced to aid in fighter correlation and should be used to anchor
a group.

ii. Geographical reference points, or georefs, are local landmarks chosen during
mission planning that are known by both the AIC controller and the fighters and
used to describe threat location. This type of anchor point is simple to
designate, but is also inaccurate (for instance, a local landmark is difficult to
locate under certain conditions or at night). They are typically only used in the
pre-commit phase of an intercept. Before a commit, if a group is within 5 nm of
a georef, then that group is stated as “at” that point. Georefs are typically only
used when a group is “at” that location. Bearing and range is usually not
provided from a georef. Additionally, using “at” the bullseye or “at” a georef
are typically only used during broadcast control, since it does not provide the
level of fidelity required for fighter correlation.

AIR INTERCEPT CONTROL 7-3


CHAPTER SEVEN ADVANCED E-2 NFOTS

iii. Using a fighter as a reference point requires AIC to maintain SA to the fighter
position at all times. This type of reference informs a fighter of the location of
the group with respect to the fighter’s position in space, in the BRAA format.
Using a fighter as a reference point aids in the correlation of groups for the
fighter and gives that fighter quick SA to the location of the group. When
anchoring groups at or inside of meld range, this type of reference is usually
required.

In order to ensure the AIC and fighters’ navigation systems are within the required
tolerance for correlation of groups, the AIC must perform an “Alpha” check with each
fighter element upon check in. This is performed by the AIC calling the fighter’s bearing
and range from the bullseye. The fighter will verify that the position called by the AIC is
within the required 3 nm and 3 degrees tolerance. For example:

AIC: “Enforcer 11, Alpha check Rock 173/38.”

If the fighter determines that the position called by AIC is within 3 nm:

FTR: “Enforcer 11, good alpha check.”

If the fighter determines that their position is outside 3 nm or 3 degrees of the position
called by AIC, they will call their position off of bullseye, prompting all parties to check
their bullseye for correct location and/or nav for error:

FTR: “Enforcer 11, shows Rock 170/32.”

In this case another alpha check shall be performed until the fighter determines that it is
within tolerances.

d. Altitude – Altitude is always given in thousands of feet (e.g., 22 thousand), rounded


to the nearest thousand. AIC must provide altitude as accurately as possible, but there
may be limitations when deriving this figure. If exact altitude is unknown or is
unreliable based on system limitations, AIC will state “Altitude Unknown” in place
of altitude. If the contact is overland, the altitude will be left out entirely, due to radar
system limitations.

e. Aspect – Aspect is the two-dimensional direction in which the specified group is


heading. General aspects are used to provide the greatest amount of SA to all of the
fighters. This is done by calling “track” with a cardinal or sub-cardinal direction,
such as “track south” or “track northeast”. Anytime you anchor groups off of
bullseye, you will use general aspects. When anchoring off of BRAA, specific
aspects are used, meaning the direction in which the contact is traveling in reference
to the fighters. These aspects are Hot (0 to 20 degrees target aspect), Flank (30 to 60
degrees target aspect), Beam (70 to 110 degrees target aspect), and Drag (120 to 180
degrees target aspect). The aspects of flank, beam, and drag must always include a
cardinal or sub-cardinal direction (i.e. beam north or flank southwest). Additionally,

7-4 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

“CAP” may be used as the aspect in broadcast or tactical control when there is no
trend because they are constantly turning, or when you haven’t had enough time to
determine a trending direction such as at initial detection.

f. Declaration – Declaration is the status of the group according to the ROE.


Declarations include Friendly (positively identified friendly aircraft), Bogey
(unknown identity), Bandit (contact identified as an enemy and weapons release not
authorized), and Hostile (contact identified as an enemy and weapons release
authorized).

Amplifying information with a Bogey declaration includes Bogey, Spades (no available IFF or
Selective Identification Feature [SIF] modes and codes required for identification), Bogey,
Squawking (response with an IFF/SIF mode or code other than one prescribed by Air Tasking
Order [ATO]/identification criteria), and Bogey, Paints (response with any specified IFF/SIF
modes and codes established for identification criteria).

For the purpose of all E-2 strand events ROE will be as follows: AIC will not call a group
hostile until told to do so by AW. The CJCS standing ROE inherent right to self-defense only
applies to the commander of the aircraft being attacked or threatened. As an example, AIC will
not respond to a “spike call” with a hostile declaration (assuming that group wasn’t previously
declared hostile). If escalations have occurred, AW may grant AIC “hostile declaration
authority”. This is a blanket authority that will allow AIC and the fighters to call groups hostile
that meet the Orange/Red PID criteria. Example:

TANGO: “AW, this is TANGO, track 6024 engaged side, 201, and was splashed in
self-defense, say intentions.”

AW: “TANGO, this is AW, roger. Warning/Weapon Status upgraded to red and tight.
All Orange military aircraft will be declared hostile and engaged, over.”

TANGO: “AW, this is TANGO, Warning/Weapon Status upgraded to red and tight.
All Orange military aircraft will be declared hostile and engaged, out.”

g. Fill-ins – This section of the core component includes identification, strength, and
other information. Fill-ins can be extremely helpful to the fighters and may aid in
determining targeting priorities or adjusting timeline. Aspect and declaration are two
fill-ins which are always required when providing a full positional call to a group.

i. Identification, commonly referred to as tipper, denotes the type of aircraft. The


words used for identification are contingent on the net used by the AIC. If
controlling on a non-secure net, use code words in accordance with the Special
Instructions (SPINS), card of the day, or other documents. If controlling on a
secure net, use the North Atlantic Treaty Organization (NATO) code words
(e.g., “Fulcrum” for a MiG-29).

ii. Strength indicates the size of the group. We assume that all groups consist of
two contacts. If the group contains three contacts or more, it is “Heavy,” and if

AIR INTERCEPT CONTROL 7-5


CHAPTER SEVEN ADVANCED E-2 NFOTS

the group is a large force of indeterminate numbers, it is designated as


“Gorilla.”

iii. Other information is always stated directly after the aspect (e.g., “Very fast” for
a group traveling at greater than 900 knots [kts] groundspeed, “High” for a
group at 40 thousand feet or above).

3. COMM priority is based on the communications cadence system where each person
participating in the intercept has a place to talk and a place to respond (although not every call
needs to be acknowledged). The priority rests with AIC, then the fighters prior to commit. Post
commit, following the post-commit picture given by AIC, the priority switches to the fighter and
then AIC. Generally, the fighters will have COMM priority for the remainder of the intercept
until the fighters are clear of the merge. However, COMM priority does not mean others cannot
provide additional calls to aid in building SA.

Figure 7-2 COMM Priority

a. There are four exceptions when AIC can talk in the merge phase. These exceptions
are:

i. A threat call is required


ii. A trespass call is required
iii. A fighter requests SA
iv. QA fighter flow

b. At any point in the merge phase of the intercept, if a fighter makes a request for
information, AIC can respond to that request. Examples of frequently used fighter
requests for information include a spike call with a bearing (e.g., Fighter: “Heat 11
spiked, 270”), a declare call to follow on factor groups (e.g., Fighter: “Ghost, Heat 11

7-6 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

contact Rock 234/23, 21 thousand, hot, declare”), or a clean call (e.g., Fighter:
“Ghost, Heat 11, clean lead group”).

c. AIC may also speak in the merge phase of the intercept if an untargeted group is
about to pierce threat range to the fighters (e.g., AIC: “Heat 11, trail group threat
BRAA 274/8, 20 thousand, hot, hostile”). There may also be times where AIC needs
to step-in and adjust fighter flow following the fighter’s post-merge flow call on PRI
(e.g., Fighter: “Heat flow 270.” [Assuming this is not the desired direction of travel
for the fighters] AIC: “Ghost recommends Heat flow 180”). Lastly, if the fighters
are about to enter a surface-to-air weapons engagement zone, AIC can provide a
trespass call, and as a technique, provide a flow direction that directs the fighter(s)
clear of the surface-to-air threat (e.g., AIC: “Heat11, trespass 6, Rock 034/19,
recommend flow 090”).

d. Information priority refers to the groups that are the highest priority to the fighters.
Priority is dictated by the range of the fighters from the targets as well as the altitude,
aspect, and identification of the targets.

e. Control types are broadcast and tactical. All control types, which are described in
further detail below, are to be in concurrence with TOPGUN standards.

i. Broadcast control, which provides an overall view of the area to all players,
helps to build SA rather than direct fighters. This type of control facilitates an
early warning and overall view for all players. All of these calls are anchored to
bullseye or a georef, when available.

ii. Tactical control provides information to a specific fighter element and allows
for the highest degree of controller integration. When using tactical control, a
bullseye or the fighter’s position (BRAA) can be used to anchor groups.

f. TOPGUN standard control is contingent upon the pre-commit, post-commit, weapons


employment, merge, and post-merge phases of the intercept. In the pre-commit
phase, standard control is broadcast control using digital format anchored to the
bullseye. At the commit, AIC uses pre-commit phase communication formats, but
typically will only anchor the highest factor group before recommending or directing
the commit. In the post-commit phase, standard control is tactical control using
digital format anchored to the bullseye. In the weapons employment phase, standard
control is tactical control using BRAA format anchored to the fighter’s position. In
the merge phase, AIC should monitor other factor groups and note COMM priority,
talking only during the exceptions noted. In the post-merge phase, AIC should use
tactical control using BRAA format anchored to the fighter’s position, or digital
format anchored to the bullseye, depending on whether or not follow on factor groups
are inside or outside of meld range, respectively. This will be covered in more detail
later in this chapter.

