Escolar Documentos
Profissional Documentos
Cultura Documentos
10)
January 2011
Distribution Restriction: Distribution authorized to DOD and DOD contractors only to protect
information and technical data on current technology in areas of significant or potentially
significant military application or that related to specific military deficiencies of potential
adversaries. This determination was made on 21 August 2007. Other requests must be
referred to HQ USASMDC, ATTN: SMDC-FWD-D, Colorado Springs, CO 80910.
Destruction Notice: Destroy by any method that will prevent disclosure of contents for
reconstruction of the document.
Warning Notice: This document contains technical data whose export is restricted by the
Arms Export Control Act (22 USC 2751 et seq.) or Executive Order 12470. Violations of these
export laws are subject of severe criminal penalties.
Headquarters
Department of the Army
Washington, DC, 3 January 2011
Chapter 2
_____________________________________________________________________________________
DISTRIBUTION RESTRICTION: Distribution authorized to the DOD and DOD contractors only to protect
information and technical data on current technology in areas of significant or potentially significant military
application or that relates to specific military deficiencies of potential adversaries. This determination was made
on 21 August 2007. Other requests must be referred to HQ USASMDC, ATTN: SMDC-FWD-D, Colorado
Springs, CO 80910.
WARNING NOTICE: This document contains technical data whose export is restricted by the Arms Export
Control Act (22 USC 2751 et seq.) or Executive Order 12470. Violations of these export laws are subject to
severe criminal penalties.
DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents for reconstruction of
the document.
*This publication supersedes FM 3-27, 20 May 2010, and FM 3-27.10, 24 April 2008.
Contents
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Appendix A
THREAT............................................................................................................. A-1
Potential Rogue Missile Threats ........................................................................ A-1
Global Ballistic Missile Threats .......................................................................... A-1
Global Threat Enviroment .................................................................................. A-2
Summary of Strategic Threats ........................................................................... A-2
Trends ................................................................................................................ A-2
Global Threat Environment ................................................................................ A-3
Missiles .............................................................................................................. A-4
Space ................................................................................................................. A-7
Information Operations ...................................................................................... A-8
Physical Attack (Sabotage, Terrorism) .............................................................. A-8
Appendix B
FM 3-27
3 January 2011
Contents
GLOSSARY
............................................................................................................... Glossary-1
..................................................................................................................... Index-1
Figures
Figure 1-1. Ballistic Missile Phases and Ranges ................................................................... 1-4
Figure 1-2. GBMD organizational structure............................................................................ 1-7
Figure 2-1. COCOM AOR ...................................................................................................... 2-2
Figure 2-2. GBMD Command Relationships .......................................................................... 2-5
Figure 3-1. GBMD Systems ................................................................................................... 3-2
Figure 3-2. GMD System Actions After ICBM Launch Detection ........................................... 3-6
Figure 3-3. Missile Tracking ................................................................................................... 3-8
Figure 4-1. PCSS Infrastructure ............................................................................................. 4-5
Figure 4-2. Operational Reporting Summarized .................................................................... 4-7
Figure 5-1. GMD COMNET Architecture ................................................................................ 5-3
Figure 5-2. C2BMC Tri-Node Architecture ............................................................................. 5-5
Figure 6-1 Strongback with Crane at a Silo & Transport of GBI from Airfield. ....................... 6-5
Figure 6-2 Vandenberg AFB & FGA GSD. ............................................................................. 6-5
Figure 6-3. OBV & Payload .................................................................................................... 6-6
Figure 6-4. EKV ...................................................................................................................... 6-7
Figure 6-5. FGA Missile Field ................................................................................................. 6-7
Figure 6-6. 100th MD BDE (GMD) MDE ............................................................................... 6-10
Figure 6-7. 49th MD BN (GMD) FDC .................................................................................... 6-11
Figure 6-8. GMD Organizational Structure ........................................................................... 6-12
Figure 6-9. Organization of Crew Positions ......................................................................... 6-13
Figure 6-10. MDE Operations Modes and Functions ........................................................... 6-13
Figure 6-11. FDC Operations Modes and Function ............................................................. 6-14
Figure 6-12. AN/TPY-2 (FBM) Search Profile ...................................................................... 6-16
Figure 6-13. Notional AN/TPY-2 (FBM) Radar Site Security Operations ............................ 6-17
FM 3-27
iii
Contents
Tables
Table 3-1. Aspects of GBMD ................................................................................................. 3-3
Table 3-2. GMD Engagement Sequence ............................................................................... 3-6
Table 5-1. Tier I Nodes .......................................................................................................... 5-7
Table 5-2. Tier II Nodes ......................................................................................................... 5-8
FM 3-27
3 January 2011
Summary of Changes
1. Purpose: To summarize the revisions made to this Field Manual, Army Global Ballistic Missile Defense
Operations, published 20 May 2010.
2. The purpose of FM 3-27 is to describe the Armys mission and roles in Global Ballistic Missile Defense
(GBMD) of the United States homeland, deployed forces, friends and allies from ballistic missile attack. It also
establishes the doctrinal framework for Army GBMD operations in the Joint community.
3. TRADOC Commander directed the information found in FM 3-27.10, Army Ground-based Midcourse
Defense Operation to be incorporated into FM 3-27 without duplication of information. All incorporated
information was copied verbatim from FM 3-27.10 to this document. When approved, this document will
supersede FM 3-27.10.
a.
Executive Summary
Current: Document lacks Executive Summary.
Change: Adds Executive Summary with changes from original document.
b.
c.
Chapter 1: Army Global Ballistic Missile Defense. Chapter defines GBMD doctrine as it relates to the
Army role, mission, responsibilities and relationships.
Current: The chapter highlights to ballistic missile defense systems in general.
Change: Adds text to clarify the Army organizations involved in GBMD and the GMD mission.
Adds explanation of BMDS engagement phases for ICBM flight path.
d.
Chapter 2: Command and Control. Chapter discusses C2 for GBMD organizations and Army units
involved in countering the global missile threat
Current: Chapter did not contain information about C2BMC or AN/TPY-2 (FBM).
Change: Adds a section for each of C2BMC and AN/TPY-2 (FBM).
e.
Chapter 3: Operations. Chapter discusses operations and considerations Army GBMD units must
apply for planning and execution of their mission.
Current: Lacks a discussion of operational procedures for GMD.
Change: Adds GMD warfighting principals, force protection requirements, and day-today ops.
f.
g.
h.
Appendix C: GMD Operations. Appendix gives an in-depth view of operations and considerations
GMD units must apply to the conduct of their mission planning and execution.
Current: Lacks in-depth view of operations and considerations for GMD units.
Change: Adds in-depth view of operations and considerations for GMD units.
i.
Glossary and Index have been updated to reflect changes made to this document.
FM 3-27
Preface
Field Manual (FM) 3-27 Army Global Ballistic Missile Defense (GBMD) Operations is a proponent-level
manual. It is the principle publication for describing the Armys role and mission in GBMD of the United
States (US) homeland, deployed forces, friends, and allies from ballistic missile attack. Although the focus is
Army GBMD, all aspects of this FM are consistent with the Joint Publication (JP) 3-01, Countering Air and
Missile Threats and United States Strategic Command (USSTRATCOM) Global Ballistic Missile Defense
Concept of Operations. This FM also establishes the doctrinal framework for Army GBMD Operations in the
Joint community.
GBMD is any defensive measure designed to destroy, nullify, or reduce the effectiveness of an adversary
ballistic missile attacks. Threats may or may not cross Combatant Commanders area of responsibility (AOR)
and may require coordination or integration among the affected combatant commands.
To achieve the Armys objective of becoming a strategically responsive quality force, dominant across the
spectrum of conflict and fully integrated within the unified action environment security framework, the US
must be able to fully integrate GBMD. US Army Strategic missile defense forces contribute to this effort by
employing sensor and shooter capabilities as part of the USSTRATCOM GBMD mission.
The Operational Army and strategic planners will use this manual as guiding principles for the successful
execution of this missile defense mission. In addition, other Services and Joint organizations can use this
manual for doctrinal applications of Army GBMD operations. Army trainers will use this manual for the
curriculum in Army institutional training and leader development. This FM provides doctrinal guidance on
Ground-based Midcourse Defense (GMD) system operations to the Army, the 100th Missile Defense Brigade
(100th MD BDE (GMD)) and 49th Missile Defense Battalion (49th MD BN (GMD)) as well as how the
AN/TPY-2 Forward Based Mode (FBM) radar that supports the Army's GBMD operations.
GMD is the only system for strategic missile defense of the US homeland, which is currently protected against
the threat of limited intercontinental ballistic missiles (ICBM) attack, as a result of investments made over the
past decade. GMD relies on Ground-Based Interceptors (GBI) at two sites: Fort Greely, Alaska (FGA) and
Vandenberg Air Force Base (AFB), California. It is an element of the Ballistic Missile Defense System
(BMDS) and functions under the Armys GBMD concept for defending the US homeland from ballistic missile
attack. This fundamental framework guides the Army participation in GBMD and GMD system operations.
The AN/TPY-2 (FBM) is a forward-based, phased-array, X-band radar used to support BMDS by providing
combatant command (COCOM) early warning of ballistic missile launches. It is designed to transmit boost and
early midcourse radar track data for both regional and strategic missile defense systems. AN/TPY-2 (FBM)
radars are forward deployed to providing early warning for homeland defense (HLD) as well as regional
defense for COCOMs AOR.
This manual applies to the Active Army, the Army National Guard (ARNG)/Army National Guard of the
United States (ARNGUS), and the United States Army Reserves (USAR) unless otherwise stated. This
publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimers
Training and Doctrine Digital Library (http://www.train.army.mil).
The proponent of this manual is the US Army Space and Missile Defense Command/US Army Strategic
Command (USASMDC/ARSTRAT). Send written comments and recommendations on Department of Army
DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to Commander, HQ
USASMDC/ARSTRAT ATTN: USASMDC-FWT-D, P.O. Box 1500, Huntsville, AL 35807-3801 (e-mail:
fdiccd@smdc.army.mil).
FM 3-27
3 January 2011
Chapter 1
GBMD
1-1. USSTRATCOM defines GBMD as defensive measures designed to destroy, nullify, or reduce the
effectiveness of adversary ballistic missile attacks that cross COCOM AOR boundaries. These cross
boundary threats require coordination or integration among the affected COCOMs.
1-2. GBMD is a USSTRATCOM mission to coordinate the employment of GBMD and strike forces to
defeat limited ballistic missile attacks in all phases of flight or prior to their launch, and defend US,
deployed forces, friends, and allies. This document only discusses Army GBMD systems. To accomplish
this mission USSTRATCOM integrates and synchronizes a wide range of sensors, shooters, and command
and control (C2) elements. This includes, GMD, Terminal High Altitude Area Defense (THAAD), Aegis
(BMD), and sensors - Upgraded Early Warning Radars (UEWR), COBRA Dane radar, Sea-Based X-band
(SBX) radar, and AN/TPY-2 (FBM) radars and Command and Control, Battle Management, and
Communications (C2BMC) systems.
1-3. The Unified Command Plan 2008 (UCP 08) tasks each COCOM with "Deterring attacks against the
US, its territories, possessions and bases, and employing appropriate force should deterrence fail." All
combatant commands (and their subordinate commands as applicable) coordinate their GBMD planning
and support with CDRUSSTRATCOM Joint Functional Component Command for Integrated Missile
Defense (JFCC-IMD) (See JP 3-01).
1-4. The proliferation of Weapons of Mass Destruction (WMD) and missile technology requires a
GBMD capability for defense of the homeland and overseas AORs. However, as the range of threat
missiles increases, so does the potential for cross AOR impacts. Thus, the links from sensors to decision
makers to shooters must occur rapidly and reliably, often across traditional geographic and AOR
boundaries.
FM 3-27
1-1
Chapter 1
support of assigned USSTRATCOM missions; USASMDC/ARSTRAT serves as the proponent for Space,
GMD and High Altitude missions and is the Armys integrator for global missile defense (Army
Regulation (AR) 10-87 & General Order 37).
1-7. GMD An Army System for strategic missile defense of the US homeland. The Army is the lead
Service for GMD systems and the AN/TPY-2 (FBM) radar. GMD is an element of the BMDS. It functions
under the USSTRATCOM GBMD concept for defending the US, its forces, and its allies from ballistic
missile attack.
1-8. TBM - Theater BMD encompasses all activities focused on the identification, integration, and
employment of forces supported by theater or operations and national capabilities to detect, identify, locate,
track, discriminate, minimize the effects of, and destroy enemy theater missiles. Theater ballistic missiles
(TBM) constitute the primary threat countered by Army Air Defense Artillery (ADA) forces. TBMs are
missiles with a range from 80 km to 3,000 km.
FM 3-27
3 January 2011
capabilities synchronized with offensive actions to deter and defeat the increasingly prolific global missile
threat.
1-16. The Armys approach to missile defense includes four operational elements: active defense, passive
defense, attack operations, command control and intelligence. The Army component also provides an
Army Air and Missile Defense Command (AAMDC) that integrates the operational elements to
synchronize Army contributions to Joint counter air operations.
Active Defense. The role of active defense operations is to protect the homeland and our
deployed forces, friends, and allies from missile attacks by destroying ballistic missiles in flight.
Active defense must consist of defense in depth against all ranges of ballistic missiles. When
destruction of the missile prior to launch is not possible or unsuccessful, missiles will be
engaged by all available weapon systems throughout their entire flight profile.
Passive Defense. The principal measures used to accomplish passive missile defense includes
early warning, reducing targeting effectiveness, reducing vulnerability, hardening and protecting
assets and individuals, and recovery/reconstitution. An example is chemical biological,
radiological, nuclear, and high-yield explosives (CBRNE) defense operations with these three
objectives: minimize casualties, preserve operating tempo and restore combat power.
Command Control and Intelligence. Commanders perform decision making functions through
an arrangement of personnel, equipment, communications, facilities, and procedures employed
by a commander in planning, directing, coordinating, executing, and controlling forces in their
AOR.
Attack Operations. Offensive operations intended to destroy and disrupt enemy ballistic
missile capabilities before, during and after launch. The objective of these operations is to
prevent the launch of BMs by attacking each element of the overall system, including such
actions as destroying launch platforms, reconnaissance, surveillance, and target acquisition
(RSTA) platforms, C2 nodes, missile stocks, and infrastructure.
1-17. Commanders use several integrating processes and continuing activities to BMD operations within
the GBMD plan. Besides the military decision-making process (MDMP), Composite Risk Management
(CRM) should be used during planning. Overall operations must be synchronized with each other as well
as integrated. CRM is the Armys primary decision-making process for identifying hazards and controlling
risks across the full spectrum of Army missions, functions, operations, and activities. CRM is a decisionmaking process used to mitigate risks associated with all hazards that have the potential to injure or kill
personnel, damage or destroy equipment, or otherwise impact mission effectiveness.
FM 3-27
1-3
Chapter 1
1-20. The Army's keystone system of BMDS is GMD. The GMD element of BMDS engages long range
threats in the midcourse engagement area using data from the suite of BMDS and external sensors. GMD is
contributing to the development of advanced BMDS capabilities with increased data sharing across the
system to more effectively manage BMDS assets and prepare the BMDS to engage missile threats. The
technological capability of the system, the mission, and the area to which forces are committed are guiding
Army GBMD employment plans and operations as BMDS capabilities evolve in an incremental
development process.
1-21. The AN/TPY-2 (FBM) radar detachments are usually forward deployed in relatively static locations
outside the continental US (OCONUS). Particular locations are dependent upon mission, enemy, terrain
and weather, troops and support available, time available, civil considerations (METT-TC) resulting in the
integral sensor management section to be integrated into the C2BMC.
