atp 3-01.60 counter-rocket,artillery,and mortar operations may 2013
DESCRIPTION
COUNTER IED OPERATIONSTRANSCRIPT
-
ATP 3-01.60 Publication Date
Counter-Rocket, Artillery, and Mortar Operations
DISTRIBUTION RESTRICTION. Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information for official government use. This determination was made on 01 February 2005. Other requests for this document must be referred to Commandant, United States Army Air Defense Artillery School, ATTN: ATSF-DTA, Fort Sill, OK 73503-5000.
DESTRUCTION NOTICE. Destroy by any method that will prevent disclosure of contents or reconstruction of the document.
Headquarters Department of the Army
-
*ATP 3-01.60
Distribution Restriction: Distribution authorized to U.S. Government agencies and their contractors only to
protect technical or operational information for official government use. This determination was made on 01 February 2005. Other requests for this document must be referred to Commandant, United States Army Air Defense Artillery School, ATTN: ATSF-DTA, Fort Sill, OK 73503-5000.
DESTRUCTION NOTICE. Destroy by any method that will prevent disclosure of contents or reconstruction of
the document.
*This publication supersedes FMI 3-01.60, 16 March 2006.
Publication Date ATP 3-01.60 i
For Official Use Only
Army, Tactics, Techniques, and Procedures
No. 3-01.60
Headquarters
Department of the Army
Washington, DC
Counter-Rocket, Artillery, and Mortar Operations
Contents
Page
PREFACE............................................................................................................. vii
INTRODUCTION ................................................................................................... ix
Chapter 1 INDIRECT FIRE AND THE OPERATIONAL ENVIRONMENT ......................... 1-1 General ............................................................................................................... 1-1 Enemy IDF: A Tactical Weapon to Achieve Operational Information Effects ... 1-2 Planning to Defeat the Enemy IDF Threat ......................................................... 1-3
Chapter 2 C-RAM OPERATIONS DOCTRINE ................................................................... 2-1 The Joint and Combined Arms Fight to Defeat Enemy IDF ............................... 2-1 Offensive and Defensive Fires Synergy ............................................................. 2-1 Unit Mission ........................................................................................................ 2-2 How to Fight: Enduring Principles ..................................................................... 2-2 The C-RAM Functional Areas............................................................................. 2-4
Chapter 3 C-RAM SYSTEM OF SYSTEMS DESCRIPTION AND ORGANIZATIONAL CONSTRUCT ..................................................................................................... 3-1 C-RAM Joint Plug-and-Fight Systems ................................................................ 3-1 Core Systems ..................................................................................................... 3-1 Description of Major Components ...................................................................... 3-7 C-RAM Sense and Warn Battery Mission and Organization ............................ 3-12
-
Contents
ii ATP 3-01.60 Publication Date
For Official Use Only
C-RAM Joint Intercept Battery Mission and Organization ................................ 3-26
Chapter 4 C-RAM UNIT PLANNING, OPERATIONS, AND SUSTAINMENT .................... 4-1 C-RAM Integration with Supported Joint and Army Units ................................... 4-1 Command and Control Functional Organization ................................................. 4-3 LPWS Employment Considerations .................................................................... 4-8 Base Defense Plan ............................................................................................. 4-8 Network Architecture ........................................................................................... 4-9 WAVES Employment Plan ................................................................................ 4-11 C-RAM Sense and Warn Battery, Platoon, and Squad Operations ................. 4-12 Degraded Operations ........................................................................................ 4-14
Chapter 5 EMERGENCY OPERATING PROCEDURES ................................................... B-1 Emergency operating procedures ...................................................................... B-1 Reconnaissance, Selection, Occupation of Position ......................................... B-4 Engagement Operations .................................................................................... B-6 Countering Interference And Jamming .............................................................. B-8 Deployability ....................................................................................................... B-9 Communications and Data Link ......................................................................... B-9 Considerations for Potential Future Split-Based Operations ........................... B-13
Appendix A FIRING CUTOUT ZONE IMPLEMENTATION .................................................. A-1 Locating the Mount............................................................................................. A-1 Boresight Preparation ........................................................................................ A-1 Collecting Boresight Data .................................................................................. A-2 Firing Cutout Zone Design ................................................................................. A-4 Firing Cutout ZONE Switch Sector Design ........................................................ A-4 Firing Cutout Zone Implementation.................................................................... A-6 Switch Locations and Adjustment Procedures .................................................. A-7
Appendix B VME ENC PROCESSOR CCA .......................................................................... B-1 Preliminary Operations ...................................................................................... B-1 Set Up WinPASS ............................................................................................... B-1 Restarting the VME Processor ........................................................................... B-7 Post Loading Procedures ................................................................................... B-7 Checking and Setting the Date and Time on VME Processor ........................... B-8 Set Up the WinPASS IP Address and TFTP Server .......................................... B-9
Appendix C NORTH FINDING DEVICE ................................................................................ C-1 Position the LPWS Mount .................................................................................. C-1 Connecting the North Finding Device to the LPWS and Powering Up .............. C-1 Acquiring Data from the North Finding Device .................................................. C-1
Appendix D SUSTAINMENT ................................................................................................. D-1 Responsibilities .................................................................................................. D-1 Battalion Trains .................................................................................................. D-1 Logistics Packages ............................................................................................ D-1 Unit Interface with the BRC ................................................................................ D-2 Classes of Supply .............................................................................................. D-2
-
Contents
Publication Date ATP 3-01.60 iii
For Official Use Only
Maintenance, Recovery, and Repair .................................................................. D-3
Appendix E SLEEP DEPRIVATION ...................................................................................... E-1 Overview ............................................................................................................. E-1 Sleeping in the Operational Environment ........................................................... E-1 Maintaining Performance During Sustained Operations/Continuous Operations .......................................................................................................... E-3 Specific Sleep Loss Effects ................................................................................ E-5 Common Misconceptions About Sleep and Sleep Loss .................................... E-6
Appendix F THE INDIRECT FIRE THREAT ......................................................................... F-1 Threat Analysis ................................................................................................... F-1 Examples of IDF Threats .................................................................................... F-3
Appendix G C-RAM REPORTS ............................................................................................. G-1
Appendix H SITE SURVEY AND RSOP CHECKLISTS ........................................................ H-1 General ............................................................................................................... H-1 RSOP Checklist .................................................................................................. H-1
Appendix I SURVEY .............................................................................................................. I-1 Q48 LCMR Orientation/Survey/Employment ....................................................... I-1
GLOSSARY .......................................................................................... Glossary-1
REFERENCES .................................................................................. References-1
INDEX .......................................................................................................... Index-1
Figures
Figure 2-1. C-RAM functional overview .................................................................................. 2-4
Figure 3-1. Local control console (Unit 1) .............................................................................. 3-2
Figure 3-2. Electronics enclosure (Unit 2) .............................................................................. 3-3
Figure 3-3. Radar weapon assembly (Unit 3) ......................................................................... 3-4
Figure 3-4. Local control station (Unit 13) .............................................................................. 3-5
Figure 3-5. Remote control station (Unit 14) .......................................................................... 3-6
Figure 3-6. SINCGARS radio (generic view) .......................................................................... 3-7
Figure 3-7. Example of wireless hardware configuration ..................................................... 3-10
Figure 3-8. Land-based Phalanx weapon system ................................................................ 3-11
Figure 3-9. Control room internal view ................................................................................. 3-11
Figure 3-10. C-RAM Sense and Warn Battery organization structure ................................. 3-13
Figure 3-11. C-RAM Sense and Warn Battery organization elements................................. 3-13
Figure 3-12. C-RAM Joint Intercept Battery ......................................................................... 3-27
Figure 4-1. LCMR site location ............................................................................................... 4-7
Figure 4-2. Multiple LCMR emplacement ............................................................................... 4-8
Figure 4-3. BDOC early warning network ............................................................................. 4-10
Figure 4-4. C-RAM data flow ................................................................................................ 4-11
-
Contents
iv ATP 3-01.60 Publication Date
For Official Use Only
Figure 4-5. Example of local warning configuration ............................................................. 4-12
Figure 4-6. Sense and warn architecture ............................................................................. 4-13
Figure 4-7. AMDWS (addition to architecture) .................................................................... 4-14
Figure 4-8. Engagement sequence from LPWS during degraded operations ..................... 4-15
Figure 4-9. Engagement Sequence from EO Section during degraded operations ............ 4-16