AIR INTERCEPT CONTROL 7-7


CHAPTER SEVEN ADVANCED E-2 NFOTS

703. THE INTERCEPT TIMELINE

The air-to-air timeline is the guideline for AIC communications. Different formats and priorities
are observed depending on the distance from the fighters to the group(s) being intercepted, in
accordance with the timeline being used. There are different timelines which are used based on
the expected threat weapons. Knowledge of the air-to-air timeline helps aviators become
familiar with the specific stage of the intercept and indicates who has communication priority.
A generic timeline is provided below, which will be used for all AIC events at VT-4.

Figure 7-3 Air-to-Air Timeline

7-8 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

Intercept Progression

The following section steps through the different stages of an air-to-air intercept.

1. Pre-Commit (Broadcast Control) – Prior to committing the fighters, AIC has


communication priority and has the responsibility for providing SA to all fighters. No picture
labels or group names are assigned in broadcast control, with the exception of a single group.
Since group names are not assigned until after the commit, all groups are simply referred to as
“group” prior to giving a full positional call for each group present. In broadcast control, groups
will be anchored off of bullseye and will be given general track directions for their aspects. AIC
will give the total number of groups to start the call, but will only anchor the three highest factor
groups. Broadcast calls should be made at least once every 60 seconds over water and once
every 30 seconds over land. Remember to omit altitudes if groups are overland. An example of
a broadcast call would be:

AIC: “Eagle, seven groups. Group, Rock 170/35, 27 thousand, track south, hostile.
Group, Rock 155/40, 29 thousand, track south, hostile. Group, Rock 176/42, 26
thousand, cap, bogey, spades.”

2. No Later Than (NLT) Commit – This is the range by which the fighters should be
committed to intercept a group(s). This is a no later than range, meaning this is the latest the
fighters should be committed in order to stay on timeline and execute their tactics accordingly.
Once a group is approaching 35 nm to the fighters, with an aspect of flank or hot, the commit
call should be made. The commit call begins as a normal broadcast call, however, only the
highest factor group (based on targeting priorities) is called prior to directing or recommending
the fighters to commit. For example:

AIC: “Eagle, two groups. Group, Rock 170/40, 27 thousand, track south, hostile.
Showtime commit.”

3. Post-Commit – After the commit call, the fighter lead will make a required call to the
fighter element on their auxiliary (aux) radio, which the AIC typically will not be listening to.
This call only takes a couple of seconds, after which time the AIC should make the post-commit
tactical picture call. This call is extremely important, as it is providing a mental picture to the
fighters of what the threat presentation is and will dictate how they execute their tactics. At this
point, labels and group names are assigned using the tactical control format anchored to bullseye.
The AIC should strive to have the picture call measured out and ready to call prior to making the
commit call. This minimizes the delay in making the picture call and assists the fighters with
staying on timeline.

4. Targeting – After the AIC makes the tactical picture call, the fighter lead will assign
targeting based on the tactics being executed and the briefed targeting priorities. While the
fighter lead determines which group(s) should be targeted, the AIC should be thoroughly familiar
with targeting priorities. The AIC determines the order in which groups are called, as outlined
above, based on targeting priorities. There will also be times when the AIC directs targeting.
Keep in mind that “targeting” does not imply weapons engagement. It simply means that the

AIR INTERCEPT CONTROL 7-9


CHAPTER SEVEN ADVANCED E-2 NFOTS

targeted group is the group currently being intercepted by the specified element(s) of fighters.
The result of that intercept will be determined by the current ROE and commander’s intent. The
targeting priorities for all AIC events at VT-4 are as follows:

a. Range – With groups separated by range, the closest group will typically be targeted
first.

b. Elevation – An enemy aircraft at a higher altitude constitutes a higher threat based on


the ability of that aircraft’s weapons to travel farther, simply based on physics.

c. Identity – Some aircraft present a higher threat than others. More capable aircraft
should be targeted first if all other considerations are equal.

In addition to the targeting priorities above, when performing the DCA mission in defense of the
CSG, the following priorities exist.

d. Bogey over hostile – An unknown aircraft is higher priority due to the fact that the
fighters would need to execute a visual identification (VID) prior to engaging,
whereas the hostile could be covered with friendly surface-to-air fires (e.g., “birds”).

e. Low over high – When defending the CSG, an enemy aircraft at low altitude is
considered a higher threat, because surface RADARs within the CSG may not be able
to see that aircraft until it is already within weapons release range.

f. Striker over fighter – With the primary mission of defending the CSG, an enemy
strike aircraft is more of a threat than a fighter.

5. Tactical (tac) range call – The tac range call is an informative call from the AIC to a
specific fighter that the group they are targeted into is 30 nm away. This call is to remind them
that meld is less than a minute away. If groups are being targeted simultaneously by multiple
elements of fighters, a tac range call is required to each element to the group they are targeting.
The format is: fighter call sign, group name, range (30 miles). For example:

AIC: “Enforcer 11, single group, 30 miles.”

There may be times when AIC is late making the tac range call. In this case, call the actual range
between the fighter and the targeted group. The latest point at which a tac range call may be
given is at Meld.

Correlation/declaration call Once the fighters are targeted into a group, they will be focused on
gaining RADAR SA to that group and correlating what they see with what the AIC has called.
This correlation will occur in the form of a declaration call by the fighter, followed by a response
from the AIC. Correlation may happen any time after targeting assignment and prior to meld.
The declaration call will consist of the fighter making a call, similar to an AIC call, referencing
an uncorrelated group they have RADAR on. If a fighter requests for correlation on a group

7-10 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

anchored off of a bullseye, AIC will use their callsign along with track directions, so that the call
applies to all elements. For example:

FTR: “Eagle, Enforcer 11, contact, Rock 170/35, 28 thousand, track south, declare.”

AIC: “Eagle, single group, Rock 170/35, 28 thousand, track south, hostile, crow.”

Correlation only occurs in the fighter cockpit. The responsibility of the AIC is to call whatever
is at the location called by the fighter. As a result, it is critical that the AIC listens to the
fighter’s declaration call, paying particular attention to the anchor point being used and the
bearing and range. In the response, the AIC should use the same anchor point as the fighter, but
call exactly what is seen at that location, not necessarily what the fighter called or what is
expected of them to call. It is not uncommon for the fighter to call something other than the
group they are targeting. There could be multiple contacts in the same general area, making
correlation much more difficult.

Never give an ambiguous response to a declaration call, such as “your call hostile” or “that group
hostile.” That could be a fatal mistake. A declaration call requires a full positional update in
response.

If the fighter makes a declaration call to a neutral or friendly aircraft, respond with what/who the
aircraft is, rather than a group name and add the brevity term “skip it” with voice inflection.
For example:

AIC: “Enforcer 11, COMM AIR, BRAA 273/23, 37 thousand, track south, SKIP IT.”

If a group’s declaration changes at any time during an intercept, AIC is required to give a full
positional update to that group with the new declaration. This is required in order to ensure
correlation on the specified group(s).

{outside of meld}

AIC: “Eagle, single group, Rock 127/31, 32 thousand, track east, hostile.”

AIC: “Eagle, single group, Rock 127/31, 32 thousand, track east, hostile.”

{or inside of meld}

AIC: “Heat 11, single group, BRAA 089/28, 32 thousand, hot, hostile, crow.”

If a fighter calls “clean” to a group, it implies that they do not have radar SA on that group and
require a BRAA call from AIC. If the fighters should be targeting that group, a directive
targeting call is required. As long as the fighters keep calling “clean” to a group, AIC will keep
responding with BRAA calls.

Fighters: “Heat 11 clean single group”

AIC: “Heat 11 single group BRAA 045/21, 27 thousand, hot, hostile, crow”

AIR INTERCEPT CONTROL 7-11


CHAPTER SEVEN ADVANCED E-2 NFOTS

Additionally, if the fighters call for a declaration on a group that AIC does not have SA to, the
response is “clean” with the anchor point and location that the fighters called, implying that AIC
looked in that area and has no radar hits.