FM 3-27
3 January 2011
FM 3-27
1-5
Chapter 1
desirable of the phases because there is little margin for error and the intercept will occur close to the
intended target. Terminal phase interceptor elements include the Armys Phased-Array Tracking Radar
Intercept On Target (PATRIOT) Advanced Capability-3 (PAC-3) now deployed worldwide and the
THAAD system. These mobile systems defend against SRBM to MRBM range ballistic missiles. THAAD
provides wide area defense while PATRIOT is most effective in protecting point targets such as troop
concentrations, ports, airfields, and staging areas.
GMD MISSION
1-31. The GMD mission is to defend the US and designated areas against IRBM and ICBM attacks in the
Midcourse phase of flight as part of the BMDS and to conduct concurrent operational and test activities.
Tasks include:
Provide trained and certified crews, installation support, and personnel protection.
FM 3-27
3 January 2011
1-37. Although the threat has changed, the defense of the US homeland has always been the primary
concern of the nation, DOD, and the Army. Doctrinally, little has changed despite treaty interpretations,
funding levels, evolving threat evaluations, and the changing focus of research and political debate. While
defense of the US homeland from ballistic missile attacks shifted from conventional anti-ballistic missile
(ABM) and nuclear-based deterrence technologies to BMDS, Air and Missile Defense (AMD) efforts, and
limited-strike shields, the essential task and approach are the same. Currently, the Army is fulfilling its
traditional role of defending the US homeland by operating the Army elements of the BMDS.
GBMD ORGANIZATIONS
1-38. Many organizations have a role in GBMD within a COCOM, subordinate COCOM, or JTF. Missile
defense is inherently a Joint operation. GBMD operations are multi-command, multi-regional, and
conducted according to Joint doctrine. See figure 1-2 GBMD organizational structure.
ARFOR specified for high altitude, GMD, and integrated air and missile defense (IAMD).
FM 3-27
1-7
Chapter 1
JFCC - SPACE
1-45. JFCC-SPACE optimizes planning, execution, and force management, as directed by the commander
of USSTRATCOM, of the assigned missions of coordinating, planning, and conducting space operations.
JFCC-SPACE provides BMDS with ballistic missile early warning and communications capability.
1-46. The mission for JFCC-SPACE is to continuously coordinate, plan, integrate, synchronize, and
execute space operations to provide tailored, responsive space effects in support of national objectives and
CCDRs. Commander JFCC-SPACE will ensure Integrated Tactical Warning and Attack Assessment
(ITW/AA) and Joint Tactical Ground Station (JTAGS) systems generate and report precise, timely and
engagement quality information on ballistic missiles and nuclear detonations.
FM 3-27
3 January 2011
FM 3-27
1-9
Chapter 1
1-54. USASMDC Commander also has Army missile defense responsibilities in accordance with (IAW)
AR 10-87. USASMDC/ARSTRAT is an operational level Army force, designated by the SECARMY,
serving as the assigned ASCC to provide planning, integration, coordination, and control of ARFOR and
capabilities in support of the USSTRATCOM requirements. These USASMDC/ARSTRAT functions are:
Conducts research and development for and provides acquisition support to USSTRATCOM or
other CCDRs. Serves as the Joint user representative, centralized manager, and integrator for the
GMD System and executes horizontal integration across all IAMD systems.
Advocate for AMD funding and requirements; provides input to Army AMD doctrine, policies,
and procedures; identifies AMD capabilities, capability gaps, and concepts; coordinates future
groundbased air defense requirements issues and programs with CCDR and Joint staff; reviews
AMD initial capabilities document and Joint capabilities documentation in support of future
requirements.
The Army's integrator for GBMD systems and the senior mission commander for GMD systems.
The Armys implementing agent for the Strategic Arms Reduction Treaty.
The Armys lead organization for coordination and support to the MDA.
FM 3-27
3 January 2011
1-60. The 100th MD BDE (GMD) Commander is dual hatted and serves in both a Title 10 United States
Code (USC) and Title 32 USC capacity to effectively C2 multi-component Soldiers. The 100th MD BDE
(GMD) provides both ARNG and regular Army Soldiers to operate the Missile Defense Element (MDE) at
Schriever AFB, one of the two GFC nodes. The MDE operates continuously, utilizing a five-crew rotation
schedule with 5 unique positions per crew. The 100th MD BDE (GMD) also provides C2 for an 49th MD
BN (GMD) and is comprised of ARNG active Army Soldiers.
1-61. The mission of the 49th MD BN (GMD) is two-fold. First, the 49th MD BN (GMD) secures the FGA
Missile Defense Complex (MDC) and second, they provide Soldiers and operate the Fire Direction Center
(FDC), a second GFC node located at FGA to dissuade, deter, and destroy ICBM attacks in the midcourse
phase of flight. The 49th MD BN (GMD) is comprised of only ARNG Soldiers. The FDC operates
continuously, utilizing the same five-crew rotation schedule with 5 unique positions per crew as does the
MDE.
1-62. The mission of the 100th MD BDE (GMD) Detachment 1 is to provide continuous monitoring of the
Ground Safing Device (GSD) and Command and Launch Equipment (CLE) located at Vandenberg AFB,
California in order to ensure the GBIs at that location are mission ready.
FM 3-27
1-11
Chapter 2
COMBATANT COMMANDS
2-6. Combatant commands are Joint military commands composed of forces from two or more services,
has a broad and continuing mission, and is organized either on a geographical basis or on a functional
basis. All COCOMs are commanded by either a four-star general or admiral and are considered "Joint"
commands with specific badges denoting their affiliation.
2-7. As directed, combatant commands are supporting commanders to CDRUSNORTHCOM for missile
defense of the contiguous 48 states, Alaska, and Hawaii. For example, Commander, US Pacific Command
FM 3-27
2-1
Chapter 2
GBMD C2 SYSTEMS
2-9. Organizations with a role in GBMD utilize a wide range of BMD battle management systems. These
systems enable C2 to mitigate complexities associated with cross COCOM GBMD operations. For GBMD
purposes, these C2 systems are C2BMC and GFC.
2-10. Command authority, USNORTHCOM, and COCOMs primarily use the C2BMC system as a BMD
battle management decision aide. However, in executing GBMD, the Army utilizes the C2BMC for C2 of
the AN/TPY-2 (FBM) radar and GFC for the C2 of GMD. Because of the global threat, execution of this
strategy will require close coordination with THAAD units. THAAD will come under the COCOM C2
structure when it is executing the strategic GBMD mission for defense of the homeland.
GFC
2-11. The GFC system is a suite of hardware, software, consoles, communications equipment, and trained
personnel integrating the GMD system and other supporting elements to manage all phases of engagement.
The GFC controls the GMD which is the first operational hit-to-kill and only operationally deployed
missile defense program to defend the homeland against long-range ballistic missile attacks. The system
provides early detection and tracking during the boost phase, midcourse target discrimination, precision
FM 3-27
3 January 2011
intercept and destruction of inbound ICBMs through the use of hit-to-kill technology. GFC uses multiple
sensors, communications systems, and GBIs with EKVs that are capable of detecting, tracking, and
destroying IRBMs and ICBMs during the midcourse phase of flight.
2-12. The GFC is the brains of the GMD system. GFC combines a variety of sensors/radars, which include
DSP/SBIRS, COBRA Dane radar, UEWR, SBX radar, AN/TPY-2 (FBM), and Aegis BMDS. The GFC
processes the sensors/radars information on target search, acquisition, track, classification, hit assessment,
and in-flight interceptor data communications support to develop an Integrated Task Plan (ITP) for every
GBI launched. This information provides the GBI with the ability to locate, discriminate, and destroy the
incoming RV.
2-13. GFC nodes receive and pass data from sensors supporting GBMD. They also provide automated C2
information and permit human-in-control (HIC) management of the GMD operations. The GFC
Engagement Planner (EP) is the software resource that synthesizes all the sensor data, develops the
Weapons Task Plan (WTP) for the GBI and provides information to the operators. The GFC crews then
analyze the information provided by the GFC to determine if the Commanders Intent for engagement has
been met.
2-14. The GFC provides instructions and launch direction to GBIs with EKVs that uses kinetic energy
from a direct hit on the incoming RV to destroy it. The EKV is a sensor-propulsion package that collides
with the target at a closing speed of approximately 15,000 miles per hour.
C2BMC
2-15. C2BMC supports GBMD planning, SA and C2. The C2BMC provides GBMD users with
capabilities to plan and maintain SA to commanders, staff and shooters. It provides missile defense forces
at both the strategic and tactical levels of command the capability to plan the GBMD fight, while
concurrently tracking all potential ballistic missile threats. C2BMC specific capabilities include missile
shooter/sensor planning coverage, overall planning assessment, SA, and sensor management. The C2BMC
system provides data, decision, and communication linkage between BMDS elements. Actual C2BMC
hardware at a given COCOM location will vary by function and data requirements.
2-16. C2BMC serves as the integrator for BMDS elements and components into a global network of
integrated sensors, weapons, and fire control systems. Currently there are C2BMC Suites located in
USPACOM, USEUCOM, USSTRATCOM, and USNORTHCOM. The USNORTHCOM C2BMC suite
supports the USSTRATCOM JFCC-IMD located at the Missile Defense Integration and Operations Center
(MDIOC) at Schriever AFB, Colorado.
2-17. C2BMC is part of the BMDS Communications Network (BCN), which is integrated with numerous
sensor and shooter communications systems and associated message formats, protocols, and computer
security information assurance measures. The C2BMC controls the sensor management and track
processing for the AN/TPY-2 (FBM) radar via the C2BMC Integrated Battle Management Picture (IBMP)
software segment.
2-18. The AN/TPY-2 (FBM) radar interfaces with the C2BMC network through the C2BMC Network
Interface Processor (CNIP). C2BMC forwards select track messages to Aegis BMD assets over Ultra-High
Frequency (UHF) Satellite Tactical Automated Data Information Link-Joint (TADIL-J) (STJ) and
Extremely High Frequency (EHF) Multicast TADIL-J (MTJ) networks and Air Defense System Integrator
(ADSI), C2BMC also forwards track messages to the GMD system. This information is used to cue other
systems supporting the missile defense operations and improves the overall SA of commanders at all
levels. The Link-16 TADIL-J network also enables the precision cueing of the AN/TPY-2 (FBM) radar by
directing messages from Aegis BMD through the C2BMC suite that controls the AN/TPY-2 (FBM) radar.
2-19. C2BMC program facilitates a layered defense by networking and unifying the individual elements
that make up the BMDS. The C2BMC IBMP provides the foundation for detailed IMD data and graphical
information available in a variety of tables and reports for operational forces SA. The C2BMC IBMP also
allows sensor managers to select radar states, define search parameters, override tracking priorities, control
FM 3-27
2-3
Chapter 2
track forwarding, define discrimination confidence, and enable wide-band discrimination and coordination
with C2 levels and operators and maintainers.
2-20. The Distributed Multi-Echelon Training System (DMETS) Control Center (DCC) is located at
Schriever AFB and supports both GMD and non-GMD training, evaluations and exercises. The DMETS
servers provide the GFC with medium fidelity emulation of ballistic missile threats and GMD subsystem (e.g.
DSP/SBIRS, UEWRs, AEGIS, AN/TPY-2 (FBM), etc.) responses without interference to real world
operations. In addition to GFC, DMETS has a wide variety and large number of GMD and non-GMD
customers across all echelons of commands. Its use must be scheduled in advance in order to deconflict
competing requirements.
COMMAND RELATIONSHIPS
2-21. Command relationships are the interrelated responsibilities between commanders, as well as the
operational authority exercised by commanders in the chain of command; defined further as COCOM
(command authority), OPCON, tactical control, or support.
2-22. Traditionally, command relationships are established through operation plans (OPLANS), concept
plans (CONPLAN), crisis planning, or execution orders based on real threats. Increasing range and other
technological advances in ballistic missiles may necessitate missile defense forces in one AOR to provide
direct support to an adjacent CCDR. The supported commander's requirements establish the overarching
framework used by supporting commanders in their respective supporting plans. The supported
Commanders CONPLAN establishes the overarching framework used by AOR CCDRs to develop
supporting plans and to support regional missile defense plans.
2-23. Together USSTRATCOM and JFCC-IMD provide recommendations to the Joint Staff/SECDEF to
balance HLD requirements with the missile defense needs of other COCOMs. Supported by the Services,
USSTRATCOM has the unique position of integrating missile defense requirements and Service
capabilities across multiple AORs and linking GBMD planning with decentralized execution.
2-24. At the strategic level, the collaborative missile defense planning process synchronizes each CCDR
missile defense plans with the GBMD plans of adjacent CCDRs. At the operational level, the Joint
Staff/SECDEF establishes CCDR relationships into supported and supporting roles. Thus, balancing other
AOR priorities for defended assets with global missile allocation IAW priorities set forth for HLD.
2-25. The supported CCDR issues commanders guidance for the missile defense mission. The Army
component provides forces to CCDRs to execute the missile defense mission.
2-26. The SECDEF will assign or attach forces to respective COCOMs as required for GBMD operations.
THAAD, GMD, and AN/TPY-2 (FBM) sensors comprise the Armys role in GBMD. During GBMD
operations, the SECDEF has directed the 100th MD BDE (GMD) and 49th MD BN (GMD) assigned to
USSTRATCOM will be OPCON to USNORTHCOM for operational execution. THAAD and AN/TPY-2
(FBM) radars are under the OPCON of the appropriate COCOM.
FM 3-27
3 January 2011
2-27. USNORTHCOM is the supported COCOM for HLD and directs engagement operations when the
threat is to the US, its territories and its possessions require an active defense. USNORTHCOM is the
supporting COCOM for GBMD threats to other COCOMs. See figure 2-2 for command relationships.
GMD FORCES
2-28. The GMD Title 10 USC Operational Elements (OE) for the 100th MD BDE (GMD) and 49th MD BN
(GMD) are the subordinate MDE and FDC units. METT-TC is the basis for delegation of OPCON to other
CCDRs.
2-29. The GMD units are assigned to USSTRATCOM. The 49th MD BN (GMD) is subordinate to the
100th MD BDE (GMD). The 100th MD BDE (GMD) belongs to the Colorado NG, but has a Detachment in
the California NG. The 49th MD BN (GMD) belongs to the Alaska NG. The 100th MD BDE (GMD)
Commander is dual-hatted Title 10 USC and Title USC 32 who commands the associated State NG units.
NG Soldiers transition between Title 10 and 32 statuses IAW the approved SECARMY staffing model.
FM 3-27
2-5
Chapter 2
The OEs are separate and distinct Title 10 USC Federal units with a clear Title 10 USC chain of command.
State Adjutants General retain authority over the NG units and Soldiers only when in a Title 32 status. The
State Adjutant Generals have no command authority over the Title 10 USC GMD Soldiers of the 100th MD
BDE (GMD) or 49th MD BN (GMD).
AN/TPY-2 (FBM)
2-30. USASMDC/ARSTRAT is the responsible organization for deploying and managing the AN/TPY-2
(FBM) radar detachment as an Army organization. Effective 1 Oct 10, the detachments appears on the
Table of Organization and Equipment (TOE) for the 100th MD BDE (GMD), which allows for greater
operational flexibility. The detachment has three primary AORs: radar site operations; radar management
operations; and radar site security. As a forward deployed element of the global BMDS, all command,
control, and support relationships are established IAW Joint and Army doctrine.
