The purpose of the ACTD is to provide vCSG-8 with an internal tactics, training, and procedures doctrine (TTP) that is not reliant on references to third-party or real life materials. This TTP will encompass basic fighter maneuvers, tactical formation, air combat maneuvers, air intercept control, and tactical intercept.
Intercept Geometry is a set of concepts that defines how two aircraft (the fighter, and the bandit) and their flight paths interact during an interception. The following diagrams will define these concepts and how they interact and interrelate to describe an intercept.
For official operations, a human Command & Control agency may be available to provide additional information and coordination for fighters. In the Air-to-Air mission, this will typically be specified as Air Intercept Control or AIC
.
Fighters will check in to their assigned controller by first ensuring all members of the flight are pushed to the controlling agency’s frequency, and then proceed to contact the controller using the following as a template:
[Controller’s Callsign], [Flight Lead’s Callsign], checking in, as fragged, request alpha check from Bullseye.
The fighters will request an ALPHA CHECK
from the controller to verify that both the controller and the fighters agree on the Bullseye position. This will be given as the fighter’s current Bullseye position. This position should agree with the fighters within 5 NM, 5°, and 1,000 ft.
The controller will reply with the following:
[Flight Lead Callsign], [Controller’s Callsign], alpha check from Bullseye is XXX,YYY. Angels ZZ, Track A.
The controller will give the position as a magnetic bearing from the bullseye position to the aircraft in nautical miles, altitude in thousands of feet (angels), and direction of travel to the nearest sub-cardinal direction as a “Track” (e.g. North-East,)
If there are any discrepancies in the flight that differ from what is present in the Air Tasking Order, such as, a missing aircraft, faulty weapon system or communication system, report that to the controller as an exception. For example:
CLOSEOUT, INFERNO 61, checking in with exceptions. Request alpha check from Bullseye.
The controller will reply with an alpha check and then proceed to copy exceptions:
INFERNO 61, CLOSEOUT, Alpha check from Bullseye is 145, 85. Angels 18, Track North.
After verifying the alpha check, the controller will continue to copy exceptions:
INFERNO 61, CLOSEOUT, go with exceptions.
Flight leads should then list out any discrepancies they have to report:
CLOSEOUT, INFERNO 62 LINK BENT, INFERNO 63 GROUND ABORT
In this case the flight lead is reporting that Inferno 62 is unable to use Link 16/TNDL, and that Inferno 63 had to abort on the ground and is not in the air with the flight.
Controllers will utilize a standard format to communicate to fighters the location of a contact or group. This radio call will take the following structure:
[Group or Contact], [Location], [Altitude], [Aspect or Track], [Declaration], [Additional Descriptors]
CONTACT | An individual radar return |
GROUP | Any number of CONTACTs within 3 NM in azimuth and range of each other. |
Control format defines how the location of a group will relayed to the fighters. There are 2 types of control formats:
BRAA is an acronym for Bearing, Range, Altitude, and Aspect. These are referenced from the fighter to the called contact.
Bearing | The magnetic heading from the fighter to the called contact |
Range | Distance in nautical miles from the fighter to the contact |
Altitude | Measured to the nearest thousand feet, and given as Angels or Thousands depending on contact declaration |
Aspect | Will be given as Hot, Flanking, Beaming, or Dragging |
The purpose of BRAA format is to give a specific fighter(s) faster situational awareness (SA) on a contact or group. BRAA format can be used with tactical or close control, but never in broadcast control.
Bullseye format utilizes a common reference point, such as a specific coordinate or terrain feature, to relay contact/group information. Without accurate information on this common reference point, the information relayed is of little to no use.
Bullseye format will give the location as a magnetic bearing from the reference point to the contact or group, followed by the range and altitude. For Example:
BULLSEYE, 0 4 5 / 22, 18 THOUSAND
Bullseye format can be used with either broadcast or tactical control.
