A Missile Engagement Zone (MEZ) is an approximated engagement envelope for a specific surface to air missile (SAM) system. It can be defined in a simple 2-dimensional configuration, or as a complete 3-dimensional definition as required.
A 2D MEZ is the flat circle shown on most planning maps — the maximum horizontal range of the system. This is a planning convenience, not reality. The actual 3D MEZ is a volume whose shape varies significantly by system type. Short-range systems (SA-8, SA-15) produce roughly hemispherical envelopes. Long-range systems (SA-10, SA-5) produce flattened, lobe-shaped envelopes — maximum range occurs at medium altitudes, with substantial dead zones at the floor (terrain clutter, minimum engagement altitude) and ceiling (missile energy limits). Older systems like the SA-2 have such a large low-altitude gap that the envelope is effectively a band starting well above the surface. In all cases, the envelope varies further with target speed and aspect angle — a crossing (beaming) target presents a harder shot than an inbound one.
An Integrated Air Defense System (IADS) is a networked architecture of sensors, command and control nodes, and weapons systems designed to detect, track, identify, and engage airborne threats in a coordinated manner. The defining characteristic of an IADS — as opposed to a collection of independent SAM batteries — is that its components share information and coordinate their actions through a command structure.
A functional IADS consists of three tiers:
Sensors — Ground-based Early Warning Radars (EWR) such as the 1L13 and 55G6 provide long-range detection and initial track data. These radars have large search volumes but do not provide fire-control-quality tracks. Long-range SAM systems (LORAD) also contribute to the sensor network, as their surveillance radars — such as the SA-10’s 64H6E Big Bird — are capable of providing comparable long-range detection. Airborne sensors — AEW&C platforms like the A-50 or E-2 Hawkeye — extend the detection umbrella beyond terrain-limited ground radar horizons and can provide look-down coverage that ground-based EWR cannot. The sensor tier’s role is to cue the rest of the network.
Command and Control — A command post (or multiple command posts) correlates tracks from all sensors, maintains a common recognized air picture, assigns targets to the optimal weapon system based on range, geometry, and weapon state, and coordinates the response. The command post is the brain of the IADS. Its destruction forces every connected node into autonomous operation. In DCS, command posts are simulated through IADS scripting frameworks — their presence and destruction are what enable or disable networked behaviors like EMCON discipline and HARM evasion.
Weapons — The IADS weapons tier includes both ground-based and airborne systems. SAM batteries employ their own acquisition and tracking radars to refine the track and guide missiles to the target. Airborne interceptors — fighters vectored by GCI or AEW&C — are also IADS weapons, tasked and coordinated through the same C2 structure. In an IADS, SAM batteries can remain silent — radars off, invisible on RWR — until the EWR network identifies a target within their engagement zone. This “emissions control” or EMCON behavior is what makes an IADS fundamentally more dangerous than standalone SAMs. The interplay between SAMs and interceptors compounds the problem for attackers: SEAD assets focused on ground threats become vulnerable to fighters, and vice versa.
The IADS Kill Chain: Detect → Identify → Track → Assign → Engage → Assess. SEAD aims to break this chain at any link. Destroy a sensor to prevent detection. Jam communications to sever C2. Kill the tracking radar to prevent engagement. Force a radar to shut down to break the track. Every broken link denies the kill.
In DCS, IADS behavior is implemented through scripting frameworks. These scripts simulate the networking, EMCON discipline, HARM evasion, point defense coordination, and autonomous fallback behavior described above. The specific behaviors vary by script and server configuration, but the general IADS principles apply universally.
Otherwise known as a Pre-Emptive Time-on-Target Shot, is a technique utilizing Anti-Radiation Missiles (ARMs) with a coordinated time-of-impact (TOI) that will create suppression or destruction effects on a given SAM system, that will coincide with friendly aircraft entering a hostile MEZ. Suppression occurs when the SAM detects an inbound ARM as a threat and shuts down its radar, not at the moment of impact. To maintain continuous suppression, a new HARM must be detected as a threat to the battery every 30–60 seconds.
The goal of a PET shot is to have suppression effects active on a SAM battery at the exact moment friendly aircraft become vulnerable to it. That moment is not when the strike pushes from its hold point. It is when the strike crosses the SAM phase line and enters the MEZ. Everything in the PET timing calculation works backward from that event.