Figure 5-1. LPWS emplaced with mutual support ................................................................. B-5
Figure 5-2. LPWS emplaced with overlapping fields of fire ................................................... B-5
Figure 5-3. LPWS emplaced with mutual support and overlapping fields of fire ................... B-6
Figure 5-4. RAM target versus friendly track ......................................................................... B-7
Figure 5-5. Alert message display during engagement ......................................................... B-8
Figure 5-6. Sending NO FIRE to all platoons ....................................................................... B-9
Figure 5-7. TOCNET notional deployment.......................................................................... B-11
Figure 5-8. Typical TOCNET node diagram ....................................................................... B-12
Figure A-1. LPWS train ring scale .......................................................................................... A-3
Figure A-2. LOS data entry form ............................................................................................ A-4
Figure A-3. Typical switch sector design ............................................................................... A-6
Figure A-4. LPWS FCZ switch logic ....................................................................................... A-7
Figure A-5. Elevation data unit ............................................................................................... A-8
Figure A-6. Train data unit ..................................................................................................... A-9
Figure A-7. Switch stack, top view ....................................................................................... A-10
Figure A-8. FCZ verification form ......................................................................................... A-11
Figure A-9. Firing interrupter switch performance data form ............................................... A-12
Figure B-1. Example of IP address table display ................................................................... B-2
Figure B-2. Boot-up screen display ........................................................................................ B-6
Figure B-3. PSOS information/modification display ............................................................... B-7
Figure B-4. Example of date and time display ....................................................................... B-8
Figure B-5. IP Address assignments for Adapter 1 ............................................................... B-9
Figure B-6. IP address assignments for Adapter 2 ................................................................ B-9
Figure C-1. North finding device installation location ............................................................. C-2
Figure F-1. Rocket launcher .................................................................................................. F-4
Figure F-2. Types of rockets .................................................................................................. F-5
Figure F-2. Types of rockets (continued) ............................................................................... F-6
Figure G-1. Sample of C-RAM Maintenance Tracker Report ................................................ G-1
Figure G-2. Sample of C-RAM IDF Report ............................................................................ G-2
Figure G-3. Sample of Equipment Item/System Report (A) .................................................. G-3
Figure G-4. Sample of Equipment Item/System Report (B) .................................................. G-4
Figure H-1. De-install and install of C-RAM capabilities ....................................................... H-5
Figure H-2. De-install roles and responsibilities for C-RAM capabilities .............................. H-6
Figure I-1. Q48 LCMR orientation (without proper survey orientation) .................................. I-1
-
Contents
Publication Date ATP 3-01.60 v
For Official Use Only
Figure I-2. Q48 LCMR orientation (with proper survey orientation) ....................................... I-2
Figure I-3. Survey error .......................................................................................................... I-2
Figure I-4. LPL error from survey error at 2 km ...................................................................... I-3
Figure I-5. LPL error from survey error at 5 km ...................................................................... I-3
Figure I-6. Q48 LCMR preferred orientation methods ............................................................ I-4
Figure I-7. Q48 LCMR orientation summary .......................................................................... I-4
Figure I-8. Q48 LCMR basic employment considerations ...................................................... I-5
Tables
Table 1. STANAGs ................................................................................................................... vii
Table 3-1. FAAD C3I system components ............................................................................. 3-7
Table 3-2. Assess the tactical situation and operations ...................................................... 3-17
Table 3-3. RAM threat factors ............................................................................................. 3-17
Table 3-4. Environmental effects ......................................................................................... 3-17
Table 3-5. Threat analysis ................................................................................................... 3-17
Table 3-6. Enemy COAs ...................................................................................................... 3-18
Table 3-7. Conduct analysis ................................................................................................ 3-18
Table 3-8. Plan ISR ............................................................................................................. 3-18
Table 3-9. COA support ....................................................................................................... 3-19
Table 3-10. Concept of support ........................................................................................... 3-19
Table 3-11. COA comparisons ............................................................................................ 3-19
Table 3-12. Running estimate ............................................................................................. 3-19
Table 3-13. Annex ............................................................................................................... 3-20
Table 3-14. Synchronize ...................................................................................................... 3-20
Table 3-15. EW system operator ......................................................................................... 3-20
Table 3-16. Initialize AMDWS ............................................................................................... 3-21
Table 3-17. Map generation ................................................................................................. 3-22
Table 3-18. Situational display ............................................................................................. 3-22
Table 3-19. TOC network ..................................................................................................... 3-22
Table 3-20. Dual LAN procedures ........................................................................................ 3-23
Table 3-21. Power-up ........................................................................................................... 3-23
Table 3-22. Alerts ................................................................................................................. 3-24
Table 3-23. EW data ............................................................................................................. 3-24
Table 3-24. Battlefield display .............................................................................................. 3-24
Table 3-25. Overlay functions............................................................................................... 3-25
Table 3-26. Data distribution ................................................................................................ 3-25
Table 3-27. CTP Application program .................................................................................. 3-25
Table 3-28. Create a plan or order ....................................................................................... 3-26
Table 4-1. Threat factors ........................................................................................................ 4-5
-
Contents
vi ATP 3-01.60 Publication Date
For Official Use Only
Table B-1. Addresses and boot path ..................................................................................... B-2
Table B-2. CPC environment lines on WinPASS ................................................................... B-3
Table B-2. CPC environment lines on WinPASS (continued)................................................ B-5
Table E-1. Basic sleep scheduling factors ............................................................................ E-2
Table E-2. Basic sleep environment and related factors ...................................................... E-3
Table E-3. Using caffeine under various conditions of sleep deprivation ............................. E-4
Table F-1. Adversary Activity Matrix ...................................................................................... F-2
Table F-2. Rocket Threat ....................................................................................................... F-4
Table F-3. Mortar Threat ........................................................................................................ F-7
-
Publication Date ATP 3-01.60 vii
For Official Use Only
Preface
The purpose of this field manual (FM) is to describe the joint and combined arms approach to defeating enemy
indirect fire (IDF). It also provides initial guidance on how specialized counter-rocket, artillery, and mortar (C-
RAM) units and capabilities contribute to offensive and defensive counter-IDF fires synergy and to that larger
joint and combined arms effort to defeat enemy rockets and mortars. It describes how C-RAM units contribute
to enabling counter-IDF shaping, denial, and response operations, and describes how C-RAM units and the C-
RAM system of systems (SoS) protect friendly forces by detecting incoming rockets and mortars, providing
timely and focused early warning (EW) of attacks, and, in selected locations, intercepting incoming rockets and
mortars. This FM focuses on operator actions, at the keyboard or system interface, and must be augmented by a
detailed standing operator procedure (SOP) to fully implement the necessary interactions between the
commander, the battle captain, and operator.
This FM provides an overview of C-RAM operations based, in part, on lessons learned during the successful
corps counter-IDF fight during Operation IRAQI FREEDOM (OIF) in 20072008. The target audience is C-RAM commanders and staff, leaders, and specialists at all levels and C-RAM trainers at schools, centers of
excellence, combat training centers, and mobile training teams. This FM also provides supported maneuver
commanders insight into C-RAM and the larger full spectrum counter-IDF operations that specialized C-RAM
units support.
This publication implements the standardization agreements (STANAGs) listed in Table 1 in compliance with
the multinational force compatibility.
Table 1. STANAGs
Number Title Edition
2034 NATO Standard Procedures for Mutual Logistic Assistance 6
2047 Emergency Alarms of Hazard or Attack (NBC and Air Attack Only) 7
2103 Reporting Nuclear Detonations, Biological and Chemical Attacks, and Predicting and Warning of Associated Hazards and Hazard Areas (Operators Manual)ATP-45(C)
9
2112 Nuclear, Biological, and Chemical Reconnaissance 5
3700 Joint Air and Space Operations DoctrineAJP-3.3 6
3736 Air Interdiction and Close Air SupportAJP-3.3.2 10
3805 Doctrine for Joint Airspace ControlAJP-3.3.5(A) 8
3880 Counter AirAJP-3.3.1(A) 5
4162 Identification Data Combining Process 2
This manual applies to the Active Army, the Army National Guard/the Army National Guard of the United
States, and the United States Army Reserve unless otherwise stated. The proponent of this publication is the
United States Army Training and Doctrine Command (TRADOC). Send comments and recommendations on
DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to Commandant, U.S. Army
Air Defense Artillery School, ATTN: ATSA-DOT-DTR, Fort Bliss, TX 79916-3802.