2-31. In a regional defense situation, it is likely the AN/TPY-2 (FBM) radar will be OPCON to the
COCOM. As a supporting commander, a COCOM will support the Commander, USNORTHCOM, in the
conduct of the homeland defense mission. There are situations where a COCOM may simultaneously be
the supported commander. The COCOM may use the AN/TPY-2 (FBM) radar to concurrently support both
strategic and regional missile defense operations. Before deployment of the AN/TPY-2 (FBM) radar into a
theater of operations, the reporting chain will be established to deconflict lines of authority for the sensor
managers during concurrent strategic and regional crisis operations.
2-32. COCOMs will coordinate/synchronize plans and actions with other COCOMs under the direction of
USSTRATCOM who has worldwide synchronizing responsibility. The local COCOM that has OPCON of
the AN/TPY-2 (FBM) radar will civil support operations with the radar system as much as possible, based
on mission requirements.
FM 3-27
3 January 2011
Chapter 3
Operations
This chapter presents an overview of operations and considerations that Army
GBMD units must apply for the planning and execution of their mission. This chapter
describes the global context within which Army GBMD units perform their mission
incorporating elements of the BMDS, and it describes the security of Army GBMD
sites.
OPERATIONS
The new strategic challenges of the 21st Century require us to think differently, but they
also require us to act. The deployment of effective missile defenses is an essential
element of the United States broader efforts to transform our defense and deterrence
policies and capabilities to meet the new threats we face. Defending the American people
against these new threats is my highest priority as Commander in Chief, and the highest
priority of my administration.
President George W. Bush
National Security Presidential Directive (NSPD) 23
3-1. The Operational Environment for the Global BMD consists of simultaneously defeating missile
threats to all COCOM AORs, in support of COCOM operations. During GBMD operations, the threat may
include SRBMs, Medium Range Ballistic Missiles (MRBM), IRBMs, and ICBMs. All of these missiles
have the potential to carry either conventional or WMD RVs and can cross multiple AORs. The number of
threats can range from potentially hundreds of SRBMs to dozens of ICBMs. Major combat operations
adversaries will likely employ these threats in waves, and in combination with other offensive forces
against any or all of our defended assets.
3-2. HLD is the protection of US sovereignty, territory, domestic population, and critical defense
infrastructure against external threats and aggression, or other threats as directed by the President. DOD is
responsible for the HLD mission, and therefore, leads the HLD response, with other departments and
agencies in support of DOD efforts. In todays complex threat environment, our approach to HLD must
address all aspects of the operational environment.
3-3. Externally, the US seeks to shape the international environment through the application of
diplomatic, economic, military, and informational means. Confronting the homeland is a variety of
interrelated threats that demand coordinated procedures and synchronized efforts among US Government
departments and agencies charged with law enforcement and national defense.
3-4. These threats include any transnational activity including international terrorism, the proliferation of
weapons, to include WMD, and the delivery systems for such weapons that threaten the national security of
the US.
FM 3-27
3-1
Chapter 3
3-5. The friendly forces organization will include layered defenses employed in a manner intended to
give prioritized defense capabilities to a given list of assets. This layered defense will include the ability for
defense forces to engage and destroy the threat in the boost, midcourse, and terminal phase of flight. The
defensive capability will be a distributed system of systems, including sensors, shooters, C2, and
communications. In the aggregate, these systems form the elements of the BMDS. GBMD involves
multiple sensors, and shooters at every echelon of command, see figure 3-1.
GLOBAL OPERATIONS
3-6. CDRUSSTRATCOM is responsible for synchronizing planning for GBMD. CDRUSSTRATCOM is
a supporting commander to CDRUSNORTHCOM for BMD execution in defense of the homeland.
3-7. In preparation for global deployment of strategic missile defense forces in the homeland or into an
AOR for forward based GBMD forces, the Army will participate in Joint collaborative planning. This is
done IAW the COCOM priorities and Defended Asset List (DAL), development of the theater area air
defense plan, finalization of Rules Of Engagement (ROE) and engagement criteria, refinement of existing
HLD plans, determination of cross COCOM engagement coordination, and force allocation. Distribution of
approved plans across the Joint network to all affected missile defense forces is critical so engagement
operations can commence as soon as possible. Multinational missile defense forces are included in all
phases of the MDMP and training of multinational missile defense forces across multiple security levels
must be considered.
FM 3-27
3 January 2011
Operations
3-8. Missile defense planning, intelligence support, Intelligence Preparation of the Operational
Environment, and airspace management are four areas critical to successful employment of GBMD.
Planning is a continuous process that includes defining the operational environment, describing the effects
of the operational environment, evaluating the adversary, and determining and describing adversary
potential courses of action. Army FMs and JPs on these subjects provide important guidance toward
successfully supporting GBMD planning. However, whether planning for strategic level missile defense or
theater missile defense, the tenets for GBMD apply. See table 3-1 for the aspects of GBMD.
Table 3-1. Aspects of GBMD
1
2
3
4
5
6
7
8
9
10
The growing threat defines the missionthe threat from adversaries across all
ranges of ballistic missiles is increasing for the US and Allies across the globe.
GBMD is greatly enabled by persistent and reliable indications and warnings.
GBMD addresses all ranges of missiles in all phases of flight and can best be
optimized by using networked C2 and integrated sensors; layered defenses
complicates enemy offensive actions.
GBMD acquisition provides interoperability on delivery, is an active partnership with
the Services and missile defense forces, and can take years to optimize for missile
defense fight occurring in minutes/seconds.
GBMD forces are low-density/high-demand, expensive, unique and global in nature.
GBMD assets are frequently located in the US homeland or in friendly countries
environments.
GBMD assets are managed remotely and over global distances and are highly
interdependent for both homeland and regional defenses.
GBMD planning is 90% of the fight.
GBMD is a four dimensional fight that cross multiple regions and AORs. Three
dimensions are commonly called length, width, and depth (or height), and the fourth
dimension is space/time.
GBMD is both Joint and Combined warfare; one nation's "region" is another nation's
homeland. Interagency coordination is a unique aspect to homeland GBMD.
3-9. Properly employed GBMD forces allow a nation the freedom of action to deliver forces and materiel
to the required points of application across the operational themes from peacetime military engagement to
major combat operations to successfully conduct those operations. Because of their complexity, the short
reaction times presented by the threat, the large number of forces, and size of the geographic areas
involved, Joint GBMD must be a centrally planned and decentralized executed, but closely coordinated
operation. JFCC-IMD plays a key role in synchronizing GBMD planning support to missile defense
operations.
FM 3-27
3-3
Chapter 3
3-11. The GBMD only addresses ballistic missile and includes active defense, passive defense, and C2
functions. Army organizations contribute directly to theater and GBMD. These organizations and systems
include GMD, AN/TPY-2 (FBM), and THAAD at the global level and PATRIOT, Joint Land Attack
Cruise Missile Defense Elevated Netted Sensor System (JLENS), AN/TPY-2 (FBM), and THAAD at the
theater level.
Unity of effort Coordination and cooperation between nations and military forces for a
commonly recognized objective grow in importance with BMD/GMD forces. Unity of effort over
complex operations is possible through decentralized execution of a centralized, deliberately
derived CONPLAN/OPLANS. Consider Joint and multinational relationships when addressing
the need for near-real time response to the threat. In multinational operations in which unity of
command may not always be possible, unity of effort becomes paramount. Unity of effort through
cooperation and common interests is an essential component to multinational command.
Centralized planning Unity of command and decentralized execution are best accomplished
with centralized planning. Centralized planning enforces proper application of fundamental
military principles, such as economy of force, ensures synchronization and/or deconfliction
among components and enables effective and efficient use of forces and other resources. Planning
should establish
Integration of the means and measures for different missile defense elements.
FM 3-27
3 January 2011
Operations
The possible impact of missile defense operations on other missions and tasks.
Missile defense targeting priorities.
ROE.
Missile defense preplanned responses (PPR) and procedures to adjust PPR based on situation.
Decentralized execution A centralized plan is best accomplished by decentralized execution.
The speed of attacking missiles and the range at which intercepts occur make BMD operations
unique, and therefore, require a real-time response to threats. The near real-time reactive nature of
missile defense operations requires COCOMs to provide execution authority to subordinate forces
according to planned guidance and ROE prior to a ballistic missile threat. Subordinate
commanders must also be flexible and have the authority to adapt to the situation IAW the
CCDRs intent when situations do not develop as the planners envisioned.
ARMY GMD
3-15. The automated C2 decision support portion of the GFC capability will provide the
CDRUSNORTHCOM with the capability to assess the threat, to characterize the attack, and to provide
force direction that best defends against the threat. The automated EP provides essential fire control/system
information to the GMD operator enabling battle redirection in support of the commanders intent.
3-16. ARFOR must acquire and fuse a constant flow of GBMD SA data and information. Missile defense
forces use approved tactics, techniques, and procedure (TTP). Although planning and engagement
authorization is centralized, effective engagements require decentralized execution. In order to conduct
decentralized execution, the GMD crews have to know what the Commanders Intent for engaging the
threat is before they begin the battle; which they receive from the Commander in the form of CONPLANs,
Concept of Operations (CONOPS), Operations Orders (OPORD) and Fragmentary Orders (FRAGO). The
speed at which attacking ballistic missiles can travel and the range and the speed at which GMD intercepts
occur makes rapid responses essential for a successful engagement. GMD execution uses automated
processes with a HIC.
3-17. Overhead Persistent Infrared (OPIR), which includes the DSP/SBIRS, should provide the first
indication of a ballistic missile launch. These sensors should also provide the first indication of a ballistic
missile launch threatening the DA. The OPIR sensors will continue to track the missile until booster
burnout. GMD operators track the launch throughout its trajectory based on data received from OPIR space
based data collection platforms, ground-based, and sea based systems, providing greater fidelity on
predicted impact. Once a determination is made that engagement criteria have been met, the Weapons
Release Authority (WRA) authorizes weapons free, and the USNORTHCOM Missile Defense Officer
(MDO) passes weapons free authorization to the MDE crews who initiate the engagement sequence.
3-18. An AAMDC supports GBMD operations with the AN/TPY-2 (FBM) radars within their AOR using
the C2BMC system to provide cueing data regarding threats against the homeland and regional missile
defense for designated assets and defenses. The AN/TPY-2 (FBM) radar sensor management section is
integrated with the AAMDC to operate the C2BMC system in the employment of the AN/TPY-2 (FBM)
radar. This integration normally occurs at the Joint Air Operations Center/Air Operations Center
(JOAC/AOC) that supports the COCOM. The AAMDC also conducts Joint and combined strategic AMD
to support designated OPLANS/CONPLANs.
3-19. OPIR, AN/TPY-2 (FBM), and the Aegis BMD provide launch location, initial track data, early
warning, target type-classification, fire control data, sensor cueing data, and target impact-point estimates
to the GFC. The GFC uses additional data from COBRA Dane, UEWR radars and SBX (if available) to
determine state vectors, determine a predicted impact point, assess the threat to the DA and alert GMD
systems. The HIC determines whether engagement criteria are met and enables further actions. Figure 3-2
illustrates system alerts and actions and Table 3-2 details events for the GMD engagement sequence.
FM 3-27
3-5
Chapter 3
3)
4)
MCS passes threat data to MDE and FDC alerting the GFCs and crews.
5)
Once the GFC determines there is a threat to the DA, the system goes to system state alert
and sends a message to all GMD.
6)
Once the crews determine it is a threat to the DA, they request WRA.
7)
8)
9)
About the same time, forward based radars - AN/TPY-2 (FBM) and Aegis BMD ships
acquire and start tracking threat ICBM. Track data is passed to the GFC.
GFC uses radar data to cue additional radars, so they can more rapidly acquire the threat.
If the GFC needs to launch GBIs, it has enough data so it can at this time (if system is
enabled with Weapons Free and GBIs are available); however, the GFC prefers higher
resolution of the threat, so if weapons access is available, the GFC will wait until it
identifies the RV before committing/launching the GBI against the threat. This higher
resolution data comes from additional radars COBRA Dane, UEWRs, SBX, and AN/TPY2 (FBM) depending on positioning.
The crews evaluate the threat and determine the proper GBI allocation to meet the
commanders intent per threat and apply them IAW their firing doctrine.
FM 3-27
3 January 2011
Operations
10)
11)
12)
13)
Shortly before the GFC decides to launch a GBI, it sends out a defend integrated task plan,
which consists of sensor task plan requesting specific information from radars to support
the intercept, communication task plans tasking specific in-flight interceptor
communication systems (IFICS) to support communication events between the GFC and
the EKV, and a WTP providing specific targeting information to the GBI that will make
the intercept.
Shortly after receiving the WTP, the GBI launches; at launch the GBI has the information
it needs to make a successful intercept of the threat, however, the GFC has the ability to
send in-flight target updates (IFTU) to the EKV, so the EKV has the most current threat
picture prior to making the intercept.
After the GBI launches, it does a three stage burn, the EKV separates and conduct star
shots to verify its location. The EKV then maneuvers to receive the first communications
event, this consists of an IFTU and transmission of an in-flight status report (IFSR) (which
lets the GFC know if the EKV is working). It makes course corrections directed by the
IFTU then maneuvers to receive a second communications event which is an IFTU only.
At a predetermined range, the EKV acquires the threat complex with the use of its onboard sensors, determines which object is the RV, and flies itself into the RV, destroying it
by force of impact or kinetic energy.
Threat intercepted. If tasked, SBX may provide a hit assessment. This process is repeated
for all threats until the battle is over or the GMD system is out of inventory.
3-20. When the MDE and FDC operators confirm the GFC automated recommendations, verify
engagement criteria are met, they will request a change in weapons control status (WCS) to weapons-free
authorization for engagement. The GFC EP builds and sends a Sensor Task Plan (STP) to cue sensors to
begin tracking the threat objects providing additional SA to the operator. Surface sensors detect the threat
objects once they enter the radars range and field of view. Some forward based sensors may detect missile
launches in the boost phase, if appropriately located. Figure 3-3 depicts threat missile tracking.
FM 3-27
3-7
Chapter 3
Adjust the allocation of GBIs against each threat/target to account for off-nominal situation and
ensure the commanders intent is met.
Monitor targets for validity, change in identification, and splitting and/or emerging new threats.
FM 3-27
3 January 2011
Operations
GBI allocation and sequencing of launch are based upon several factors. These factors includes data
available in the GFC, the crew and directors interpretation of the situation, and their determination of how
to best meet the commanders intent to determine how many GBIs are launched and when.
3-25. The Defense Strategy/Execution Plan (DS/XP) (battle plan, GFC system configuration) will
determine the parameters the GFC uses to determine the threat and the number of GBIs to automatically
allocate to satisfy these parameters. HIC capabilities allow changes to meet the commanders intent and
Presidential guidance or SECDEF-level pre-approved firing guidance. Due to the few and fixed number of
GBI locations, a pre-determined DS/XP is used to determine the minimum number of missiles for each
engagement, but the GFC operator provides oversight of the GMD battle to ensure that the commanders
intent is met for each threat engagement.
THAAD OPERATIONS
3-26. The THAAD system may integrate, as a component of the BMDS, with the IAMD to support a
theater AOR and cross AOR engagements. THAAD provides endo- and exo-atmospheric engagements of
SRBM and MRBM in the terminal phase with future growth possible for engagements of IRBMs.
3-27. THAAD employment is included in the theater Area Air Defense Plan (AADP) which may include a
BMDS action plan that describes the C2 relationships and procedures to transition THAAD to a GBMD
role in support of USSTRATCOM GBMD priorities. Normally, the AAMDC is responsible for THAAD
planning and integration into the AADP. All GBMD planning by USSTRATCOM (to include use of
THAAD to support HLD must be coordinated and integrated with the COCOM plans and reflect SECDEF
priorities. The Area Air Defense Commander (AADC) is responsible to establish communications with the
GMD network.
