Flight Training Instruction: Naval Air Training Command
Flight Training Instruction: Naval Air Training Command
                 FLIGHT TRAINING
                   INSTRUCTION
FOR
E-2
P-877
             iii
                               LIST OF EFFECTIVE PAGES
                                              iv
                             INTERIM CHANGE SUMMARY
  CHANGE
                                           REMARKS/PURPOSE
  NUMBER
 INTERIM
 CHANGE                      REMARKS/PURPOSE                         ENTERED BY   DATE
 NUMBER
                                              v
                        SAFETY/HAZARD AWARENESS NOTICE
This course does not require any special safety precautions other than those normally found on
the flight lines.
                                               vi
                                                TABLE OF CONTENTS
                                                                 vii
CHAPTER EIGHT - AIR DEFENSE TECHNIQUES .......................................................... 8-1
  800. INTRODUCTION ..................................................................................................... 8-1
  801. AIR DEFENSE CONTROL ...................................................................................... 8-1
  802. ENGAGEMENT ZONE PRINCIPLES ..................................................................... 8-3
                                                            viii
                                               TABLE OF FIGURES
Figure 2-2 E-2 Community Missions, Responsibilities, and Roles .................................. 2-3
Figure 6-1    Forward Line of Own Troops and Fire Support Coordination Line ............ 6-3
Figure 6-2    Global Area Reference System ......................................................................... 6-5
Figure 6-3    Blue Kill Box....................................................................................................... 6-6
Figure 6-4    Purple Kill Box ................................................................................................... 6-7
Figure 6-5    CAS Life Cycle ................................................................................................... 6-9
Figure 6-6    High-Priority Task List ................................................................................... 6-10
                                                                ix
Figure 7-15   Two Groups, Azimuth, Echelon NE ............................................................... 7-27
Figure 7-16   Three Groups, Champagne, Weighted East .................................................. 7-28
Figure 7-17   Leading Edge Comms ...................................................................................... 7-29
Figure 7-18   Exclusion Comms ............................................................................................. 7-30
Figure 7-19   Two Groups, Range with Additional Groups ............................................... 7-31
Figure 7-20   Maneuver in Range .......................................................................................... 7-34
Figure 7-21   Maneuver in Azimuth ...................................................................................... 7-35
Figure 7-22   Lead Group, Trail Group, Passing ................................................................. 7-37
Figure 7-23   East Group, West Group, Crossing................................................................ 7-38
                                                            x
                                         CHAPTER ONE
                                       THE E-2 COMMUNITY
100. INTRODUCTION
This chapter provides an overview of the E-2 Airborne Command & Control (ACC) community.
The basic ACC community organization, structure, and geographic distribution to support
normal operations are presented in this chapter.
The E-2 Hawkeye is the Navy’s all-weather, carrier-based, tactical battlespace management
ACC aircraft. The E-2’s primary mission is to deliver dominant airborne command and control
from the Carrier Strike Group. Missions that the E-2 is involved in include Air Intercept Control
(AIC), Strike, Search and Rescue (SAR), Offensive Air Support (OAS), and Surface
Surveillance Coordination (SSC).
The E-2 uses a combination of Radio Detection and Ranging (RADAR), Identification Friend or
Foe (IFF), and electronic surveillance sensors to provide early warning threat analysis of
potential targets. The ACC community uses its airborne radar system to carry out the following
functions:
The E-2 fleet is composed of 10 squadrons, which are located in Norfolk, Virginia; Point Mugu,
California; and Iwakuni, Japan.
      VAW-120 Fleet
      Replacement              Greyhawks                NS Norfolk
      Squadron (FRS)
A typical E-2 squadron consists of 10-12 pilots, 15-18 Naval Flight Officers (NFOs), several
officers working support in maintenance, an intel officer, and approximately 120 enlisted
personnel.
A Carrier Air Wing (CVW) is composed of multiple aircraft squadrons and several detachments
of fixed wing and rotary wing aircraft. CVWs are trained, organized, and equipped to conduct
modern carrier air operations while embarked aboard United States Navy (USN) aircraft carriers.
The variety of aircraft and their missions allows for flexibility across multiple domains.
Capabilities – When combined with the detection and C2 capabilities of the E-2, a CVW can
execute the following types of missions:
1. Strike
Staff – A CVW is led by the Strike Warfare Commander (AP), a Navy Captain who is
commonly referred to as “CAG.” The term CAG is a holdover from when the Air Wing was
once called a Carrier Air Group. CAG is supported by a staff of 40 officer and enlisted
personnel that includes the following:
2. Operations Officer
3. Warfare specialists
5. Intelligence Officer
6. Maintenance Officer
NOTE
A modern CVW typically consists of the fixed wing squadrons listed in the figure below.
                                                                               Number of
                                          Number of                             Aircraft
                  Squadrons                                   Aircraft
                                          Squadrons                              (per
                                                                               Squadron)
      Strike Fighter (VFA) Super Hornet      3-4*            F/A-18E/F           12–14
      Strike Fighter (VFA) Joint Strike
                                             0-1*              F-35C               10
      Fighter
      VFA Legacy Hornet (when
      provided by a Marine Fighter           0-1*             F/A-18C            10–12
      Attack [VMFA] squadron)
      Electronic Attack (VAQ)                  1              EA-18G                6
      Carrier Airborne Command &
                                               1              E-2C/D               4–5
      Control (VAW)
      Fleet Logistics Support (VRC)            1                C-2                 2
*Note: Four total VFA squadrons per CVW. Composition of variants changes between Air
Wings.
A modern CVW typically consists of the rotary wing squadrons listed in the following figure.
                                                                               Number of
                                          Number of                            Helicopters
                  Squadrons                                 Helicopters
                                          Squadrons                               (per
                                                                               Squadron)
      Helicopter Sea Combat (HSC)              1              MH-60S                8
      Helicopter Maritime Strike (HSM)         1              MH-60R                6
                            CHAPTER TWO
             AIRBORNE COMMAND & CONTROL MISSION OVERVIEW
200. INTRODUCTION
This chapter covers the various ACC roles and missions which support fleet and expeditionary
operations. The first section of this chapter defines various ACC missions, including OAS,
DCA, OCA, SAR/CSAR, Carrier Air Traffic Control Center (CATCC) Casualty Approach, and
SSC. The last section of the chapter summarizes the E-2’s responsibilities during these missions.
OAS is the process of managing air assets in support of ground forces. OAS support is provided
by properly pairing CAS assets with target requests that are received over the Joint Air Request
Net (JARN) and through the Joint Tactical Air Strike Requests (JTARs).
Dynamic or Time Sensitive Targets (TSTs) are also managed through proper asset assignment
and coordination with the theater Air and Space Operations Center (AOC).
The E-2’s role in OAS involves coordinating with airborne assets, ground forces, and higher
theater authority to ensure the proper ordnance arrives on target and on time in support of ground
operations.
DCA is the process of coordinating surface and airborne assets to prevent potentially hostile air
threats from maneuvering within their weapons release range to friendly forces.
This mission is accomplished through the proper management of Advanced Electronic Guided
Interceptor System (AEGIS) cruisers and destroyers as well as land-based surface-to-air missile
systems (e.g., Patriot Missile Batteries), and fighter Combat Air Patrol (CAP) stations.
The E-2 will typically manage the CAP station(s) assignment(s) during a DCA mission.
Additionally, the E-2 is responsible for detecting and reporting all air contacts outside the
Line- of-Sight (LOS) of friendly surface DCA participants, contributing vital information to the
Single Integrated Air Picture (SIAP) used by the Air Defense Commander (AW) when making
tactical decisions.
NOTE
               The E-2 is frequently relied upon as the first line of defense in the
               detection of inbound air threats.
OCA is the process of utilizing fighter configured aircraft and surface to air missiles to attrite as
many airborne hostile aircraft as possible. OCA can be used in preparation for follow-on strikes
and ground force offensives that require air superiority. This mission is typically conducted over
enemy controlled territory.
SAR, a subset of Personnel Recovery, involves locating, identifying, and recovering persons in
distress. SAR is typically associated with rescue efforts such as locating and rescuing the crew
of disabled vessels or recovering downed aircrew in a non-combat environment. The CSAR
mission refers to search and rescue operations that are carried out near or within combat zones.
The role of an E-2 in SAR and CSAR is to provide assistance in locating personnel in distress
and coordinate the air and sea space for all other assets attempting to locate and recover
survivors. The E-2, due to its onboard sensors and extended on station time, often acts as the
Airborne Mission Coordinator (AMC) for SAR missions and is responsible for the safe and
effective conduct of rescue operations.
A CATC Casualty Approach (CCA), also known as a Hawkeye Controlled Approach (HCA),
involves the safe coordination and recovery of aircraft on board an aircraft carrier. These
missions are conducted in situations when a ship’s casualty or equipment failure prevents the
ship’s company from performing normal recovery operations. During the performance of a
CCA, the E-2 crew will assume the roles of the carrier air traffic controllers, which include
marshal, approach, departure, and final controllers.
SSC is the process of managing air assets in the identification and prosecution of surface
contacts in the vicinity of friendly surface units or designated High Value Unit(s) (HVUs).
SSC involves the actions of classification, identification, and (if required) engagement. The goal
of SSC is to provide an integrated surface picture to the Sea Combat Commander (AZ) so they
can make timely and informed tactical decisions.
The role of the E-2 in SSC focuses on locating surface contacts to be investigated and
coordinating with air assets to identify those contacts properly and in a timely manner. In SSC
situations where engagements are required, the E-2 coordinates with the appropriate warfare
commander and provides necessary airspace and sea space management, which is used for the
effective prosecution of contacts.
The following figure provides a summary of the types of E-2 missions, the corresponding
responsibilities during the execution of each mission, and the specific aircrew roles when
conducting these E-2 community missions.
                                                            MC – Warfare Commander
                                                             Coordinator.
                  Locate surface contacts, assign air
                  assets to identify those contacts, and    AD – Data Link Manager, Strike
 SSC
                  coordinate with Warfare                    Control
                  Commander.
                                                            SO – Surface Search Asset
                                                             Controller, SSC Log.
300. INTRODUCTION
This chapter describes the Detect-to-Engage sequence to include the associated terminology,
procedures, and required action items in support of ACC operations.
Weapons system is a generalized term that encompasses a broad spectrum of components and
subsystems. These components range from simple devices (operated manually by a single
person to perform one specific function) to a complex array of subsystems that are
interconnected by computers and data communication links and capable of performing several
functions or engaging numerous targets simultaneously. Although each subsystem may be
specifically designed to solve a particular part of the fire control solution, it is the combined
functionality of the components that allow the system to achieve the ultimate goal of destroying
the target.
All modern naval weapons systems, regardless of the environment in which they operate or the
type of weapon they employ, consist of the basic components that allow the system to detect,
track, and engage the target. Sensor components must be designed for the environments in
which the weapons system and the target operate. These components must also be capable of
coping with varying target characteristics such as range, bearing, speed, heading, size, and
aspect.
Every weapons system performs the functions of detecting, resolving or localizing, classifying,
tracking, selecting a weapon, and neutralizing the target. The target can be surface or airborne,
stationary or mobile, manned or unmanned, guided or unguided, and maneuverable or in a fixed
trajectory. The target may also travel at speeds that range from a few knots to several times the
speed of sound.
Detect-to-Engage Sequence
The Detect-to-Engage sequence, which is an integral part of the modern fire control problem,
involves the action steps of detecting, tracking, engaging, and neutralizing the target.
Detect the Target – Target detection by a weapons system includes three phases. The first
phase is surveillance and detection. This phase involves an active and/or passive search of a
predetermined area to detect a target. In an active search, the system radiates energy into the
medium and processes any returns or echoes (e.g., radar). In a passive search, the system listens
for energy that is transmitted from the emitting target. During the second phase, the target is
measured or localized. This phase involves estimating the target’s behavior or motion relative to
the detecting platform by taking a series of measurements that include range, bearing, and depth
or elevation. In the third phase, the target is classified. This is accomplished by interpreting the
target’s various parameters and behavior in order to estimate its type, number, size, and identity.
Weapon system sensors’ capabilities are evaluated with respect to the maximum range at which
they can reliably detect a target, plus their ability to distinguish individual targets in a multi-
target group. Additionally, sensor subsystems must be able to detect targets in a noise-cluttered
environment. Noise and clutter are terms used to describe any unwanted radar returns. They are
usually caused by ground, sea, rain, and/or other atmospheric reflections. They may also be the
result of deliberate radio interference or jamming. Some level of noise or clutter is always
present in the environment. Noise may also be self-generated, such as that occurring within the
electronic circuitry of the detecting sensor itself.
Track the Target – Target detection is the essential first step in resolving any fire control
problem, but to successfully engage and neutralize the target its relative position and velocity
must be updated continuously. This information is used to evaluate the potential threat
represented by the target, predict the target’s future position, and determine a weapon intercept
point so that the proper weapon can be effectively and efficiently deployed. A successful fire
control solution is the convergence of the target’s predicted position with the weapon intercept
point.