6. Meld and sort – While the AIC is not necessarily involved with meld and sort, it is
important to understand what is happening. Prior to meld each fighter will be assigned a specific
AOR, where they are responsible for sanitization. Pre-meld, the fighters are using their
RADARs to sanitize the airspace within their respective AOR. Melding is the act of focusing the
RADAR of every fighter into the targeted group for sorting and weapons employment.

Sorting is determining which contact within the targeted group each fighter will employ weapons
against. The sort plan is determined by the fighter lead during mission planning, based on
several assumptions, such as, a group always consists of two aircraft. This minimizes the
amount of communication required to ensure weapons are employed on each contact within a
group.

The communications associated with meld and sort are all performed on the fighters’ aux radio.
Therefore, AIC will usually not hear it. However, meld is the point where the AIC anchor point
typically shifts to the fighter’s position, using the BRAA format. Post-meld, BRAA should be
used unless a fighter specifically asks to anchor a group off of bullseye or if they ask to “declare”
a group, which is a brevity term requesting an updated AIC call for a specified group anchored to
bullseye. During this phase of the intercept, the AIC should focus on monitoring for any changes
to the picture, such as maneuvers, additional, or pop-up groups, etc.

Meld is also the point when the AIC can directively target the fighters, if necessary. Directive
targeting is performed by using both fighters’ callsigns (11 and 12) and simply injecting the
word “target” prior to the group name in a normal BRAA call. Directive targeting is required by
AIC at Meld if the fighters have not already issued their own targeting, or whenever targeting is
no longer sound.

a. Targeting is no longer sound – Directive targeting is necessary if groups maneuver in


such a manner that targeting priority shifts among the groups. One example would be
if the lead group in a two group range problem drags away and then passes with the
trail group. Targeting the lead group would no longer be sound. Therefore, it is
AIC’s responsibility to issue directive targeting into the trail group. When issuing
directive targeting, you need to use the callsign of all the fighters you are going to
target. An example of how that would be communicated to the fighters:

AIC: “Eagle, lead group, drag east.”

Once the lead group and trail group pass:

AIC: “Eagle, lead group, trail group, passing. Enforcer 11 12, target trail group, BRAA
090/21, 29 thousand, hot, hostile, robin.”

7-12 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

b. Pop-up group – If a pop-up group is detected, directive targeting may be necessary,


unless the fighters are already targeted into another group that has targeting priority
over the pop-up group.

c. When the fighters give an “anchor, flow, picture” call after the merge, and there is an
untargeted group within factor range to the fighters. (See “Post Merge” below for
more details.)

7. MRM (Fox 3) – At 20 nm, the fighters will have their first opportunity to employ weapons,
assuming the group has been declared hostile. The weapon being employed at this range would
be the medium range missile, which is an active RADAR missile. The brevity term for an active
guided missile shot is “Fox 3.”

Normally, the AIC will not respond to a fighter’s shot call. However, if there are follow on
groups, the fighter may request a separation call to the specified group. For example:

FTR: “Enforcer 11, fox 3, lead group. Eagle, separation trail group.”

AIC: “Enforcer 11, trail group, separation 10, 28 thousand, hot, hostile, heron.”

If the relationship (range or azimuth) between the targeted group and the follow on group is not
implicit (e.g., range separation for a trail group), the AIC will specify whether it is a range
separation or an azimuth separation. For example:

AIC: “Enforcer 11, additional group, azimuth separation 10, 26 thousand, hot, hostile.”

Following shots, the fighters can make a number of different weapons status calls, using Air
Land Sea Application (ALSA) brevity terms. These calls don’t require a response by the AIC,
but they can be huge SA builders, indicating the likelihood of whether or not the shot will kill the
target. Weapons status calls may include one or more of the following terms: timeout, pitbull,
cheapshot, husky, or trashed.

8. Threat range – If an untargeted group enters within 15 nm to the fighter, it is considered a


“threat.” It is incumbent upon the AIC to quickly provide the fighter with SA to the untargeted
group. The fighter will then determine the best course of action. A “threat” call is in the normal
BRAA format, with the addition of the word “threat”, with emphasis/voice inflection, injected
after the group name and you must use the callsign of all fighters that are within threat range.
For example:

AIC: “Enforcer 11 12, east group, THREAT, BRAA 260/15, 29 thousand, hot, hostile,
robin.”

9. Timeout – If a Fox 3 shot was taken on timeline, the fighters will call timeout at 12 nm if
they determine the shot was valid and that the missile should have reached the target. A timeout
call does not imply that the group was killed. No response by AIC is required.

AIR INTERCEPT CONTROL 7-13


CHAPTER SEVEN ADVANCED E-2 NFOTS

10. Follow-on Fox3/NLT abort – Based on the fighters game plan, they may or may not elect
to continue to the merge, while taking additional Fox 3 shots. This determination would be made
based on tactics being executed, fighter loadouts, expected threat response, etc. If the decision
has been made to take an additional Fox 3 shot, it should be taken at 10 nm.

Conversely, if the fighters determine they are not going to continue to the merge, they may elect
to abort no later than 10 nm. Abort is a procedure executed by the fighters with the goal of
remaining outside the enemy aircraft’s weapon engagement zone (WEZ).

11. NLT defend – If the fighter determines they are in a defensive situation, i.e., being targeted,
they should start defending themselves no later than 8 nm. They will begin executing defensive
tactics in an attempt to break enemy RADAR lock.

12. FQ SRM (Fox 2) – Inside 5 nm, this is considered the merge of the intercept, as the fighters
are entering the visual arena. The weapon being employed within visual range is the short range
missile, which is an infrared (IR) missile. The brevity term for an IR guided missile shot is
“Fox 2.”

13. Merge – While in the merge phase (inside 5 nm), the AIC should be maintaining SA to any
follow on groups and scanning for any new groups, particularly anything inside threat or meld
range. The merge ends when the fighters give the “anchor, flow, picture call.”

Whenever there are follow on groups, the AIC should be ready to give a BRAA to the fighters as
soon as they complete the merge with the initial group. Remember to not talk unless one of the
four exceptions for talking in the merge has been met.

14. RQ SRM (Fox 2) – If the fighters continue to the merge with a group and find themselves
in a visual fight, they may need to take a rear quarter Fox 2 shot. A rear quarter Fox 2 shot can
be taken between 0.5 and 1 nm behind the target. This range is significantly shorter than a
forward quarter shot, due to the lack of closure between the shooter and the target. Generally,
there are no comms required by the AIC in this scenario. The AIC should be monitoring for any
changes to the picture, as well as looking for RADAR video to disappear from the targeted
group, indicating they are vanished.

15. Post-Merge – If there are no known follow on groups or the fighter does not have SA to
follow on groups, they will usually come out of the merge, anchor themselves off of bullseye,
give their “flow” direction, and ask for the picture. This is known as the “anchor, flow, picture
call.” If there are no groups in the area, we consider the picture clean.

AIC: “Eagle, Picture clean, reset Miami, say state.”

Since the fighters are going to every merge in VT-4, they will call “kill” on all groups that they
see killed in the visual arena. A “vanished” or “faded” call is not required on groups that have
been called “killed” by the fighters. If the fighters have given the “anchor, flow, picture” call
and AIC sees a group still alive (radar video or M1 squawk in ULT AIC) or there are follow on
groups inside of factor range, AIC shall issue directive targeting into that group(s).

AIC: “Enforcer 11, target trail group, BRAA 164/16, 27 thousand, hot, hostile, crow.”

7-14 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

If the picture is not clean and there are follow on groups, but they are outside of factor range,
AIC will give the new picture in a broadcast format. Let the fighters respond to the new picture,
and then reset them at the CAP. For example:

AIC: “Eagle, new picture, two groups, group rock 153/48, 30 thousand, track north,
bogey, spades. Group rock, 178/54, 31 thousand, track north, bogey, spades.

FTR: “Enforcer 11.”

AIC: “Enforcer, reset Miami, say state.”

Timeline Critical Points

Timeline critical points, which refer to important decisions that must be made by the AIC, are No
Later Than Commit (NLT Commit) range, tactical range call, threat call, and spike call.

1. The NLT Commit range refers to the point at which the fighters should be committed to
begin an intercept. Failure to commit the fighters prior to this range puts them behind timeline
and as a result, in a disadvantageous position.

2. The tactical range call is an SA call made by AIC to provide a reminder to the fighters that
meld is less than a minute away and serves to update everyone’s timeline SA. The fighters’ meld
mechanics are the foundation of air-to-air success. This reminder by the AIC can aid them in
ensuring they execute on timeline.

3. The threat call refers to a call made by AIC to the fighters when an untargeted group
pierces the briefed threat range. A missed threat call could likely result in the fighters being shot
down by the enemy.