3-28. The AAMDC deploys into a COCOMs AOR and conducts Joint Theater Air and Missile Defense
(JTAMD), which includes THAAD employment options in support of designated OPLANS and
contingency operations. The AAMDC also provides sensor management support for GBMD utilizing
C2BMC operations when augmented with AN/TPY-2 (FBM) trained sensor managers. The active defense
and passive defense cells of the AAMDC consist of two ADSI remote monitor workstations and a tactical
situational display, an AMD work station, an Army COCOMs Joint Warning and Reporting Network
(JWARN) display, Processing Display SystemMigration (PDS-M), and laptop computers.
PROTECTION
3-29. The protection of the GBMD warfighting function is the related tasks and systems that preserve the
force so the commander can apply maximum combat power. Preserving the force includes protecting
personnel (combatants and noncombatants), physical Security System Level-A (SSL-A) assets, and
information of the US military. The protection warfighting function facilitates the commanders ability to
maintain the forces integrity and combat power. Protection determines the degree to which potential
threats can disrupt operations and counters or mitigates those threats. Emphasis on protection increases
during preparation for missile engagements and continues throughout execution. Protection is a continuous
activity that integrates all protection capabilities to safeguard GBMD assets and protect forces. The
protection warfighting function includes the following tasks:
Air defense.
Personnel recovery.
Information protection.
Antiterrorism.
Survivability.
FM 3-27
3-9
Chapter 3
SECURITY OPERATIONS
3-30. It is the commanders responsibility to apply more stringent security standards required by Strategic
Command Instruction (SI) 538-2, Army, and BMDS security during increased threat level or high risk
determinations, or as the commander/director deems necessary. The objective of security for the Army
GBMD sites is to:
Implement general policy for the security of personnel, installations, military operations, and
designated assets IAW SI 538-2, DODD 5200-8 and Army applicable security regulations.
Provide security guidance and general procedures that are realistic, harmonized with other
security disciplines, and provide the necessary flexibility for commanders to protect personnel,
installations, projects, operations, and related resources against capable threats from terrorists,
criminal activity, and other subversive or illegal activity.
Reduce the loss, theft, diversion of, or damage to DOD assets with advanced technologies;
thereby enhancing overall security, while ensuring that warfighting capability is maintained.
Utilize the DOD Personal Identity Verification (PIV) credentials on the Common Access Card
(CAC) as the universal authority of individual authenticity.
PHYSICAL SECURITY PROGRAM
3-31. The physical security program is that part of security concerned with active and passive measures
designed to prevent unauthorized access to personnel, equipment, installations, information, and to
safeguard them against espionage, sabotage, terrorism, damage, and criminal activity. Physical security is a
primary command responsibility. This security is for worldwide GBMD operations.
3-32. Physical security programs are for prevention and provide the means to counter threats when
bypassing or ignoring preventive measures. Physical security threats include, but are not limited to:
Criminals.
Protest groups.
Disaffected persons.
3-33. Physical security planning includes using biometric, electronic, and/or mechanical technological
security systems to mitigate both vulnerability to the threat and reduce reliance on fixed security forces.
The postulated threat to GBMD assets, DA, and USASMDC/ARSTRAT annual threat statements,
local threat, and all other relevant factors will be considered.
FM 3-27
3 January 2011
Operations
Security programs and procedures will be revised accordingly to ensure adequate protection at all
times.
Physical security procedures must constitute a balanced, in-depth system responsive to all credible
and potential threats and vulnerabilities.
Construction projects require continuous security coordination between engineers and security
personnel from planning through completion of the project.
Security forces appropriately armed and all possible actions taken, including the use of deadly
force within the limitations of AR 19014, to prevent the sabotage of GBMD assets.
Ensure immediate re-occupation and security of a GBMD asset exclusion area wrongfully
penetrated.
FPCON Normal General threat of possible terrorist activity exists but warrants only a routine
security posture.
FPCON Alpha Level applies when there is a general threat of possible terrorist activity against
personnel and facilities (the nature and extent of which are unpredictable) and when
circumstances do not justify full implementation of FPCON Bravo measures. It may be necessary
to implement measures from higher FPCON resulting from intelligence or as a deterrent. The
measures in this FPCON must be capable of being maintained indefinitely.
FPCON Bravo Applies when an increased and more predictable threat of terrorist activity
exists. The measures in this FPCON must be capable of being maintained for weeks without
FM 3-27
3-11
Chapter 3
causing undue hardship, affecting operational capability, or aggravating relations with local
authorities. While in Bravo, the 49th MD BN (GMD) should bring staffing levels and physicalprotection levels to the point at which the 49th MD BN (GMD) can instantly transition to FPCON
Charlie or Delta.
FPCON Charlie Transition to FPCON Charlie is on short notice. It is a result of an incident
occurring or the receipt of intelligence indicating that some form of terrorist action against
personnel and facilities is imminent. Charlie measures should primarily focus on staffing
adjustments and procedural changes. Security forces will usually enhance their security presence
by acquiring additional staffing or by adjusting the work-rest ratio (such as moving from a 3:1 to a
6:1 ratio). At Charlie, off-installation travel should be minimized.
FPCON Delta Transition to FPCON Delta is immediate, Delta measures should focus primarily
on staffing adjustments and procedural changes. FPCON Delta applies in the immediate area
where a terrorist attack has occurred or when intelligence has been received that terrorist action
against a specific location or person is likely. The security force staffing level is usually peaked in
Charlie; therefore, Delta additional staffing usually comes from an augmentation force. Once in
Delta, nonessential operations cease to enhance the security and response posture. Normally, this
FPCON is declared as a local condition.
Day-to-Day Operations
3-40. During day-to-day operations (FPCON Normal) for the GMD or AN/TPY-2 (FBM) site, all posts at
the site are manned. However, the unit security force must be prepared to react and negate a threat
according to pre-established plans and rules for use of force. The importance of training to react in a crisis
cannot be overemphasized. Not all scenarios will allow for a smooth progression.
Example: A no-notice attack or penetration attempt could cause immediate transition to crisis
operations, thus highlighting the significance of intelligence, extensive preplanning, and
personnel and asset management.
RESERVE FORCE
3-42. Army doctrine requires the designation of a reserve force. A reserve force is an uncommitted force
available for action at the decisive moment. Its primary purpose is to retain freedom of action throughout a
contingency operation. The designated reserve force consists of the members of the platoon (-) on mission
cycle inside the wire, who are not staffing a post or otherwise engaging the threat. Once the IRF and the
remainder of the platoon (-) is committed, the commander must immediately reconstitute a reserve force
from the company (-) to retain freedom of action.
FM 3-27
3 January 2011
Operations
personnel, and coded to reflect precisely which facilities each individual is working. Guard personnel must
perform entry control of vehicles, inspection, and/or clearing by proper authorities and controls before
reaching the GMD site (see AR 190-13.)
Example: Entry control of a prime contractor technician must have access to the power generation
facilities, but has no reason to enter either the readiness and control building or the missile field.
Therefore, when the individual provides proper identification at the entry control, access will be
granted only to the areas the individual is authorized (for example the power generation facilities).
This method of control does not allow access to other facilities or areas.
VISITOR PERSONNEL
3-44. Occasionally, it is necessary to escort personnel who do not have the minimum security clearance
required to be granted access to a GMD facility. Approved personnel shall escort cleared visitors within all
controlled areas. All GMD units shall have established policy and procedures for escorting visitors.
COMMUNICATIONS
3-45. The security force is equipped with two-way radios, which are essential for the efficient operation of
the security force and the accomplishment of its assigned mission. The IESS (alarms and sensors) operator
maintains the security force net. All on-duty security force personnel have an individual radio, and the
security force vehicles have vehicle-mounted radios. The installation/garrison security force must have
compatible communications equipment to allow continuous coordination between the two organizations
when the mission dictates. Use secure voice capability when possible.
WEAPONS
3-46. Weapons will provide the maximum practical firepower for security forces, carried and/or
immediately available. Where employing side arms, personnel responsible for FPCON of SSL resources
will have immediate access to weapons providing greater firepower. Security forces shall be equipped and
armed for combat operations and terrorist incidents as determined appropriate by the local commander. The
local environment must be considered in authorizing the types of weapons employed.
3-47. Because of the high number of civilian personnel onsite, the MP Commander will brief the MP force
on the Rules for the Use of Force (RUF) before receiving weapons. Issuing of weapons to MP personnel
will be IAW AR 190-11 and the unit SOP. The commander may prescribe other weapons to the security
force based on needs and requirements. Normally, weapons are loaded with live ammunition, except when
prohibited for safety reasons. Criteria must be established when to authorize lock and load in prohibited
areas. The use of privately owned weapons while on duty is not authorized. Weapons and ammunition
issued to security-force personnel are not removed from the installation, except for official duty.
AMMUNITION SUPPLIES
3-48. Ammunition supplies maintained for security force use are on the GMD site in secured storage
containers, according to AR 190-11. A basic load of ammunition is kept on hand (sufficient to support site
defense against a full level II threat for an extended duration), according to the intelligence picture and the
reinforcing support available.
FM 3-27
3-13
Chapter 3
OPERATIONS SECURITY
3-49. IAW AR 530-1, battalion and higher echelons will have written Operations Security (OPSEC)
programs with the following common features:
Specific requirements to plan for and implement OPSEC before, during, and after operations and
other activities that affect the combat capability of the US Army. OPSEC is part of the
commanders initial planning guidance.
Use of OPSEC analytic techniques to identify vulnerabilities and to select appropriate OPSEC
measures.
Training programs to ensure that all personnel, commensurate with their positions and security
clearances, are aware of adversary intelligence threats and understand the OPSEC process.
Training programs will comply with the requirements in AR 530-1, Appendix F.
INFORMATION OPERATIONS
3-50. IAW FM 3-13 Information Operations (IO), information is an element of combat power.
Commanders conduct IO to apply it. Focused IO synchronized with effective information management
and ISR enable commanders to gain and maintain information superiority. IO is a prime means for
achieving information superiority. Common features of programs are:
Procedures to protect and defend friendly information, C2 systems, and information systems.
Procedures to synchronize IO with effective information management and ISR giving the
commander information superiority.
Procedures to protect C2, shooter, and radar computer systems and information systems from
Cyber attack (destruction, degradation, disruption, denial, and deception).
FM 3-27
3 January 2011
Chapter 4
SUSTAINMENT
This chapter describes the Armys duties and responsibilities for sustainment support
of GBMD units. MDA is a Defense Agency, under authority, direction and control of
the USD (AT&L) responsible for managing, directing and executing the development
of the BMDS. As such, MDA is an acquisition agent whose development activities
make them responsible for planning, acquiring, and implementing activities
necessary to support Army GBMD elements. However, it is imperative that support
must be responsive to the military commander on a noninterference basis. This is
critical given the importance of the GBMD mission to defend the homeland,
deployed forces, friends, and allies from ballistic missile attack. MDAs sustainment
concept for operations is complex and Army personnel must be familiar with its
impact on readiness and availability.
OVERVIEW
4-1. The Army responsibility for logistics support extends into COCOM AORs in regards to GBMD and
may be modified when logistic support is otherwise provided for by agreements with Host Nation (HN)
agencies, Joint services, or by CCDRs. The COCOM may determine that common servicing would be
beneficial within the AOR or a designated operational area. If so, the COCOM may delegate the
responsibility for providing or coordinating service for all Service components in the AOR or designated
area to the Service component that is the dominant user. Service components will identify and validate
support requirements in both the deliberate and crisis planning process, and then provide these
requirements to the supporting Service component as soon as possible.
Fixed sites that include large fixed structures, permanently situated sites, mobile sensors and
IAMD sites in several COCOM locations. The GMD system is neither mobile nor deployable.
Most sites are in northern latitudes where operation in cold weather is a factor.
Limited numbers of sites create a very low density of equipment items and trained Military
Occupational Specialty (MOS) positions.
Continuous (24 hours a day/7 days a week) operations. Military staffing must be consistent and
include careful scheduling of maintenance and training activities.
Some GBMD systems may require an extensive contractor support maintenance concept, which
requires contractor life-cycle support. This is an outcome of the GBMD systems being low
density, highly complex, with a dual role as operational and a test bed in its initial stages.
FM 3-27
4-1
Chapter 4
SUPPORT PRINCIPLES
4-3. Even though GBMD is unique in many aspects, some common Army principles of support apply for
government furnished equipment (GFE). The application principles are responsiveness, simplicity,
flexibility, logistic economy, attainability, sustainability, survivability, and integration, as detailed below:
Responsiveness is the right support in the right quantity in the right place at the right time.
Among the logistic principles, responsiveness is the keystone; all else becomes irrelevant if the
logistic system cannot support the concept of operations of the supported commander.
Simplicity often fosters efficiency in the planning, execution of national, and AOR logistic
operations. Mission-type orders and standardized, interoperable procedures contribute to
simplicity. Establishment of priorities and pre-allocation of supplies and services by the
supported unit may simplify logistic sustainment.
Flexibility is the ability to adapt logistic structures and procedures to changing situations,
missions, and concepts of operation. Logistic plans and operations must be flexible in order to
achieve both responsiveness and economy. This principle is a guide for strategic thinking and
forms the template for synchronized and coordinated Joint logistic planning.
Logistic economy is achieved when effective support is provided using the fewest resources at
the least cost, and within acceptable levels of risk. At some level and to some degree, resources
are always limited. When prioritizing and allocating resources, the commander must
continuously consider economy and optimize use of resources to ensure effectiveness and
mission success while supporting every effort toward achieving efficiency.
Attainability (or adequacy) is the ability to provide the minimum essential supplies and services
required to begin combat operations. The commanders logistic staff develops the concept of
logistic support, completes the logistic estimate, and initiates resource identification based on
the supported commanders requirements, priorities, and apportionment.
Sustainability is a measure of the ability to maintain logistic support to all users throughout the
AOR for the duration of the operation. Sustainability focuses the supporting commanders
attention on long-term objectives and capabilities of the supported forces. Long-term support is
the greatest challenge for the logistician, who must not only attain the minimum essential
materiel levels to initiate combat operations (readiness) but must also sustain those operations.
Survivability is the capacity of the organization to prevail in the face of potential destruction.
Logistic units and installations are also high-value targets that must be safeguarded by both
active and passive measures. Active measures must include a defense plan for supply with
provisions for reinforcement and fire support. Passive measures include dispersion, physical
protection of personnel and equipment, deception, and limiting the size of an installation to what
is essential for the mission.
Integration consists of synchronizing general civil support operations with all aspects of military
and civilian, Joint and multinational partners. Integration involves total integration of Army
sustainment process. Support of the commanders plan is the goal of all sustainment efforts.
Effective support requires a thorough understanding of the commanders intent and
synchronizing support plans with the concept of operations. ARFOR conduct operations as part
of Joint, multinational, and interagency teams in combined actions.
Condition Based Maintenance plus (CBM+) is the application and integration of appropriate
process, technologies, and knowledge based capability to improve the reliability and
maintenance effectiveness of DOD systems and components. CBM+ is maintenance performed
on evidence of need provided by reliability centered maintenance (RCM) analysis & other
enabling processes and technologies such as system health monitoring & management using
embedded sensors. To the commander, CBM+ is the ability to meet mission requirements with
proactively driven maintenance, as well as the ability to optimize the competing demands of
warfighting & planned maintenance.