The modern battlefield is one in which sensors detect numerous contacts (friendly, neutral, and
hostile), and continually gather information on them. The extreme high speed, precision, and
flexibility of modern computers enable the weapons systems and their operators to compile,
coordinate, and evaluate the data before initiating an appropriate response. Using computers, a
weapons system can establish the target’s presence, track, and predict target motion
automatically, and ultimately define how, when, if, and with what weapon the target will be
engaged.
Engage and Neutralize the Target – Effective engagement and neutralization of a target
requires that a destructive mechanism, such as a warhead, be delivered in the vicinity of or
actually impact the target. When delivering the warhead, the following factors must be
considered: aiming, launch point, propulsion system type, and the external forces experienced
by the weapon enroute to the target. The weapon’s capability to be guided or controlled after
launch dramatically increases its accuracy and Probability of Kill (Pk). Different types of
guidance systems also significantly impact weapon system designs. These factors, combined
with the type of warhead, the fusing mechanism, and other warhead design considerations, all
contribute to the effectiveness of a modern weapon.
NOTE
              The type of warhead and the type of target determine how close to
              the target a warhead must be delivered.
F2T2EA, commonly referred to as the “kill chain,” is the process used to perform the Detect-to-
Engage sequence.
Find – During this step, emerging targets are detected and characterized for further prosecution.
The find step involves detecting the presence of a potential target by sensors and/or through
intelligence, surveillance, and reconnaissance (ISR) methods can be used for the detection of a
target. Traditional ISR includes platforms or systems dedicated to the ISR mission, such as
human intelligence (HUMINT), electronic intelligence (ELINT) assets, space intelligence assets,
unmanned aerial systems (UAS), etc. Non-traditional ISR (NTISR) refers to ISR collection by
other means, such as a strike aircraft using their targeting pod to locate and identify a target.
Fix – The fix step of this phase includes actions to determine the location (fix) of the potential
target. The fix step begins after potential targets are detected. When a potential target is
identified, sensors are focused to confirm target identification and its precise location. The
correlation and fusing of data confirms, identifies, and locates the target.
Sensors help to classify the target and interpret its behavior in order to estimate the type, number,
size, and identity. Many of the sensors used in the detection process aid in determining the exact
identity of the contact, or Positive Identification (PID). Electronic and physical parameters are
gathered on the contact and are used to characterize the contact. These parameters include, when
possible, the point of origin, altitude, and speed.
1.    Friendly – A positively identified friendly aircraft, ship, or ground position. You can use
the following methods to help identify friendly aircraft:
a. Home country or coalition aircraft originating from a friendly base or aircraft carrier
3.   Bandit – Using an Identification Matrix, a contact may be identified as a bandit for threat
evaluation if the target has characteristics, such as:
a. No IFF
NOTE
Track – During this step, the target is observed, and its activity and movement are monitored.
The track step begins once a definite fix is obtained on the target and ends when the
engagement’s desired effect upon the target is determined. Note that some targets may require
continuous tracking upon initial detection as an emerging target. Sensors may be coordinated to
maintain situational awareness or track continuity. If track continuity is lost, the fix step will
likely have to be repeated (and potentially the find step as well).
Target – During this step, the decision is made to engage the target in some manner to create
desired effects and the means to do so are selected and coordinated. The target step begins with
target validation. That is, operation personnel ensure that all vetted targets meet the objectives
and criteria outlined in the commander’s guidance. Additionally, validation reviews the target’s
compliance with law of war and ROE and ensures that it is not otherwise restricted. The target
phase matches available engagement and sensor assets against the target are coordinated and
deconflicted, and a risk assessment is performed. The target is weaponeered, engagement
options are formulated, a recommendation is nominated, an option is selected to affect the target,
and assessment requirements are submitted. The target phase can be time-consuming due to the
large number of requirements to satisfy. Target step actions can be initiated and/or completed in
parallel with previous phases to enable timely decisions.
Engage – In this step, action is taken against the target. During the engage step, the engagement
is ordered and transmitted to the selected asset. Engagement orders must be transmitted to,
received by, and understood by those engaging the target. The engaging component manages
and monitors the actual target engagement. The PID process is conducted prior to target
engagement, and continues throughout the engagement, in coordination with the controlling
agency for any changes to the operational environment that may affect the engagement decision.
Assess – In this step, initial assessment of action against the target is performed. During the
assess step, initial assessment of the physical or functional status of the target takes place. For
attacks in the physical environment, the assessment confirms impact of the weapon on the target
and makes an initial estimate of the damage. For nonlethal weapons, the initial assessment
attempts to detect changes in functionality indicating a successful engagement.
For both lethal and nonlethal weapons, this initial assessment is part of battle damage assessment
(BDA), phase I. Attack recommendations are generally not made during BDA phase I
information. However, in cases of confirmed miss, a re-attack may be authorized based on target
priority and weapon availability. This completes the F2T2EA cycle. However, further
assessment will take place following this cycle to determine actual effectiveness of the
engagement.
400. INTRODUCTION
This chapter addresses the characteristics of the E-2 weapon system and explains the
terminology, capabilities, and limitations of surveillance and identification systems in support of
ACC operations. Information on how to communicate using basic radio terminology, brevity,
and procedures in support of ACC operations is also discussed. In addition, this chapter provides
an explanation of the terminology and concepts associated with AEW tracking, including manual
tracking and Near Collision Intercepts (NCIs) to support ACC operations. This chapter
concludes with an introduction to the terms, concepts, and procedures associated with Air
Intercept Control (AIC), and communications procedures.
The E-2’s IFF, ESM, and Data Link systems operate similarly to those discussed during VT-4
Intermediate training. One exception is that in the E-2 strand, ESM’s confidence percentage will
not be taken into account before considering that line of bearing valid. As soon as an emitter
populates the gutter on the scope, its information can be used. In this section, we’ll discuss
differences in the E-2’s radar system as well as an additional system called Automatic
Identification System (AIS).
APS-145 – The E-2C is equipped with the APS-145 radar. This mechanically scanned array
airborne surveillance radar is capable of tracking about 20,000 targets simultaneously and
identifying distance, azimuth, velocity, and altitude for each target. Even with these extensive
capabilities, this radar type exhibits limitations in overland or high clutter environments that
make coordinating with fighters during AICs crucial.
APY-9 – The E-2D is equipped with the APY-9 radar. The APY-9 is an electronically and
mechanically scanned radar system which improves upon the APS-145 and is able to identify
smaller targets at a greater distance in a variety of clutter environments. The system is capable
of focusing the radar on select areas of interest and provides a higher degree of accuracy over the
APS-145.
In order to support SSC operations, the E-2 utilizes Automatic Identification System (AIS) data
to aid in the identification of maritime ships. AIS is a commercial maritime digital broadcast
system that continually exchanges vessel data among network participants over a VHF radio
frequency. The data includes vessel identity, position, speed, course, destination, flag, and other
information of critical interest for navigation safety and maritime security.
International commercial vessels over a specified Gross Tonnage (GT) are mandated to use AIS
by the 1974 International Maritime Organization (IMO) International Convention for the Safety
of Life at Sea (SOLAS) Treaty. The IMO Performance Standards for AIS (IMO Resolution
MSC.74 [69]) (IMO 2002b) require that these systems be capable of functioning in the ship-to-
ship mode (to assist in collision avoidance), and ship-to-shore mode (as a means for littoral states
to obtain information about a ship and its cargo and as a Vessel Traffic Service [VTS] tool).
Ship-to-ship mode is the most important mode because of its ability to assist in collision
avoidance.
AIS is intended to enhance the SOLAS, safety and efficiency of navigation, and protection of the
marine environment. The system assists in vessel identification, target tracking, and
simplification of information exchange by reducing verbal mandatory ship reporting. Providing
additional information to assist SA is another characteristic of the AIS.
AIS has many advantages for those vessels that are equipped with this system, but it also has
limitations. Carrying vessels simply disappear from the surveillance picture without notice when
the equipment is not operational, or the vessel turns it off. In addition, the information is only as
accurate as what the user inputs, allowing for information to easily be spoofed or faked. For
example, a combatant vessel could have an AIS system on board and input information as if it
was an oil tanker. To all other AIS users, the combatant would appear as an oil tanker.
This section provides details on how E-2 aircrew can communicate using the basic ACC aircraft
radio procedures and terminology.
The two main entities an E-2 will communicate with are AW over ADC C&R net and fighters on
a FAD (Fighter Air Direction) net via standardized Air Intercept Control (AIC) comms. Fighters
will check in with a standardized check in format, and through AIC comms, be directed to
intercept contacts inbound to the strike group.
The ADC C&R net is the communications network for all units participating in CSG Air
Defense. Participants will normally include the Air Defense Commander (AW), aircraft control
units (ACUs), and all ships within the CSG. The net is used to communicate all facets of air
defense, such as relaying AW’s intentions to all units, voice reporting all air tracks entered into
the data link, and coordinating the use of DCA assets and/or surface to air missiles. The high
frequency (HF) band is normally used for the ADC C&R net, due to its over the horizon
capabilities, although J-voice may be used as well.
The ADC C&R net is often referred to as a “formal” or “directed” net, which means that
communications are strictly controlled. Every transmission on the net should begin with the call
sign of the unit being called, the call sign of the unit calling, and end with either “over” or “out”.
“Over” is used when the transmitter is expecting a response from the unit(s) being called. If a
response is not expected, “out” should be used, denoting the conversation is assessed to be
complete.
As an ACU, the role of the E-2 on the ADC C&R net is primarily to report new air tracks and
coordinate DCA assets. All new air tracks shall be reported in the data link and voice reported to
AW using the format detailed below. Any changes to existing tracks should be reported, as well.
When controlling DCA assets, AW should be informed whenever the status of a CAP station
changes. For example, the E-2 crew should communicate with AW whenever the CAP is
initially manned, whenever they are committed to take an intercept, the results of the intercept
upon resetting, any updates to fuel states, or when the CAP is otherwise unmanned. The ACU
can also coordinate with AW to have tracks “covered” with “birds” (friendly SAMs) in the event
of a “leaker”.
In most cases, even when not directly supporting air defense, the E-2 is still performing AEW,
contributing to the air defense mission by building and maintaining the single integrated air
picture.
When reporting a track using voice communications on the air warfare commander net, use the
following format:
1.  Unit being called – Refers to the warfare commander to whom the information is reported
(AW)
2. Unit Calling – Refers to the call sign of the unit reporting the information
3. Track number – Data Link track number being reported, either “new” or “update”.
4. Checkprint – Checkprint line and item that the contact is evaluated to have.
5. Evaluation – What the E-2 evaluates the contact as, using applicable code words.
6.   Intentions – If required, this is where you relay intentions to AW related to the contact.
Such intentions can include intend to intercept with a CAP station (“…intend to intercept with
Eagles”).
                                                                           Evaluate      Intend to
         Alpha                            Update         Checkprint                      intercept
                           Tango                                           Cardinal
        Whiskey                         Track 3652         line 2                       with Miami
                                                                            Heron
More examples of this and how to apply it during an E-2 mission are further explained in
FTI P-813 Student Guide.
Air assets use a standard check-in brief in order to transmit their identity and capabilities to the
airspace controlling authorities. The fighter aircraft radio communications check-in procedure is
executed using the following memory aid, MNPOPCA.
Terminology
The fighter aircraft use the following terminology during AIC radio communications:
1.    Bullseye – An established reference point from which the position of a contact can be
referenced by bearing (magnetic degrees) and range (nm).
2.    Bearing, Range, Altitude, and Aspect (BRAA) – A tactical communication format used by
the fighter aircrew or controller to provide the location and direction of the contact relative to the
specified friendly aircraft. This information provides the fighter SA to the location of the contact
with respect to the fighter’s position in space and aids in correlation of groups.
3.    CAP station – A point in space established during pre-mission planning used to position
friendly fighters. The CAP is denoted by a code name, often the name of a city.
4.    On station – An informative call indicating that a unit or aircraft has reached its assigned
station.
Air Intercept Control communications are conducted between either the Ground Control
Intercept (GCI) or AIC controller and the fighter. This type of intercept procedure is known as
Tactical Air Intercept Control (TACAIC). The comm format is standardized and governed by
the TOPGUN manual which is maintained and updated by the Navy Fighter Weapons School in
NAS Fallon, NV. These comms are introduced via BRAA “picture” calls for NCIs and will be
covered in much more detail in AIC phase and chapter 7 of this FTI. Defining and making a
picture call is discussed in this section.
The NCI procedure utilizes the picture call, which serves to build a fighter’s SA. A picture call
defines the position of bogeys and other aircraft in relation to an anchor point, either bullseye or
the fighter (BRAA). A picture call does not include comm air traffic. While performing NCIs,
the picture call will be given in BRAA format.
AIC: “Enforcer 11, single group BRAA 100/28, 29 thousand, flank south, bogey, spades.”