4. The spike call, which is a RADAR Warning Receiver (RWR) indication of an air threat in
track or launch, is a call made from a friendly aircraft being fired on or targeted. If a fighter
makes a spike call with a bearing on PRI, AIC will respond with the spike range to the group,
altitude, fill-ins, and the group’s name at the end of the call. For example:

FTR: “Enforcer 12, spike, 310.”

AIC: “Enforcer 12, spike range 18, 31 thousand, hot, hostile, east group.”

704. LABELING AND NAMING THE PICTURE

The basic communication format is call sign, number of groups and/or group names, location and
anchor point, altitude, and fill-ins. Below are some more definitions for AIC:

1. Group – A group is any number of air contacts within 3 nm in azimuth and range of each
other (which is then considered a formation). In the pre-commit phase of the AIC timeline,
groups are referenced to the bullseye.

AIR INTERCEPT CONTROL 7-15


CHAPTER SEVEN ADVANCED E-2 NFOTS

2. Picture labels – After the commit, labels are used to define the relationship between groups,
which the fighters are being committed to intercept. Their position is then referenced from
bullseye. The labels, which are used to define the overall picture, include:

a. Single group – Only one group included in the tactical picture. A single group is the
only presentation where the label and name are the same. When there is only a single
group present, AIC is not required to anchor it, since it was just anchored in the
commit call. Therefore, the post-commit call is simply the AIC call sign, group
name, and aspect, such as:

“Eagle, single group, hot.”

Figure 7-4 Single Group

7-16 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

b. Two groups, range yy – Two groups that present themselves in a straight line with the
fighter, in other words, one bandit in front of the other, as seen by the fighter. For
groups in range (including a ladder or a vic), only the lead group is anchored (bearing
and range from bullseye provided), followed by altitude and fill-ins. Only altitude
and fill-ins are provided for the trail group(s). For example:

“Eagle, two groups, range 10, track south. Lead group, Rock 360/10,
29 thousand, hostile. Trail group, 31 thousand, hostile.”

Figure 7-5 Two Groups, Range

AIR INTERCEPT CONTROL 7-17


CHAPTER SEVEN ADVANCED E-2 NFOTS

c. Two groups, azimuth xx – Two groups that present themselves in a line abreast, as
seen by the fighters. With groups in azimuth (including a wall and a champagne),
two groups are anchored, followed by altitude and fill-ins. For example:

“Eagle, two groups, azimuth 10, track south. East group, Rock 030/30, 31
thousand, hostile. West group, Rock 330/30, 29 thousand, hostile.”

Figure 7-6 Two Groups, Azimuth

7-18 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

d. Three groups, wall, xx wide – A wall is essentially a three group azimuth problem.
When we label three group problems, we use the term “wide” when referencing the
total separation of an azimuth. “Deep” is the term used to reference separation in
range for three group problems. For a wall, the outriggers, or the two groups on the
outside of the formation, are anchored. Deciding which one to anchor first in the
picture call should be consistent with the group anchored in the commit call, based on
targeting priorities. Then the separation from the first group anchored to the middle
group must also be provided, with altitude and fill-ins, prior to calling the final group.
For example:

“Eagle, three groups, wall, 40 wide, track south. East group, Rock 090/20,
33 thousand, track south, hostile. Middle group, separation 20, 30 thousand,
hostile. West group, Rock 270/20, 27 thousand, hostile.”

Figure 7-7 Three Groups, Wall

AIR INTERCEPT CONTROL 7-19


CHAPTER SEVEN ADVANCED E-2 NFOTS

e. Three groups, champagne, xx wide, yy deep – A champagne is a triangular formation


with two groups presented in an azimuth formation, followed by a third group in trail.
Since the azimuth presentation is encountered first, the width is referenced first in the
label, prior to the depth. For a champagne, the two lead groups are anchored. For
example:

“Eagle, three groups, champagne, 30 wide, 20 deep, track south. East lead
group, Rock 080/15, 33 thousand, hostile. West lead group, Rock 280/15, 29
thousand, hostile. Trail group, 31 thousand, hostile.”

Figure 7-8 Three Groups, Champagne

7-20 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

f. Three groups, vic, yy deep, xx wide – A vic is the opposite of a champagne. It


includes a lead group followed in trail by two groups in an azimuth formation. Since
a range presentation is encountered prior to the azimuth, the depth is referenced first
in the label, prior to the width.

“Eagle, three groups, vic, 25 deep, 30 wide, track south. Lead group, Rock
360/10, 33 thousand, hostile. East trail group, 31 thousand, hostile. West trail
group, 29 thousand, hostile.”

Figure 7-9 Three Groups, Vic

AIR INTERCEPT CONTROL 7-21


CHAPTER SEVEN ADVANCED E-2 NFOTS

g. Three groups ladder, yy deep – A ladder is a three group range problem. You start
the picture call by anchoring the lead group, then giving the separation from the lead
group as well as the altitude and fill-ins, and finally giving the altitude and fill-ins for
the trail group. For example:

“Eagle, three groups, ladder, 30 deep, track south. Lead group, Rock 360/10,
30 thousand, hostile. Middle group, separation 15, 27 thousand, hostile. Trail
group, 33 thousand, track south, hostile.”

Figure 7-10 Three Groups, Ladder

7-22 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

3. Additional terms may be used in the label to provide SA to the presentation. These terms
include:

a. Opening – Indicates the separation, either in range or azimuth, is increasing, due to


the aspects of the groups. This term is included after the separation which it is
referencing, i.e., “…vic, 25 deep, opening, 30 wide, opening…”

“Eagle, three groups, vic, 25 deep, opening, 30 wide, opening. Lead group,
Rock 360/10, 33 thousand, track south, hostile. East trail group, 31 thousand,
track southeast, hostile. West trail group, 29 thousand, flank southwest,
hostile.”

Figure 7-11 Three Groups, Vic, Opening

AIR INTERCEPT CONTROL 7-23


CHAPTER SEVEN ADVANCED E-2 NFOTS

b. Closing – Indicates the separation, either in range or azimuth, is decreasing, due to


the aspects of the groups. This term is used in the same manner as opening.

“Eagle, two groups, azimuth 15, closing. East group, Rock 030/15,
31 thousand, hot track southwest, hostile. West group, Rock 330/15, 29
thousand, track southeast, hostile.”

Figure 7-12 Two Groups, Azimuth, Closing

7-24 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

c. Stack – Used to indicate an altitude separation of at least 10,000 ft between contacts


within a single group. In the case of a stack, both altitudes will be called. For
example:

“Eagle, single group, Rock 360/15, stack, 29 thousand and


10 thousand, track south, hostile.”

Figure 7-13 Single Group, Stack

AIR INTERCEPT CONTROL 7-25


CHAPTER SEVEN ADVANCED E-2 NFOTS

d. Echelon – Two group problems or a ladder may also include an “echelon” component
to signify that the presentation is offset in one direction or the other. Echelon should
always include a sub-cardinal direction. For example, a label of “two groups, range
10, echelon, northwest” would mean that the fighters will see two groups, with 10 nm
range separation, that will be offset to the northwest.

“Eagle, two groups, range 20, echelon northwest, track south. Lead group,
Rock 360/10, 29 thousand, hostile. Trail group, 31 thousand, hostile.”

Figure 7-14 Two Groups, Range, Echelon NW

7-26 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

“Eagle, two groups, azimuth 10, echelon northeast, track south. West group, Rock
330/30, 29 thousand, hostile. East group, Rock 030/35, 31 thousand, hostile.”

Figure 7-15 Two Groups, Azimuth, Echelon NE

AIR INTERCEPT CONTROL 7-27


CHAPTER SEVEN ADVANCED E-2 NFOTS

e. Weighted – Three group vic, champagne, or wall problems use the term weighted,
similar to echelon, to indicate the presentation is asymmetrical. Weighted will always
include a cardinal direction. For example, a label of “three groups, champagne,
20 wide, 30 deep, weighted east” would mean the trail group is closer to the east lead
group, than the west lead group.

“Eagle, three groups, champagne, 30 wide, 20 deep, weighted east, track


south. East lead group, Rock 080/15, 33 thousand, hostile. West lead group,
Rock 280/15, 29 thousand, hostile. Trail group, 31 thousand, hostile.”

Figure 7-16 Three Groups, Champagne, Weighted East

7-28 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

4. Leading edge comms – Leading edge comms is a tool used to simplify the picture when
there are multiple groups present, but not all of those groups are currently a factor. This allows
the AIC to call the picture, including only the groups that need to be intercepted at that point in
time. Leading edge comms should be used when the leading edge consists of a single group,
groups in azimuth, or a wall, where depth is not a factor. The groups included in the leading
edge picture should be the groups which would be assessed to become a factor during the course
of the intercept. At VT-4, any groups within our notional factor range of 25 nm of the group(s)
approaching NLT commit, will be considered a factor and should be included in the picture call,
vice using leading edge comm.