FM 3-27
3 January 2011
Sustainment
A single life-cycle support contractor who is responsible for all system peculiar maintenance
support and is responsive to the commanders direction. Through its prime contractor support
system (PCSS), the prime contractor will manage all logistical areas of maintenance and system
upgrades.
Supply support.
Technical data.
Computer resources.
A Logistics Control Center (LOGCC) is the support contractors responsibility. The LOGCC
provides a single point of contact for all sustainment actions and readily accessible sustainment
information (such as repair parts usage, due-ins, equipment status, and equipment readiness
reporting data).
The contractor also operates the on-site control center tailored to the needs of the assets at each
location.
The on-site support center (OSSC) is the main element through which the contractor manages
the maintenance support of elements and reports to the commander. Within the OSSC, the
Maintenance Management Center (MMC) is the single point of contact to facilitate the military
oversight of the support contractor, and ensures the contractors responsiveness to the
commanders direction.
The maintenance of GFE exists at two levels, on-site and off-site maintenance, on-site (unit) and
off-site (depot).
Because of the requirement to operate 24 hours a day/7 days a week, some depot-level
maintenance may be performed onsite.
Extensive use of both diagnostic and prognostic maintenance capabilities using build-in test
equipment (BITE), built-in test (BIT), and CBM procedures to automatically predict, detect, and
fault isolate down to the line replaceable unit (LRU) without interfering with mission
performance (while the system is operating.
The contractor replaces the LRU and repairs it onsite or offsite, as required.
For the long term, the Army considers the use of commercial equipment and practices best for
the fixed sites.
Reach-back While different from JP 3-30, BMDS transition transfer plan defines this as the
use of GMD prime contractor assets outside of the support contract when it becomes necessary
to sustain acquisition or construction, maintenance, operation, and disposition of facilities.
Fix or fight criteria Operators and maintainers determine System Capability (SYSCAP)
failure analysis criteria to evaluate systems capabilities, to determine if components will fail
during crisis or combat operations.
Logistics considers the parameters that effect of the failure on probability of engagement
success: time to troubleshoot/time to repair, availability of LRU for repair operations, criticality
of defended asset, and time to impact. These criteria determine if operations proceed or if a
system is taken offline for repair.
FM 3-27
4-3
Chapter 4
The MDA will continue to have primary responsibility for execution of current and future
development and production contracts, which encompass the hardware/software development
efforts, obsolescence risk reduction, testing and site System hardware procurement. MDA also
retains responsibility for software configuration management and for post deployment software
support regardless of whether an MDA or Army, contract is used.
4-6. The key imperative is that contractor support must be responsive to the military commander and
provided on a noninterference basis. This is critical given the importance of the GMD mission and the need
to generate forces in crises. Commanders must be familiar with FM 3-100.21, to ensure contractor
operations support the mission.
FM 3-27
3 January 2011
Sustainment
PCSS provides the support infrastructure and maintenance management system for support of
GMD prime mission equipment (PME), associated support equipment and operational facilities.
Off-site support centers perform factory/depot support located at PME repair facilities.
FM 3-27
4-5
Chapter 4
Provides scheduled and unscheduled maintenance information to the GMD operations center as
required.
Analyzes PCSS sustainment performance data to determine improvement in the system
effectiveness.
Provides reports as required to government and prime contractor management.
Provides centralized management of processes and procedures, acquisition control,
transportation coordination, and authority for parts deviation/re-route.
Provide training to personnel prior to deployment.
Collects maintenance data from sites, compiles reports, and distributes reliability, availability,
and maintainability (RAM) data and other analyses.
Provides program administrators for sustainment management information systems,
computerized inventory and maintenance management system, and training records databases.
Maintains PCSS metrics.
Where possible, site utilities operate on commercial power, with an uninterruptible power
supply with backup power generation. The extreme dependence of the system operation on both
electrical power and cooling equipment requires that the sites have their own backup power
generators.
Heating, cooling, and ventilation must be available to support year-round continuous operations.
CBRNE protection must be integral to the design of system operations facilities.
Fire protection is an operational concern for GBMD elements that must operate continuously.
The unit must coordinate for fire protection and equipment that will not cause collateral damage
to the system, and will allow the system to operate through all emergencies.
Limited time operation by personnel within enclosed environments is possible (for example,
using breathing apparatus to accomplish emergency functions, as required).
Unit Readiness
4-15. The GBMD Commander ensures elements are operationally ready according to the potential for
attack, the threat level, force protection for missile defense, information protection, operational area
security, antiterrorism, survivability, CBRNE, safety, and readiness condition (REDCON). Systems must
be ready to complete the GBMD mission while managing many factors such as routine maintenance,
weather, training, and equipment upgrades. Ultimately, the commander participates in asset management
conferences and has a voice in schedules and readiness decisions.
FM 3-27
3 January 2011
Sustainment
4-17. The BMDS Operational Readiness Reporting System (BORRS) is the system of record for MDA to
collect BMDS operational readiness and system configuration data generated by the BMDS elements.
BORRS is a portal-based reporting and data collections system developed specifically to provide
operational readiness and system configuration information for the BMDS. BORRS accumulates
operational readiness and system configuration information for data received within the MDA operations
Support Center, or from any BMDS site with access to the Warfighter Support Center Operations Support
Division (MDA/DWOO) portal. MDA/DWOO maintains the BORRS asset list on the classified website.
SUSTAINMENT FUNDAMENTALS
4-19. The science of sustainment fundamentals for the Army also applies to GBMD forces and integrates
strategic, operational, and tactical sustainment efforts. The sustainment fundamentals include mobilization
and deployment of units, personnel, equipment, and supplies in support of the GBMD operations
worldwide. Properly employed GBMD forces allow a nation the freedom of action to deliver forces and
materiel to the required points of application across the operational themes from peacetime military
engagement to major combat operations to successfully conduct those operations. A nations capability to
deliver logistic resources has historically been a major factor in military operations (JP 4-0).
SUSTAINMENT/LOGISTIC CHARACTERISTICS
4-20. Successful sustainment must be both effective and efficient. Sustainment operations are not
successful unless they provide effective support. Scarce resources require sustainment operations to be
efficient. Scarce resources require sustainment operations to be efficient. Effectiveness, however, cannot be
handicapped by efficiency. These two aspects of sustainment and logistics are balanced to provide the
foundation of successful operations. Seven characteristics facilitate effective and efficient operations and
enable operational success. The seven characteristics are: responsiveness, simplicity, flexibility, economy,
attainability, sustainability, and survivability.
FM 3-27
4-7
Chapter 4
4-21. During materiel acquisition, the Army requires critical systems are militarized, ruggedized, or
hardened, to operate reliably in environments that might be subject to the effects of missile attacks.
GBMD tactical support facilities that withstand electromagnetic pulse (EMP) are an example of hardening.
Deployed forces must take steps to decrease their vulnerability to, or reduce the effectiveness of, an attack.
For example, during deployment they can:
Ensure critical functions and capabilities remain intact by using backup or alternate systems
(redundant or robust means) to reduce vulnerability to attack.
FACILITIES
4-22. The Army must maintain support and facilities for GBMD sites both within CONUS and OCONUS.
For the Army facilities management and responsibilities, see AR 420-1.
4-23. Installation Management Command (IMCOM) has responsibility for facilities and support. The basis
for additional OCONUS considerations are the Status of Forces Agreement (SOFA) or HN Agreement
(HNA) that may augment the method of support provided by IMCOM.
4-24. Support and facilities for GBMD OCONUS sites include mobile and fixed sites, MDC, and support
facilities.
The Base must be a closed area in the territory of the HN used by US forces pursuant to the
provisions of the agreement for the purpose of deployment of ground-based BMD interceptors.
The base constitutes an agreed facility and area as defined in the US HN supplemental SOFA.
The base corresponds to a US installation.
The MDC is a restricted area, IAW SI 538-2. Restricted areas will be located within the military
base/installation where all US missile defense system components and supporting equipment
installation and maintenance under US control.
GBMD Facilities are permanent structure built within the MDC to house, operate, or support US
missile defense system operations.
Interceptor field.
Site infrastructure such as, but not limited to communications, power, and water distribution
lines, that directly connects to or operates with LE/MCr equipment/systems.
FM 3-27
3 January 2011
Sustainment
PERSONNEL
4-27. Army Soldiers and prime contractor personnel man and maintain Army GBMD systems
continuously 24/7/365. The current approach for operational and support personnel will be qualified and
certified military personnel, and that the maintenance and support personnel will be provided via a CLS
concept. Army GBMD forces consist of a mixture of active duty Army and NG personnel and are
commanded by dual hatted, Title 10 USC and Title 32 USC officers. Contract personnel fall under a chain
of command established by the prime contractor.
4-28. The Army, in conjunction with the prime contractor and individual GBMD Components, specifies
the quantities and skills of labor required for the BMDS Element. Military personnel are expected to have
completed their respective institutional resident training courses, been awarded their required Army Area
of Concentration/MOS Codes, upgraded their proficiency via on-the-job training and experience, and / or
attended advanced residence courses. These individuals may occupy operations, maintenance, and support
positions that include operator, command, staff, instructor, and test functions. The military services will
certify personnel to their positions within the BMDS. Contractor personnel will qualify and certify their
respective organizations to their assigned positions and duties. Soldiers who operate the GFC system are
trained and certified IAW the GMD Gunnery Program.
4-29. During the accelerated fielding of the first two AN/TPY-2 (FBM) radars, the MDA provided
contractors to operate and provide initial security at the two AN/TPY-2 (FBM) locations. Security
responsibilities for the two initial sites were transferred from MDA to the COCOM ASCCs and these
procedures are expected to be followed for future AN/TPY-2 (FBM) deployments. Site commanders have
ADCON of the site but do not provide command and tactical control (TACON) of the radar. TACON is
normally exercised by the COCOMs AADC through the AN/TPY-2 (FBM) detachment sensor managers
using C2BMC.
4-30. Operating and maintaining the AN/TPY-2 (FBM) radar sites on a continuous basis has and will
likely continue to rely largely on contractor support. The radar requires 24 hour staffing year round. Any
changes to the proper balance between military and contractor personnel will evolve by using lessons
learned during initial operations, METT-TC factors and other analysis.
FM 3-27
4-9
Chapter 4
4-32. The current plan for sustainment costs for the AN/TPY-2 (FBM) is for the Army Service Cell to
execute the sustainment mission IAW Army regulations and policy. During transition, the AN/TPY-2
(FBM) the Army/MDA Hybrid Product Office will prepare and obtain Army approval of the Supportability
Strategy. After the transfer, the Army will be responsible for sustainment costs. A forum will prepare Army
senior leaders for decisions in the Program Objective Memorandum (POM) and budget. The Army funds
through the program evaluation groups and the costs are used for internal planning and funding allocation
processes.
4-33. Prior to deployment of any new or upgraded capability affecting ARFOR MDA will provide a
detailed briefing on the operational capabilities, limitations and in-AOR support requirements. The purpose
of these briefings is to identify the actions required to integrate improved capabilities within the existing
C2 and support infrastructure and to plan sustainment.
FM 3-27
3 January 2011
Chapter 5
COMMUNICATIONS
This chapter describes the global communications systems needed to support the
GBMD and it provides a general review of the existing architectures in support of
global communications. The Global communications network (COMNET) is the link,
which connects GBMD elements with fire control networks for missile intercepts.
Additionally, key organizations that support GBMD have duties and responsibilities
to ensure specific communications systems and equipment are always available to
support GBMD battle management, C2.
OVERVIEW
5-1. GBMD defense uses many secure voice and data communication systems to execute the mission.
The GBMD communications capability will be secure, interoperable, collaborative, redundant, and
survivable, providing connectivity to the entire GBMD community. The communications infrastructure
should consist of interoperable systems spread across theaters, regions, and COCOM AORs including
considerations for HN interface and multi-national forces. To support inter and intra-AOR
communications, a comprehensive network has been developed. Information assurance must be built into
every aspect of the system to ensure a high probability of mission success.
COMMUNICATIONS REQUIREMENTS
5-2. Reliable communications are imperative for GBMD systems conducting their mission. Effective
battle management requires reliable signal/communications support to enable the commander to conduct
operations during stressing situations for extended time durations over extended distances. The commander
must retain the flexibility to operate GBMD units across the battlefield and to maintain communication
links with the C2 elements, space-based systems, and to maintain access to time-sensitive data to influence
the battle.
5-3. Seamless, integrated secure COMNETs provide for the horizontal and vertical integration of voice,
data, graphics, imagery, and video information. Integrated networks support combat operations with the
purpose of keeping the commander informed. This means connectivity to Joint streamlined
communications links, global connectivity of extended-range assets, and integrated communications. These
networks must connect to existing military and civilian, Joint and multinational partners, operations, forces,
intelligence sources, sustainment centers, and support administrative functions.
5-4. Satellite communications (SATCOM) support all battlefield systems to significantly enhance the
speed and accuracy of useful information that commanders exchange with subordinates. COMNETs
provide entry at key points within the force structure to facilitate SA through data exchange and through
automated routing capabilities.
5-5. GBMD Communications systems require the capability to collect, process, display, and
communicate large amounts of information while denying the enemy access to the information.
Communications systems supporting GBMD, including space-based resources, are capable of providing
secure near real time exchange of essential information between commanders and subordinate
commanders. The systems must be sufficiently flexible and responsive to allow timely redirection of
FM 3-27
5-1
Chapter 5
GBMD resources. GBMD communications systems must have sufficient capacity, electronic protection,
and flexibility to accommodate information exchange among all levels of command, even when an
intermediate level has been disabled (degraded operations).
GBMD NETWORKS
5-6. To support GBMD operations, communications are established and maintained using all available
means, including strategic, tactical service component, sustaining base, commercially-leased, multinational,
and HN communications. The required communications must support high-speed data systems with
massive data storage, retrieval, and dissemination capabilities. The following types of information are
exchanged:
FM 3-27
3 January 2011
Communications
FM 3-27
5-3
Chapter 5
5-16. The GCN is monitored and managed by the GCN Network Operations Center (GNOC). The GNOC
provides C2, SA, network security, safety, and network management roles and responsibilities for the
GCN. The GCN network includes all terminal site long-haul and LAN equipment to include encryption
devices. It employs the commercial standards for Telecommunications Management Network (TMN)
which includes the functions of fault configuration, accounting (asset management), performance and
security.
5-17. The GNOC provides status reporting to the JFCC-IMD Global IMD NetOps Integration Center
(GINIC) for distribution to appropriate COCOMs and the BMDS C2 COI. The GNOC is responsible for
network restoration, coordination of scheduled maintenance events, near real-time analysis of circuit
performance, issuing of trouble reports, and resolving network status alarms. The GNOC also implements
transitions for simultaneous test and operations across the GCN. These transitions are directed and
implemented by the GNOC network operators, engineers and trained and certified field engineers located
at the various GMD terminal sites.
5-18. USNORTHCOM uses SA data provided by the C2BMC system, GFC remote workstation, and
voice communication with the MDE of the 100th MD BDE (GMD) to exercise OPCON of GMD
components. USSTRATCOM has OPCON of some GMD-related sensors. GFC has the ability to directly
task certain USSTRATCOM sensors in support of missile defense operations. Other sensors support is
coordinated through the C2BMC.
5-19. DSP/SBIRS satellites send data to the DSP/SBIRS MCS. The MCS connects to the C2BMC and
GFC. The Aegis BMD uses STJ and MTJ to send data to the GFC using the external system interfaces
(ESI). IDTs are located at Vandenberg AFB, Eareckson Air Station, FGA, and on the SBX platform. These
GMD components and sensors connect to the GFCs at FGA and the MDIOC via the GCN and Defense
Information Systems Agency (DISA) provided LHC. The GFCs are connected to the C2BMC system used
by USNORTHCOM via the GCN with LHC and the BCN.