With only a few exceptions, this basic communication format remains unchanged. BRAA
format will be used at the beginning of each NCI procedure to communicate the position of the
bogey. Since the BRAA format uses the fighter as the reference point, the call will always begin
with the fighter call sign. It can be assumed that each bogey in the NCI procedure will be named
“single group” and their declaration will be “bogey, spades”. Specific aspects (Figure 4-4) will
be given when using the BRAA format. Specific aspects are hot, flank (cardinal or sub-cardinal
direction), beam (cardinal or sub-cardinal direction), and drag (cardinal or sub-cardinal
direction). This specific aspect is from the bogey to the fighter, or the angle that the fighter is off
the bogey’s nose. This is called target aspect (TA).
The following sections cover terminology and concepts associated with AEW tracking, including
manual tracking and Near Collision Intercepts (NCI) to support AEW operations. For more
details on the procedures, refer to FTI P-813.
Manual Tracking
If the processor fails to build a track on a RADAR contact, an operator must determine the
contact’s course and speed in order to manually build, update, and report a track in the data link.
Manual tracking is accomplished by measuring the course and distance traveled of a contact over
time by using the raw radar return (video).
      c.   After 1 minute from the initial mark, or 10 sweeps of the radar, mark the new
           position.
     d. Measure the bearing and range from the initial position to each subsequent mark to
     compare and calculate the course and speed. The bearing from the initial position to each
     subsequent mark is the course. For the 36 second calculation, (distance traveled)
     * 100 = speed. For the 1 minute calculation, (distance traveled) * 60 = speed.
3. Manually build an air track and input the course and speed.
a. After 3 minutes from the initial mark, mark the position a final time.
     b.    Measure the bearing and range from the initial position to the final position and
           calculate the course and speed. The bearing from the initial position to the 3 minute
           mark is the course. The speed is (distance traveled) * 20.
c. Update the manual track with the final course and speed calculation.
During an intercept, the fighter will maneuver relative to the bogey in preparation for weapons
employment or a visual identification (VID). Correctly orienting the fighter to the bogey’s flight
path will allow aircrew to advantageously position the fighter aircraft. The information below
provides definitions of the terms used in intercept geometry.
3. BB – The magnetic bearing from the fighter to the bogey is known as the Bogey Bearing.
5.    TA – This is the angle by which the bogey sees the fighter. This angle, which is the LOS
angle from the target’s nose to the fighter, is measured in direction right or left of the bandit’s
flight path. TA is important for the fighter to monitor because it is the primary method of
determining if the fighter or other friendly assets are being targeted by the bandit.
b. TA (L or R) = Cut to AO
Both formulas use BR (cut) as the starting point and BB (AO) as the finishing point to determine
TA in degrees and direction. The TA formula is stated in two ways in order to help aircrews
determine TA under different circumstances.
Establishing the Collision Course (CC) is the initial long-range objective of the fighter. With
this information, the fighter can close on the bogey in the quickest way possible.
AIC will compute a CC and direct the intercept using the steps below:
2. Calculate BR (BH plus or minus 180°): 110 for the example in Figure 4-6
4.    Compute TA: TA = BR to BB. For the example in Figure 4-6, 110 (BR) minus 075 (BB) =
   o
35 Left Target Aspect, and add (for a right TA) or subtract (for a left TA) the amount equal to
TA to the BB to obtain a CC. 075 (BB) minus 35 (Left TA) = 040 (CC). Direct the fighter to
turn to this heading.
5.    Monitor the BB for drift as the fighter closes on the bogey and make appropriate heading
adjustment calls to the fighter.
500. INTRODUCTION
This chapter discusses concepts and terms associated with Surface surveillance coordination
(SSC) as well as information about Surface Warfare (SUW) in a tactical environment.
Maritime Employment
Maritime Employment is normally conducted by air and surface command and control platforms
known as Aircraft Control Units (ACUs). An ACU’s function is to provide deconfliction of
controlled assets. Additionally, ACUs must efficiently utilize assets to maximize search volume.
In most cases, SSC assets will be controlled by a designated ACU.
The E-2’s mission, while functioning as an ACU, is to coordinate a search of the Vital Area
(VA) and Classification Identification Engagement Area (CIEA). Controllers vector aircraft
using either bullseye reference points or BRAA calls to investigate all unknown surface vessels
within the VA encompassing the High Value Assets (HVAs).
SSC assets determine vessel type, classification, and hull number and report this information to
the E-2. The E-2 then reports this information via link and voice over the command network. If
further inquiry is necessary, the request for clarification will be issued over the command
network and relayed to the appropriate aircraft. The E-2 controller ensures the entire VA has
been sanitized prior to moving outward to the CIEA.
SSC Assets under ACU control can be made to shadow any surface Contact of Interest (COI) or
Critical Contacts of Interest (CCOI). All SSC is under the purview of the Sea Combat
Commander (SCC), also known as “Alpha Zulu” (AZ). In the instances where an SSC asset
locates a CCOI or COI, AZ will often request additional actions, such as taking pictures
(brownies) during a rig or close-up surveillance of the contact. The objectives of SSC assets are
to identify all contacts in the VA, followed by contacts in the CIEA, and ensure that no
unidentified contacts move within a position where they could pose a threat to a HVA.
The concept of Air Operations in Maritime Surface Warfare (AOMSW) supports the objectives
of the Joint Force Commander (JFC) by providing the required capabilities and forces. The JFC
normally designates a Joint Force Maritime Component Commander (JFMCC) to command and
control joint maritime operations. As the functional component commander, the JFMCC has
authority to perform operational missions with assigned and attached forces as well as forces and
assets made available for tasking. When the JFC designates a JFMCC Area of Operations (AO),
the JFMCC is the supported commander within the AO, and in this capacity, has the authority to
designate the target priority, effects, and timing of fires within the AO.
In addition, the JFMCC enables effective joint and coalition air participation in planning and
executing the four specific missions of SSC, Maritime Air Support (MAS), Air Interdiction
Maritime Targeting (AIMT), and Maritime Dynamic Targeting (MDT). As the JFC’s maritime
warfighter, the JFMCC integrates coalition and service assets into the missions described in the
following figure.
                                     Mission Descriptions
              This mission provides reconnaissance and surveillance in support of the
      SSC     maritime commander’s objectives by establishing and maintaining the
              Common Operational Picture (COP).
              These operations, which may cover large areas of open water, provide air
      MAS     action against hostile surface targets at sea that require detailed integration of
              each air mission with the fire and movement of maritime forces.
              This mission involves detailed tactical integration where surface forces are not
      AIMT    required. This mission shares many common similarities with traditional air
              interdiction and Strike Coordination and Reconnaissance (SCAR) missions.
              This mission allows for the prosecution of Targets of Opportunity. These are
              targets that are identified too late or are not selected for action in time to be
      MDT
              included in deliberate targeting, but meet criteria specific to achieving
              objectives.
The Composite Warfare Commander (CWC), who is typically the Officer in Tactical Command
(OTC), is responsible for the operational needs of the CSG and Expeditionary Strike Group
(ESG). However, the CWC concept of operations allows an OTC to delegate tactical command
to the CWC. The CWC wages combat operations to counter threats to the force and to maintain
tactical sea control with assigned assets, while the OTC retains close control of power projection
and strategic sea control operations. Subordinate to the OTC and CWC are Principal Warfare
Commanders (PWCs), who are responsible for specific warfare areas. These warfare
commanders are responsible for collecting and disseminating information and, in certain
situations, are delegated authority to respond to threats with assigned assets. Six PWCs,
subordinate to the CWC, are designated by their warfare area. Aircraft may be assigned to more
than one PWC based on perceived threat priorities. The description of PWC–
supported/supporting relationships and assignment of responsibilities are outlined by Operational
Tasking (OPTASK) message.
The CWC and the PWCs are assigned an individual, two-letter call sign. The first letter
identifies the particular strike group, while the second letter identifies the corresponding mission
area. For example, the call sign of the ADC for the Enterprise CSG could be “Echo Whiskey”
(EW). Depending on the situation, the SCC can serve as both the Anti-Submarine Warfare
Commander (ASWC) and the Surface Warfare Commander (SUWC). If the name of the
particular strike group is not known or specified, utilizing “Alpha” as the first letter of the CWC
is appropriate. The CWC would then be AB, ADC would be AW, and so on.
Areas of Operation
AZ is the sea combat commander responsible to the Composite Commander of the strike group.
In times of high tasking, or if a specific situation requires, he/she can split the duties into SUW
(AS) and ASW (AX). AZ (and AS/X when active) is responsible for the identification, tracking
and prosecution of all surface and subsurface contacts in the surveillance area. The range of the
AO is defined by each PWC; therefore, the VA for “Alpha Whiskey” (AW) may be significantly
larger than AZ’s VA based upon the threats.
The entities and operational areas normally established include the following:
1.     HVA – This asset is, in most cases, the Aircraft Carrier (CVN) in a CSG or the
Amphibious Assault Ship (LHA/LHD) in an ESG. It can also be a High Value Airborne Asset
(HVAA), such as an EA-18G Growler in a strike package. It is an asset deemed so important
that the loss of it could seriously impact U.S. warfighting capabilities or provide the enemy with
significant propaganda value. In the case of a HVAA, fighter aircraft can be assigned as HVAA
Protection (HVAAP).
2.    VA – This area, which is defined by the expected maximum weapons release range of the
threat, is centered on the HVA. It is possible to have more than one VA.
3.    CIEA – This is the area outside the VA, but inside the Surveillance Area (SA), which
includes all of the detected contacts upon which classification, identification, and monitoring
must be performed. Since any potential threat must be monitored prior to entering the VA, the
ability to escort, cover, or engage must be maintained for all contacts in the CIEA.
4.   SA – This area, determined by the CSG commander, is where organic and inorganic
sensors keep track of activity to prevent surprise contacts from entering the CIEA.
When operating in a particular theater, warfare commanders will issue various messages that not
only define the VA, CIEA, and SA, but also provide listings of important threats, specific
guidance on ROE, and methods of identification.
2.    OPTASK Link – This document provides all the parameters for link utilization, including
net assignments, track limitations, and crypto.
3.     OPTASK Link Identification – This document delineates the appropriate link symbology
for track assignments.
4.     OPTASK Air Defense and/or ADC Daily Intentions Message (DIM) – This message
outlines which naval vessels are designated as firing units and ACUs as well as listing additional
fleet air defense responsibilities.
5.   OPTASK SUW/SCC and/or SCC DIM – This message contains the following priority
contact sets:
     a.    COI – These contacts have tactical significance, but they may not be a threat to the
           force. As an example, COI may be defined as naval combatants operating in a
           particular area or unknown surface contacts operating in a designated area. Their
           presence has no real impact on mission completion.
     b.    CCOI – These types of contacts present a threat to the force, and their locations must
           be identified for successful completion of the mission. The CCOI could be a
           potential adversary suspected of either terrorist or smuggling activity.
The E-2 control of fighters and Maritime Patrol and Reconnaissance (MPR) aircraft, such as the
P-8, is typically regulated using a bullseye format, which is similar to AIC communications.
When determining where to send assets, the E-2 will prioritize contacts based upon their location
and perceived threat. Any unidentified contacts in the VA are a priority over other contacts in
the CIEA, followed by unknown contacts in the SA.
Once vectored to a surface contact, SSC assets (typically F/A-18s or P-8s) will use their
platform-specific sensors to try to identify the contact. The ship type, hull number, flag, course,
and speed of the surface contact are reported back to the E-2, which then reports relevant
information via data link and a voice report to AZ.
600. INTRODUCTION
This chapter introduces the fundamental concepts of OAS, provides definitions of the associated
terminology, and discusses the principles of effective OAS to support these operations.
This section describes the basic principles and concepts used to support OAS operations and
missions.
Principles of OAS
The concept of OAS allows a JFC to project command management beyond the range of normal
communications and provide up-to-date, fast-reacting commands to forces on the ground. The
foundation of OAS is based on an airborne mobile command platform, such as an E-2 Hawkeye
or E-3 AWACS, which provides critical relay and communications support between C2 centers
and aircraft in the theater.
1.   Air and Space Operations Center (AOC) – The JAOC (joint operations) or CAOC
(combined operations) is the senior C2 element and is responsible for the planning and conduct
of component air and space operations within a theater.
2.   Air Support Operations Center (ASOC) – The ASOC is the primary control agency
responsible for the execution of air power in direct support of land operations. Its primary
mission is to control air operations short of the Fire Support Coordination Line (FSCL). It is
normally collocated with the senior Army fires element. The ASOC is directly subordinate to the
AOC.
3.   Tactical Air Control Party (TACP) – The TACP is an air liaison unit collocated with
ground maneuver units. TACPs report to the ASOC and have two primary missions: to advise
ground commanders on the capabilities and limitations of air operations and to provide joint
terminal attack controllers (JTACs) to support ground units.
4.    Joint Terminal Attack Controllers – JTACs are embedded with ground units to provide
final control to CAS attack aircraft. JTACs will assist the CAS attack aircraft with target
correlation and provide information critical to a successful attack.