The leading edge is typically only referenced during the post-commit picture call. Therefore,
broadcast control, including the commit call are the same as outlined above. Prior to the commit
call, the AIC should determine if leading edge is appropriate for the post-commit picture call.
The picture call is essentially the same, with just a couple of exceptions. The call will start with
the total number of groups present and then specify the leading edge picture. Once the leading
edge picture is called, the AIC will then give separation to the trailing edge, which is the closest
of the remaining groups, not included in the leading edge.

For example, if there are five total groups present, but there is only a two group azimuth included
in the leading edge, the post-commit picture would be:

“Eagle, five groups, leading edge, two groups, azimuth 10, track southeast.
East group, Rock 315/20, 31 thousand, hostile. West group, Rock 298/32, 29
thousand, hostile. Follow-on 30, opening.”

Figure 7-17 Leading Edge Comms

AIR INTERCEPT CONTROL 7-29


CHAPTER SEVEN ADVANCED E-2 NFOTS

After the post-commit picture call, the communication flow is exactly the same. There will
typically be no further reference to the trailing edge, since the assumption was that none of the
trailing edge groups would become a factor during the course of the intercept. If for some reason
any of the trailing edge groups did become a factor, they would be called additional group as
appropriate.

5. Exclusions comms – Much like leading edge comms, exclusions comms (Figure 7-17) is
another way to simplify the post-commit picture when there are multiple groups in a picture.
However, leading edge comms are used when depth is not a factor (single group, azimuth, etc.),
but exclusion comms are used when depth is a factor (range, vic, etc.).

“Screwtop, four groups, two groups, range 10, track southwest. Lead group,
Rock 315/20, 29 thousand, hostile. Trail group 231 thousand, hostile.”

Figure 7-18 Exclusion Comms

Similarly, to the use of leading edge and exclusion comms explained above, when there are
multiple groups present, some of which fit into a traditional label featuring a range component
(e.g., range, ladder, vic, or champagne), while remaining groups do not, the picture call will
consist of the total number of groups, followed by the traditional label and post-commit picture
call. However, there is no reference made to a leading edge or trailing edge in this case, since
the traditional label already includes a depth component.

7-30 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

If any of the remaining groups not included in the picture are a factor (within 25 nm of the
farthest group included in the picture), they will be named additional group(s) and anchored
accordingly. Whenever there are multiple additional groups which were not included in the
traditional label, they will be named first additional group, second additional group, etc.,
although only the additional group(s) within the factor range of 25 nm will be called and
anchored in the post-commit picture call.

“Eagle, five groups, two groups, range 10, track south. Lead group, Rock
043/12, 29 thousand, hostile. Trail group, 31 thousand, hostile. Additional
group, Rock 053/47, 32 thousand, track southwest, hostile.”

Figure 7-19 Two Groups, Range with Additional Groups

6. Group names – After the commit, and after the AIC labels the picture, the controller will
then assign names to each group. The group will then be referenced by its group name until
either a maneuver or new picture is called. The group names used for the given label are:

a. Single group – Single group.

b. Two groups, range – Lead group/trail group.

c. Two groups, azimuth – Either north group/south group or east group/west group.
Azimuth names are chosen based on their orientation, using cardinal directions (N, S,
E, W).

AIR INTERCEPT CONTROL 7-31


CHAPTER SEVEN ADVANCED E-2 NFOTS

d. Three groups, wall – Either North group/middle group/south group or east


group/middle group/west group.

e. Three groups, champagne – Either north lead group/south lead group/trail group or
east lead group/west lead group/trail group.

f. Three groups, vic – Either lead group/north trail group/south trail group or lead
group/east trail group/west trail group.

g. Three groups, ladder – Lead group/middle group/trail group.

7. Other group names – There are times when a group is not included in the picture label
because it does not fit into one of the traditional labels. There are also times when a group is
detected after the picture has been labeled and needs to be named. The following are examples of
other possible group names.

a. Additional group – May be used for a group that is named in the post-commit picture
call, but does not fit a traditional label. Additional group may also be used to name a
group that is initially detected post-commit, but outside of meld range. Any
subsequent groups with the same naming convention, that are called prior to the next
new picture, get assigned a sequential number (i.e., second additional group, third
additional group, etc.). The same rule applies to pop-up and threat groups.

b. Pop-up group – The name for a group that is detected at or inside of meld range, but
outside of threat range.

c. Threat group – The name for a group that is detected at or inside of threat range.

705. VISUAL IDENTIFICATION (VID)/INTERCEPT AND ESCORT

Whenever PID has not been solved, a VID may need to be performed. Additionally, current
warning/weapons status and ROE may require DCA assets to intercept and escort, vice employ
weapons. Either scenario begins as a normal intercept. However, there are obviously some
differences upon entering the weapons employment phase of the intercept.

In the event of a VID, the AIC should continue trying to obtain PID throughout the intercept. If
PID is solved, the AIC should provide a full positional update to the group with the new
declaration. If PID is not solved, the fighter lead will begin a sequence of VID comms. This
will start at approximately 10 nm from the merge with the lead designating himself/herself as the
“eyeball” (the aircraft responsible for identifying the group being intercepted). The lead will
then designate his/her wingman as the “shooter” (responsible for employing weapons [ROE
dependent] if identified as hostile). These “shooter” and “eyeball” roles are delineated on AUX.
At approximately 5 nm the lead will call, for example, “Heat 11, standby, single group” on PRI,
which signifies that he/she is about to make the VID call and all other comms on the control
frequency should cease. At the VID, the lead will make the intercept report and direct “shoot,
shoot” or “skip it”, as appropriate. The intercept report should then be relayed to AW.

7-32 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

Following the VID, if the group was identified as an enemy aircraft and declared hostile, based
on ROE, the intercept will continue until the group is killed. If the group being intercepted has
not been declared hostile, AW may want the fighters to escort away from the CSG. The AIC
should ensure AW’s intentions are understood and executed properly. Once the group has been
escorted away from the CSG, the AIC can direct the fighters to drop the group and reset their
CAP station.

706. CHANGES TO THE PICTURE

Maneuvers in range or azimuth – A maneuver in range or azimuth occurs when the contacts
within a group maneuvers to the point where they now exceed group criteria (i.e., 3 nm). The
resulting elements are called arms. Arms that again maneuver into individual elements outside of
group criteria are renamed contacts. If a group maneuvers and displays a change in target aspect
to the fighters, and all elements within the group remain within group criteria, AIC can simply
provide a descriptive update with the group’s new target aspect (e.g., “Ghost, single group beam
north.”)

During group maneuvers, whoever sees the maneuver first makes the call. Typically, the fighters
see the maneuver first, and the resulting call starts with “Dog 31, Single group maneuver.” The
AIC will then acknowledge the maneuver, evaluate, and provide amplifying information.
However, for the sake of training while at VT-4, don’t expect the fighters to call maneuvers.
Recognizing maneuvers is a critical skill for AICs. Therefore, the responsibility to call
maneuvers will rest with the student. It is critical for the AIC to pay close attention to the
RADAR video, rather than the track. When a maneuver in range or azimuth occurs, the system
may take a few minutes to build a new track for the new arm. If the AIC is first to recognize the
maneuver, the call will be in the same format, replacing the fighter call sign with the AIC call
sign.

When evaluating maneuvers, altitude changes need to be considered, as groups are expected to
maneuver three-dimensionally. Therefore, don’t assume the altitude is the same. If maneuvers
occur outside of meld range, a new picture can be called by the AIC calling “new picture”,
followed by a new tactical picture call. When in broadcast control, every call is essentially a
new picture. For that reason, maneuvers and new pictures shall not be made in broadcast control.

The following information provides a definition of the types of group maneuvers:

1. Maneuver in range – If a group maneuvers, such that at least one of the resulting arms are
still hot to the fighters, it is called a maneuver in range, and the resulting elements are lead arm
and trail arm. AIC can assume that the fighters will likely maintain RADAR SA to the lead arm.
For a maneuver range comm, AIC will call out the altitude and aspect for the both of the new
“arms.” An example of a maneuver in range call would be:

AIR INTERCEPT CONTROL 7-33


CHAPTER SEVEN ADVANCED E-2 NFOTS

28,000’

“Eagle, Single Group, maneuver range, Lead Arm 28 thousand, track


southeast. Trail Arm 31 thousand, track northwest.”

Figure 7-20 Maneuver in Range

2. Maneuver in azimuth – If a group maneuvers such that neither one of the result in arms are
hot to the fighters, it is a maneuver in azimuth, and the controller will name the arms according
to the cardinal directions of south arm, north arm, west arm, or east arm.

7-34 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

“Eagle, Single Group, maneuver azimuth, East Arm 31 thousand, track east.
West Arm 25 thousand, track west.”