Altitude on a contact or group will be given in ANGELS
or THOUSANDS
depending on whether a group/contact is friendly or ambiguous, respectively.
TRACK
will indicate a direction of travel for a contact to the nearest sub-cardinal direction or use the magnetic bearing of the contact’s flight path.
ASPECT
will be used to indicate a relative direction of travel from a referenced fighter.
This portion of the the standard radio call will inform fighters of the Rules of Engagement restrictions on the identified group or contact and can be summarized as follows:
Hostile | A GROUP that meets the ROE criteria for engagement. Weapons release against this group is implicitly authorized |
Bandit | A GROUP that is positively identified as an enemy, but does not meet ROE criteria for engagement. |
Bogey | A GROUP whose identity is not known or confirmed. |
White Air | A GROUP positively identified as a non-combatant. |
Friendly | A GROUP that is positively identified as friendly. |
Controllers may append their call with amplifying information that may include group strength, contact make and model, airspeed, or maneuvers
Heavy | Group Strength indicator, meaning a group contains 3 or more contacts |
Fast | Speed of contact or group exceeds Mach 1.0 |
Very Fast | Speed of contact is exceeds Mach 1.5 |
Type | This descriptor will be followed by the contact or group’s NATO designator for the given aircraft type (e.g. FULCRUM ) |
The control type forms a contract between the controller and the fighters. There are 3 types of control: Broadcast, Tactical, and Close control.
Broadcast control is a method of communication that meant to be useful to all fighters on the network and will only utilize bullseye format to communicate information about groups. When in broadcast, information of a contact or group will not specify an aspect and instead relay an absolute direction of travel to the nearest sub-cardinal direction. For example:
Group, Bullseye 1 0 0 / 45, 22 Thousand, Track South-West
It is important to note, that when under broadcast control, no group or contact will be LABELED
, and the controlling agency accepts responsibiity for all groups to be monitored.
Tactical control is communication directed towards a specific fighter, CAP station, division/flight, or section/element. Tactical control is initiated by fighters with the controller by initiating a COMMIT
. Information on groups and contacts can remain in Bullseye format, or immediately transition to BRAA depending on the briefed contract between fighters and the controller. Tactical control also initiates the LABELING
of a picture, and will switch from using TRACK
to ASPECT
when communicating a group’s direction.
Other fighters on the network can still use this information to build additional SA. An example of a controller in tactical control can be seen below:
Lead Group, Bullseye 0 7 5 / 55, 30 Thousand, Hot, Hostile, Heavy.
When under tactical control, the controlling agency (AIC) will only accept responsibilty for those groups not TARGETED
by fighters and monitor their positions. It is the fighter’s responsibility, once TARGETED
to maintain radar coverage of their group(s).
Close control is used when a controller must control individual fighters. Fighters should brief controllers on when/if they will require close control prior to mission start if able. During close control AIC may command a commit, target, or flow for fighters to adhere to.
Close control drains the AIC of SA on a larger picture and requires that their attention be focused on the fighters requiring control information.
When contact and group information is compiled, it is referred to as a PICTURE
. A controller will communicate to fighters the locations of all contacts and groups in their assigned area of responsibility. This list of contacts and groups is given in a bullseye format.
Picture Range, or PR, is the ultimate range of the fighter’s mission, where contacts beyond the PR are considered No Factor. Within this range, AIC will be expected to include any contacts in their picture updates.
The focal point of the PICTURE from where to determine this range can be a geographical reference, the collective center of a package, the location of a CAP Fix, or the current location of the fighters. PR may be afixed to an option for a whole mission, or it may be fluid depending on the needs of a package. If there are multiple CAP Fixes, then there may be multiple PRs. Ultimately PR is an excercise for the AIC, with an agreement of understanding between the fighters that AIC is controlling.
The Commit is a contract between C2 and fighters, where the fighters accepts responsibility to execute intercepts within a PICTURE. When fighters commits, they are agreeing to engage the whole PICTURE, although they are targeting a specific GROUP within the PICTURE.