-
Publication Date ATP 3-01.60 ix
For Official Use Only
Introduction
The enemy IDF threat is enduring and growing. The C-RAM concept is a joint and combined arms
approach to defeating enemy IDF that features offensive and defensive fires synergy and is enabled by, but
not defined by, specialized C-RAM units and equipment.
The first chapters of this manual focus on the enduring and growing IDF threat and enduring principles
associated with defeating enemy IDF. Chapters 4 and 5, and associated annexes and appendices, address
the current rapidly spiraled C-RAM units and equipment, and how we fight them. C-RAM organization and
equipment will change over time but the enduring principles will not.
The C-RAM SoS provides the following top-level functional capabilities:
SHAPEReal and non-real-time operations to deny insurgents the opportunity to conduct rockets, artillery, and mortar (RAM) attacks.
SENSETimely, reliable, accurate acquisition of in-flight RAM to support deny, warn, intercept, and respond operations.
WARNTimely, reliable, accurate, localized troop warning for impending RAM attacks.
INTERCEPTRAM munitions in-flight destruction.
PROTECTHardened shelters for high-density troop locations.
RESPONDReal and non-real-time, accurate response operations to defeat RAM insurgent personnel/teams.
COMMAND AND CONTROL (C2)Effective battle command structure to support timely and
accurate C-RAM operations
SUMMARY OF CHANGES The following items summarize the doctrinal changes made by this field manual:
Addresses the joint and combined arms approach to defeating enemy IDF with more equal emphasis on all C-RAM functional areas compared with earlier doctrine that was focused almost exclusively on the intercept function.
Replaces staff estimate with running estimate to reflect FMI 5-0.1.
Replaces the term fires effects cell (FEC) and fires effects coordinator (ECOORD) with fires cell (FC) to reflect FMI 5-0.1.
Replaces the term fires and effects with fires to reflect FMI 5-0.1.
Adds graphics showing the difference between RAM and friendlies.
Adds text indicating new alert messages with different options for sending fire permit to platoons and/or options for sending data to Wireless Audio-Visual Emergency System (WAVES) (with or without correlation).
Adds graphics of new forward area air defense (FAAD) screen shots.
Changes combat service support (CSS) to sustainment operations to reflect FMI 5-0.1.
Adds Sense and Warn Platoon, to split the Operations chapter.
Adds new capability to accept data from FAAD box at external forward operations base (FOB).
-
Publication Date ATP 3-01.60 1-1
For Official Use Only
Chapter 1
Indirect Fire and the Operational Environment
This chapter discusses how multinational forces are defeating and planning against
the enemy IDF threat in an operational environment. It describes the primary and
strategic uses of IDF. Also discussed is how, in general terms, the enemy employs
IDF as part of a larger approach in the current operational environment. It addresses
the need for commanders to learn who the enemy factions in their area are and learn
their weapons capabilities.
GENERAL
1-1. The battlefield in Iraq is complex and violent. The enemys strengths derive from the ability to hide within the populace. This allows the option to select the time and place to engage you with his improvised
explosive device (IED) and SAF ambushes. In this way, the enemy avoids your superior firepower and
controls your operational environment. Operational environments are a composite of the conditions,
circumstances, and influences that affect the employment of capabilities and bear on the decisions of the
commander (JP 3-0). You must address the enemys strengths with your tactics. Use a coordinated effort of overt and covert activities to manipulate your operational environment to get the enemy to show up at a
time and place of your choosing so that you can apprehend or kill him.
1-2. Identify the various sites in your operational area (OA) where the enemy frequently chooses to fight you with IEDs. From this list, select the site that offers your unit the best combination of concealment and
firing position for multinational forces (MF).
1-3. Army missions require leaders, Soldiers, and units to be trained as they must fight in that environment. Observations from the field have emphasized the criticality of unit leadership confident in
their ability to train realistically and units that can fight effectively over the duration of an operation or
deployment.
1-4. The threat from IDFparticularly from rockets and mortarsis enduring and growing. During the Hezbollah-Israeli conflict, the enemy executed approximately 150 rocket attacks per day. Many in the
Middle East perceived Hezbollah had won at least a moral victory by being able to wage a sustained and
very public rocket operation battle against Israel, despite Israeli dominance in other aspects of the fighting.
It was no surprise when Hezbollah tactics, techniques, and procedures (TTP) migrated to the Iraqi theater
of operations. During OIF, enemy rocket and mortar attack levels reached over 1,000 attacks per month
during a concerted enemy effort to inflict casualties and erode U.S. and multinational political and popular
support. Successful multinational surge operations and focused counter-IDF actions, supported by
specialized C-RAM units, helped mitigate the effects of this IDF operational battle and, ultimately, reduced
the enemy IDF threat to much lower levels. However, IDF attacks, along with IEDs, suicide bombers,
snipers, and other means, remain part of the larger asymmetric arsenal available to our enemies to inflict
casualties and battle damage, get media attention, and erode multinational political and popular will. IDFand the larger Hezbollah model of warfarewill likely remain a staple of combat for the near future.
1-5. IDF provides the enemy a low-cost means of attacking U.S. and multinational forces. The IDF threat in Iraq has mostly consisted of rockets and mortars. Therefore, it is important to note that many potential
adversaries possess the ability to employ RAM in concert with all or some of the other elements that have
replaced manned air forces as the principle aerial threat: tactical ballistic missiles (TBMs), cruise missiles
(CMs), and unmanned aircraft systems (UASs). While this FM focuses on the IDF threat and C-RAM
operations, many of the principles in this FM for attack operations, active defense operations, passive
-
Chapter 1
1-2 ATP 3-01.60 Publication Date
For Official Use Only
defense operations, and C2 information system associated with C-RAM and defeating enemy IDF can be
applied to this larger combination of asymmetric aerial threats that U.S. and MF will likely face in the
future.
1-6. Rockets and mortars vary in size and destructive capability. Each type presents its own challenges to applying offensive and defensive C-RAM fires to defeat them. For example, the enemy shooting 60-mm
mortars into an FOB off a rooftop or out of the back of a vehicle generally provides minimal destructive
power but can be more difficult to detect, target, and respond against. An enemy 240-mm rocket attack can
create a spectacular fireball and can cause significant damage but is easier to detect and respond to.
1-7. C-RAM units were created based on urgent operational needs statements from commanders in theater. These commanders, despite significant offensive capabilities, remained vulnerable to the enemy
IDF threat. The remainder of this chapter introduces how, in general terms, the enemy employs IDF as part
of a larger approach in the current operational environment. Appendix F provides more specific
information on enemy rockets, mortars, and their employment, and describes some of the pattern analysis
and other tools that C-RAM leaders, fires planners, and maneuver intelligence officers should be familiar
with when assessing and planning against the enemy IDF threat.
ENEMY IDF: A TACTICAL WEAPON TO ACHIEVE OPERATIONAL
INFORMATION EFFECTS
1-8. C-RAM is deployed in operating areas where the enemy uses primarily asymmetric means to attack their objectives. Enemy commanders have stated that more than half the battle is a media war; a struggle to
create perceptions in key global audiences rather than a contest to gain terrain or political control through
kinetic force.
1-9. The enemy conducts lethal attacks but does so in ways, and against target sets, that will have the maximum possible effect in the information arena. These methods include direct fire attacks, suicide
bombs, IEDs, and IDF. While the IDF weapons used in current theaters are only occasionally effective in a
tactical sense, those used in future conflicts where adversaries have significant support from hostile states
may present a lethal IDF threat with far greater accuracy and intensity. Regardless of accuracy, the enemy
is adept at getting media attention using rocket and mortar attacks against key U.S. and multinational bases
and units.