Figure 7-21 Maneuver in Azimuth

Change to the number of groups – While in broadcast control, a new picture is implied on
every call. If the number of groups changes post-commit, the AIC can apply a group name to a
group that has not previously been named. The name given will be determined by the range of
the group from the fighters when it is first called. Those group names include additional group,
pop-up group, and threat group, as discussed earlier in the chapter.

New picture – When in broadcast control, every call is essentially a new picture. For that
reason, maneuvers and new pictures shall not be made in broadcast control. A new picture can
be called by the AIC prior to meld when the tactical picture has changed dramatically enough to
cause confusion or to affect the targeting game plan. A new picture can be requested by the
fighter at any time, if necessary. A new picture supersedes all previous picture calls and
establishes a clean slate for all players. A new picture is also called post-merge, after the fighters
have given their “anchor, flow, picture” call.

A new picture is not necessarily required whenever there is a maneuver. Since a new picture
includes a full tactical picture call, it may make more sense to simply call the maneuver. Before
a new picture is called, AIC should give the fighters an idea of why it is being called. Any time
a new picture is called, AIC will call “new picture” prior to calling the new tactical picture.

AIR INTERCEPT CONTROL 7-35


CHAPTER SEVEN ADVANCED E-2 NFOTS

Examples:

AIC: “Eagle, single group maneuver range. New picture, two groups, range five, opening,
lead group, rock 087/24, 26 thousand, track east, hostile. Trail group, 19 thousand,
track west, hostile.”

Or

AIC: “Eagle, lead group, trail group, passing. New picture, two groups, range 5,
opening, lead group, Rock 240/30, 25 thousand, track east, hostile, crow. Trail
group, 21 thousand, track west, hostile, crow.”

Descriptive updates – A descriptive update is how AIC communicates changes to altitude,


aspect, strength, or identification. They CANNOT be used for a change in declaration. A
change in declaration requires a full positional update, anchored off of bullseye or BRAA, by
either AIC or the fighters. The format for a descriptive update is the AIC call sign, group name,
and the changed component. Examples:

AIC: “Eagle, trail arm, hot.”

Or

AIC: “Eagle, lead group, 24 thousand.”

Or

AIC: “Eagle, north group, robin.” (If previously hostile, but tipper was unknown)

Changes in relationship – There are times when the tactical relationship between groups change
and can be communicated to the fighters without calling a new picture. The change in
relationship may happen due to maneuvers or changes in aspect. Once the change in relationship
happens, the format for communicating the change is similar to a descriptive update.

7-36 AIR INTERCEPT CONTROL


ADVANCED E-2 NFOTS CHAPTER SEVEN

1. Passing – Groups initially separated by range that change relative position with each other
are “passing.”

AIC: “Eagle, lead group, trail group, passing.”

“Ghost, lead group, trail group, passing. Enforcer 11, target trail group,
29BRAA 360/23, 29 thousand, hot, hostile.”

Figure 7-22 Lead Group, Trail Group, Passing

AIR INTERCEPT CONTROL 7-37


CHAPTER SEVEN ADVANCED E-2 NFOTS

2. Crossing – Groups initially separated in azimuth that change relative position with each
other are “crossing.”

AIC: “Eagle, east group, west group, crossing.”

“Ghost, east group, west group, crossing.”

Figure 7-23 East Group, West Group, Crossing

7-38 AIR INTERCEPT CONTROL


CHAPTER EIGHT
AIR DEFENSE TECHNIQUES

800. INTRODUCTION

In this chapter, the basic principles and techniques of air defense control to support air defense
operations are discussed. These include types of engagement zones, aspects of littoral air
defense, CAP stationing, and Air Defense Identification Zones (ADIZs). The terminology
associated with air defense control is also provided.

801. AIR DEFENSE CONTROL

This section provides some of the essential principles of planning for air defense control.

Fuel Planning

Fuel management is one of the most critical mission planning factors when executing CSG air
defense. Although external fuel tank configurations can change, general mission planning rules
assumes the F/A-18C fighter has enough fuel to perform 1 - 2 intercepts, and the F/A-18E/F
fighter has enough fuel to perform 2 - 3 intercepts before returning to base or needing to refuel
from an airborne tanker. In order to properly manage assigned CAP stations, the ACU should
maintain situational awareness to the fighter’s fuel states at all times.

Littoral Environment

When establishing air defense in a littoral environment, surface-to-air missiles (SAMs) and
aircraft may be used. This combination of surface and airborne assets creates a Joint
Engagement Zone (JEZ).

Figure 8-1 Littoral Air Defense

AIR DEFENSE TECHNIQUES 8-1


CHAPTER EIGHT ADVANCED E-2 NFOTS

For example, ADCs may consider using CAPs for defending carrier and amphibious groups and
as collateral defense of land-based assets, by positioning them over land during littoral
operations. Maritime battle groups may also function as a mobile missile engagement zone
(MEZ) with their armaments and mobility. Linking land-based SAMs with Navy-generated
search and fire control data can result in an improved ability to defend the littoral areas of the
theater.

Combat Air Patrol

CAP stations typically have at least 2 fighters, a “section”, that defend HVAs. The correct
placement of these stations relative to the perceived threat provides a barrier for the defense of
multiple assets in a broad area, called an area defense. One possible placement of CAP stations
might provide coverage beyond the MEZ to create defense in depth, where the various stations
can complement each other. Placement of a CAP station should be planned to minimize gaps in
coverage, both vertically and laterally.

CAPs may also be used to defend specific assets, called a point defense, such as a high-value
surface vessel, or for special missions. Additionally, CAPs may act as a backup defense (if
required) for enemy penetrations that result from MEZ gaps.

Air Defense Identification Zones

ADIZs are sections of airspace of defined dimensions that require the ready identification,
location, and control of airborne vehicles. An ADIZ that is associated with nations or AO is
normally the transition between procedural areas and positive control areas. These zones are
used for sovereign national boundaries, although in the case of AOs, they are used for
identification in the rear areas.

Any aircraft that wants to fly in or through an ADIZ must file an appropriate flight plan. In the
case of the North American ADIZ, aircraft must have an operational transponder and maintain
two-way radio contact. Any aircraft that fails to follow these procedures or flies into an ADIZ
without authorization may be identified and treated as a threat and intercepted by a fighter
aircraft.

8-2 AIR DEFENSE TECHNIQUES


ADVANCED E-2 NFOTS CHAPTER EIGHT

Figure 8-2 Air Defense Identification Zone

802. ENGAGEMENT ZONE PRINCIPLES

Used in conjunction with each other, the Fighter Engagement Zone, Joint Engagement Zone, and
Missile Engagement Zone are layers of defense used to protect the CSG from inbound threats.
Typically, the FEZ will be the first line of defense, followed by the JEZ and finally the MEZ.
A basic layout of the zones is shown below (Figure 8-3).

Threat Axis
CAP MOM

FEZ JEZ MEZ

Figure 8-3 Engagement Zones

AIR DEFENSE TECHNIQUES 8-3


CHAPTER EIGHT ADVANCED E-2 NFOTS

Fighter Engagement Zone

A Fighter Engagement Zone (FEZ) is a section of airspace where the responsibility for engaging
targets rests completely with fighter aircraft. FEZ operations are usually performed when
fighters have the clear operational advantage over SAMs or take place beyond the range of
land and sea-based SAMs.

Normally, fighters in a FEZ have weapon systems with greater Launch Acceptability Regions
(LARs). With the availability of these fighters, the JFC can destroy enemy aircraft at greater
standoff ranges from the defended HVAs. FEZ operations within the defense zone should be
coordinated and de-conflicted with SAM systems to engage threats.

Joint Engagement Zone

A JEZ is a section of airspace in air defense in which the responsibility for engaging targets rests
with both fighter aircraft and SAM systems. JEZ operations involve the employment and
integration of multiple air defense systems in order to engage enemy targets simultaneously in
the operational area.

Successful JEZ operations, which require effective C2, are based on identifying friendly, neutral,
and enemy aircraft. In a JEZ, all air defense systems must be capable of accurately discerning
between each of these types of aircraft in a highly complex environment before full joint
engagement operations can occur. If these conditions cannot be met, separate FEZs and MEZs
should be established.

Missile Engagement Zone

A MEZ is a section of airspace in air defense in which the responsibility for engaging targets
completely rests with land and/or sea based SAM systems. MEZ operations are ideal for point
defense of critical assets, protection of maneuvering units, and area coverage of the joint security
area. These types of operations also offer the ability to engage the enemy with a high-
altitude/low-altitude, all-weather capability. In addition, these operations can disrupt massed
enemy air attacks prior to committing fighter assets. They are also effective across the full range
of air defense operations and enemy threats. In joint doctrine, these operations are divided into
high-altitude/low-altitude MEZs based on the missile systems used and the altitude limit of the
MEZ.