A FL will choose to commit their flight to a PICTURE, when any GROUP within the PICTURE meets their Commit Criteria.
It is important for an FL to internalize that when they commit, they are committing to the PICTURE. The fate of that flight is ultimately sealed in their ability to successfully execute an intercept on every GROUP in the PICTURE, and anything less than an eventual Pk of 1.0 can lead to the complete destruction of their flight. Although a PICTURE may have a large Targeting Depth when they initially commit, this is almost guaranteed to rapidly change after the flight persecutes the first targeted GROUP within the PICTURE.
Targeting Range, or TR, is the maximum doctrinal range that the nearest hostile group in a picture can be from the fighters, before the fighters can accept responsiblity to target and engage groups within that picture. Before TR is met, DCA flights will stay on station on their CAP Fix, and OCA flights will maintain to their pre-briefed navigation plan.
Factor Range, or FR, is a notional range from which fighters who merge with their targeted group can be engaged by a follow-on group. This can be approximated as the maximum WEZ of the expected threat and the projected range rate of closure, centered around the currently targeted group.
It is important to note, that FR is not necessarily applicable to Launch & Leave tactics, but always applicable to gameplans aiming to terminate in a merge.
A Notchback is a maneuver executed within a 2-ship formation used to defeat an adversary that is outside decision range by splitting the section into two beaming aircraft as shown in the figure below:
The objective of this maneuver is to force the adversary to choose between the two fighters and commit to an attack. The “naked” fighter will then take this opportunity to initiate their own attack on the adversary. It is key to note that this tactic should only be used outside of decision range, in order to give fighters the ability to abort when spiked. If fighters have crossed past the decision range, and into the minimum abort range, a Stagger-Back may be the more likely ensure survivability.
Like the Notchback, a Stagger-Back will split the formation into two seperate fighters for the adversary to target, while also reducing closure rate between fighters and the adversary. This tactic is best used when outside of the adversary stern WEZ in order to give fighters the required time and space to defend an incoming adversary missile when this tactic is initiated.
Defensive Counter Air (DCA) missions consist of defending high value assets (airborne or ground based) or points of interest. These missions will be designed to detect, identify, intercept, and destroy or deny enemy forces attempting to attack or penetrate the friendly air environment.
Planning considerations should include, but are not limited to: Rules of Engagement (ROE), point vs. area defense, mobility of the defended asset, type, number, and origin of enemy forces, availability of friendly assets, time of day, and weather conditions.
Typical DCA missions include
DCA missions may require integration with surface based air defenses such as Patriot or AEGIS to provide adequate coverage of friendly forces. This integration requires the designation of Fighter Engagement Zones (FEZ), Joint Engagement Zones (JEZ), and Missile Engagement Zones (MEZ).
Combat Air Patrol(s) (CAP) are designed to place an element or flight in a fixed position with the ability to place sensors and weapons at the most likely direction of the threat.
A CAP station is a racetrack orbit that can be defined by 5 attributes:
1. CAP Fix
This will be the point most forward in the CAP orbit with a radial direction from this point indicating the Hot direction. A CAP fix can be any given point with an advantageous position to defend from, but can also be a briefed navigational aid, such as a TACAN or VOR, or a geographic reference (GeoRef) such as a landmark or terrain feature. The CAP Fix is always on the side of the orbit closest to the expected threat vector.
2. Hot Leg
This will be the portion of the CAP orbit where fighters will be pointed towards the threat sector and are expected to conduct radar sanitization of their assigned sectors by means of their briefed radar mating plan. Visual lookout doctrine should be respected, and not neglected. The hot leg will usually be defined by the magnetic bearing the fighters will be facing when on this portion of the orbit.
3. Cold Leg
This portion of the orbit will position fighters facing away from the expected threat and should be utilized to focus on visual lookout in support of the Hot fighters while continuing radar sanitization. Like the hot leg, this portion of the orbit will be defined by the magnetic bearing the fighters will be facing.