5-20. The AN/TPY-2 (FBM) provided data to the GFC network through fiber optic communications from
Japan to the C2BMC in Hawaii and is retransmitted to the GCN using SATCOM links. The AN/TPY-2
(FBM) interfaces with the C2BMC network through the CNIP. Data is passed to the GFC from C2BMC at
the GFC location. Execution of the sensor management function is from the C2BMC terminals (generally
located remotely from the radar).
5-21. Voice communications required for support and coordination of BMDS operations is through Red
and Black phone switch networks. The radar site operations element and the sensor management element
are participants in both switched networks. Communications requirements for collateral mission support
will be determined by the COCOM.
C2BMC
5-23. C2BMC through its communication architecture links ground and space-based sensors to display
track and ballistic missile threat data which is distributed to each C2BMC suite. The C2BMC system
consists of the Command and Control Battle Management (C2BM) interface, the C2BM subcomponents of
each supporting weapon system, and the communications infrastructure for linking assets with other DOD
and non-DOD networks. Sensor managers use C2BMC to control the AN/TPY-2 (FBM) radar.
FM 3-27
3 January 2011
Communications
RESPONSIBILITIES
5-25. The GBMD communications infrastructure needs interoperable systems that facilitate the conduct of
GBMD operations against the threat. The organizations with responsibilities in GBMD communications
are uniquely organized to accomplish the GBMD mission. Providing communications rests with the
combat developer down to the Army GBMD elements. The MDA is the developer, USSTRATCOM has
the responsibility for GBMD communication and JFCC-IMD is the asset manager for the BMD COMNET.
DSCS satellites.
FM 3-27
5-5
Chapter 5
USSTRATCOM
5-27. USSTRATCOM, which is the C2 center for US Strategic forces, has the responsibility for strategic
communication for GBMD as defined within the SI 538-4. USSTRATCOM will leverage overall DOD
communications architectures to support the Army GBMD forces working with the JFC, DISA, COCOMs,
and services.
5-28. USSTRATCOM has established the BMD COMNET for communications integration of BMDS
assets. These assets consist of three layers:
Tier I network constitutes realms and aspects at the strategic level that are relevant to
subordinate and adjacent commands within GBMD.
Tier III consists of the user elements and managed be the using command.
5-29. The BMDS leverages networks to provide connectivity for BMDS elements assuring commanders
have access to information and data required to execute the BMDS mission. These existing NetOps
interoperate to form a virtual community of interest network, referred to as BMD COMNET. The BMD
COMNET includes data, voice, video, and transport systems that are independently installed and operated
across multiple theaters supporting GBMD. The BMD COMNET is not a dedicated network for GBMD;
rather, it shares the same transport and communications systems used to support multiple missions.
5-30. Its current infrastructure consists of both commercial and DOD NetOps and satellites. Information
system elements of BMDS, and various fragmented developmental and test networks connect to the BMD
COMNET infrastructure. The BMD COMNET includes operational, development, test, and training
components of DISN, both hardened and non-hardened commercial and military SATCOM assets, DRSN,
and the dedicated GCN.
5-31. JFCC-IMD/J6 manages the Tier I assets and the COCOMs Joint command, control, and
communications systems directorates (J6s) manage the Tier II assets. Tier III consists of the GBMD user
elements. The BMD COMNET includes the leased GCN, SCS, TADIL-J, and all physical and logical links
providing data and voice communications.
JFCC-IMD
5-32. JFCC-IMD is the primary asset manager for the BMD COMNET is the primary responsible agency
for the Tier I BMD COMNET. JFCC-IMD manages the BMD COMNET through the GINIC. The GINIC
is JFCC-IMDs 24x7 global operations center responsible for monitoring and reporting the availability,
reliability and security of the BMD COMNET and the components that directly support the BMD mission.
Additionally, they assist global and theater NetOps service providers with isolation activities, ensuring
network outages affecting the BMDS are resolved in a timely manner.
FM 3-27
3 January 2011
Communications
5-33. The GINIC coordinates scheduled and unscheduled maintenance activities affecting BMD
COMNET system integrity to ensure minimal operational impact. To ensure NetOps capability gaps are
closed, the GINIC relies on support from JTF Global Network Operations (GNO) NetOps centers,
service/agency communication providers, BMDS Network Operations Support Centers (BNOSC). The
GINIC shares the global fused picture with JTF-GNO, COCOM, MDA, other NetOps centers, and BMD
communication service providers.
5.34 The BMD COMNET mission is to ensure commanders have access to the information and data
required to execute the GBMD mission and provides the infrastructure that connects all assets (sensors,
weapons, and C2BMC) into an IMD. Tier I and Tier II node tables 5-1 and table 5-2 show the
organizations and locations involved in the BMD COMNET.
Table 5-1. Tier I Nodes
TIER I
ORGANIZATION
LOCATION
JTF-GNO
Arlington, VA
USSTRATCOM GNCC
Offutt AFB
DISA CONUS
Scott AFB
USNORTHCOM TNCC
Peterson AFB
TNC Pacific
Wheeler AFB
GECIC
Schriever AFB
BNOSC
Schriever AFB
FM 3-27
5-7
Chapter 5
TIER II
ORGANIZATION
LOCATION
USNORTHCOM TNCC
USNORTHCOM TNCC
Peterson AFB
USNORTHCOM TNC
Peterson AFB
TNCC USEUCOM
Stuttgart, GE
FGA NOC
Fort Greely, AK
Schriever AFB
NCC
Makalapa, HI
Wahiawa, HI
C6F BWC
Naples, IT
JFTOC
Naples, IT
FM 3-27
3 January 2011
Chapter 6
GMD OVERVIEW
6-1. The GMD system is the first operational, hit-to-kill and only operationally deployed missile defense
program to defend the homeland against long-range ballistic missile attacks. The system provides early
detection and tracking during the boost phase, midcourse target discrimination, precision intercept and
destruction of inbound IRBMs or ICBMs through the force of hit-to-kill technology. GMD uses multiple
sensors, communications systems, fire control capabilities, and GBIs that are capable of detecting, tracking,
and destroying IRBM and ICBMs during the midcourse phase of flight. The GMD system is comprised of
the ground systems, GBI and sensors.
6-2. The ground system is made up of the GFC, GCN, IFICS, and Launch Support System (LSS). The
GFC orchestrates the battle and is staffed by Soldiers who operator the GFC system. The GCN links the
components of the system together to provide seamless information exchange via fiber optic cables and
satellites. The GMD communicates with the EKV during flight via the IDTs. The LSS communicates with
the GBI on the ground and passes information between the GFC and the GBIs.
6-3. The GBI is comprised of the orbital booster vehicle (OBV) in a standardized three-stage booster
configuration. The OBV caries the Booster Avionics Module (BAM) and the EKV into its trajectory. The
EKV uses the kinetic energy from a direct hit on the incoming RV to destroy it. The EKV is a sensorpropulsion package that collides with the target at a closing speed in the range of 15,000 miles per hour.
The hit-to-kill method uses proven technology verified in several flight tests, including three tests using an
operationally configured GBI.
6-4. Sensors support the GMD by providing data the system relies upon to calculate a firing solution.
The sensors consist of satellites, sea-based and ground-based radars which feed data into the GMD. The
sensors that provide data to the GMD are the DSP/SBIRS, Aegis BMDS with the AN/SPY-1 radar, the
AN/TPY-2 (FBM) radar, COBRA Dane radar, and UEWRs located at Beale AFB in California and RAF
Fylingdales, UK. The SBX provides support to the GMD test program and GMD operations if it is in
positional to detect an actual IRBM or ICBM launch.
FM 3-27
6-1
Chapter 6
launch an interceptor. The engagement opportunity is defined as the distance or time between the first
intercept opportunity and the last intercept opportunity.
6-7. The GBI is comprised of a booster vehicle, the avionics package and the EKV. Launch of a GBI
occurs after a ballistic missile has been determined to be a threat, the GFC determines there is an
engagement opportunity and permission is granted from the WRA. The booster will fly towards a projected
intercept point and release the EKV when the booster has burned out. The EKV will adjust its position if it
receives updated track data via IFTU. The EKV uses on-board sensors to see the threat cluster and
performs final discrimination to acquire the likely RV. Then the EKV maneuvers itself to collide with the
RV, destroying it by a lethal kinetic energy impact.
6-8. GFC enables the crew to understand and assess the situation, make informed decisions, feed
information to interceptors to find and destroy incoming ballistic missile RVs, and evaluate mission
success. The GFC ground system component consists of the hardware, software, and communications
systems necessary for planning, tasking, and controlling the GMD components during threat engagements.
It collects data from all of the sensors, interconnects the communications among all of the components,
connects GMD to the overall BMDS, and allows military and civilian authorities to mount a defense
against a limited ballistic missile attack.
GFC.
GCN.
IFICS.
Decision parameters.
Information on the status of the engagement, radar coverage, and GBI fly-out trajectories
allowing operators to follow the engagements.
6-13. Both space-based and land-based communications systems C2 nodes provide communications paths
through the GFC to the IDT, and on to the GBIs. The communications capability provides connectivity
among supporting sensors, ground-based elements, and GFC capabilities located in various operations and
control centers. Reliable, redundant communications is necessary among the MDE, FDC and alternate
facilities, to ensure all GMD systems components are operating effectively. Both space-based and landbased communications systems C2 nodes connect to the IFICS, and the GBIs.
FM 3-27
3 January 2011
6-14. The multi-echelon training capability of the ground systems allows the Army GMD operators to
conduct training to maintain proficiency. It also allows evaluation of new XPs during periods of crisis. An
embedded testing capability is a goal of system development. It also allows inserting of periodic system
tests into the C2 system, without disrupting operational readiness.
TEST EXERCISER
6-15. The TEX drives the GFC/C during testing and consists of threat scenarios and models all GMD
components, and. TEX integrates with GFC hardware and software and forms the heart of the training
capability. The GMD System Trainer (GST) can run in a stand-alone mode or in a distributed mode with
other nodes at FGA, Schriever AFB, and USNORTHCOM. The GFC node allows testing and exercising of
the node without stimulus from the actual test articles. TEX is collocated with MDE and FDC nodes and is
resident on all GSTs. The GST is a standard GFC node with the addition of an instructor workstation that
includes a learning management system. The GST is a training tool that replicates all aspects of the GFC
system and the GMD architecture.
FM 3-27
6-3
Chapter 6
LGCE houses the CLE Applications (CLEAPS), Mission Applications (MAPL), and Training (TRAIN)
software and provides launch C2 of the Interceptor.
6-20. The LSE consists of the hardware and software, which provides C2, receives health and status from
the interceptor, provides ground power to the interceptor, and provides the capability to monitor the health
and status of the LSE and LSCs. The LSE is housed in the SIV. The LSE is loaded with and utilizes the
CLE Launch Station Operations (LSOPS) and Engagement Calculation (ENGAGE) software. The LSOPS
uses computer software configuration items (CSCI) to provide C2 for the LSE. The LSOPS CSCI is
contained in each Launch Interface Unit (LIU). All functions necessary to support the control of LSOPSs
from LSE power application through Interceptor activation and subsequent Interceptor launch are
contained within the LSOPS CSCI. The LSOPS CSCI also controls and monitors status for the silo
environmental control system and the Silo Closure Mechanism (SCM).
6-21. The Communications Equipment (CE) consists of the following: The hardware and commercial
software necessary to interconnect CLE components. It provides the network connectivity and
communication links between the LGCE, RSE and the LSE located in the SIV. It interfaces with the
GFC/C equipment to allow transfer of data to and from the CLE Components. It provides a separate secure
voice communication system between the RSE and the SIVs. The CE provides weapon system inter-site
COMNET for transmission and control of data information within the weapon system in support of the
Interceptor launch. It provides the capabilities to exchange flight tactical, C2 data and information within
the weapon system.
FM 3-27
3 January 2011
Figure 6-1. Strongback with Crane at a Silo & Transport of GBI from Airfield
6-25. The PSE is a component of the LSS. The function of the PSE is to provide Support and Handling
Equipment (S&HE) for the Weapon System. Additionally the PSE provides specialized TMDE to support
developmental tests and operational deployment of the Weapon System. The PSE provides the S&HE
required for transportation, emplacement and removal of the interceptor. This equipment primarily
includes tractors, trailers, erectors and ancillary equipment needed to load, transport, transfer, and erect the
interceptor. Also included is any specialized S&HE required for installation of the LGCE, LSE and RSE.
This equipment is restricted to specialized equipment not commonly provided by the facilities.
FM 3-27
6-5
Chapter 6
GBI SYSTEM
6-28. The GBI system is designed to intercept RVs outside the Earths atmosphere (exo-atmospheric) and
destroy them by force of impact. The GBI system consists of a multi-stage solid propellant booster, an
EKV and support equipment. The LSS is comprised of the CLE, the LSC and the PSE and missile complex
facilities.
6-29. The GBI consists of a booster and an EKV. The booster is a high-powered rocket that propels the
EKV to its intercept basket outside the atmosphere and is housed in an underground launch silo. The range
and speed of the booster allows the GBI to defend much of the homeland.
6-32. The EKV (see figure 6-4) is the bullet of the GBI. Upon being delivered to a point in space by the
booster, the EKVs IR seeker and flight package perform all divert, navigation, guidance and control
activities necessary to engage the target. After reaching its acquisition range, the EKV can autonomously
track, discriminate among objects, engage the threat object, and destroy it through lethal collision.
Although nominally the EKV receives required target characterization from the GFC mission data load
prior to launch, or from subsequent in-flight updates, the EKV can autonomously discriminate the threat
object through its integrated onboard sensor suite and processing algorithms.
FM 3-27
3 January 2011
MISSILE FIELDS
6-33. All GBIs are fielded at two operational MF at FGA and a smaller MF at Vandenberg AFB, CA. The
missile complex facilities support the maintenance of the GBIs. The facilities are comprised of the missile
assembly building, mechanical electrical building, interceptor storage facilities, EKV fuel storage, and
EKV oxidizer storage facilities. Figure 6-5 illustrates the FGA MF.
FM 3-27
6-7
Chapter 6
operations center at Peterson AFB, Colorado, and one GFC terminal with the JFCC-IMD operations center
at Schriever AFB, Colorado to provide SA.
GMD SENSORS
6-37. DSP/SBIRS provides initial ballistic missile launch detection with continuous global coverage.
DSP/SBIRS used IR technology to tracks a ballistic missile from launch through booster burnout.
Information received from the DSP/SBIRS is relayed to the MCS at Buckley AFB, Colorado where it is
passed into the GFC System. DSP/SBIRS is part of the ITW/AA system and provides the GFC with a
launch location, launch time and predicted point of impact. The DSP/SBIRS data provided to the GFC is
not insufficient to obtain a firing solution and therefore will not affect the launch of GBIs to engage a
potential threat. The data used from DSP/SBIRS cues other systems to begin searching specified locations
for the ballistic missile.
6-38. Aegis BMDS is the most forward based radar that supports GMD. It is cued directly by DSP/SBIRS
and provides target classification information to the GFC during late boost and early mid-course phase of a
ballistic missile trajectory. The Aegis BMDS needs to be in proper position to be effective due upon its
narrow search beam and radar characteristics. It will likely provide be the first sensor to provide
engagement quality data for the GFC to launch interceptors. Aegis BMDS is particularly important for the
engagement of ballistic missile threats with short flight time. Deployment and support level provided by
Aegis BMDS to the GMD mission is tied to REDCON levels.