5.    Control and Reporting Center (CRC) – The CRC provides battle management, early
warning and surveillance, weapons control, and data link management. The functions of the
CRC are essentially the same as the OAS platform, but may not be available in an immature
theater.
Airspace Coordinating Measures (ACMs) are three dimensional areas which can be used to
restrict access to certain areas. This restricted access allows controllers and commanders the
ability to de-conflict air and surface fires. There are two general types of ACMs: pre-planned or
dynamic. Some examples of common ACMs include, but are not limited to:
1.   Restricted Operating Zone (ROZ) – Airspace is reserved for specific activities in which the
operations of one or more airspace users are restricted.
2.   Close Air Support Area (CAS) – Airspace designated as a holding orbit for rotary or fixed-
wing aircraft supporting CAS operations.
3.   Minimum Risk Route (MRR) – A temporary corridor of defined dimensions that presents
minimum hazards to low flying aircraft transiting the combat area.
4.    Air Corridor (AIRCOR) – A restricted air route for use by friendly aircraft to prevent being
fired upon by friendly forces.
5.   No Fly Area (NOFLY) – Airspace set aside for a specific purpose in which no aircraft
operations are permitted, except as authorized by the appropriate commander or controlling
agency.
1.    Forward Line of Own Troops (FLOT) – A line that indicates the friendly forces in the most
forward positions in any kind of military operation at a specific time. The FLOT must be
designated by the ground commander and disseminated to supporting aircraft to prevent potential
friendly fire incidents.
2.  Fire Support Area (FSA) – An area assigned to fire support ships by the naval force
commander from which they deliver.
Fire Support Coordination Measures (FSCMs) are two or three dimensional areas employed by
commanders to facilitate the rapid engagement of targets and simultaneously provide safeguards
for friendly forces. Like ACMs, FSCMs may be pre-planned or dynamic. Some examples of
common FSCMs include, but are not limited to:
1.   Fire Support Coordination Line (FSCL) – A line established by the appropriate land or
amphibious force commander support common objectives within an area of operations. The
FSCL is used to coordinate fires of air, ground, or sea weapons systems against surface targets.
Short of the FSCL, all fires must be coordinated with the establishing commander prior to
engagement, due to the close proximity to friendly forces. This is where CAS normally occurs.
Beyond the FSCL, all fires must be coordinated with affected commanders prior to engagement.
Figure 6-1 Forward Line of Own Troops and Fire Support Coordination Line
2.   No Fire Area (NFA) – An area designated by the appropriate commander into which fires
or their effects are prohibited.
3.   Restricted Fire Line (RFL) – A line between converging friendly ground forces that
prohibits fires or their effects across that line.
4.    Restricted Fire Area (RFA) – An area in which specific restrictions are imposed and into
which fires that exceed those restrictions will not be delivered without coordination with the
establishing headquarters.
5.    Kill Box – A three-dimensional area used to facilitate the integration of joint fires. Kill
boxes are established to support airborne interdiction (AI) efforts as part of the JFC’s joint
targeting process. Once established, a kill box allows for lethal attack on surface targets without
further coordination with the establishing commander or terminal attack control. Kill boxes can
have restrictions in the case of joint air-to-surface and surface-to-surface indirect (LOS does not
exist between weapon system and target) fires. The goal of a kill box is to reduce the required
coordination for fulfilling support requirements with maximum flexibility, while preventing
friendly fire incidents. Kill boxes are normally established beyond the FSCL. Since friendly
forces are typically not expected to be beyond the FSCL, the kill box structure allows AI assets
to engage targets without the need for CAS or additional coordination.
A kill box should be established with the aid and consultation of any commanders involved. Kill
box requirements and other control measures, which are determined using normal component
targeting and planning processes, are established and approved by commanders or their
designated staff. Information on the attributes of the kill box is then published and disseminated
using existing voice and digital C2 systems. The integration of indirect fires and the presence of
forces are some of the factors that may affect the structure of the kill boxes.
The dimensions of a kill box are defined using a reference system, such as the Global Area
Reference System (GARS). The GARS system uses three numbers followed by two letters to
describe a unique 30 minute by 30 minute area. The origin point for the system is 90 degrees
south (the South Pole) and 180 degrees east/west. The areas are read right (west to east,
001-720) then up (south to north, AA-QZ). The 30 minute by 30 minute areas are subdivided by
quadrant into 15 minute by 15 minute areas, and then further subdivided by a keypad division
into 5 minute by 5 minute areas (Figure 6-2).
The colors blue and purple are used to represent the two types of kill boxes.
Blue Kill Box – A blue kill box permits air interdiction in the area without further coordination
from the establishing headquarters. If the kill box is active, air-to-surface fires delivered by
aircraft not assigned to the kill box must be coordinated. Additionally, all aircraft not assigned to
an active blue kill box are restricted from entering without proper coordination. Surface-to-
surface direct (LOS exists between weapon system and target) fires are not restricted by a blue
kill box, but surface-to-surface indirect fires are not permitted. Blue kill boxes minimize the
restrictions on air-to-surface fires while also protecting aircraft.
Purple Kill Box – A purple kill box also allows maritime and land component commanders to
employ surface-to-surface and subsurface-to-surface indirect fires. This difference from the blue
kill box allows for the maximum use of joint fires, creating the maximum potential for engaging
targets. Surface-to-surface direct fires are not restricted by a purple kill box. The airspace for a
purple kill box also includes a floor and ceiling to enable separation between aircraft delivering
air-to-surface fires, trajectories of surface-to-surface indirect fires, surface-to-air fires, and other
aircraft.
602. TERMINOLOGY
The following section provides a summary of the terms used in support of OAS operations.
CAS is an air action by fixed-wing and rotary-wing aircraft against hostile targets that are in
close proximity to friendly forces and requires detailed integration of each air mission with
the fire and movement of those forces.
CAS can be conducted at any place and time friendly forces are in close proximity to enemy
forces. The word “close” does not imply a specific distance; rather, it is situational. The
requirement for detailed integration because of proximity, fires, or movement is the determining
factor. At times, CAS may be the best means to exploit tactical opportunities in the offense or
defense. CAS provides fires to destroy, disrupt, suppress, fix, harass, neutralize, or delay enemy
forces.
JTAR
Any tasking for CAS will come from the ASOC in the form of a Joint Tactical Air Strike
Request (JTAR). The JTAR will be assigned a number in the form of the two-digit date
followed by the numerical order of JTARs assigned that day. For example, JTAR 13-07 is the
seventh JTAR assigned on the 13th of the month. The JTAR will include target type and
location, desired results, callsign and frequency of the JTAC, as well as more detailed
information.
The JTAR will be relayed to the OAS platform by referencing the line numbers on the JTAR
form, directing to “circle” the applicable letter(s) for that line number and/or filling in blanks.
The ASOC will pass lines 1-7 to the OAS platform. It is important to accurately transcribe the
information. Certain information needs to be read back to the ASOC to ensure they have the
most critical information. The student should read back the request number, line 4, and line 7.
The remaining information is used for selecting the appropriate asset based on the type and
location of the target.
Once a JTAR has been received from the ASOC, it is the responsibility of the E-2 to assign an
appropriate CAS asset to prosecute the target. Consideration should be given to the following
when choosing an asset:
1. Prioritization of targets
3. Type of target
4. Weapons loadout
5. Desired results
6. Play time (time on station based on ATO or fuel remaining) remaining for assets
Once an asset has been chosen for a JTAR, pass the applicable JTAR information to the asset
and request their Time on Top (TOT). The student should pass the request number, line 4, and
line 7 to the asset. Since the JTAC will pass the CAS 9-line to the asset, there is no need to read
the entire JTAR to the assigned asset. Once the asset calculates their TOT and relays it back to
you, pass that information back to the ASOC. After a JTAR has been prosecuted, the asset
should report back with an In-Flight Report, which should then be relayed to the ASOC. A
JTAR is not considered closed out until the In-Flight Report has been passed to the ASOC.
A CAS Stack is any number of CAS assets in close proximity to each other that are deconflicted
with regard to altitude. CAS check-in procedures include reporting of information, such as
mission number, number of aircraft, position, altitude, play time, and abort code. Once the
check-in is complete, the aircraft will be assigned targets and times for weapons delivery by the
OAS platform or CRC.
A TST is a target that requires immediate response from friendly forces. TSTs require a
response either because they pose or will soon pose a danger to friendly forces, or because they
are highly valuable, fleeting targets of opportunity. TSTs may be either planned or immediate.
Some, such as aircraft or submarines, may be handled by separate components. Others may
require detailed inter-service and/or functional component planning and coordination. The JFC
provides specific guidance and prioritization for TSTs within the AO. Since fleeting TSTs may
be difficult to detect or identify due to enemy mobility and/or denial and detection techniques,
they must be engaged rapidly before the enemy can use these techniques.
The High-Priority Task List is a list of important targets that receive priority when TSTs and
direct support targets are not available. This list, which exists to aid warfighters in deciding
mission priority, takes precedence over all priorities except TST and troops in contact.
                                                                         Date of       Date of
   Priority             Description              Location JTAR#
                                                                         Request      Approval
   High       Mobile RADAR Emplacement           Grid D4     T28-33    28/09/2012     01/10/2012
   Medium     Natural Gas Power Plant            Grid C2     T28-05    28/09/2012     04/10/2012
   Medium     Vehicle Depot                      Grid C2     T28-11    28/09/2012     03/10/2012
   Low        Improvised Troop Bunker            Grid D5     T28-63    28/09/2012     04/10/2012
The essential role of the E-2 aircrew is to provide friendly assets with C2 for mission success
within the AO. Some of these responsibilities include checking in strike assets; directing
fighters; tracking and directing CAS assets; coordinating tankers; sending and receiving
Situation Reports (SITREPs) with updates to the FLOT, FSCL, kill boxes, No-Fire Areas
(NFAs), and real time targets of opportunity; communicating with C2 agencies (AOC/ASOC);
recording In-Flight Reports/Mission Reports (MISREPs); and providing link information and
procedural air traffic control functions. The E-2 is a critical airborne asset with an extremely
busy pace of operations in the AO.
700. INTRODUCTION
This chapter summarizes the basic layout and proper use of the AIC and tactics timeline. The
associated AIC terminology, information on how to use the timeline in an intercept scenario, and
examples of how to use the timeline and brevity language to make proper communication calls
are also provided.
The Big 3 concept applies to each element of successful AIC. The Naval Aviator, Air Intercept
Controller, and Fighter Aircraft each have their respective Big 3 concept.
1.  Naval Aviator’s Big 3 – The standard aviation priorities of aviating, navigating, and
communicating apply for all missions.
2.    Air Intercept Controller’s Big 3 – Controller’s must use the appropriate intercept control
communication and brevity, display proactive involvement in their actions, and maintain proper
situational awareness.
3.    Fighter Aircraft’s Big 3 – These aircraft must maintain the appropriate formation, execute
the sensor game plan, and use clear and concise communications.
The following information provides guidelines and conceptual information used in implementing
AIC functions.
Communication Goals
1.    Maximize listening time and comprehension – Listen to transmissions to make sure they
are understood. In a critical situation, a misinterpreted call could result in a mishap or threaten
mission success.
2.    Execute clear and concise standardized calls – Make use of standard brevity language and
be as specific as possible. Communication standardization reduces uncertainty and confusion,
while communication brevity provides maximum listening time on the frequency to build SA.
4.    Avoid unnecessary calls – Do not make nonessential transmissions, which may interfere
with critical communications or induce confusion.
In order to execute AIC successfully and minimize undue errors or stress, the following
communications tools are used:
Core Information
The seven components of AIC core information are call sign, number of groups and/or group
name(s), location and anchor point, altitude, aspect, declaration, and fill-ins. Each one of these
components is represented in the following figure:
29,000 ft
Merlin 11
“Merlin 11, Single Group, BRAA 300/25 29 thousand, Flank South, Bogey Spades”
     a.   Call sign – This component is the call sign of the element receiving or sending the
          information. Every call begins with a call sign. Certain call signs should not be used
          to avoid mixing of communication brevity terms. Some examples of call signs that
          should not be used are: “Fox” (which is a designation for the firing of missiles), a
          call sign that sounds similar to the AIC aircraft’s call sign, or the bullseye. Generally
          speaking, during AIC communications, the AIC’s call sign will be used unless a call
          is specifically referencing the fighter, such as when using the BRAA format
.
     b.   Number of groups and/or group name(s) – This will determine the label of the picture
          as described later in chapter 7 (i.e., “2 groups range 10”) or to specify the group being
          referenced in the call (i.e., “…Single Group, Bull…”).
     c.   Location and anchor point – This component allows the specified group to be
          “anchored”, providing the group’s location in bearing and range from an anchor
          point. The chosen anchor point, which is dependent on the situation and timeline, is
          related to the type of control format used. These points include digital bullseyes,
          bearing and range from the fighters (in the BRAA format), or a geographical
          reference point.
          i.    For bullseye referenced calls, the bearing (stated as separate numbers) and range
                (stated as a single number) are given in numerical format from the bullseye
                (e.g., 280/17, read as “two-eight zero, seventeen,” means 280 degrees magnetic
                at 17 miles). This allows for correlation of the groups by the fighters’ sensor
                systems. The bullseye will be assigned a code word. Before a commit, groups
                in the area are typically anchored to the bullseye alone. If a group is within 5
                nm of the bullseye, the group is stated as “at” the bullseye. After commit, the
                bullseye is referenced to aid in fighter correlation and should be used to anchor
                a group.
          ii.   Geographical reference points, or georefs, are local landmarks chosen during
                mission planning that are known by both the AIC controller and the fighters and
                used to describe threat location. This type of anchor point is simple to
                designate, but is also inaccurate (for instance, a local landmark is difficult to
                locate under certain conditions or at night). They are typically only used in the
                pre-commit phase of an intercept. Before a commit, if a group is within 5 nm of
                a georef, then that group is stated as “at” that point. Georefs are typically only
                used when a group is “at” that location. Bearing and range is usually not
                provided from a georef. Additionally, using “at” the bullseye or “at” a georef
                are typically only used during broadcast control, since it does not provide the
                level of fidelity required for fighter correlation.
           iii.   Using a fighter as a reference point requires AIC to maintain SA to the fighter
                  position at all times. This type of reference informs a fighter of the location of
                  the group with respect to the fighter’s position in space, in the BRAA format.