4. Leg Length
Leg lengths will vary, but are essential to define in a CAP plan, with shorter lengths requiring higher tempo, workload, and situational awareness, but allowing fighters to remain in a smaller geographic area. Longer legs will allow more radar frames per leg and a lower workload per pilot, while expanding the geographic footprint of the CAP station. Lengths can be defined in either distance (NM) or in time (MM:SS). The primary factor affecting leg length will be how much Opportunity Range fighters are willing to cede to the adversary.
5. Altitude
Altitude will also play a key factor in fighters’ ability to detect, identify, and prosecute low altitude threats, and also heavily impact their endurance, and missile employment range. Flight Leads and planners should be cognizant of how the selected altitude will impact these factors and choose the appropriate block based on the expected threats and assets to be defended.
The intent of this orbit is to always have an element of fighters on the Hot Leg, facing the threat axis, while remaining in a fixed airspace with adequate radar and visual coverage of the threat axis and defended assets.
Offensive Counter Air (OCA) missions are operations conducted with the intent to destroy, disrupt, or neutralized enemy aircraft, missiles, launch platforms, and their supporting assets and systems before and after launch. These include attack operations, fighter sweeps, escort, and suppression or destruction of enemy air defenses (SEAD/DEAD). OCA missions are not confined to air-to-air combat, and encompass all missions undertaken to disable airfields, aircraft, or their supporting systems. Specific fighter missions may include:
Fighter Sweeps are missions conducted with the intent to engage enemy aircraft ahead of a strike package and should attempt to stimulate enemy interceptors to engage in aerial combat. This may be desired to attrite enemy forces or divert them away from another attack by friendly forces. Fighters conducting these missions should exercise looser commit criteria, and exploit their ability to maneuver freely without friendly forces in close proximity.
When fighter sweeps are utilized in conjunction with other fighters as part of a package, the fighters should position themselves well ahead of the package by either physically displacing themselves in distance or by time. Utilizing distance, fighters should be 2-3 multiples of their briefed shoot range per the expected threat. If utilizing time, fighters should arrive with enough time to conduct 2-3 complete BVR engagements before strikers arrive at their initial point or launch point for stand-off weapons. The time required to accomplish 1 BVR engagement can be summarized in the following formula:
(CRNLT - MAR) / (VC/60) = Time in minutes
The above formula will approximate the amount of time required to close the distance from the commit to the minimum abort range, and can be utilized to approximate the time required for fighters to detect, target, and employ on a group and remain outside of the expected threat Weapons Employment Zone (WEZ). It is important to note that this is only an approximation of an ideal timeline, and not always reflective of the inconsistencies that can arise due to poor detection, PID or ROE requirements, or poor sorting by fighters.
The total number of hostile aircraft expected will impact the amount of required fighters utilized in the sweep. If a 100% Probability of Kill (Pk) is desired from the fighter sweep, planners should expect each hostile aircraft to require 2-3 Fox 3 missiles, when utilizing Launch and Leave (LL) tactics, and expect to bring the required number of munitions to destroy or suppress the expected number of hostile aircraft.
For example: an airfield is known to house 4 fighters ready to scramble, and is known to keep 2 aircraft in a CAP that defends an area that strike aircraft will need to penetrate. The total number of expected hostile aircraft is 6 total, and a 100% Pk is desired, this will require 12-18 Fox 3 in order for a fighter sweep to have enough munitions to destroy or suppress the expected threat.
An escort mission should notionally remain approximately 1 BVR timeline ahead of its defended asset, or far enough to deny adversaries a WEZ on the asset(s).
An escort mission should exercise tighter commit criteria, and be wary of being dragged from their defended asset in order to remain mission effective.
Close Escort missions are a subset of fighter escort with much more restrictive commit criteria, and tighter spacing to their defended asset. Notionally, a close escort will have visual contact with their asset, along with means to defend from in-close or pop-up threats.