6-39. AN/TPY-2 (FBM) is a re-locatable radar that provides increased coverage in theaters of operation
where needed. It augments Aegis BMDS and provides sensor coverage if an Aegis BMDS is not on
station. The AN/TPY-2 (FBM) used the same phased-array radar equipment as the THAAD system, but
the software to support the GMD/BMDS mission is totally different. Data information flows CNIP into the
GFC and C2BMC so it can also provide data into Aegis BMDS for launch information related to the SM-3
missile system. The AN/TPY-2 (FBM) can operate in either classification or discrimination mode and can
support either strategic or theater threats.
FM 3-27
3 January 2011
6-40. COBRA Dane radar is located at Eareckson AFB on the island of Shemya, Alaska in the Aleutian
chain. It is the only ground based radar currently capable or detecting IRBM and ICBM launches out of
North Korea. Its primary mission is intelligence gathering radar, but has been upgraded to conduct
additional mission of providing ballistic missile information to the GMD system when cued. It provides
target acquisition and tracking information allowing it to detect RV-like objects giving the system the
ability to classify. COBRA Dane is a highly reliable, one-sided, phased-array radar owned by Defense
Intelligence Agency (DIA).
6-41. SBX provides support to the GMD test program and GMD operations if it is in positional to detect
an actual IRBM or ICBM launch. SBX is a discrimination-class radar that gives the GMD system the
capability to both classify an RV and provide shape discrimination of an object to detect an RV. SBX also
carries on board an IDT to communicate with the EKV; however this IDT is not currently operational.
6-42. The UEWR at Beale AFB, California has a primary mission to detect Submarine-Launched Ballistic
Missiles (SLBM) as part of the Ballistic Missile Early Warning System (BMEWS). It was modified so it
could provide data to GMD system. Beale radar is a two-faced, phased-array radar system with good range
that provides target classification data. This radar has limited use to the GMD System due to its field of
view and ground location, even though it provides coverage to the southwest portion of the CONUS and
Mexico. The UEWR at RAF Fylingdales, United Kingdom is a three-faced, phased-array BMEWS radar
system upgraded to support GMD mission. It is currently the only radar system that provides CONUS
notification for ballistic missile defense for a ballistic missile launched from Iran.
FM 3-27
6-9
Chapter 6
FM 3-27
3 January 2011
GMD ORGANIZATION
6-48. USASMDC/ARSTRAT exercises ADCON and responsibility of the GMD units and serves as the
combat developer while the National Guard Bureau (NGB) and the State Adjutants General of Alaska and
Colorado provide general equipment and personnel who transition to a Title 10 status in order to man the
MDE and FDC. Figure 6-8 shows the GMD organizational structure. USASMDC/ARSTRAT will oversee
the Armys Title 10 USC mission. Army organizations involved in GMD operations include:
th
100 MD BDE (GMD) provides staffing for the MDE executing GMD operations.
th
49 MD BN (GMD) provides staffing for the FDC executing GMD operations.
A GMD Detachment at Vandenberg AFB.
OCONUS Theater Missile Defense (TMD) planners and units.
FM 3-27
6-11
Chapter 6
FM 3-27
3 January 2011
and reports overall GMD SYSCAP. The MDE provides redundant failover capabilities in support of all
GMD operations.
FM 3-27
6-13
Chapter 6
FM 3-27
3 January 2011
Autonomous Search Operations. This is the AN/TPY-2 (FBM) standard operations mode.
Search sectors are defined by deliberate planning to provide desired probability of detection
over the AOI. A single search plan normally includes multiple search sectors. The active search
plan can be the designated the default search plan or another predefined plan may be selected by
the C2BMC sensor manager. The AN/TPY-2 (FBM) autonomously acquires and reports tracks
through the C2BMC to GMD, Aegis BMD, and other BMDS elements.
Focused Search Acquisition. This mode is for boosting objects and relies on DSP/SBIRS
input. DSP/SBIRS detects a launch event and reports the event to C2BMC through the MCS.
C2BMC assesses the threat and checks if the radar already has the object in track. If it does not,
C2BMC evaluates AN/TPY-2 (FBM) coverage, and selects a focused search plan for AN/TPY-2
(FBM) to activate. AN/TPY-2 (FBM) executes the search, acquires the track, and reports the
track through C2BMC to GMD, Aegis BMD, and other BMDS elements.
Precision Cue Acquisition. This mode is for non-boosting objects acquired by another forward
sensor (e.g., Aegis BMD). The sensor detects the object and initiates a track across Link-16 to
the C2BMC network. C2BMC assesses the threat and checks if AN/TPY-2 (FBM) already has
the track. If not, C2BMC assesses cue feasibility, schedules the cue, and activates the cue when
the object enters the AN/TPY-2 (FBM) field of view. The AN/TPY-2 (FBM) implements
cueing, acquires the track, and reports the track through C2BMC to GMD and other BMDS
elements.
6-60. The AN/TPY-2 (FBM) can execute manual wide-band discrimination on selected targets. This wideband discrimination function is used with TBMs. When the AN/TPY-2 (FBM) transmits object tracks to
the C2BMC, the C2BMC forwards the associated cueing data for the two largest objects to the Aegis
BMD, the GFC, and to the C2BMC network.
6-61. AN/TPY-2 (FBM) operations require pre-developed mission profiles, which include a set of search
plans developed to support the particular radar mission. Developing mission profiles are part of the premission planning process and are long lead time items. When completed, they are loaded into both the
radar and the C2BMC controlling sensor operations.
6-62. Radar coverage is a series of layered 3-dimensional pie shaped search wedges of different
thicknesses arrayed horizontally and vertically to optimize detection of missile launches emanating from
the identified named areas of interest (NAI) (figure 6-12). The search pattern is enlarged or reduced based
FM 3-27
6-15
Chapter 6
on the geometric relationship of the DA and the trajectories originating from the NAIs. The larger the TBM
NAI, the larger the search volume of the radar.
FM 3-27
3 January 2011
technicians. The support contract will include provision for spares, replacement parts, and their transport to
and from the radar site.
6-66. The AN/TPY-2 (FBM) radar and associated equipment are classified as SSL-A assets. AN/TPY-2
(FBM) site security provisions will be consistent with SSL-A protection of the warfighting function. The
AN/TPY-2 (FBM) detachment commander will have oversight responsibility for all AN/TPY-2 (FBM)
security operations. Security detachment personnel will be subject to HN SOFA coordination and
requirements (see figure 6-13).
FM 3-27
6-17
Chapter 6
6-69. The Site Operations function is performed by the Site Operations Section (10 personnel), which
provides personnel (five 2-person crews/shifts) for Site oversight (one per shift) in the Mission Support
Facility and radar operations (one per shift) in the Electronic Equipment Unit.
6-70. The sensor management function is geographically separated from the physical site of the radar and
is performed by Sensor Managers. This section is comprised of five 2-person teams who operate on a
continuous basis though two consoles that interface providing the linkage between sensor and C2BMC.
Sensor Mangers thoroughly understand the management of AN/TPY-2 (FBM) sensor resources and how to
manipulate the radar to best utilize the available resources. Sensor Managers initialize and configure the
sensor for surveillance operations, enable mission profiles, and monitor operational status. This Section is
normally located at a BMDS C2 node to integrate sensor management in support of an integrated BMDS,
normally at, or in the vicinity of the COCOMs AOC or AAMDC.
6-71. The Security Operations function is performed by the Security Operations Section (18 personnel),
which provides C2 of personnel to perform security operations for the AN/TPY-2 (FBM) site. The
Section provides entry control, oversight, training, and C2 for each shift of security personnel for 24-hour
(SSL-A) security for the AN/TPY-2 (FBM) site. The site contains five, three-person shifts to provide entry
control, oversee and conduct all security-related operations, one NCO to supervise the section and two
NCOs to provide training oversight and coordination for the security forces.
6-72. The AN/TPY-2 (FBM) Detachment TOE was approved by HQDA in 2008, and is depicted in
Figure 6-14. Although the Security Platoon personnel are required by the TOE, these positions are not
resourced by the Army. Staffing the radar site relies almost exclusively on contracted support. This
approach makes minimal demands for military staffing slots, but does not provide for unity of command
for the elements directly responsible for AN/TPY-2 (FBM) operations. If contractor security personnel are
not used at a AN/TPY-2 (FBM) site, and military personnel are desired/required, the COCOM or ASCC
must request these forces through the Request For Forces (RFF) process, or resource the military positions
from within assets available to the COCOM/ASCC.
6-73. The AN/TPY-2 (FBM) Detachment requires a Security Platoon, but it is not authorized / resourced.
The actual security forces to secure the radar site will be by RFF from the COCOM, contractors, or HN.
Security force composition will be site specific, based upon threat, HN agreements, and other factors.
FM 3-27
3 January 2011
FM 3-27
6-19
Appendix A
THREAT
This chapter describes the transition of the global missile threat environment. The
proliferation of ballistic missiles worldwide threatens our national security. The
potential proliferation of CBRNE weapons to rogue nations and terrorists and the
threat of limited ballistic missile attack on the US homeland presents new challenges.
Also addressed in this chapter is the threat from physical attack to the missile site by
protesters, terrorists, and subversives, along with the potential of irregular threats
posed by opponents employing unconventional means to counter traditional U.S.
advantages.
In this changing geopolitical environment, a number of countries overtly hostile to
the US have acquired ballistic missile system capabilities. The proliferation of missile
technology has made the fielding of GBMD a critical aspect to US national security.
The BMDS must be capable of engaging all classes of ballistic missile threats and is
a key component in the Armys defense of the nation.
FM 3-27
A-1
Appendix A
effective military capability. With the end of the superpower rivalry, there is no longer any incentive to
provide inexpensive military equipment. Although a lot of modern equipment remains available for sale to
any paying customer, most countries will be unable to finance the purchase of a first-rate military
capability. In addition, the US demonstrated repeatedly, in Operation Desert Storm, Operation Enduring
Freedom, and Operation Iraqi Freedom that the US can rapidly project sufficient forces to defeat major
regional adversaries, and to conduct more than one major operation simultaneously. Force projection
operations require:
Multi-national support, if only to the extent of providing landing, over-flight, and transit rights.
HN support.
TRENDS
A-9. By 2020, the US will have to consider several trends when assessing the global threat to its national
security. First, China and India will likely emerge as major global players, which will transform the
geopolitical landscape with potentially dramatic impacts. This environment may play a potential role in
state decision-making. Political Islam will continue to have a significant global impact, rallying disparate
ethnic and national groups and perhaps even creating an authority that transcends national boundaries. The
key factors that spawned international terrorism show no signs of abating and thus remain a significant
threat.
FM 3-27
3 January 2011
Threat
A-10. With the fall of Iraq and the voluntary termination of Libyas ballistic missile program, North
Korean and Iranian WMD and missile development programs are viewed as the primary rogue nation
long-range ballistic missile threat to US national security. Russia and China continue to be capable of
attacking the US with ICBMs armed with nuclear weapons. Indias and Pakistans ongoing missile
development programs are highly aggressive and even provocative, but are generally viewed in a regional
context as opposed to a direct threat to the US.
THREAT EVOLUTION
A-11. The pre-Cold War inclination for developing nations to imitate Western force structures and
approaches is rapidly disappearing. Evolving military forces, once modeled on the US and Russian forces,
now take identities more distinctive to their own traditions and societies. Emerging nations and radical
groups seek WMD to gain prestige, achieve deterrence, and exercise coercive diplomacy in the
international community. Unconcerned with safety or reliability, some nation-states, terrorists, and
extremist groups rapidly advance their weapon programs. There are few greater threats than a terrorist
attack with WMD.
Irregular challenges. The immediate threat the US faces is the irregular challenge. General
characteristics of irregular warfare include protracted struggle, reliance on sanctuaries and outside
support, gradual escalation in number and size of tactical actions, and the predominance of close
combat as the means of engagement.
Disruptive challenges. Few nations will shape their forces or acquisition strategy to directly
confront the US, because they understand the power of US capabilities and leadership.
Faced with a looming conflict with the US, possible adversaries will seek to buy the latest
technology in niche areas to counteract key US capabilities, including, for example ballistic
and other missile systems, solid fuel boosters, WMD munitions, sophisticated RVs (ex.
Early release sub-munitions), penetration aids, terminal guidance, electronic warfare
systems, and to degrade our advanced C2 systems.
Adversaries will seek acquisitions, which could include breakthrough technology that they
believe will be most effective against perceived US strengths, particularly US reliance on
digital technologies, space, and communications.
Even the most primitive military adversaries will potentially be space capable because of the
commercial sectors provision of such products as high-bandwidth SATCOM, imagery,
navigation signals, and weather data.
FM 3-27
A-3
Appendix A
A-14. Adversaries will make extensive use of IO to include electronic warfare, computer network
operations, and the use of radiofrequency weapons in order to disrupt, delay and/or degrade US forces C2
and active defense measures.
MISSILE PRODUCTION
A-15. The number of missile production and development facilities is also increasing. Fourteen countries
produce ballistic missiles: the US, France, Russia, China, North Korea, South Korea, Taiwan, India,
Pakistan, Iran, Israel, Egypt, Syria, and Ukraine. North Korea has been exporting missiles and missile
production facilities for a number of years, and there is concern that more countries will enter the missile
market as suppliers. Availability of nuclear material on the world market increases through clandestine
sales, covert transfers, or outright thefts. Arms control agreements are no longer the bulwark against
proliferation. A number of nations fail to comply with existing treaties and non-proliferation agreements.
Today, countries quickly transfer missile technologies, components, and complete systems.
A-16. Some countries play prominent roles as manufacturing and technology sources for foreign missile
development programs. Sales and subsequent reverse-engineering enables countries to quickly acquire new
technology capability and then proliferate it into their own domestic industrial base. This enables
expansion of efforts to develop more capable and longer range missiles. Some platforms, which have
enabled this process, are the CSS-2, M-11, and No Dong missiles. Army missile defense forces face a
changing threat environment that includes an increasing number of adversaries capable of using ballistic
missiles to deliver WMD.
A-17. It appears that no country will achieve military parity with the US by 2020. However, the
proliferation of ballistic missile technology and WMD increase the likelihood that potential adversaries
will threaten their use in any confrontation with the US The possession of chemical, biological, and/or
nuclear weapons by Iran and North Korea and the possible acquisition of such weapons by others by year
2020 also increase the potential cost of any military action by the US against them or their allies.
MISSILES
A-18. Foreign ballistic missiles pose a unique threat to the security of the US because they provide an
effective vehicle for delivering nuclear, chemical, or biological weapons over long distances. While WMD
can be delivered by a variety of means including aircraft, artillery, or automobile, it is missile-delivered
WMD that garner the most domestic and international attention. Countries with a WMD missile capability
have the potential to influence the actions of other countries in their regions or even countries on another
continent and, in some cases, destroy population centers and national infrastructure.
A-19. Additionally, ballistic missiles are relatively inexpensive when compared with their ability to
penetrate defenses and strike deep into an enemys homeland. Missiles have become a delivery system of
choice, a symbol of national might for some countries, and will remain a central element in the military
arsenals of nations around the globe over the next fifteen years. States willingly devote often scarce
resources in efforts to develop or acquire ballistic missiles; build the infrastructures necessary to sustain
future development and production; and actively pursue technologies, materials, and personnel on the
world market to compensate for domestic shortfalls, gain increased expertise, and potentially shorten
development timelines.