                  Using a fighter as a reference point aids in the correlation of groups for the
                  fighter and gives that fighter quick SA to the location of the group. When
                  anchoring groups at or inside of meld range, this type of reference is usually
                  required.
      In order to ensure the AIC and fighters’ navigation systems are within the required
      tolerance for correlation of groups, the AIC must perform an “Alpha” check with each
      fighter element upon check in. This is performed by the AIC calling the fighter’s bearing
      and range from the bullseye. The fighter will verify that the position called by the AIC is
      within the required 3 nm and 3 degrees tolerance. For example:
If the fighter determines that the position called by AIC is within 3 nm:
      If the fighter determines that their position is outside 3 nm or 3 degrees of the position
      called by AIC, they will call their position off of bullseye, prompting all parties to check
      their bullseye for correct location and/or nav for error:
      In this case another alpha check shall be performed until the fighter determines that it is
      within tolerances.
           “CAP” may be used as the aspect in broadcast or tactical control when there is no
           trend because they are constantly turning, or when you haven’t had enough time to
           determine a trending direction such as at initial detection.
Amplifying information with a Bogey declaration includes Bogey, Spades (no available IFF or
Selective Identification Feature [SIF] modes and codes required for identification), Bogey,
Squawking (response with an IFF/SIF mode or code other than one prescribed by Air Tasking
Order [ATO]/identification criteria), and Bogey, Paints (response with any specified IFF/SIF
modes and codes established for identification criteria).
For the purpose of all E-2 strand events ROE will be as follows: AIC will not call a group
hostile until told to do so by AW. The CJCS standing ROE inherent right to self-defense only
applies to the commander of the aircraft being attacked or threatened. As an example, AIC will
not respond to a “spike call” with a hostile declaration (assuming that group wasn’t previously
declared hostile). If escalations have occurred, AW may grant AIC “hostile declaration
authority”. This is a blanket authority that will allow AIC and the fighters to call groups hostile
that meet the Orange/Red PID criteria. Example:
     TANGO: “AW, this is TANGO, track 6024 engaged side, 201, and was splashed in
             self-defense, say intentions.”
     AW: “TANGO, this is AW, roger. Warning/Weapon Status upgraded to red and tight.
         All Orange military aircraft will be declared hostile and engaged, over.”
     TANGO: “AW, this is TANGO, Warning/Weapon Status upgraded to red and tight.
             All Orange military aircraft will be declared hostile and engaged, out.”
     g.    Fill-ins – This section of the core component includes identification, strength, and
           other information. Fill-ins can be extremely helpful to the fighters and may aid in
           determining targeting priorities or adjusting timeline. Aspect and declaration are two
           fill-ins which are always required when providing a full positional call to a group.
           ii.   Strength indicates the size of the group. We assume that all groups consist of
                 two contacts. If the group contains three contacts or more, it is “Heavy,” and if
           iii.   Other information is always stated directly after the aspect (e.g., “Very fast” for
                  a group traveling at greater than 900 knots [kts] groundspeed, “High” for a
                  group at 40 thousand feet or above).
3.     COMM priority is based on the communications cadence system where each person
participating in the intercept has a place to talk and a place to respond (although not every call
needs to be acknowledged). The priority rests with AIC, then the fighters prior to commit. Post
commit, following the post-commit picture given by AIC, the priority switches to the fighter and
then AIC. Generally, the fighters will have COMM priority for the remainder of the intercept
until the fighters are clear of the merge. However, COMM priority does not mean others cannot
provide additional calls to aid in building SA.
      a.   There are four exceptions when AIC can talk in the merge phase. These exceptions
           are:
      b.   At any point in the merge phase of the intercept, if a fighter makes a request for
           information, AIC can respond to that request. Examples of frequently used fighter
           requests for information include a spike call with a bearing (e.g., Fighter: “Heat 11
           spiked, 270”), a declare call to follow on factor groups (e.g., Fighter: “Ghost, Heat 11
        contact Rock 234/23, 21 thousand, hot, declare”), or a clean call (e.g., Fighter:
        “Ghost, Heat 11, clean lead group”).
   c.   AIC may also speak in the merge phase of the intercept if an untargeted group is
        about to pierce threat range to the fighters (e.g., AIC: “Heat 11, trail group threat
        BRAA 274/8, 20 thousand, hot, hostile”). There may also be times where AIC needs
        to step-in and adjust fighter flow following the fighter’s post-merge flow call on PRI
        (e.g., Fighter: “Heat flow 270.” [Assuming this is not the desired direction of travel
        for the fighters] AIC: “Ghost recommends Heat flow 180”). Lastly, if the fighters
        are about to enter a surface-to-air weapons engagement zone, AIC can provide a
        trespass call, and as a technique, provide a flow direction that directs the fighter(s)
        clear of the surface-to-air threat (e.g., AIC: “Heat11, trespass 6, Rock 034/19,
        recommend flow 090”).
   d.   Information priority refers to the groups that are the highest priority to the fighters.
        Priority is dictated by the range of the fighters from the targets as well as the altitude,
        aspect, and identification of the targets.
   e.   Control types are broadcast and tactical. All control types, which are described in
        further detail below, are to be in concurrence with TOPGUN standards.
        i.    Broadcast control, which provides an overall view of the area to all players,
              helps to build SA rather than direct fighters. This type of control facilitates an
              early warning and overall view for all players. All of these calls are anchored to
              bullseye or a georef, when available.
        ii.   Tactical control provides information to a specific fighter element and allows
              for the highest degree of controller integration. When using tactical control, a
              bullseye or the fighter’s position (BRAA) can be used to anchor groups.
The air-to-air timeline is the guideline for AIC communications. Different formats and priorities
are observed depending on the distance from the fighters to the group(s) being intercepted, in
accordance with the timeline being used. There are different timelines which are used based on
the expected threat weapons. Knowledge of the air-to-air timeline helps aviators become
familiar with the specific stage of the intercept and indicates who has communication priority.
A generic timeline is provided below, which will be used for all AIC events at VT-4.
Intercept Progression
The following section steps through the different stages of an air-to-air intercept.
     AIC: “Eagle, seven groups. Group, Rock 170/35, 27 thousand, track south, hostile.
          Group, Rock 155/40, 29 thousand, track south, hostile. Group, Rock 176/42, 26
          thousand, cap, bogey, spades.”
2.    No Later Than (NLT) Commit – This is the range by which the fighters should be
committed to intercept a group(s). This is a no later than range, meaning this is the latest the
fighters should be committed in order to stay on timeline and execute their tactics accordingly.
Once a group is approaching 35 nm to the fighters, with an aspect of flank or hot, the commit
call should be made. The commit call begins as a normal broadcast call, however, only the
highest factor group (based on targeting priorities) is called prior to directing or recommending
the fighters to commit. For example:
     AIC: “Eagle, two groups. Group, Rock 170/40, 27 thousand, track south, hostile.
          Showtime commit.”
3.    Post-Commit – After the commit call, the fighter lead will make a required call to the
fighter element on their auxiliary (aux) radio, which the AIC typically will not be listening to.
This call only takes a couple of seconds, after which time the AIC should make the post-commit
tactical picture call. This call is extremely important, as it is providing a mental picture to the
fighters of what the threat presentation is and will dictate how they execute their tactics. At this
point, labels and group names are assigned using the tactical control format anchored to bullseye.
The AIC should strive to have the picture call measured out and ready to call prior to making the
commit call. This minimizes the delay in making the picture call and assists the fighters with
staying on timeline.
4.    Targeting – After the AIC makes the tactical picture call, the fighter lead will assign
targeting based on the tactics being executed and the briefed targeting priorities. While the
fighter lead determines which group(s) should be targeted, the AIC should be thoroughly familiar
with targeting priorities. The AIC determines the order in which groups are called, as outlined
above, based on targeting priorities. There will also be times when the AIC directs targeting.
Keep in mind that “targeting” does not imply weapons engagement. It simply means that the
targeted group is the group currently being intercepted by the specified element(s) of fighters.
The result of that intercept will be determined by the current ROE and commander’s intent. The
targeting priorities for all AIC events at VT-4 are as follows:
     a.    Range – With groups separated by range, the closest group will typically be targeted
           first.
     c.    Identity – Some aircraft present a higher threat than others. More capable aircraft
           should be targeted first if all other considerations are equal.
In addition to the targeting priorities above, when performing the DCA mission in defense of the
CSG, the following priorities exist.
     d.    Bogey over hostile – An unknown aircraft is higher priority due to the fact that the
           fighters would need to execute a visual identification (VID) prior to engaging,
           whereas the hostile could be covered with friendly surface-to-air fires (e.g., “birds”).
     e.    Low over high – When defending the CSG, an enemy aircraft at low altitude is
           considered a higher threat, because surface RADARs within the CSG may not be able
           to see that aircraft until it is already within weapons release range.
     f.    Striker over fighter – With the primary mission of defending the CSG, an enemy
           strike aircraft is more of a threat than a fighter.
5.    Tactical (tac) range call – The tac range call is an informative call from the AIC to a
specific fighter that the group they are targeted into is 30 nm away. This call is to remind them
that meld is less than a minute away. If groups are being targeted simultaneously by multiple
elements of fighters, a tac range call is required to each element to the group they are targeting.
The format is: fighter call sign, group name, range (30 miles). For example:
There may be times when AIC is late making the tac range call. In this case, call the actual range
between the fighter and the targeted group. The latest point at which a tac range call may be
given is at Meld.
Correlation/declaration call Once the fighters are targeted into a group, they will be focused on
gaining RADAR SA to that group and correlating what they see with what the AIC has called.
This correlation will occur in the form of a declaration call by the fighter, followed by a response
from the AIC. Correlation may happen any time after targeting assignment and prior to meld.
The declaration call will consist of the fighter making a call, similar to an AIC call, referencing
an uncorrelated group they have RADAR on. If a fighter requests for correlation on a group
anchored off of a bullseye, AIC will use their callsign along with track directions, so that the call
applies to all elements. For example:
FTR: “Eagle, Enforcer 11, contact, Rock 170/35, 28 thousand, track south, declare.”
AIC: “Eagle, single group, Rock 170/35, 28 thousand, track south, hostile, crow.”
Correlation only occurs in the fighter cockpit. The responsibility of the AIC is to call whatever
is at the location called by the fighter. As a result, it is critical that the AIC listens to the
fighter’s declaration call, paying particular attention to the anchor point being used and the
bearing and range. In the response, the AIC should use the same anchor point as the fighter, but
call exactly what is seen at that location, not necessarily what the fighter called or what is
expected of them to call. It is not uncommon for the fighter to call something other than the
group they are targeting. There could be multiple contacts in the same general area, making
correlation much more difficult.
Never give an ambiguous response to a declaration call, such as “your call hostile” or “that group
hostile.” That could be a fatal mistake. A declaration call requires a full positional update in
response.
If the fighter makes a declaration call to a neutral or friendly aircraft, respond with what/who the
aircraft is, rather than a group name and add the brevity term “skip it” with voice inflection.
For example:
AIC: “Enforcer 11, COMM AIR, BRAA 273/23, 37 thousand, track south, SKIP IT.”
If a group’s declaration changes at any time during an intercept, AIC is required to give a full
positional update to that group with the new declaration. This is required in order to ensure
correlation on the specified group(s).
{outside of meld}
AIC: “Eagle, single group, Rock 127/31, 32 thousand, track east, hostile.”
AIC: “Eagle, single group, Rock 127/31, 32 thousand, track east, hostile.”
AIC: “Heat 11, single group, BRAA 089/28, 32 thousand, hot, hostile, crow.”