8-4 AIR DEFENSE TECHNIQUES


CHAPTER NINE
STRIKE COMMAND AND CONTROL

900. INTRODUCTION

This chapter introduces the advanced strike C2 to support strike operations and the terminology
and concepts associated with these operations.

901. STRIKE PACKAGE

A strike package, a group of aircraft with different capabilities, is used to perform a single attack
mission on a land based target. The strike package will normally consist of a strike element, a
fighter element, a suppression of enemy air defense (SEAD) element, and the C2 element (E-2).
The composition (number and type aircraft) of each element will depend largely on the type of
target and the expected threat response. A strike package could consist of a single division of
strike/fighters or up to 20+ aircraft for a large force strike. The basic composition of each
element within an organic (CVW) strike package is as follows:

1. Strikers – The element responsible for employing ordnance on the land based target.
Commonly referred to as the “Hammers.” Consists of Fighters with an air-ground ordnance
loadout.

2. Fighters – The element responsible for protecting the strikers from any airborne threats.
Commonly referred to as the “Shields” for close escort. Consists of Fighters with an air-to air
ordnance loadout. They will fly in formation with the strikers. When a significant enemy air
response is expected, an additional advanced element of fighters, known as the “Sweeps”, may
be employed ahead of the rest of the strike package. These additional Fighters may be sent in to
sanitize the airspace over the target prior to the arrival of the strike package. Additionally, the
sweep and shield elements are responsible for the safe egress of the strike package once the
mission is complete.

3. SEAD – The element responsible for protecting the strike package by jamming enemy
RADARs and/or communications. Commonly referred to as “Tron.” Consists of an E/A-18G,
possibly with a loadout of AGM-88, high-speed anti-radiation missiles (HARM). The SEAD
element may also include Fighters (“Vests”) with an air-to-air ordnance loadout, serving as high
value asset protection (HVAAP), responsible for protecting “Tron.” Depending on the level of
SEAD required, additional Fighters (“Zaps”) may be included with primarily a HARM loadout
to assist with the SEAD. The SEAD element may follow the strike package along the strike
route or they may set an orbit at a predetermined location. This will be determined during
mission planning. At VT-4, one of the other crewmembers will be notionally communicating
with the SEAD package on SEAD common and will pass updates to the AIC controller such as
TACREPS, “music on” (jammers on), and “magnum away” (HARM shot). It will then be the
controller’s responsibility to pass this info to the strike package.

4. C2 – The E-2 will serve as the C2 platform, providing AIC to the strike package and
coordinating with the strike lead and the Strike Warfare Commander (AP).

STRIKE COMMAND AND CONTROL 9-1


CHAPTER NINE ADVANCED E-2 NFOTS

902. COMMAND AND CONTROL FOR A STRIKE MISSION

The C2 game plan is integrated in the strike package mission plan. C2 aircrew will provide air
picture information to all friendly assets and communicate with standard AIC communications.
Link information will also be relayed to all friendly assets on the network.

Picture information will be provided before, during, and after the execution of the strike route
and destruction of the target. Typically, the fighter elements will commit to airborne hostile
threats that have met route commit criteria. After the commit occurs, AIC will label the picture
and name the groups. After the groups are labeled and named, the fighters will target each group
per the briefed game plan and destroy the air threat. Similarly, if there are surface threats, strike
package assets may suppress or destroy the threats to allow the strikers to proceed to the mission
target.

AIC supports the strike package by detecting and tracking the presence of enemy aircraft
and relaying the picture, just as with any AIC mission. Additional duties of the E-2 crew are
centered on the C2 aspect of the strike mission. There are several key differences for AIC in
controlling a strike mission versus a defensive counter air (DCA) mission. The strike lead,
Hammer 11, has commit authority. Therefore, AIC must recommend commits. AIC will say
“recommend sweep commit” vice “sweep commit” as you are used to in a DCA. Remember that
altitudes should be omitted when groups are over land. The control net of strike common will be
secured. You can assume that in mission planning we have coordinated to not use code words on
this net. This means that you will use the North Atlantic Treaty Organization (NATO) code
words (e.g., “Fulcrum” for a MiG-29 and Fishbed for the MiG-21) for the tipper fill-in. The SO
will be responsible for coordinating with AP regarding all aspects of the mission. The SO should
check in with AP when airborne. As the event progresses, the SO will also relay when all assets
are checked in and if there are any “alibis” (degraded capabilities), if there is a ROLEX, when
Sweeps push, when Hammers push, feet dry, miller time (add time stamp if significantly
delayed), feet wet, results of the roll call after reaching the egress control point, and in-flight
report. When performing a large force strike, coordination is critical to success.

The E-2 crew will monitor the initial man-up and launch of the strike package, as well their
check-ins as the strike package proceeds to the rendezvous point. This is done to expedite the
launch of alerts in the event of any aircraft falling out or having significant alibis. They can also
recommend to the strike lead to re-role assets if degradation prevents them from serving in one
role, but they are still able to serve elsewhere in the strike package (fill plan).

Throughout the strike, the E-2 will monitor the go and abort criteria. The go criteria are the
minimum items, as determined by the strike lead and CAG, which are required to commence the
strike mission. Abort criteria are referenced once the package has pushed and is a list of items
that if any are met, will cause the strike lead to abort the strike. If AIC recognizes that one of
these criteria are met after the strike has commenced, they should recommend an abort with the
following comm and reason for the recommendation.

AIC: “Hammer 11, Eagle, recommend check criteria, SA-5 active, rock 240/37.”

9-2 STRIKE COMMAND AND CONTROL


ADVANCED E-2 NFOTS CHAPTER NINE

The word “echo” will be used in a strike to repeat certain calls to separated elements of the
strike. Saying “echo” identifies that C2 is not initiating the call/contract and is relaying to the
rest of the strike package. This could be based upon being geographically separated or blue
assets not having heard the original call from the strike lead. This also prevents potential
confusion for the use of ROLEX so that the actually amount of time is understood by all the
package commanders. Calls that are “echoed” include: ROLEX, MUSIC ON, MAGNUM
AWAY, SPIN, LEAN (cardinal direction), RESUME, MILLERTIME.

Hammer 11: “Strike Package Alpha, lean North.”

AIC: “Eagle echoes, lean North.”

“Faded” calls will be used in an overland environment in place of a “vanished” assessment at the
end of an intercept, or when a RADAR return has been lost on a specified group. Whenever
“faded” is used, the group must be anchored off of bullseye and a track direction provided.

AIC: “Eagle, west group, faded, rock 090/13, track east.”

Initial Point/Decision Point

The Initial Point (IP) is the point at which the strike package sets their attack formation. The
Decision Point (DP) is the point where the strike lead makes the decision to transition from
air-to-air mode (self-protect during ingress) to air-ground mode (decision to attack the target).
The points are often collocated and referred to as the IP/DP. AIC will provide picture
information throughout the strike route, and at the IP/DP, the strike lead will report its position
and request a final picture call from AIC to determine if the strikers will continue to the target.

At the IP/DP, the AIC will reference “target area commit”, which is the specific commit criteria
determined for a given strike mission, while the strike package is inside the target area (between
the IP/DP and target). Target area commit does not replace the air-to-air timeline, but serves as a
decision making tool for the strike lead when deciding whether or not to continue to the target.
For the strike event at VT-4, the target area commit will be a 45 nm radius, centered on the
target. Any groups that are outside of target area commit when the strike package reaches the
IP/DP are assessed to not be a factor prior to the “Hammers” attacking the target. If the picture
is clean, AIC will call, “Banger, picture clean. Recommend Hammer continue.” If there are
groups present, but not in the target area commit, AIC should anchor these groups in broadcast
control, followed by “recommend Hammer continue.” If there are groups inside of target area
commit, AIC should recommend a commit to the “Shields” followed by “recommend Hammer
continue”, unless the number of factor groups exceeds abort criteria. If abort criteria has been
met, AIC will communicate this to the strike lead by saying “check criteria”, as previously
mentioned in this section. If the recommendation to continue is given to the Hammers, there
should be minimal calls from AIC during the ingress to the target, however AIC still owes its
contracts to all controlled assets. If groups are going to affect the strike route and a commit is
required to be taken, AIC should use the fighter element with the most ideal positioning for the
intercept, usually the Shields.

STRIKE COMMAND AND CONTROL 9-3


CHAPTER NINE ADVANCED E-2 NFOTS

MILLERTIME and Egress

When the last bomb is dropped from the last Striker, he/she will call “MILLERTIME”. As
previously mentioned, this will be echoed by AIC. After turning to the Egress Flow Point (EFP)
and after setting formation, Hammer 11 will make an “anchor flow picture” call (assuming no
engagements are currently taking place). The priority for the Strike Package at this point is to
egress. If threats can be placed at the Six O’clock position relative to the Strike Package, AIC
should do so and not commit fighters. AIC can give headings (“flow, green, buster”) that deviate
from the planned heading. If groups are present AIC should give SA to those group prior to
recommending flow headings. If this geometry can’t be achieved and a commit must be taken,
use the Shields, or if they are already in a commit, the swing fighter in the strike element.