For a repeatable ~50 nm HARM shot with approximately 2:10 of flight time, use the following profile: establish level flight at 18,000–20,000 ft at Mach 1, execute a smooth pull-up, and pickle as you pass through 45° nose-high (typically mid-20,000s ft). This loft profile provides the best combination of range and predictable TOF for PET timing.
Deviations from this profile change the result. Lower launch altitude or lower airspeed reduce the missile’s energy, which may cause it to fall short rather than arrive later. Longer range increases flight time. If you cannot fly the optimum profile, estimate conservatively and launch earlier. Note that some IADS implementations may calculate the CPA (Closest Point of Approach) to batteries in the path of HARM to estimate if it actually poses a threat or not. Always attempt to make valid shots.
Sustained suppression requires that the targeted battery detects a new inbound HARM as a threat before the previous suppression effect expires. The suppression effect begins at detection (when the SAM identifies the ARM and shuts down), not at impact. This means each HARM’s effective suppression contribution begins well before it arrives, and the launch cadence can be wider than an impact-interval model would suggest.
Plan HARM launches at 30–60 second intervals. The cadence is a risk decision: shorter intervals provide higher confidence that no gap in suppression occurs, at the cost of higher ordnance expenditure. Longer intervals conserve HARMs but accept more risk of a brief window where the battery is not detecting an inbound threat. CSG8 standard practice is to launch at approximately 60-second intervals, balancing ordnance conservation against reliable suppression.
| Suppression Duration | HARMs Required (30s cadence) | HARMs Required (60s cadence) | SEAD Assets (2× HARM each) |
|---|---|---|---|
| ~1 minute | 2 | 1 | 1 aircraft |
| 2 minutes | 4 | 2 | 1 element |
| 3 minutes | 6 | 3 | 1 element |
| 4+ minutes | 8+ | 4+ | 2+ elements or SEADCAP rotation |
SEADCAP is the technique similar to an A/A Combat Air Patrol, placing fighters with ARMs in an advantageous position to employ ARMs on briefed emitters in a specific area. These fighters can be expected to respond to any SNIPER request in a timely fashion.
SEADCAP orbits should be established outside known MEZ boundaries but within HARM launch range, typically 30–50 nm from the threat at 20,000–30,000 ft. A racetrack pattern with legs perpendicular to the threat axis keeps at least one aircraft in the element pointed toward the threat at all times. The high-altitude orbit maximizes HARM kinematic range and provides energy for loft shots.
SEADCAP is best suited for:
SEADCAP is not a substitute for PET shots when precise suppression timing is required. It is reactive by nature: the emitter must radiate before it can be targeted.
Sniper is a directive communication used to request a briefed emitter at a known location be targeted by ARMs in order to generate suppression effects. The following communication format should be used to request fires:
[Recipient C/S], [Requester's C/S], SNIPER [SAM Type], BULLSEYE X X X / Y Y
Since SNIPER targets are pre-briefed, the target can also be referenced by its briefed codename or location rather than SAM type and bullseye coordinates:
PLASMA 41, INFERNO 22, SA-2 ALEPPO
Full format example:
PLASMA 41, INFERNO 22, SNIPER SA-17, BULLSEYE 1 0 5 / 45
If the requester does not know the SEADCAP callsign, the call can be made as a blind broadcast on the common frequency using ANY PLAYER or simply omitting the recipient:
INFERNO 22, SNIPER SA-17, BULLSEYE 1 0 5 / 45
The recipient acknowledges with callsign and repeats the target. Upon employment, a MAGNUM call is made on the common frequency.
SLAPSHOT is a defensive communication used to request the launch of an ARM at a hostile emitter. An ARM launched under these parameters can be expected to utilize a pure pursuit to the emitter, with no trajectory shaping maneuvers to aid in the terminal phase. These conditions lead to low a low Probability of Kill (Pk), and can be expected to be decoyed by other emitters of the same type if the emitter that caused the launch becomes inactive.
Self-initiated PET shots can be utilized in self-escort to provide limited suppression effects during the ingress, and sometimes egress, phase of a strike. The major drawback for a striking element is the reduction in total payload carried for the intended strike target. Flight leads should