1-10. In the current active OA, the weapons available to insurgent forces are generally as mediocre as they are plentiful. While IDF remains one of the enemys primary means of inducing casualties and achieving battle damage against targets such as helicopters on the ground, effectiveness in the current OA has been
lower than enemy leaders expected it to be or believe it really is. The training level of insurgent or militia
personnel varies greatly but generally consists of semi-trained personnel who have had some instruction
from a military veteran familiar with that particular system. Sometimes these veterans will conduct attacks,
which are generally more accurate on average, but typically, they will restrict their activities to recruitment
and training of entry-level insurgents or militiamen. In a long-term struggle, enemy commanders do not
want to risk their valuable training cadre just to increase success in a given attack, unless a key target is
available. Identifying and targeting training cadre is an important element of the counter-IDF fight. In some
cases, U.S. forces will face IDF crews that received more focused training in third world countries
supporting the extremists. Since these crews are relatively easy to identify based on the accuracy they
achieve and the TTP they use, they should be a priority for elimination.
1-11. Despite limitations in the tactical realm, the use of IDF plays some key supporting roles at the operational and even strategic levels in the larger enemy information war, therefore it is likely to endure
and grow in the operational environment. For the C-RAM unit or supported commander, the three uses of
IDF for operational and strategic purposes most relevant to the conduct of the mission are erosion of
popular will, key event exploitation, and symbolic retaliation. At the tactical level, commander assessment
of troop and critical asset criticality, vulnerability, recuperability, and threat (CVRT) (likelihood the enemy
will target those troops and assets with IDF) remains important to prioritizing active and passive defensive
capabilities for protecting Soldiers and equipment from enemy RAM.
-
Indirect Fire and the Operational Environment
Publication Date ATP 3-01.60 1-3
For Official Use Only
ATTEMPTS TO ERODE WILL
1-12. Steady attacks on U.S., multinational, and host government bases or units create statistics that are weapons in themselves. This accumulation of events assessed as "attacks" feeds reports that create an
impression of no progress, despite the fact that the majority of these attacks may have been totally
ineffective or even led to friendly force raids and counter-strikes inflicting enemy losses. Based on attack
reports, opinion-makers and casual observers in the U.S. and key nations wrongly perceive that the U.S.
and its allies are stalled, or that the long-term fight is hopeless. The reverse side of this coin is that merely
conducting attacks reinforces enemy morale. Many insurgent forces inductively reason that their attacks are
much more effective than they actually are. As a minimum, the enemy assumes that their persistence will
wear down the morale of targeted U.S. and multinational commanders and troops, if not inflict actual
casualties or operational disruption.
KEY EVENT EXPLOITATION
1-13. The second primary operational or strategic use of IDF relevant to C-RAM is the use of IDF attacks to create strong images during key windows of opportunity. Such an attack might be an attack timed during
the visit of a key U.S. or allied official or head of state. While the enemy commander may know there is
little chance to hit this individual, the real target is the increased number of media outlets that will be keyed
to that location. The attack will almost certainly be broadcast in near-real-time to the world and is
calculated to cause the maximum impact for the resources expended. The enemy may also attempt to
exploit large crowds where cameras are likely to be used. During OIF, the successful C-RAM intercept of
an incoming rocket that was projected to hit a crowd at a morale, welfare, and recreation concert is an
example of a C-RAM tactical action that prevented the enemy from achieving a significant operational
effect with IDF. The incident also serves as a reminder to commanders about the necessity for operations
security (OPSEC) when scheduling events with large crowds, given the known enemy tendency to try to
exploit key events with IDF.
SYMBOLIC RETALIATION
1-14. The third primary operational and strategic use of IDF is to retaliate against U.S. forces after particularly damaging U.S., allied, or host nation security force operations. The insurgent or militia
commander cannot hit the forces that inflicted the damage, but still must strike back quickly. This is
necessary to sustain morale and to possibly deter friendly forces in the area from future operations. A
variant of this type of attack is the indirect response to an event. This could be another faction's attack on
insurgents or allied groups, which insurgents try to associate with U.S. forces. This can even be a general
propaganda attempt to link the U.S. to a negative event that just happened elsewhere in the OA. It is
important to be familiar with historical dates that are significant to the enemy and the region, as symbolic
retaliation attacks frequently occur on the anniversary of a significant date.
PLANNING TO DEFEAT THE ENEMY IDF THREAT
1-15. C-RAM unit leaders and supported commanders need to learn who the enemy factions in their area are and learn their weapons capabilities and attack tendencies. It is just as important to learn the motivations of the different factions and how they see the battlefield. Look at your defended areas from the
enemy's perspective. C-RAM leaders also need to understand the local population, especially in areas
where enemy rocket crews are more likely to get active or passive support. They also need to understand
local geography, that, if hit by enemy IDF (intentionally or unintentionally) can be exploited in the larger
effort to undermine enemy IDF crews as extremists who are denying the people stability and progress.
Once C-RAM leaders understand how their OA fits in the enemy's target set, they must begin the detailed
intelligence preparation of the battlefield (IPB). This will create the baseline assessment, with projections
of enemy activity in terms of time, weapon system, point of origin (POO), and associated trigger events as
well as the larger network of enemy supply and training activities and locations. Even though C-RAM
sections may have no assigned intelligence personnel, they can still use the simple tools provided in Army
intelligence and doctrinal publications to create and sustain a relevant assessment. This will enable them to
-
Chapter 1
1-4 ATP 3-01.60 Publication Date
For Official Use Only
maximize the potential of the weapon systems under their command as well as advise supported
commanders on other C-RAM functional areas in the larger holistic counter-IDF fight. C-RAM leaders
need to understand their supported unit OA. They must maintain situational understanding of supported
unit actions. This will enable them to anticipate the impact of friendly force operations and how that might
alter templated predictions of enemy activity. C-RAM leaders also need to be aware of dates of historical
significance in the region that could alter anticipated enemy activity. Appendix F provides more detail on
pattern analysis and other tools that C-RAM and supported leaders can apply when assessing and planning
offensive and defensive operations to defeat the enemy IDF threat. This will deny them both the tactical
and operational advantages they seek, and enable them to target all elements of the enemy IDF network,
both physically and in the information arena.
-
Publication Date ATP 3-01.60 2-1
For Official Use Only
Chapter 2
C-RAM Operations Doctrine
This chapter describes some of the enduring principles associated with defeating the
enemy rockets and mortar threat. It also discusses the C-RAM functional areas. The
rapidly spiraled C-RAM organizations and equipment currently used in response to
the urgent operational need statement for dedicated C-RAM capability will change
over time; however, the principles associated with defeating enemy IDF will likely
endure.
THE JOINT AND COMBINED ARMS FIGHT TO DEFEAT ENEMY
IDF
2-1. C-RAM is a joint and combined arms and full spectrum approach to defeating enemy IDF that features offensive and defensive fires synergy. It is enabled by, but not defined by, specialized C-RAM
units and capabilities.
2-2. The enemy uses IDF to try to inflict casualties and battle damage, reduce multinational political and popular will, and to raise their stature in the community. C-RAM operations reverse this equation by
minimizing the casualties caused by enemy IDF. This denies them the mass casualty scenes they seek to
exploit in the information arena. It also decreases their stature in the eyes of the average citizen either by
their physical destruction or by nonlethal fires that expose their cowardly actions, and the adverse effects
such actions have on peace and stability for the people.
OFFENSIVE AND DEFENSIVE FIRES SYNERGY
2-3. Defeating enemy IDF requires offensive and defensive synergy. Offensive or defensive capability alone fails.
2-4. Offense alone will not defeat the enemy IDF threat. During recent conflicts, multinational bases that both possessed and employed the most offensive firepower in theater suffered casualties, major losses of
attack as well as lift helicopters, and other valuable equipment. This caused severe mission disruption
because commanders lacked the capabilities to provide early warning to troops, had inadequate protective
barriers, or lacked the capability to destroy incoming rockets and mortars with C-RAM surface-to-air fires.
The enemy was often able to exploit these successes, with operational effect, in the information arena.
2-5. Similarly, in bases that apply a strictly defensive approach, the enemy will fire without any retaliation. The enemy IDF crews and the population that passively or actively support them fear no
response and are consequently emboldened. Recruitment of IDF crews becomes easy since the job is less
dangerous. It is much easier for the local population to rationalize allowing their neighborhood to be used
as an extremist rocket launch site when they know multinational forces will not fire back into their
neighborhood. As a result, both the number of attacks and the number of rounds fired in each attack goes
up. While defensive C-RAM measures will prevent casualties in many attacks, they cannot prevent them in
all attacks. The increase in enemy attacks encouraged by a strictly defensive approach will ultimately
overwhelm defenses and achieve at least some tactical effect. More significantly, friendly morale suffers
and enemy morale goes up when enemy IDF attacks go unanswered and when there is no serious joint and
combined arms effort to deter, deny, or defeat them.