If a fighter calls “clean” to a group, it implies that they do not have radar SA on that group and
require a BRAA call from AIC. If the fighters should be targeting that group, a directive
targeting call is required. As long as the fighters keep calling “clean” to a group, AIC will keep
responding with BRAA calls.
AIC: “Heat 11 single group BRAA 045/21, 27 thousand, hot, hostile, crow”
Additionally, if the fighters call for a declaration on a group that AIC does not have SA to, the
response is “clean” with the anchor point and location that the fighters called, implying that AIC
looked in that area and has no radar hits.
6.   Meld and sort – While the AIC is not necessarily involved with meld and sort, it is
important to understand what is happening. Prior to meld each fighter will be assigned a specific
AOR, where they are responsible for sanitization. Pre-meld, the fighters are using their
RADARs to sanitize the airspace within their respective AOR. Melding is the act of focusing the
RADAR of every fighter into the targeted group for sorting and weapons employment.
Sorting is determining which contact within the targeted group each fighter will employ weapons
against. The sort plan is determined by the fighter lead during mission planning, based on
several assumptions, such as, a group always consists of two aircraft. This minimizes the
amount of communication required to ensure weapons are employed on each contact within a
group.
The communications associated with meld and sort are all performed on the fighters’ aux radio.
Therefore, AIC will usually not hear it. However, meld is the point where the AIC anchor point
typically shifts to the fighter’s position, using the BRAA format. Post-meld, BRAA should be
used unless a fighter specifically asks to anchor a group off of bullseye or if they ask to “declare”
a group, which is a brevity term requesting an updated AIC call for a specified group anchored to
bullseye. During this phase of the intercept, the AIC should focus on monitoring for any changes
to the picture, such as maneuvers, additional, or pop-up groups, etc.
Meld is also the point when the AIC can directively target the fighters, if necessary. Directive
targeting is performed by using both fighters’ callsigns (11 and 12) and simply injecting the
word “target” prior to the group name in a normal BRAA call. Directive targeting is required by
AIC at Meld if the fighters have not already issued their own targeting, or whenever targeting is
no longer sound.
     AIC: “Eagle, lead group, trail group, passing. Enforcer 11 12, target trail group, BRAA
           090/21, 29 thousand, hot, hostile, robin.”
     c.    When the fighters give an “anchor, flow, picture” call after the merge, and there is an
           untargeted group within factor range to the fighters. (See “Post Merge” below for
           more details.)
7.    MRM (Fox 3) – At 20 nm, the fighters will have their first opportunity to employ weapons,
assuming the group has been declared hostile. The weapon being employed at this range would
be the medium range missile, which is an active RADAR missile. The brevity term for an active
guided missile shot is “Fox 3.”
Normally, the AIC will not respond to a fighter’s shot call. However, if there are follow on
groups, the fighter may request a separation call to the specified group. For example:
FTR: “Enforcer 11, fox 3, lead group. Eagle, separation trail group.”
AIC: “Enforcer 11, trail group, separation 10, 28 thousand, hot, hostile, heron.”
If the relationship (range or azimuth) between the targeted group and the follow on group is not
implicit (e.g., range separation for a trail group), the AIC will specify whether it is a range
separation or an azimuth separation. For example:
AIC: “Enforcer 11, additional group, azimuth separation 10, 26 thousand, hot, hostile.”
Following shots, the fighters can make a number of different weapons status calls, using Air
Land Sea Application (ALSA) brevity terms. These calls don’t require a response by the AIC,
but they can be huge SA builders, indicating the likelihood of whether or not the shot will kill the
target. Weapons status calls may include one or more of the following terms: timeout, pitbull,
cheapshot, husky, or trashed.
     AIC: “Enforcer 11 12, east group, THREAT, BRAA 260/15, 29 thousand, hot, hostile,
           robin.”
9.    Timeout – If a Fox 3 shot was taken on timeline, the fighters will call timeout at 12 nm if
they determine the shot was valid and that the missile should have reached the target. A timeout
call does not imply that the group was killed. No response by AIC is required.
10. Follow-on Fox3/NLT abort – Based on the fighters game plan, they may or may not elect
to continue to the merge, while taking additional Fox 3 shots. This determination would be made
based on tactics being executed, fighter loadouts, expected threat response, etc. If the decision
has been made to take an additional Fox 3 shot, it should be taken at 10 nm.
Conversely, if the fighters determine they are not going to continue to the merge, they may elect
to abort no later than 10 nm. Abort is a procedure executed by the fighters with the goal of
remaining outside the enemy aircraft’s weapon engagement zone (WEZ).
11. NLT defend – If the fighter determines they are in a defensive situation, i.e., being targeted,
they should start defending themselves no later than 8 nm. They will begin executing defensive
tactics in an attempt to break enemy RADAR lock.
12. FQ SRM (Fox 2) – Inside 5 nm, this is considered the merge of the intercept, as the fighters
are entering the visual arena. The weapon being employed within visual range is the short range
missile, which is an infrared (IR) missile. The brevity term for an IR guided missile shot is
“Fox 2.”
13. Merge – While in the merge phase (inside 5 nm), the AIC should be maintaining SA to any
follow on groups and scanning for any new groups, particularly anything inside threat or meld
range. The merge ends when the fighters give the “anchor, flow, picture call.”
Whenever there are follow on groups, the AIC should be ready to give a BRAA to the fighters as
soon as they complete the merge with the initial group. Remember to not talk unless one of the
four exceptions for talking in the merge has been met.
14. RQ SRM (Fox 2) – If the fighters continue to the merge with a group and find themselves
in a visual fight, they may need to take a rear quarter Fox 2 shot. A rear quarter Fox 2 shot can
be taken between 0.5 and 1 nm behind the target. This range is significantly shorter than a
forward quarter shot, due to the lack of closure between the shooter and the target. Generally,
there are no comms required by the AIC in this scenario. The AIC should be monitoring for any
changes to the picture, as well as looking for RADAR video to disappear from the targeted
group, indicating they are vanished.
15. Post-Merge – If there are no known follow on groups or the fighter does not have SA to
follow on groups, they will usually come out of the merge, anchor themselves off of bullseye,
give their “flow” direction, and ask for the picture. This is known as the “anchor, flow, picture
call.” If there are no groups in the area, we consider the picture clean.
Since the fighters are going to every merge in VT-4, they will call “kill” on all groups that they
see killed in the visual arena. A “vanished” or “faded” call is not required on groups that have
been called “killed” by the fighters. If the fighters have given the “anchor, flow, picture” call
and AIC sees a group still alive (radar video or M1 squawk in ULT AIC) or there are follow on
groups inside of factor range, AIC shall issue directive targeting into that group(s).
AIC: “Enforcer 11, target trail group, BRAA 164/16, 27 thousand, hot, hostile, crow.”
If the picture is not clean and there are follow on groups, but they are outside of factor range,
AIC will give the new picture in a broadcast format. Let the fighters respond to the new picture,
and then reset them at the CAP. For example:
     AIC: “Eagle, new picture, two groups, group rock 153/48, 30 thousand, track north,
           bogey, spades. Group rock, 178/54, 31 thousand, track north, bogey, spades.
Timeline critical points, which refer to important decisions that must be made by the AIC, are No
Later Than Commit (NLT Commit) range, tactical range call, threat call, and spike call.
1.   The NLT Commit range refers to the point at which the fighters should be committed to
begin an intercept. Failure to commit the fighters prior to this range puts them behind timeline
and as a result, in a disadvantageous position.
2.   The tactical range call is an SA call made by AIC to provide a reminder to the fighters that
meld is less than a minute away and serves to update everyone’s timeline SA. The fighters’ meld
mechanics are the foundation of air-to-air success. This reminder by the AIC can aid them in
ensuring they execute on timeline.
3.    The threat call refers to a call made by AIC to the fighters when an untargeted group
pierces the briefed threat range. A missed threat call could likely result in the fighters being shot
down by the enemy.
4.    The spike call, which is a RADAR Warning Receiver (RWR) indication of an air threat in
track or launch, is a call made from a friendly aircraft being fired on or targeted. If a fighter
makes a spike call with a bearing on PRI, AIC will respond with the spike range to the group,
altitude, fill-ins, and the group’s name at the end of the call. For example:
AIC: “Enforcer 12, spike range 18, 31 thousand, hot, hostile, east group.”
The basic communication format is call sign, number of groups and/or group names, location and
anchor point, altitude, and fill-ins. Below are some more definitions for AIC:
1.    Group – A group is any number of air contacts within 3 nm in azimuth and range of each
other (which is then considered a formation). In the pre-commit phase of the AIC timeline,
groups are referenced to the bullseye.
2.    Picture labels – After the commit, labels are used to define the relationship between groups,
which the fighters are being committed to intercept. Their position is then referenced from
bullseye. The labels, which are used to define the overall picture, include:
     a.    Single group – Only one group included in the tactical picture. A single group is the
           only presentation where the label and name are the same. When there is only a single
           group present, AIC is not required to anchor it, since it was just anchored in the
           commit call. Therefore, the post-commit call is simply the AIC call sign, group
           name, and aspect, such as:
   b.   Two groups, range yy – Two groups that present themselves in a straight line with the
        fighter, in other words, one bandit in front of the other, as seen by the fighter. For
        groups in range (including a ladder or a vic), only the lead group is anchored (bearing
        and range from bullseye provided), followed by altitude and fill-ins. Only altitude
        and fill-ins are provided for the trail group(s). For example:
                  “Eagle, two groups, range 10, track south. Lead group, Rock 360/10,
                        29 thousand, hostile. Trail group, 31 thousand, hostile.”
   c.   Two groups, azimuth xx – Two groups that present themselves in a line abreast, as
        seen by the fighters. With groups in azimuth (including a wall and a champagne),
        two groups are anchored, followed by altitude and fill-ins. For example:
              “Eagle, two groups, azimuth 10, track south. East group, Rock 030/30, 31
                 thousand, hostile. West group, Rock 330/30, 29 thousand, hostile.”
   d.   Three groups, wall, xx wide – A wall is essentially a three group azimuth problem.
        When we label three group problems, we use the term “wide” when referencing the
        total separation of an azimuth. “Deep” is the term used to reference separation in
        range for three group problems. For a wall, the outriggers, or the two groups on the
        outside of the formation, are anchored. Deciding which one to anchor first in the
        picture call should be consistent with the group anchored in the commit call, based on
        targeting priorities. Then the separation from the first group anchored to the middle
        group must also be provided, with altitude and fill-ins, prior to calling the final group.
        For example:
              “Eagle, three groups, wall, 40 wide, track south. East group, Rock 090/20,
             33 thousand, track south, hostile. Middle group, separation 20, 30 thousand,
                       hostile. West group, Rock 270/20, 27 thousand, hostile.”
              “Eagle, three groups, champagne, 30 wide, 20 deep, track south. East lead
             group, Rock 080/15, 33 thousand, hostile. West lead group, Rock 280/15, 29
                         thousand, hostile. Trail group, 31 thousand, hostile.”
             “Eagle, three groups, vic, 25 deep, 30 wide, track south. Lead group, Rock
            360/10, 33 thousand, hostile. East trail group, 31 thousand, hostile. West trail
                                    group, 29 thousand, hostile.”
   g.   Three groups ladder, yy deep – A ladder is a three group range problem. You start
        the picture call by anchoring the lead group, then giving the separation from the lead
        group as well as the altitude and fill-ins, and finally giving the altitude and fill-ins for
        the trail group. For example:
             “Eagle, three groups, ladder, 30 deep, track south. Lead group, Rock 360/10,
             30 thousand, hostile. Middle group, separation 15, 27 thousand, hostile. Trail
                                group, 33 thousand, track south, hostile.”
3.    Additional terms may be used in the label to provide SA to the presentation. These terms
include:
                 “Eagle, three groups, vic, 25 deep, opening, 30 wide, opening. Lead group,
                Rock 360/10, 33 thousand, track south, hostile. East trail group, 31 thousand,
                  track southeast, hostile. West trail group, 29 thousand, flank southwest,
                                                   hostile.”
                 “Eagle, two groups, azimuth 15, closing. East group, Rock 030/15,
               31 thousand, hot track southwest, hostile. West group, Rock 330/15, 29
                                  thousand, track southeast, hostile.”
   d.   Echelon – Two group problems or a ladder may also include an “echelon” component
        to signify that the presentation is offset in one direction or the other. Echelon should
        always include a sub-cardinal direction. For example, a label of “two groups, range
        10, echelon, northwest” would mean that the fighters will see two groups, with 10 nm
        range separation, that will be offset to the northwest.
              “Eagle, two groups, range 20, echelon northwest, track south. Lead group,
               Rock 360/10, 29 thousand, hostile. Trail group, 31 thousand, hostile.”