After the EFP, the strike package will flow to the Egress Control Point (ECP). Once they reach
the ECP, the package should be safe from the expected threats and Hammer can begin the
back-side TACADMIN. Hammer will lead another roll-call or chick-count to ensure all assets
are accounted for and then should pass an In-Flight Report (IFR) to AIC. Once AIC has received
the IFR, the student should pass it on to AP.

903. RETURN TO FORCE PROFILE

A Return to Force (RTF) Profile allows friendly strike aircraft to move in, out, and through
airspace in the AO.

RTF procedures provide for the safe passage of friendly aircraft through restricted areas and back
through friendly air defense systems. RTF procedures are based on the threat, friendly posture,
friendly aircraft capabilities, and weather. RTF control procedures include the use of the
following:

1. Ingress/egress corridors and routes

2. Control points

3. Visual Identification (VID)

4. Electronic identification

5. Tactical Air Navigation (TACAN) system

6. IFF equipment

7. Altitude and air speed restrictions

8. Lame-duck procedures (aircraft without communications, IFF, or battle damage)

9. Airspace Coordination Areas (ACAs)

9-4 STRIKE COMMAND AND CONTROL


APPENDIX A
GLOSSARY

ACA Airspace Coordination Area

ACC Airborne Command & Control

ACM Airspace Coordinating Measure

ACO Air Control Officer

ACU Aircraft Control Unit

ADC Air Defense Commander

ADIZ Air Defense Identification Zone

AEGIS Advanced Electronic Guided Interceptor System

AEW Airborne Early Warning

AI Airborne Interdiction

AIC Air Intercept Control/Controller

AIMT Air Interdiction Maritime Targeting

AIRCOR Air Corridor

AIS Automatic Identification System

ALMC Air-Launched Cruise Missile

ALSA Air Land Sea Application

AMC Airborne Mission Coordinator

AO Angle Off

AO Area of Operations

AOC Air and space Operations Center

AOMSW Air Operations in Maritime Surface Warfare

AOR Area of Responsibility

GLOSSARY A-1
APPENDIX A ADVANCED E-2NFOTS

ASOC Air Support Operations Center

ASUW Anti-Surface Warfare

ASW Anti-Submarine Warfare

ASWC Anti-Submarine Warfare Commander

ATC Air Traffic Control

ATC Air Traffic Controller

ATO Air Tasking Order

AUX Auxiliary radio

BB Bogey Bearing

BDA Battle Damage Assessment

BH Bogey Heading

BR Bogey Reciprocal Heading

BRAA Bearing, Range, Altitude, and Aspect

C2 Command and Control

CAG Carrier Air Wing Commander

CAP Combat Air Patrol

CAS Close Air Support

CATCC Carrier Air Traffic Control Center

CC Collision Course

CCA CATCC Casualty Approach

CCOI Critical Contact of Interest

CDE Collateral Damage Estimate

CIC Combat Information Center

A-2 GLOSSARY
ADVANCED E-2 NFOTS APPENDIX A

CICO Combat Information Center Officer

CIEA Classification Identification Engagement Area

COI Contact of Interest

COMM Communication

COP Common Operational Picture

CSAR Combat Search and Rescue

CSARTF CSAR Task Force

CSG Carrier Strike Group

CSRC Component Search and Rescue Controller

CVN Aircraft Carrier, Nuclear

CVW Carrier Air Wing

CWC Composite Warfare Commander

DCA Defensive Counter Air

DCAG Deputy Carrier Air Wing Commander

DIM Daily Intentions Message

DP Decision Point

DTG Degrees to Go

ECP Egress Control Point

EFP Egress Flow Point

ELINT Electronic Intelligence

EM Electromagnetic

ES Electronic Support

ESG Expeditionary Strike Group

GLOSSARY A-3
APPENDIX A ADVANCED E-2NFOTS

ESM Electronic Support Measures

EW Electronic Warfare

FEZ Fighter Engagement Zone

FH Fighter Heading

FLOT Forward Line of Own Troops

FRS Fleet Replacement Squadron

FSA Fire Support Area

FSCL Fire Support Coordination Line

FSCM Fire Support Coordination Measure

Ft Feet

GARS Global Area Reference System

GCI Ground Control Intercept

GT Gross Tonnage

HADR Humanitarian Assistance/Disaster Relief

HARM High-Speed Anti-Radiation Mission

HCA Hawkeye Controlled Approach

HSC Helicopter Sea Combat

HSM Helicopter Maritime Strike

HVA High Value Assets

HUMINT Human Intelligence

HVAA High Value Asset Airborne

HVAAP HVAA Protection

IFF Identification Friend or Foe

A-4 GLOSSARY
ADVANCED E-2 NFOTS APPENDIX A

IFR In-Flight Report

IMO International Maritime Organization

IP Initial Point

ISOPREP Isolated Personnel Report

ISR Intelligence, Surveillance, and Reconnaissance

JARN Joint Air Request Net

JEZ Joint Engagement Zone

JFC Joint Force Commander

JFMCC Joint Force Maritime Component Commander

JPRC Joint Personnel Recovery Center

JTAC Joint Terminal Attack Controller

JTAR Joint Tactical Air Strike Request

KILLBX Kill Box

kts Knots

L Left

LAR Launch Acceptability Region

LFCC Land Force Component Commander

LHA Amphibious Assault Ship

LHD Amphibious Dock Ship

LOS Line-of-Sight

LZ Landing Zone

MAS Maritime Air Support

MC Mission Commander

GLOSSARY A-5
APPENDIX A ADVANCED E-2NFOTS

MC2 Maritime Command and Control

MCM Maneuver Coordination Measure

MDT Maritime Dynamic Targeting

MEZ Missile Engagement Zone

MIDS Multifunctional Information Distribution System

min Minute

MISREP Mission Report

MPR Maritime Patrol and Reconnaissance

MRR Minimum Risk Route

NATO North Atlantic Treaty Organization

NCI Near Collision Intercept

NFA No-Fire Area

NFO Naval Flight Officer

NFOTS Naval Flight Officer Training System

NLT No Later Than

nm Nautical mile(s)

NTISR Non-Traditional ISR

NTR Net Time Reference

OAS Offensive Air Support

OCA Offensive Counter Air

OPTASK Operational Tasking

OSC On-Scene Coordinator or On-Scene Commander

OTC Officer in Tactical Command

A-6 GLOSSARY
ADVANCED E-2 NFOTS APPENDIX A

OTH Over-the-Horizon

PID Positive Identification

Pk Probability of Kill

Pd Probability of Detection

PR Personnel Recovery

PRCC Personnel Recover Coordination Cell

PWC Principal Warfare Commander

R Right

RCT Rescue Coordination Team

RESCAP Rescue Combat Air Patrol

RESCORT Rescue Escort

RF Radio Frequency

RFA Restricted Fire Area

RMC Rescue Mission Commander

RO RADAR Officer

ROE Rules of Engagement

ROZ Restricted Operating Zone

RTB Return to Base

RTF Return to Force

RV Rescue Vehicle

RWR RADAR Warning Receiver

SA Situational Awareness

SA Surveillance Area

GLOSSARY A-7
APPENDIX A ADVANCED E-2NFOTS

SAM Surface-to-Air Missile

SAR Search and Rescue

SCAR Strike Coordination and Reconnaissance

SCC Sea Combat Commander

SEAD Suppression of Enemy Air Defense

SIAP Single Integrated Air Picture

SIF Selective Identification Feature

SIGINT Signals Intelligence

SITREP Situation Report

SO Sensor Operator

SOLAS Safety of Life at Sea

SPINS Special Instructions

SSC Surface Search Coordination

STAP Space-Time Adaptive Processing

SUW Surface Warfare

SUWC Surface Warfare Commander

TA Target Aspect

TACAIC Tactical Air Intercept Control

TACAN Tactical Air Navigation

TAC C2 Tactical Command and Control

TACP Tactical Air Control Party

TDMA Time Division Multiple Access

TST Time Sensitive Target

A-8 GLOSSARY
ADVANCED E-2 NFOTS APPENDIX A

UAS Unmanned Aerial System

USN United States Navy

VA Vital Area

VAQ Electronic Attack

VAW Airborne Command & Control

VFA Strike Fighter

VID Visual Identification

VMFA Marine Fighter Attack

VRC Fleet Logistics Support

VTS Vessel Traffic Service

WEZ Weapon Engagement Zone

GLOSSARY A-9

You might also like