2-6. The combination of offensive and defensive fires synergy, both lethal and nonlethal, has proven extremely effective against enemy IDF. The combined arms effort to keep the enemy from employing
-
Chapter 2
2-2 ATP 3-01.60 Publication Date
For Official Use Only
rockets, mortars, and the fires synergy that targets the enemy at the IDF point of origin while
simultaneously cueing early warning and defensive fires to protect Soldiers in the vicinity of the projected
IDF point of impact (POI) (or precise employment of nonlethal fires/information operations if the enemy
IDF POI is a civilian target) is what C-RAM operations are all about.
UNIT MISSION
2-7. The generic mission of specialized C-RAM units, to be modified as appropriate based on mission, enemy, terrain and weather, troops and support available, time available, civil considerations (METT-TC),
is as follows:
C-RAM units, working as part of a joint and combined arms effort, detect incoming
rockets and mortars; provide focused early warning; destroy inbound rockets and mortars
at prioritized locations; and enable counter-IDF shaping, denial, and response actions in
order to protect friendly forces and high-value assets, ensure mission continuity, and help
to kill or capture enemy IDF teams and seize their caches.
HOW TO FIGHT: ENDURING PRINCIPLES
2-8. C-RAM detections help fuel the larger joint and combined arms fight versus enemy IDF. Detections provide the cueing for the immediate offensive and defensive fires used to defeat an enemy IDF attack.
They also contribute to the database of historic IDF POO used for pattern analysis and both proactive
operations and a more detailed study of past events leading to deliberate operations against the enemy IDF
network. C-RAM fusion of organic detections and both supported and networked unit detections enables a
more robust situational awareness of enemy IDF patterns than was previously possible.
2-9. Shape operations attempt to prevent enemy IDF attacks from being generated in the first place. C-RAM and supported maneuver operations attempt to shape actions and attitudes associated with IDF
employment in areas that can be used as launch points against MF. This is conducted with information
operations and other full spectrum operations designed to help people, win their support, and make them
less inclined to support enemy IDF activity. In addition, ground patrols attempt to find and seize caches. A
high positive ratio of enemy IDF rounds seized in caches compared to enemy rounds fired is an important
measure of success in the combined arms C-RAM fight. Aircrews that operate in the FOB OAs should be
well briefed on historic enemy IDF POOs and pattern analysis, and should be trained to look for signs of
enemy IDF activity during routine flights. Many of the kills achieved against enemy IDF teams during OIF
came from alert aircrews looking for and finding enemy IDF activity. Properly cleared denial fires and the
conduct of helicopter gunnery and other test fires in historic POOs also help deter and deny enemy IDF
activities.
2-10. C-RAM sense and warn operations provide the detection that is key to the joint and combined arms C-RAM fight. Sense and warn operations then provide warning to friendly troops of incoming rockets and
mortars so that they can seek cover to avoid being killed or wounded.
2-11. C-RAM intercept operations destroy or deflect incoming rockets and mortars at prioritized locations.
2-12. Protect operations provide Soldiers passive protection against the effects of rockets and mortar blasts. T-walls, Hesko barriers, rocket roofs, and other means help reduce exposure to the risks of enemy
RAM.
2-13. C-RAM respond operations (which is a base defense operations center [BDOC] function), directly or indirectly, attack insurgent forces with lethal and nonlethal fires. During OIF, U.S. and MF killed enemy
IDF crews and destroyed rockets and rails at the POOs with weapons fired from UASs, attack helicopters,
joint air, artillery, ground forces, and other means. When positive identification could not be made at the
POOs, U.S. forces tracked vehicles and personnel at the POOs back to their weapons caches. Multinational forces then planned and conducted appropriate operations to kill or capture the enemy IDF teams and
associated supporters. When the enemy fired at U.S. and multinational forces but missed and hit civilians
-
C-RAM Operations Doctrine
Publication Date ATP 3-01.60 2-3
For Official Use Only
instead, nonlethal fires such as information operations were used to undermine the enemy for their actions
and to reduce their support base.
2-14. Many of the kills achieved versus enemy IDF teams during OIF came from alert aircrews looking for and finding enemy IDF activity. Properly cleared denial fires and conduct of helicopter gunnery and other
test fires in historic POO also help deter and deny enemy IDF activities. C-RAM sense and warn operations
provide the detections that are key to the joint and combined arms C-RAM fight and provide troops
warning of incoming rockets and mortars so they can seek cover to avoid being killed or wounded. Protect
operations aim to provide Soldiers passive protection against the effects of rockets and mortar blasts. C-
RAM intercept operations destroy incoming rockets and mortars at prioritized locations. C-RAM respond
operations shoot back at the enemy with lethal and nonlethal fires.
2-15. C-RAM command and control operations ensure that all C-RAM functions are being leveraged in the fight and seek to maximize synergy between the offensive capabilities of the supported unit and the
specialized C-RAM unit supporting the fight.
2-16. These C-RAM functional areas are enduring principles critical to a successful joint and combined arms C-RAM fight. It is important to note that they are interrelated. For example, the response functional
area has a significant shaping effect on both the enemy and the population that the enemy depends upon for
active or passive support in order to recruit, fund, hide caches, or operate among the people. These
functional areas are listed and described in more detail, following the historical vignette below.
Historical Vignette III Corps successfully applied a full spectrum and a joint and combined arms approach to defeating the enemy and enemy IDF. The enemy used IDF to try to inflict casualties, reduce multinational political and popular will, and to raise their stature in the community. Multinational Corps-Iraq (MNC-I) defeated this approach with a full spectrum, combined arms approach, withstanding the highest enemy IDF attack levels of the war through the spring and summer and ultimately reducing the enemy to the lowest attack levels in over 4 years by the end of 2007. During the 2 months of November and December 2007 alone, multinational forces seized over 10,000 rounds of enemy IDF. During 2007, multinational forces killed scores of enemy IDF teams with Predator-mounted Hellfire, AH-64, and joint fires. Artillery helped shape and deny support for enemy IDF activity and reduced the number of rounds fired per enemy attack. In selected locations, specialized C-RAM units and equipment contributed to the combined arms approach and to synergy between offensive and defensive counter-IDF fires. C-RAM units successfully warned on well over 800 enemy IDF attacks and intercepted over 72 rockets and mortars in specified locations during the III Corps tour, saving lives and reducing the impact of a concerted enemy IDF-intensive offensive. Information operations helped undermine extremists for the frequent collateral damage their IDF attacks exacted on the Iraqi people. Full spectrum operations helped shape attitudes in favor of multinational force security efforts and against extremists that emplace IEDs and attack multinational forces and Iraqi civilians with IDF. The Joint Fires Cell and MNC-I C-RAM Section played a key role in focusing on the enemy IDF threat and leading and integrating efforts to defeat it. IDF, along with UASs, CMs, and TBMs, will remain the Poor Mans Air Force and something we will continue to see brought into the fight to challenge us. The successful III Corps counter-IDF fight provides many valuable insights into how to defeat this aspect of the threat that we will no doubt see again in the future during the continuing struggle against radical extremists. XVIII ABN Corps and subsequent MNC-I and other formations facing IDF threats will continue the process of learning, improving relevant tactics, techniques, and procedures, and cycling lessons learned from operational deployments to the generating force.
COL Timothy Keppler MNC-I C-RAM LNO
-
Chapter 2
2-4 ATP 3-01.60 Publication Date
For Official Use Only
THE C-RAM FUNCTIONAL AREAS
2-17. The C-RAM functional areas are depicted in Figure 2-1 and are described in the paragraphs that follow.