         “Eagle, two groups, azimuth 10, echelon northeast, track south. West group, Rock
           330/30, 29 thousand, hostile. East group, Rock 030/35, 31 thousand, hostile.”
   e.   Weighted – Three group vic, champagne, or wall problems use the term weighted,
        similar to echelon, to indicate the presentation is asymmetrical. Weighted will always
        include a cardinal direction. For example, a label of “three groups, champagne,
        20 wide, 30 deep, weighted east” would mean the trail group is closer to the east lead
        group, than the west lead group.
4.    Leading edge comms – Leading edge comms is a tool used to simplify the picture when
there are multiple groups present, but not all of those groups are currently a factor. This allows
the AIC to call the picture, including only the groups that need to be intercepted at that point in
time. Leading edge comms should be used when the leading edge consists of a single group,
groups in azimuth, or a wall, where depth is not a factor. The groups included in the leading
edge picture should be the groups which would be assessed to become a factor during the course
of the intercept. At VT-4, any groups within our notional factor range of 25 nm of the group(s)
approaching NLT commit, will be considered a factor and should be included in the picture call,
vice using leading edge comm.
The leading edge is typically only referenced during the post-commit picture call. Therefore,
broadcast control, including the commit call are the same as outlined above. Prior to the commit
call, the AIC should determine if leading edge is appropriate for the post-commit picture call.
The picture call is essentially the same, with just a couple of exceptions. The call will start with
the total number of groups present and then specify the leading edge picture. Once the leading
edge picture is called, the AIC will then give separation to the trailing edge, which is the closest
of the remaining groups, not included in the leading edge.
For example, if there are five total groups present, but there is only a two group azimuth included
in the leading edge, the post-commit picture would be:
                 “Eagle, five groups, leading edge, two groups, azimuth 10, track southeast.
                East group, Rock 315/20, 31 thousand, hostile. West group, Rock 298/32, 29
                                 thousand, hostile. Follow-on 30, opening.”
After the post-commit picture call, the communication flow is exactly the same. There will
typically be no further reference to the trailing edge, since the assumption was that none of the
trailing edge groups would become a factor during the course of the intercept. If for some reason
any of the trailing edge groups did become a factor, they would be called additional group as
appropriate.
5.    Exclusions comms – Much like leading edge comms, exclusions comms (Figure 7-17) is
another way to simplify the post-commit picture when there are multiple groups in a picture.
However, leading edge comms are used when depth is not a factor (single group, azimuth, etc.),
but exclusion comms are used when depth is a factor (range, vic, etc.).
                 “Screwtop, four groups, two groups, range 10, track southwest. Lead group,
                   Rock 315/20, 29 thousand, hostile. Trail group 231 thousand, hostile.”
Similarly, to the use of leading edge and exclusion comms explained above, when there are
multiple groups present, some of which fit into a traditional label featuring a range component
(e.g., range, ladder, vic, or champagne), while remaining groups do not, the picture call will
consist of the total number of groups, followed by the traditional label and post-commit picture
call. However, there is no reference made to a leading edge or trailing edge in this case, since
the traditional label already includes a depth component.
If any of the remaining groups not included in the picture are a factor (within 25 nm of the
farthest group included in the picture), they will be named additional group(s) and anchored
accordingly. Whenever there are multiple additional groups which were not included in the
traditional label, they will be named first additional group, second additional group, etc.,
although only the additional group(s) within the factor range of 25 nm will be called and
anchored in the post-commit picture call.
                  “Eagle, five groups, two groups, range 10, track south. Lead group, Rock
                 043/12, 29 thousand, hostile. Trail group, 31 thousand, hostile. Additional
                        group, Rock 053/47, 32 thousand, track southwest, hostile.”
6.    Group names – After the commit, and after the AIC labels the picture, the controller will
then assign names to each group. The group will then be referenced by its group name until
either a maneuver or new picture is called. The group names used for the given label are:
     c.    Two groups, azimuth – Either north group/south group or east group/west group.
           Azimuth names are chosen based on their orientation, using cardinal directions (N, S,
           E, W).
     e.    Three groups, champagne – Either north lead group/south lead group/trail group or
           east lead group/west lead group/trail group.
     f.    Three groups, vic – Either lead group/north trail group/south trail group or lead
           group/east trail group/west trail group.
7.    Other group names – There are times when a group is not included in the picture label
because it does not fit into one of the traditional labels. There are also times when a group is
detected after the picture has been labeled and needs to be named. The following are examples of
other possible group names.
     a.    Additional group – May be used for a group that is named in the post-commit picture
           call, but does not fit a traditional label. Additional group may also be used to name a
           group that is initially detected post-commit, but outside of meld range. Any
           subsequent groups with the same naming convention, that are called prior to the next
           new picture, get assigned a sequential number (i.e., second additional group, third
           additional group, etc.). The same rule applies to pop-up and threat groups.
     b.    Pop-up group – The name for a group that is detected at or inside of meld range, but
           outside of threat range.
c. Threat group – The name for a group that is detected at or inside of threat range.
Whenever PID has not been solved, a VID may need to be performed. Additionally, current
warning/weapons status and ROE may require DCA assets to intercept and escort, vice employ
weapons. Either scenario begins as a normal intercept. However, there are obviously some
differences upon entering the weapons employment phase of the intercept.
In the event of a VID, the AIC should continue trying to obtain PID throughout the intercept. If
PID is solved, the AIC should provide a full positional update to the group with the new
declaration. If PID is not solved, the fighter lead will begin a sequence of VID comms. This
will start at approximately 10 nm from the merge with the lead designating himself/herself as the
“eyeball” (the aircraft responsible for identifying the group being intercepted). The lead will
then designate his/her wingman as the “shooter” (responsible for employing weapons [ROE
dependent] if identified as hostile). These “shooter” and “eyeball” roles are delineated on AUX.
At approximately 5 nm the lead will call, for example, “Heat 11, standby, single group” on PRI,
which signifies that he/she is about to make the VID call and all other comms on the control
frequency should cease. At the VID, the lead will make the intercept report and direct “shoot,
shoot” or “skip it”, as appropriate. The intercept report should then be relayed to AW.
Following the VID, if the group was identified as an enemy aircraft and declared hostile, based
on ROE, the intercept will continue until the group is killed. If the group being intercepted has
not been declared hostile, AW may want the fighters to escort away from the CSG. The AIC
should ensure AW’s intentions are understood and executed properly. Once the group has been
escorted away from the CSG, the AIC can direct the fighters to drop the group and reset their
CAP station.
Maneuvers in range or azimuth – A maneuver in range or azimuth occurs when the contacts
within a group maneuvers to the point where they now exceed group criteria (i.e., 3 nm). The
resulting elements are called arms. Arms that again maneuver into individual elements outside of
group criteria are renamed contacts. If a group maneuvers and displays a change in target aspect
to the fighters, and all elements within the group remain within group criteria, AIC can simply
provide a descriptive update with the group’s new target aspect (e.g., “Ghost, single group beam
north.”)
During group maneuvers, whoever sees the maneuver first makes the call. Typically, the fighters
see the maneuver first, and the resulting call starts with “Dog 31, Single group maneuver.” The
AIC will then acknowledge the maneuver, evaluate, and provide amplifying information.
However, for the sake of training while at VT-4, don’t expect the fighters to call maneuvers.
Recognizing maneuvers is a critical skill for AICs. Therefore, the responsibility to call
maneuvers will rest with the student. It is critical for the AIC to pay close attention to the
RADAR video, rather than the track. When a maneuver in range or azimuth occurs, the system
may take a few minutes to build a new track for the new arm. If the AIC is first to recognize the
maneuver, the call will be in the same format, replacing the fighter call sign with the AIC call
sign.
When evaluating maneuvers, altitude changes need to be considered, as groups are expected to
maneuver three-dimensionally. Therefore, don’t assume the altitude is the same. If maneuvers
occur outside of meld range, a new picture can be called by the AIC calling “new picture”,
followed by a new tactical picture call. When in broadcast control, every call is essentially a
new picture. For that reason, maneuvers and new pictures shall not be made in broadcast control.
1.     Maneuver in range – If a group maneuvers, such that at least one of the resulting arms are
still hot to the fighters, it is called a maneuver in range, and the resulting elements are lead arm
and trail arm. AIC can assume that the fighters will likely maintain RADAR SA to the lead arm.
For a maneuver range comm, AIC will call out the altitude and aspect for the both of the new
“arms.” An example of a maneuver in range call would be:
28,000’
2.    Maneuver in azimuth – If a group maneuvers such that neither one of the result in arms are
hot to the fighters, it is a maneuver in azimuth, and the controller will name the arms according
to the cardinal directions of south arm, north arm, west arm, or east arm.
                 “Eagle, Single Group, maneuver azimuth, East Arm 31 thousand, track east.
                                    West Arm 25 thousand, track west.”
Change to the number of groups – While in broadcast control, a new picture is implied on
every call. If the number of groups changes post-commit, the AIC can apply a group name to a
group that has not previously been named. The name given will be determined by the range of
the group from the fighters when it is first called. Those group names include additional group,
pop-up group, and threat group, as discussed earlier in the chapter.
New picture – When in broadcast control, every call is essentially a new picture. For that
reason, maneuvers and new pictures shall not be made in broadcast control. A new picture can
be called by the AIC prior to meld when the tactical picture has changed dramatically enough to
cause confusion or to affect the targeting game plan. A new picture can be requested by the
fighter at any time, if necessary. A new picture supersedes all previous picture calls and
establishes a clean slate for all players. A new picture is also called post-merge, after the fighters
have given their “anchor, flow, picture” call.
A new picture is not necessarily required whenever there is a maneuver. Since a new picture
includes a full tactical picture call, it may make more sense to simply call the maneuver. Before
a new picture is called, AIC should give the fighters an idea of why it is being called. Any time
a new picture is called, AIC will call “new picture” prior to calling the new tactical picture.
Examples:
     AIC: “Eagle, single group maneuver range. New picture, two groups, range five, opening,
           lead group, rock 087/24, 26 thousand, track east, hostile. Trail group, 19 thousand,
           track west, hostile.”
Or
     AIC: “Eagle, lead group, trail group, passing. New picture, two groups, range 5,
           opening, lead group, Rock 240/30, 25 thousand, track east, hostile, crow. Trail
           group, 21 thousand, track west, hostile, crow.”
Or
Or
AIC: “Eagle, north group, robin.” (If previously hostile, but tipper was unknown)
Changes in relationship – There are times when the tactical relationship between groups change
and can be communicated to the fighters without calling a new picture. The change in
relationship may happen due to maneuvers or changes in aspect. Once the change in relationship
happens, the format for communicating the change is similar to a descriptive update.
1.    Passing – Groups initially separated by range that change relative position with each other
are “passing.”
                   “Ghost, lead group, trail group, passing. Enforcer 11, target trail group,
                                29BRAA 360/23, 29 thousand, hot, hostile.”
2.    Crossing – Groups initially separated in azimuth that change relative position with each
other are “crossing.”
800. INTRODUCTION
In this chapter, the basic principles and techniques of air defense control to support air defense
operations are discussed. These include types of engagement zones, aspects of littoral air
defense, CAP stationing, and Air Defense Identification Zones (ADIZs). The terminology
associated with air defense control is also provided.
This section provides some of the essential principles of planning for air defense control.
Fuel Planning
Fuel management is one of the most critical mission planning factors when executing CSG air
defense. Although external fuel tank configurations can change, general mission planning rules
assumes the F/A-18C fighter has enough fuel to perform 1 - 2 intercepts, and the F/A-18E/F
fighter has enough fuel to perform 2 - 3 intercepts before returning to base or needing to refuel
from an airborne tanker. In order to properly manage assigned CAP stations, the ACU should
maintain situational awareness to the fighter’s fuel states at all times.
Littoral Environment
When establishing air defense in a littoral environment, surface-to-air missiles (SAMs) and
aircraft may be used. This combination of surface and airborne assets creates a Joint
Engagement Zone (JEZ).
For example, ADCs may consider using CAPs for defending carrier and amphibious groups and
as collateral defense of land-based assets, by positioning them over land during littoral
operations. Maritime battle groups may also function as a mobile missile engagement zone
(MEZ) with their armaments and mobility. Linking land-based SAMs with Navy-generated
search and fire control data can result in an improved ability to defend the littoral areas of the
theater.
CAP stations typically have at least 2 fighters, a “section”, that defend HVAs. The correct
placement of these stations relative to the perceived threat provides a barrier for the defense of
multiple assets in a broad area, called an area defense. One possible placement of CAP stations
might provide coverage beyond the MEZ to create defense in depth, where the various stations
can complement each other. Placement of a CAP station should be planned to minimize gaps in
coverage, both vertically and laterally.
CAPs may also be used to defend specific assets, called a point defense, such as a high-value
surface vessel, or for special missions. Additionally, CAPs may act as a backup defense (if
required) for enemy penetrations that result from MEZ gaps.
ADIZs are sections of airspace of defined dimensions that require the ready identification,
location, and control of airborne vehicles. An ADIZ that is associated with nations or AO is
normally the transition between procedural areas and positive control areas. These zones are
used for sovereign national boundaries, although in the case of AOs, they are used for
identification in the rear areas.