Figure 2-1. C-RAM functional overview
SHAPE
2-18. The C-RAM shape functional area denies or minimizes the enemys ability to launch successful IDF attacks that undermine the friendly force mission. C-RAM shape operations include predictive and pattern
analysis to assist the counter-IDF aspects of the enemys IPB. Good IPB helps orient dedicated and general purpose collection and attack assets in time and space, and provides enhanced situational awareness to non-
dedicated aviation and other forces operating in the area based on known enemy IDF trends and tendencies
and identified intelligence gaps. It also helps establish appropriate anticipatory battlefield coordination
measures. These procedures all combine to facilitate successful supported unit lethal and nonlethal counter-
IDF area denial operations. They shape the civilian population and deny the enemy the launch points they
seek. It also fuels preemptive attacks to seize enemy rocket and mortar caches and/or attack other aspects of
the enemy IDF systemology with the net effect of denying or minimizing enemy IDF success. We face a
thinking adaptive enemy; therefore, IPB and the shape process are continuous. Proper command emphasis
and focus on the C-RAM shape functional area helps stay one step ahead of, and stay out in front of,
thinking adaptive enemies in the counter IDF fight.
SENSE AND WARN
2-19. The C-RAM sense and warn functional areas are focused on detecting, discriminating, and tracking RAM events in flight and providing timely, focused early warning to Soldiers, sailors, marines, airmen, and
civilians.
Sense
2-20. Detections generated in the sense and warn functional areas are critical to joint and combined arms C-RAM success. The sense detections enable multiple functions to occur. In addition to enabling focused
-
C-RAM Operations Doctrine
Publication Date ATP 3-01.60 2-5
For Official Use Only
early warning of friendly personnel, the sense function alerts C-RAM intercept systems to enable surface-
to-air engagements that destroy incoming rockets and mortars. Detection information assists in determining
POI information, with sufficient accuracy to enable the use of lethal and/or nonlethal response.
Accumulated detections also allow proactive shaping and denial efforts. Accumulated POI analysis and
identification of accuracy trends are useful in understanding enemy IDF intent, focusing of C-RAM-related
OPSEC, and efforts to identify and eliminate enemy human intelligence and forward observers. This also
provides indicators of external training and equipping influence in the area.
2-21. The C-RAM sense effort features an integrated sensor system, able to recognize threats, support the alerting of friendly forces to RAM attack (warn), support intercept cueing, and assist commanders and
supported units with both lethal and nonlethal response actions and proactive shaping and denial
operations.
Warn
2-22. The warn function is focused on providing timely and accurate localized early warning to friendly personnel. This early warning allows time to get in the prone position, seek protective cover, or remain
within a hardened structure until the RAM event is complete. This function must maintain a high degree of
reliability, to minimize complacency.
2-23. The sensor/warning interface should be automated and make effective use of the following:
Local sensors for short-range attacks.
A network of broad area sensors for long-range attacks and to mitigate the impacts of terrain
masking.
A high degree of sensor discrimination to minimize false warnings.
Timely dissemination of warnings using multiple methods (audio, visual, both indoor and
outdoor).
The ability to quickly move or augment existing warning coverage based on changes in
protected unit stance or other METT-TC factors.
2-24. The rapid warning of a predicted impact area, using input from existing C-RAM and supported and adjacent unit sensors, facilitates the early warning of personnel. Warning is accomplished by transmitting
an immediate audio and/or visual warning to a targeted area, limited to the actual zone of danger and not
the entire base or area of operations, unless area coverage is directed by the supported commander and
troops are educated on this local TTP. This enables threatened personnel to seek any immediately available
cover and get in the prone position. The end product of the warn effort is saving Soldiers lives and denying the enemy the casualties through IDF. Countless Soldiers have walked away from close encounters with
rockets by proper, disciplined reaction to C-RAM warnings.
INTERCEPT
2-25. The C-RAM intercept functional area is focused on the destruction or neutralization of RAM munitions in flight. C-RAM intercepts required acquisition and tracking of incoming rounds that have
predicted POI within the designated protected area. C-RAM intercept capability enables supported units in
defended areas to continue the mission with greater confidence and less fear of enemy rockets and mortar
attacks. Successful C-RAM intercepts prevent lethal effects within protected areas and help to prevent or
minimize battle damage. While the C-RAM warn capability is more readily available and significantly
improves Soldiers survivability, it does not stop the rocket or mortar impact and ensuing destruction and shrapnel damage at and around the POI. Any exposed high-value assets such as attack and heavy lift
helicopters on the ground cannot react to warning. The C-RAM intercept capability destroys rockets and
mortars in the air or deflects them away from targeted areas, saving lives and preventing or minimizing
shrapnel effects. Successful C-RAM intercepts boost friendly morale and, at a minimum, deny the enemy
the degree of casualties, damage, and the resulting information operations advantages the enemy seeks
through an IDF attack. When C-RAM intercepts are visible or otherwise made known to the enemy or local
population, there is a psychological advantage for friendly forces that can dampen both the enemys
-
Chapter 2
2-6 ATP 3-01.60 Publication Date
For Official Use Only
enthusiasm for IDF attacks and the willingness of civilians to provide active or passive support for enemy
RAM attacks. CVRT is key to prioritizing the allocation of limited C-RAM intercept capability and
doctrinal active air defense principles, and employment guidelines are applicable to positioning. The
recuperability time and cost of replacing defended high-value assets and troop concentrations should be
considered when assessing the costs and benefits of C-RAM intercept capabilities and requirements. C-
RAM intercepts have saved a large number of lives and prevented significant battle damage. In several
instances, C-RAM intercepts prevented the enemy from achieving what likely would have been a damaging
media story.
PROTECT
2-26. The C-RAM protect functional area is applicable to all units, regardless of whether or not they are resourced with specialized C-RAM units and capabilities. Many doctrinal passive air defense principles
apply. Use of T-wall barriers, Hesko barriers, earthworks, sandbags, SCUD/RAM bunkers, hardened mess
hall dividers, and other materials help shield and harden troop billeting and work areas, and protect
equipment from shrapnel damage. C-RAM CVRT analysis guides prioritization of barrier emplacement and
allocation of limited protection resources for projects such as rocket roofs over high troop concentration
areas and dining facilities. The protect function is particularly important for units and places without
specialized C-RAM sense and warn or intercept capability. Simple barriers have saved countless lives by
containing shrapnel blast and by shielding Soldiers.
RESPOND
2-27. Respond is the execution of lethal and/or nonlethal fires in response to detected enemy IDF attacks. The C-RAM respond function primarily focuses on killing or capturing enemy IDF crews that fired on, are
firing on, or are about to fire on friendly forces. The C-RAM respond function can also include nonlethal
effects (focused information operations) targeting local populations that are impacted (intentionally or
unintentionally) by enemy effect. Since respond and shape efforts often overlap, the respond function
impacts friendly, enemy, and local population attitudes. Units that respond aggressively, decisively, and
intelligently to enemy IDF enjoy a boost of friendly morale and generally realize a decrease in both number
and size of enemy attacks. This is due to a reduced willingness in the local population to support attacks
from their area and increased enemy respect for the capabilities of U.S. and multinational firepower and the
demonstrated will to use it.
2-28. U.S. and MF kill or capture enemy IDF crews and destroy rockets and rails at the POO by employing weapons fired from UASs, attack helicopters, joint air, artillery, ground forces, and other means. When
positive identification can be made at the POO, U.S. forces use target mensuration and other techniques to
determine what vehicles and personnel are near the POO at the time of launch and then plan and conduct
appropriate operations to kill or capture the enemy IDF teams and associated supporters. Proactive response
is conducted based on intelligence that initiates lethal or nonlethal fires prior to IDF action. Reactive
response attempts to destroy IDF teams prior to their vacating the POO. When the enemy fires at U.S. and
multinational forces but misses and hits civilians instead, or when the enemy intentionally fires at civilian
targets, nonlethal fires such as information operations are employed to undermine the enemys actions and to reduce the enemys support base. When possible, POO sites are examined for intelligence gathering and sensitive site exploitation and captured IDF teams are interrogated for intelligence that can help prevent
further attacks. The response functional area, whether employed aggressively and effectively or not, has a
significant shaping effect on both the enemy and the population that the enemy depends upon for active or
passive support in order to recruit, fund, hide caches, or operate among the people.