Any aircraft that wants to fly in or through an ADIZ must file an appropriate flight plan. In the
case of the North American ADIZ, aircraft must have an operational transponder and maintain
two-way radio contact. Any aircraft that fails to follow these procedures or flies into an ADIZ
without authorization may be identified and treated as a threat and intercepted by a fighter
aircraft.
Used in conjunction with each other, the Fighter Engagement Zone, Joint Engagement Zone, and
Missile Engagement Zone are layers of defense used to protect the CSG from inbound threats.
Typically, the FEZ will be the first line of defense, followed by the JEZ and finally the MEZ.
A basic layout of the zones is shown below (Figure 8-3).
             Threat Axis
                                                  CAP                      MOM
A Fighter Engagement Zone (FEZ) is a section of airspace where the responsibility for engaging
targets rests completely with fighter aircraft. FEZ operations are usually performed when
fighters have the clear operational advantage over SAMs or take place beyond the range of
land and sea-based SAMs.
Normally, fighters in a FEZ have weapon systems with greater Launch Acceptability Regions
(LARs). With the availability of these fighters, the JFC can destroy enemy aircraft at greater
standoff ranges from the defended HVAs. FEZ operations within the defense zone should be
coordinated and de-conflicted with SAM systems to engage threats.
A JEZ is a section of airspace in air defense in which the responsibility for engaging targets rests
with both fighter aircraft and SAM systems. JEZ operations involve the employment and
integration of multiple air defense systems in order to engage enemy targets simultaneously in
the operational area.
Successful JEZ operations, which require effective C2, are based on identifying friendly, neutral,
and enemy aircraft. In a JEZ, all air defense systems must be capable of accurately discerning
between each of these types of aircraft in a highly complex environment before full joint
engagement operations can occur. If these conditions cannot be met, separate FEZs and MEZs
should be established.
A MEZ is a section of airspace in air defense in which the responsibility for engaging targets
completely rests with land and/or sea based SAM systems. MEZ operations are ideal for point
defense of critical assets, protection of maneuvering units, and area coverage of the joint security
area. These types of operations also offer the ability to engage the enemy with a high-
altitude/low-altitude, all-weather capability. In addition, these operations can disrupt massed
enemy air attacks prior to committing fighter assets. They are also effective across the full range
of air defense operations and enemy threats. In joint doctrine, these operations are divided into
high-altitude/low-altitude MEZs based on the missile systems used and the altitude limit of the
MEZ.
900. INTRODUCTION
This chapter introduces the advanced strike C2 to support strike operations and the terminology
and concepts associated with these operations.
A strike package, a group of aircraft with different capabilities, is used to perform a single attack
mission on a land based target. The strike package will normally consist of a strike element, a
fighter element, a suppression of enemy air defense (SEAD) element, and the C2 element (E-2).
The composition (number and type aircraft) of each element will depend largely on the type of
target and the expected threat response. A strike package could consist of a single division of
strike/fighters or up to 20+ aircraft for a large force strike. The basic composition of each
element within an organic (CVW) strike package is as follows:
1.   Strikers – The element responsible for employing ordnance on the land based target.
Commonly referred to as the “Hammers.” Consists of Fighters with an air-ground ordnance
loadout.
2.    Fighters – The element responsible for protecting the strikers from any airborne threats.
Commonly referred to as the “Shields” for close escort. Consists of Fighters with an air-to air
ordnance loadout. They will fly in formation with the strikers. When a significant enemy air
response is expected, an additional advanced element of fighters, known as the “Sweeps”, may
be employed ahead of the rest of the strike package. These additional Fighters may be sent in to
sanitize the airspace over the target prior to the arrival of the strike package. Additionally, the
sweep and shield elements are responsible for the safe egress of the strike package once the
mission is complete.
3.    SEAD – The element responsible for protecting the strike package by jamming enemy
RADARs and/or communications. Commonly referred to as “Tron.” Consists of an E/A-18G,
possibly with a loadout of AGM-88, high-speed anti-radiation missiles (HARM). The SEAD
element may also include Fighters (“Vests”) with an air-to-air ordnance loadout, serving as high
value asset protection (HVAAP), responsible for protecting “Tron.” Depending on the level of
SEAD required, additional Fighters (“Zaps”) may be included with primarily a HARM loadout
to assist with the SEAD. The SEAD element may follow the strike package along the strike
route or they may set an orbit at a predetermined location. This will be determined during
mission planning. At VT-4, one of the other crewmembers will be notionally communicating
with the SEAD package on SEAD common and will pass updates to the AIC controller such as
TACREPS, “music on” (jammers on), and “magnum away” (HARM shot). It will then be the
controller’s responsibility to pass this info to the strike package.
4.   C2 – The E-2 will serve as the C2 platform, providing AIC to the strike package and
coordinating with the strike lead and the Strike Warfare Commander (AP).
The C2 game plan is integrated in the strike package mission plan. C2 aircrew will provide air
picture information to all friendly assets and communicate with standard AIC communications.
Link information will also be relayed to all friendly assets on the network.
Picture information will be provided before, during, and after the execution of the strike route
and destruction of the target. Typically, the fighter elements will commit to airborne hostile
threats that have met route commit criteria. After the commit occurs, AIC will label the picture
and name the groups. After the groups are labeled and named, the fighters will target each group
per the briefed game plan and destroy the air threat. Similarly, if there are surface threats, strike
package assets may suppress or destroy the threats to allow the strikers to proceed to the mission
target.
AIC supports the strike package by detecting and tracking the presence of enemy aircraft
and relaying the picture, just as with any AIC mission. Additional duties of the E-2 crew are
centered on the C2 aspect of the strike mission. There are several key differences for AIC in
controlling a strike mission versus a defensive counter air (DCA) mission. The strike lead,
Hammer 11, has commit authority. Therefore, AIC must recommend commits. AIC will say
“recommend sweep commit” vice “sweep commit” as you are used to in a DCA. Remember that
altitudes should be omitted when groups are over land. The control net of strike common will be
secured. You can assume that in mission planning we have coordinated to not use code words on
this net. This means that you will use the North Atlantic Treaty Organization (NATO) code
words (e.g., “Fulcrum” for a MiG-29 and Fishbed for the MiG-21) for the tipper fill-in. The SO
will be responsible for coordinating with AP regarding all aspects of the mission. The SO should
check in with AP when airborne. As the event progresses, the SO will also relay when all assets
are checked in and if there are any “alibis” (degraded capabilities), if there is a ROLEX, when
Sweeps push, when Hammers push, feet dry, miller time (add time stamp if significantly
delayed), feet wet, results of the roll call after reaching the egress control point, and in-flight
report. When performing a large force strike, coordination is critical to success.
The E-2 crew will monitor the initial man-up and launch of the strike package, as well their
check-ins as the strike package proceeds to the rendezvous point. This is done to expedite the
launch of alerts in the event of any aircraft falling out or having significant alibis. They can also
recommend to the strike lead to re-role assets if degradation prevents them from serving in one
role, but they are still able to serve elsewhere in the strike package (fill plan).
Throughout the strike, the E-2 will monitor the go and abort criteria. The go criteria are the
minimum items, as determined by the strike lead and CAG, which are required to commence the
strike mission. Abort criteria are referenced once the package has pushed and is a list of items
that if any are met, will cause the strike lead to abort the strike. If AIC recognizes that one of
these criteria are met after the strike has commenced, they should recommend an abort with the
following comm and reason for the recommendation.
AIC: “Hammer 11, Eagle, recommend check criteria, SA-5 active, rock 240/37.”
The word “echo” will be used in a strike to repeat certain calls to separated elements of the
strike. Saying “echo” identifies that C2 is not initiating the call/contract and is relaying to the
rest of the strike package. This could be based upon being geographically separated or blue
assets not having heard the original call from the strike lead. This also prevents potential
confusion for the use of ROLEX so that the actually amount of time is understood by all the
package commanders. Calls that are “echoed” include: ROLEX, MUSIC ON, MAGNUM
AWAY, SPIN, LEAN (cardinal direction), RESUME, MILLERTIME.
“Faded” calls will be used in an overland environment in place of a “vanished” assessment at the
end of an intercept, or when a RADAR return has been lost on a specified group. Whenever
“faded” is used, the group must be anchored off of bullseye and a track direction provided.
The Initial Point (IP) is the point at which the strike package sets their attack formation. The
Decision Point (DP) is the point where the strike lead makes the decision to transition from
air-to-air mode (self-protect during ingress) to air-ground mode (decision to attack the target).
The points are often collocated and referred to as the IP/DP. AIC will provide picture
information throughout the strike route, and at the IP/DP, the strike lead will report its position
and request a final picture call from AIC to determine if the strikers will continue to the target.
At the IP/DP, the AIC will reference “target area commit”, which is the specific commit criteria
determined for a given strike mission, while the strike package is inside the target area (between
the IP/DP and target). Target area commit does not replace the air-to-air timeline, but serves as a
decision making tool for the strike lead when deciding whether or not to continue to the target.
For the strike event at VT-4, the target area commit will be a 45 nm radius, centered on the
target. Any groups that are outside of target area commit when the strike package reaches the
IP/DP are assessed to not be a factor prior to the “Hammers” attacking the target. If the picture
is clean, AIC will call, “Banger, picture clean. Recommend Hammer continue.” If there are
groups present, but not in the target area commit, AIC should anchor these groups in broadcast
control, followed by “recommend Hammer continue.” If there are groups inside of target area
commit, AIC should recommend a commit to the “Shields” followed by “recommend Hammer
continue”, unless the number of factor groups exceeds abort criteria. If abort criteria has been
met, AIC will communicate this to the strike lead by saying “check criteria”, as previously
mentioned in this section. If the recommendation to continue is given to the Hammers, there
should be minimal calls from AIC during the ingress to the target, however AIC still owes its
contracts to all controlled assets. If groups are going to affect the strike route and a commit is
required to be taken, AIC should use the fighter element with the most ideal positioning for the
intercept, usually the Shields.
When the last bomb is dropped from the last Striker, he/she will call “MILLERTIME”. As
previously mentioned, this will be echoed by AIC. After turning to the Egress Flow Point (EFP)
and after setting formation, Hammer 11 will make an “anchor flow picture” call (assuming no
engagements are currently taking place). The priority for the Strike Package at this point is to
egress. If threats can be placed at the Six O’clock position relative to the Strike Package, AIC
should do so and not commit fighters. AIC can give headings (“flow, green, buster”) that deviate
from the planned heading. If groups are present AIC should give SA to those group prior to
recommending flow headings. If this geometry can’t be achieved and a commit must be taken,
use the Shields, or if they are already in a commit, the swing fighter in the strike element.
After the EFP, the strike package will flow to the Egress Control Point (ECP). Once they reach
the ECP, the package should be safe from the expected threats and Hammer can begin the
back-side TACADMIN. Hammer will lead another roll-call or chick-count to ensure all assets
are accounted for and then should pass an In-Flight Report (IFR) to AIC. Once AIC has received
the IFR, the student should pass it on to AP.
A Return to Force (RTF) Profile allows friendly strike aircraft to move in, out, and through
airspace in the AO.
RTF procedures provide for the safe passage of friendly aircraft through restricted areas and back
through friendly air defense systems. RTF procedures are based on the threat, friendly posture,
friendly aircraft capabilities, and weather. RTF control procedures include the use of the
following:
2. Control points
4. Electronic identification
6. IFF equipment
AI Airborne Interdiction
AO Angle Off
AO Area of Operations
                                                         GLOSSARY   A-1
APPENDIX A                                            ADVANCED E-2NFOTS
BB Bogey Bearing
BH Bogey Heading
CC Collision Course
A-2 GLOSSARY
ADVANCED E-2 NFOTS                                              APPENDIX A
COMM Communication
DP Decision Point
DTG Degrees to Go
EM Electromagnetic
ES Electronic Support
                                                              GLOSSARY   A-3
APPENDIX A                                               ADVANCED E-2NFOTS
EW Electronic Warfare
FH Fighter Heading
Ft Feet
GT Gross Tonnage
A-4 GLOSSARY
ADVANCED E-2 NFOTS                                               APPENDIX A
IP Initial Point
kts Knots
L Left
LOS Line-of-Sight
LZ Landing Zone
MC Mission Commander
                                                               GLOSSARY   A-5
APPENDIX A                                                   ADVANCED E-2NFOTS
min Minute
nm Nautical mile(s)
A-6 GLOSSARY
ADVANCED E-2 NFOTS                                    APPENDIX A
OTH Over-the-Horizon
Pk Probability of Kill
Pd Probability of Detection
PR Personnel Recovery
R Right
RF Radio Frequency
RO RADAR Officer
RV Rescue Vehicle
SA Situational Awareness
SA Surveillance Area
                                                    GLOSSARY   A-7
APPENDIX A                                              ADVANCED E-2NFOTS
SO Sensor Operator
TA Target Aspect
A-8 GLOSSARY
ADVANCED E-2 NFOTS                           APPENDIX A
VA Vital Area
GLOSSARY A-9