2-29. Rules of engagement (ROE) are extremely important to effective C-RAM response. A key element of effective response is the ability to establish positive identification rapidly that meets criteria established
in the commanders ROE. In more restrictive cases, units may require positive visual identification in addition to radar data. Since C-RAM units get the grid for the enemy POO sooner than other sources,
collocation of specialized C-RAM units with UAS controllers and fires leaders in the maneuver
commander tactical operations centers (TOCs) is a TTP that helps units synchronize intelligence,
surveillance, and reconnaissance (ISR) to the POO for positive identification and clearance of fires more
-
C-RAM Operations Doctrine
Publication Date ATP 3-01.60 2-7
For Official Use Only
quickly. It is important that units clearly understand how the ROE right of self-defense applies to enemy
indirect fire. Along with the desire to minimize collateral damage and other considerations, commanders
must consider the likelihood that ROE which severely constrain response against enemy rocket and mortar
crews typically can cause an increase in both the number and the size of attacks. It may also increase the
likelihood of the local population actively or passively supporting enemy IDF activity in their
neighborhoods. All C-RAM proactive and reactive response must be executed within the commanders intent and in accordance with established ROE.
COMMAND AND CONTROL
2-30. The C-RAM command and control functional area ensures all C-RAM functional areas are being leveraged in the fight and seeks to maximize synergy between the offensive capabilities of the supported
unit and the specialized C-RAM unit supporting the fight.
2-31. At corps level, a theater C-RAM lead and small staff element, typically working as part of the joint fires cell, integrates the overall C-RAM fight within the corps commanders intent. It is important that the corps C-RAM section have a mixture of surface-to-air and surface-to-surface fires expertise, as well as
division and corps level experience. Depending on the number of C-RAM units and locations in the fight, a
C-RAM tactical command post (CP) may need to be established to synchronize multiple specialized C-
RAM units with multiple supported division operations. The C-RAM Intercept Battery commander
integrates the C-RAM fight with the supported commander at selected high-priority locations allocated as
C-RAM intercept capability. The C-RAM sense and warn squad leader integrates with a supported brigade
or regimental combat team or the senior tactical commander at the designated FOB, patrol base, or joint
security station. The C-RAM Sense and Warn Battery commander and platoon leaders work with multiple
C-RAM sense and warn squads and the division(s) commanding supported units. While some units
collocate C-RAM units with BDOCs or protection cells, operational experience suggests the best command
and control practice is to collocate the C-RAM sense and warn squads in the portion of the TOC where ISR
and fires decisions are made. This facilitates positive identification with UASs and results in rapid
clearance of fires. The warning function can be triggered as easily from the TOC as from a BDOC or
protection cell; however, synchronization with ISR and fires is typically more difficult from a protection
cell or BDOC than from the TOC. Commanders organize their command posts as they see fit, and C-RAM
unit leaders must be ready to aggressively integrate all C-RAM pillars with supported unit operations from
wherever positioned. The key is to promote proactive and aggressive offensive and defensive synergy
against the enemy IDF threat. Chapters Four and Five describe current C-RAM Intercept Battery and C-
RAM Sense and Warn Battery organizations and operations.
-
Publication Date ATP 3-01.60 3-1
For Official Use Only
Chapter 3
C-RAM System of Systems Description and Organizational Construct
This chapter outlines the current states and operational functional solution to the
threat facing Soldiers on the battlefield today with the complex threat of indirect fire.
Commanders, through their analysis, determine the best employment of available
systems and personnel in response to the current threat. This chapter discusses the
core systems. It also discusses the C-RAM Sense and Warn Battery mission and
organization.
C-RAM JOINT PLUG-AND-FIGHT SYSTEMS
THEORY AND OVERVIEW
3-1. C-RAM and its systems in their current state of spiral development are an operationally functional solution to a complex IDF threat facing combat forces on today's battlefield. Designed as a joint plug-and-
fight system, there are both core and non-core systems. Commanders and planners must be familiar with
both the capabilities and limitations associated with the integration and networking of additional sensors
and responders to the core C-RAM system. Currently, the FAAD, air and missile defense workstation
(AMDWS), WAVES, lightweight counter-mortar radar (LCMR), land-based Phalanx weapon system
(LPWS), and Redline are organic to C-RAM units. Others, like LCMRs, may be either C-RAM equipment
or theater-provided equipment, and which C-RAM personnel will maintain and operate. Systems like the
Q36, Q46, Q37, Rapid Aerostat Initial Deployment (RAID) system, and Integrated Base Defense Security
System (IBDSS) will not be under operational control of C-RAM units. However, commanders may
designate them to support the C-RAM mission through system integration and inter-FOB networking. The
concept of the C-RAM SoS is based on the premise that systems under development will integrate
successfully with current fielded systems, enhancing their capabilities and moving towards the objective
SoS. There is no basic issue or standard equipment that comprises C-RAM. In the current state, manning
and equipment are based on a variety of factors. Commanders, through their analysis, determine the best
employment of available systems and personnel in response to the current threat.
CORE SYSTEMS
LAND-BASED PHALANX WEAPON SYSTEM
3-2. The LPWS consists of a trailer-mounted MK 15 close-in weapon system (CIWS). The CIWS is a 310-degree, 20-millimeter gun system with separate search-and-track radars, and a forward-looking
infrared (FLIR) radar. The gun system is capable of firing 4,500 rounds per minute, with a magazine
storage capacity of 1,580 rounds. Two 60-kilowatt generators mounted on the trailer supply power to the
entire system. The remote control station (RCS) requires its own power source. A Schreiber Engineering
chiller (mounted on the trailer) provides cool water to the electronics (ELX) enclosure. Emplacement time
for the complete system is approximately 45 minutes with a six-man crew. The LPWS can be towed by a
10-ton vehicle.
-
Chapter 3
3-2 ATP 3-01.60 Publication Date
For Official Use Only
Description of LPWS Components
3-3. The MK 15 LPWS consists of the following unit components:
Unit 1, the local control console (LCC).
Unit 2, the ELX.enclosure.
Unit 3, the radar weapon assembly.
Note: Units 2 and 3 together comprise the weapon group.
Unit 13, the local control station (LCS).
Unit 14, the RCS.
3-4. The LCC (Figure 3-1) is located in the control room. Threat criteria and engagement data can be entered into the weapons control computer (WCC). If the RCS is inoperable or if the FAAD/LPWS fiber-
optic link is broken (degraded operations), the LCC can be used as the primary control panel for the LPWS.
The LCC also functions as a maintenance control panel. The operator can perform operability tests, fault
isolation, and maintenance operations at the LCC. The LCC contains the local control panel (LCP), mass
storage device drawer, and power supply.
3-5. The LCC cabinet houses its chassis assembly, mass storage device drawer, power supply, and air-cooling fans (capable of moving 300 cubic feet per minute to dissipate 2,000 BTUs per hour). The LCC is
designed for sit-down operation. A pullout shelf is located at the base of LCC chassis assembly and
provides a work surface for the operator. Each of the assemblies is mounted on drawer slides, which may
be opened and locked into position for maintenance operations. The control panel/chassis assembly in the
LCC is mounted at a 15-degree angle on slides. The chassis assembly houses replaceable circuit card
assemblies (CCAs). The CCAs are designed to simplify fault isolation, with one CCA controlling each
section of the control panel. For example, one CCA controls the ENGAGEMENT STATUS section, while
another CCA controls the MODE CONTROL section.
Figure 3-1. Local control console (Unit 1)
-
C-RAM System of Systems Description and Organizational Construct
Publication Date ATP 3-01.60 3-3
For Official Use Only
3-6. The ELX (Figure 3-2) provides environmental protection and packaging for most of the weapon group electronics items. A connector shield, a power junction box assembly, and a transient surge
suppressor assembly are mounted on the right side of the enclosure. The enclosure is mounted on six
helical shock isolators. The bottom of the enclosure is fitted with two drain fittings that are opened
periodically to drain any water that may have accumulated in the bottom of the enclosure. Two hinged
doors on the front of the enclosure allow access to the electronic items. Door stay assemblies are located on
each top corner of the enclosure. They enable locking the doors in either the 90-degree or 180-degree open
position for maintenance operations. The interior of the enclosure contains slide-out drawer assemblies 2A1
through 2A5 and 2A7 through 2A11, which all contain replaceable CCAs. These CCAs are also referred to
as replaceable modules. The lower portion of the enclosure houses a power supply and control group 2A6
and 2A12. Small double doors on the lower portion allow access to the power supply and control group
(PSCG). Portions of the PSCG are located on the backside of these two doors, with the remainder located
in the lower portion of the enclosure. A tie rod on the backside of the enclosure door can be connected to a
pivot on the PSCG door. This secures the PSCG door during maintenance operations.
Figure 3-2. Electronics enclosure (Unit 2)
3-7. The radar weapon assembly (Figure 3-3) includes the 3A1 radar-servo fire control assembly, 3A2 gun subsystem, 3A3 elevation drive group assembly (mount), 3A4 barbette assembly, 3A5 train platform
assembly, 3A32 electro-optical stabilization system (EOSS) pedestal assembly, and 3A33 thermal imager.
The barbette assembly supports the entire radar weapon assembly. The train platform assembly is mounted
on top of the barbette assembly and is supported by four shock isolators. The train platform assembly
supports the bearing mounted elevation drive assembly. The elevation drive group assembly supports the
gun subsystem and the radar-servo fire control assembly.
-
Chapter 3
3-4 ATP 3-01.60 Publication Date
For Official Use Only
Figure 3-3. Radar weapon assembly (Unit 3)
3-8. The LCS (Figure 3-4) is located in the control room. The LCS provides the capability of command and control (from the mode control menu). It also provides friendly protect functions during degraded
operations from the FLIR display, and provides operator computer displays and the same mode displays as
those of the RCS. The LCS console contains the parameter analysis and storage system (PASS) computer
and printer; an engagement controller with video monitor, function keys, electro-optical stabilization
steering control, guarded fire button, power supplies, and electronics chassis. The electronics chassis
contains the LPWS support processor, which acts as the electro-optical system controller and data interface
with the WCC, and the acquisition video tracker that processes infrared image signals in electro-optical
search and track (disabled in LPWS).
3-9. The LCS cabinet houses the PASS computer and printer chassis assemblies, engagement controller, Versa Module Europa (VME) bus chassis assembly, and air-cooling fans (capable of moving 240 cubic feet
per minute to dissipate 3,276 BTUs per hour). The engagement controller contains a video monitor and
keypad. The VME chassis assembly contains the thermal imager video interface devices. Each of the
assemblies is mounted on slides that may be opened and locked into position for maintenance operations.
-
C-RAM System of Systems Description and Organizational Construct
Publication Date ATP 3-01.60 3-5
For Official Use Only
Figure 3-4. Local control station (Unit 13)
3-10. The RCS (Figure 3-5) is located at the engagement operations (EO) section (when the tactical situation permits) and allows an operator to break engagements while in antiair warfare (AAW) mode. The
RCS integrates the remote control panel MK 340 into a single console, which duplicates most LPWS
operational C2 functions of the LCP, and exercises control of these functions through the mode control
menu. The RCS contains circuitry to accept target designations automatically from other sensor/radar
systems. The RCS console also contains an engagement controller with video monitor, function keys,
electro-optical stabilization steering control, guarded fire button, and a power supply chassis.
3-11. The RCS cabinet houses the remote control chassis assembly, engagement controller, power chassis assembly, and air-cooling fans (capable of moving 240 cubic feet per minute to dissipate 2,730 BTUs per
hour). Through use of the mode control menu, the RCS can mode sequence selected mounts. The
engagement controller contains a video monitor and keypad. The power chassis assembly contains power
supplies for unit operation. Each of the assemblies is mounted on drawer slides, which may be opened and
locked into position for maintenance operations.
-
Chapter 3
3-6 ATP 3-01.60 Publication Date
For Official Use Only
Figure 3-5. Remote control station (Unit 14)
ENGAGEMENT OPERATIONS SECTION
3-12. The FAAD command, control, communications, and intelligence (C3I) system provides automated EO and protection operations capabilities at the C-RAM EO section. EO section capabilities include real-
time EW and target cueing information to C-RAM weapon systems, friendly aircraft identification, and air
battle management. Force operations (FO) capabilities include automated mission planning, automated staff
planning, and interoperability with other command systems.
3-13. The components of the FAAD C3I system include the following:
The EO section that monitors and controls the C-RAM tactical operations for the FOB/BDOC.
The Army airspace command and control (A2C
2) system that controls the engagement process
and provides FOB/BDOC liaison.
The sensor/C2 system that processes and disseminates track data to firing batteries.
The primary intelligence component, the Sentinel radar that provides airspace deconfliction
capability for the Intercept Battery in order to prevent fratricide.
-
C-RAM System of Systems Description and Organizational Construct
Publication Date ATP 3-01.60 3-7
For Official Use Only
Table 3-1 lists FAAD C3I system components.
Table 3-1. FAAD C3I system components
Common Name Official Nomenclature
Air and Missile Defense Work Station (AMDWS)
Computer, Tactical, AN/GYQ-88
Sensor C2 Subsystem
Communications Control Set AN/TSQ-183, AN/TSQ-183A
800 W Uninterruptible Power Supply 5-kw Generator/Trailer
Power Supply PP-8282/U 5-kw, 60-Hz Generator Set, Diesel Engine-Driven, Trailer-Mounted PU-751/M
10-kw Generator/Trailer 10-kw, 60-Hz Generator Set, Diesel Engine-Driven, Trailer-Mounted PU-798/M
Antenna OE-254/GRC Antenna Group OE-254/GRC
Adaptive Programmable Interface Unit (APIU) Adaptive Programmable Interface Unit MD-1217B/U
Fill Device Electronic Transfer Device, KYK-13/TSEC
Sentinel Radar Forward Area Air Defense (FAAD) Ground-Based Sensor, AN/MPQ-64
High-Mobility Multipurpose Wheeled Vehicle (HMMWV)
Truck, Utility, S250 Shelter Carrier, 4X4, M1113 or Truck, Utility, 5/4-ton, Cargo/Troop Carrier w/4x4 M998 (HMMWV)
Precision Lightweight Global Positioning System Receiver (PLGR)
Satellite Signals Navigation Set, AN/PSN-11
Single-Channel Ground and Airborne Radio System/90 (SINCGARS/90)
Radio Set, AN/VRC-90
SINCGARS/91 Radio Set, AN/VRC-91
SINCGARS/92 Radio Set, AN/VRC-92
DESCRIPTION OF MAJOR COMPONENTS
3-14. SINCGARS (Figure 3-6) are very high frequency (VHF) frequency modulation (FM) radios with the capability to transmit and receive voice or data communications. The SINCGARS voice radios are used in
all FAAD C3I subsystems.
Figure 3-6. SINCGARS radio (generic view)
-
Chapter 3
3-8 ATP 3-01.60 Publication Date
For Official Use Only
AIR DEFENSE MANAGEMENT EQUIPMENT
3-15. Air defense management equipment consists of the FAAD C2 and the AMDWS. This equipment is described in the following paragraphs.
Forward Area Air Defense
3-16. The FAAD links the various RAM sensors and the Sentinel radar. It provides situational awareness (SA) to the AMDWS and engagement commands to the LPWS. The FAAD C
2 also cues the WAVES EW
system (located in the BDOC) automatically when two or more sensors pick up the inbound RAM,
providing EW for the area at risk.
Air and Missile Defense Workstation
3-17. As one of the five original Army Battlefield Command Systems (ABCS), the AMDWS allows the C-RAM unit to provide air and missile defense (AMD) force planning and operational support. The C-RAM
unit holds one AMDWS linked to the FAAD and the BDOC (when the unit is located at FOB), or the air
defense system integrator (ADSI) (when not located at an FOB), where it can obtain external air tracks. The
AMDWS sends EW and other vital track data to the other C2 systems in the network.
ADVANCED FIELD ARTILLERY TACTICAL DATA SYSTEM
3-18. The Advanced Field Artillery Tactical Data System (AFATDS) is the digitized link providing automated technical and tactical fire direction solutions, fire asset management tools, and decision support
functionality. The system provides Army, Navy, and Marine Corps automated fire support C2, pairs targets
to weapons to provide optimum use of fire support assets, and automates the planning, coordinating, and
controlling of all fire support assets (field artillery, mortars, air support, naval surface fire support, and
attack helicopters). The AFATDS has the following capabilities:
Tactical air support.
Technical fire control.
Expanded target coordination and trigger events.
The ability to process 250 fire missions per hour.
Enhanced continuity of operations automation.
Improved attack analysis and target list.
SENSORS
3-19. The sensors assigned to the C-RAM Intercept Battery are the LCMR and the Sentinel radar. Improvement to existing sensor and the addition of new sensors make C-RAM even more accurate and
efficient. The following sections describe various sensors currently used by C-RAM.
Q-48 LCMR
3-20. The LCMR is operated as either a counter-fire sensor (Special Operations