A-20. Estimates of the missile threat to the US continue to be controversial for a number of reasons. One is
that many missile programs have moved underground, and hidden in a countrys civilian space or
aerospace industry, making it much harder for intelligence organizations to track development. Today, the
US is within range of the ballistic missiles of Russia, China, and perhaps North Korea. Several other
countries have missiles within range of US overseas facilities and interests.
A-21. A number of countries are attempting to either procure or develop longer-range ballistic missiles to
accurately deliver WMD over great distances. There is much fear that one day launching such an attack
against the US by a regional power or rogue state is possible even where there are stringent political and
military controls over these weapons.
FM 3-27
3 January 2011
Threat
A-22. The missile threat to the US, allies, and forward-deployed forces includes all ranges of ballistic
missiles and Submarine Launched Ballistic Missile (SLBMs). Although technologically far more difficult
to develop and deploy, SLBMs are a challenge to defend against because once a ballistic missile submarine
is at sea and submerged, the ability to predict and/or prevent a SLBM strike becomes inherently difficult.
A-23. Ballistic missile attacks are envisioned in three potential limited attack scenarios:
Unauthorized attack Insurgent groups or other radical elements can perpetrate a premeditated
attack against the US by a nation-state, multinational force, or group, but is not accidental.
Accidental launch Unintended launches can result from a random event (such as mechanical
failure or human error) that threatens the US.
A-24. Most missile development of emerging ballistic missile nations is based on the Soviet-era SCUD
missile and its derivatives. The development of the SCUD missile derives from the World War II German
V-2 rocket. Any country with a well-developed SCUD infrastructure can achieve a long-range ballistic
missile capability, due to the easily accessible help on the world market. This could include ICBMs with
ranges greater than 5,500 kilometers.
IRBMS
A-25. An IRBM is a ballistic missile with a range of 3,000-5,500 km. IRBMs differ from ICBMs in that
they are usually smaller and thus could be submarine launched as well as land launched. For these reasons,
some countries use them as their only nuclear deterrent. An IRBM:
Travel at incredibly high speeds, fly varied trajectories, employ evasive maneuvers, and use
penetration aids such as decoys.
Are capable of employing early release of multiple RVs. Therefore, intercept must occur before
they reenter the atmosphere and requires precision hit-to-kill intercept to ensure complete
destruction of all RVs.
ICBMS
A-26. Several countries have built, or sought to build, missiles with an intercontinental reach, usually under
the auspices of a space launch capability. Thus, the threat to the US continues to grow. Countries
developing ICBMs (see figure A-1) are also likely to develop various responses to US BMDS. Developing
countries would probably rely on available Russian or Chinese countermeasure technologies such as
separating RVs, spin stabilizing RVs, radar-absorbing material, low-power jammers, and simple (balloon)
decoys. An ICBM:
Can attack targets more than 5,500 kilometers from their launch point and pose a direct threat to
the US homeland.
FM 3-27
A-5
Appendix A
Capability may include; projected improvements in mobile basing, reliability, accuracy, and
penetration aids.
Requires a precision hit-to-kill interceptor. Also applies to IRBMs.
SLBMS
A-27. Submarine mobility provides launch-location options unavailable to land ballistic missile forces and
makes detection difficult, see figure A-2. Launching ballistic missiles via submarines gives the threat the
added advantages of better hiding, shorter flight times, and depressed reentry angles. Targets will generally
be similar to those of ICBMs. Projected SLBM improvements include sophisticated payloads and guidance
systems, improved reliability, increased range, and improved penetration aids. An SLBM is any ballistic
missile launched from a submarine, regardless of range. An SLBM:
Can be launched from multiple locations and pose a direct threat to the US homeland.
Is carried aboard a mobile, stealthy launch platform that is able to hide and wait for extended
periods.
FM 3-27
3 January 2011
Threat
SPACE
A-28. Threat to space capabilities are integral to modern warfighting. Space assets provide critical
surveillance and reconnaissance information, support to command, control, and communications, as well as
weather observations and precision positioning, navigation, and timing. Foreign access to space services,
whether indigenous or obtained commercially, is proliferating. Most nations will gain access to better
quality and/or timely services for communications, remote sensing, navigation, and weather. Adversaries
can use extensive counter space techniques, ranging from passive means (for example denial & deception)
to more active means (for example, ground segment attack and sabotage, electronic attack) to degrade US
space capabilities. Additionally, technologies enabling a space segment attack are available and
proliferating.
A-29. Imaging Earth from space, monitoring of atmospheric conditions, collecting electronic intelligence,
and warning against ballistic missile attacks once were unique capabilities owned by the US and Russia.
The leveling and spreading of global technology and the multibillion-dollar commercial space industry
allow US adversaries to support a variety of military or terrorist operations. The sheer number of foreignowned, commercial, or government-sponsored imaging satellites diminishes the US ability to impose
political constraints on the use of satellite imagery products. These commercial imaging capabilities allow
an adversary to challenge a US forces ability to achieve strategic, operational, and tactical surprise and to
gain and sustain information superiority.
A-30. More importantly, commercial space-launch vehicles pose a unique ballistic missile threat. Spacelaunch boosters represent a dual-use technology capable of delivering WMD when converted to such use.
As commercial access to space expands, so does a threat of a ballistic missile attack threat to the homeland
expands.
FM 3-27
A-7
Appendix A
INFORMATION OPERATIONS
A-31. The threats to the GMD information infrastructure are genuine, worldwide in origin, technically
multifaceted, and growing. Todays threats come from individuals and groups motivated by military,
political, social, cultural, ethnic, religious, or personal/industrial gain. IO (see FM 3-13) are the
employment of the core capabilities of electronic warfare, computer network operations, psychological
operations, military deception, and OPSEC. These capabilities are used in concert with specified
supporting and related capabilities, to affect or defend information and information systems, and to
influence decision making.
A-32. Globalization of networked communications creates vulnerabilities due to increased access to our
information infrastructure from points around the world. Threats against computers, computer systems, and
networks vary by the level of hostility (peacetime, conflict, or war), by technical capabilities, and by
motivation. The bottom line is that threats to all forces, from strategic to tactical, exist from a variety of
new and different sources, and they exist on a continuing basis even during periods of relative peace.
PROTESTERS
A-35. Security forces must consider that only violent protesters are a threat. Protesters include the two
general groups of vandals/activists and extremist protesters. Both groups are politically motivated and/or
issue oriented and acts out of frustration, discontent, or anger against the actions of other social or political
groups. The primary objective of both groups commonly includes destruction and publicity.
A-36. Extremist protest groups are moderately sophisticated and are usually more destructive than vandals
are. Their actions are frequently overt and may involve the additional objective or consequence of injuring
people. They attack symbolic targets, including authority figures such as high-ranking officials and police,
weapon systems, and things they consider environmentally unsound.
TERRORISTS
A-37. Terrorists are ideologically, politically, or issue oriented. They commonly work in small, well
organized groups or cells. They are sophisticated, skilled with tools and weapons, and possess an efficient
planning capability. Terrorist objectives usually include death, destruction, theft, and publicity. Three types
of terrorist groups identified based on their areas of operation and their sophistication. The three types are
terrorists indigenous to CONUS, including Puerto Rico; terrorists indigenous to OCONUS areas; and
paramilitary OCONUS terrorists.
FM 3-27
3 January 2011
Threat
Current CONUS terrorists are typically right or left-wing extremists operating in distinct areas
of the country. They primarily consist of ethnic and white supremacy groups, many with ties to
groups which originated during the 1960s and 70s. Historically, acts of terrorism in CONUS
have been less severe than OCONUS areas, and operations have been somewhat limited.
OCONUS terrorists typically are better organized and better equipped than their CONUS
counter parts. They include right and left-wing extremists and ethnically or religiously oriented
groups. Their attacks have also been more severe and more frequent than have those of CONUS
terrorists.
Paramilitary OCONUS terrorist groups have shown some military capabilities and have used a
broad range of military and improvised weapons. Historically, they have staged the most serious
terrorist attacks, including suicidal attacks. These groups are frequently state-sponsored and
include transnational terrorists. They are predominantly ethnically or religiously oriented. Some
of these groups have legitimate political wings in addition to their terrorist wings.
SUBVERSIVES
A-38. Subversives include aggressors from foreign governments or from groups trying to overthrow the
government by force. They include saboteurs and spies (hostile intelligence agents).
Saboteurs include guerrillas and unconventional warfare forces. They are paramilitary or actual
military personnel who are very sophisticated, highly skilled, and employ meticulous planning.
They commonly act in small groups, have an unlimited arsenal of weapons, and are well-trained
in the use of those weapons. The objectives of saboteurs usually include destruction of property
and death and their targets include mission critical personnel, equipment, and operations.
Spies (hostile intelligence agents) are highly skilled and very sophisticated. They are generally
foreign agents, but they frequently employ insiders for assistance. Spies commonly operate
covertly to avoid detection before, during, or after an event. Their objective is usually theft of
military and industrial or technology information.
A-39. Because of its unrivalled conventional military superiority in the opening years of the 21st Century,
the US is subject to the Superpower Paradox. Our adversaries and potential adversaries observe and
identify weaknesses in our capabilities and resort to unconventional means to attack these capabilities.
A-40. Adversaries will closely observe emerging US capabilities in an effort to identify and exploit
weaknesses using unconventional approaches. An asymmetric approach uses simple counters to negate US
capabilities and avoid a direct match with US strengths. Fundamental capabilities that 21st Century
adversaries may pursue to counter US strengths include WMD. One possible tactic is long-range ballistic
missile strikes, with WMD, against major population centers. Moreover, adversaries can simultaneously
conduct asymmetric attacks at the strategic (militarily and politically), operational, and tactical levels:
Militarily, attacks could include limited ballistic missile strikes with nuclear devices, or
biological and chemical agents. These weapons have psychological and geopolitical effects.
Politically, terrorists can attempt to disrupt or intimidate civilian activity, thus preventing
the flow of war materials to ports and airfields.
Special operations forces or terrorists could attack GMD sites or nodes in the confusion
resulting from cyberspace or WMD attacks.
A-41. In todays operational environment, it is possible that limited ballistic missile attacks on ports,
airfields, and other staging areas could be part of an enemys anti-access strategy. Even limited ballistic
missile attacks on US bases and sanctuaries can reduce the synergistic effects of the Joint force. Any threat
to the US homeland affects the nations way of life and survival.
FM 3-27
A-9
Appendix A
A-42. A deliberate or unauthorized ballistic missile attack could precede (or accompany) a conventional
attack on GMD systems. Threats to GMD installations include those associated with high priority defense.
These threats may be ground, air, sea, and IO attacks on facilities, or forms of terrorism, sabotage, and
special operations (such as terrorists, protestors, and agitators).
FM 3-27
3 January 2011
Appendix B
Situation Awareness.
Track Management.
FM 3-27
B-1
Appendix B
GFC
B-5. The GFC automated EP builds and sends sensor task plans to cue sensors to begin tracking the threat
objects providing additional SA to the operator. Ground sensors detect the threat objects once they are in
their ballistic flight profile; others may detect missile launches in the boost phase, if appropriately located.
B-6. With initial sensors input from the OPIR, Aegis BMD, and the AN/TPY-2 (FBM) radar, the GFC
begins building a fire control solution. COBRA Dane, SBX, and UEWRs sensors continue to track,
discriminate, and refine data used by the GFC to launch GBIs. The refined data is sent to the EKV either
prior to launch in the mission data load or while in-flight through the IFTU, which is transmitted from the
GFC through the IFICS to the EKV.
BMDS SENSORS
B-7. BMD sensors make up a systems-of-systems consisting of multiple early warning sensors in space,
on land and at sea that provide C2 data to enhance engagement operations. BMDS sensors also provide
synchronization and integration of capabilities to destroy or disrupt adversary missiles. Early warning
sensors are a key element to defense of US homeland.
SPACE COMPONENTS
B-8. DSP/SBIRS satellites provide the space segment that enables the GBMD mission. Since groundbased sensors cannot see through the Earth and characterize a target array on the other side of the globe,
a space-based system provides early target characterization and tracking information, permitting launch of
a correctly tailored interceptor package before surface-based sensors detect the targets.
FM 3-27
3 January 2011
FM 3-27
B-3
Appendix B
LAND COMPONENTS
B-11. The land components are the primary radar sensors that enable the Army GBMD mission are the
AN/TPY-2 (FBM), the UEWR, and COBRA Dane radars. The AN/TPY-2 (FBM) is a forward deployed
acquisition and tracking radar; the UEWR and COBRA Dane radars are sensors that support long-range
tracking. These sensor systems provide early target characterization and tracking information, permitting
launch of a correctly tailored interceptor package during midcourse intercepts.
AN/TPY-2 (FBM)
B-12. The AN/TPY-2 (FBM) is an X-Band radar based on the THAAD system radar (see Figure B-4). It is
a high resolution, medium to long-range search and target acquisition radar. This sensor provides early
warning, target type-classification, fire control data, external sensor cueing, launch location, and target
impact-point estimates. The radar may be able to discriminate the RV from debris and may provide the
GMD operators with a hit assessment if the intercept is within its field of view. The Army is the lead
Service for AN/TPY-2 (FBM).
B-13. Classification is the ability to categorize a target based on observed characteristics such as a RV-like
objects or non RV-like objects. Lower frequency radars typically accomplish classification of a threat.
Discrimination is the ability to positively determine the type of target based on target features,
distinguishing between RVs, fragments, canisters, fuel tanks, or decoys. Typically, higher band C-Band
and X-Band radars have the capability to accomplish discrimination of a threat.
FM 3-27
3 January 2011
B-14. Other missions may include support to theater warning, support to targeting operations for Global
Strike and theater attack operations, and cueing and tracking support to theater missile defense operations.
Additionally, potential future capabilities may provide support to collateral missions for ISR collection
requirements and space surveillance.
FM 3-27
B-5
Appendix B
COBRA DANE
B-17. The COBRA Dane radar is a national, ground-based, technical intelligence sensor that incorporates
software upgrades and modest hardware changes required to support the GBMD mission. COBRA Dane
provides early detection, acquisition, tracking, and threat-object classification in support of GBMD. Its
data can be used for interceptor commit and ground-based radar cueing. COBRA Dane (see figure B-6) is
similar in appearance to the UEWR, but has a radar face on only one side. The COBRA Dane radar is
multi-mission radar and is capable of supporting multiple missions to the missile defense mode when
directed by USSTRATCOM.
FM 3-27
3 January 2011
SEA COMPONENTS
B-18. The sea based sensors to provide data to GBMD elements for cueing and engagement. This sensor
data allows the GFC system the ability to track, discriminate, and assess incoming missiles. Basing the
SBX and Aegis BMD with an AN/SPY-1 radar in forward locations will provide high resolution for
medium to long-range threat missiles and enhance target acquisition. These sensors also send data to
GBMD systems for early warning, target type-classification, fire control data, external sensor cueing, and
target impact-point estimates.
FM 3-27
B-7
Appendix B
FM 3-27
3 January 2011
weapon system with the Standard Missile-3 (SM-3) on BMD configured ships provides intercept against
short and MRBM. The Aegis ship shown in figure B-8 has the AN/SPY-1 radar.
B-24. The AN/SPY-1 radar provides target classification information during the boost and early mid
course phases of threat missile fly out. The antenna array consists of four independent antennas each
providing 110 degrees of coverage. AN/SPY-1 data provides the GFC sufficient target information to
launch GBIs, but during a nominal engagement the data is used to cue other GMD radars.
FM 3-27
B-9
Appendix B
B-28. JTAGS provides accurate and timely Theater Missile Warning (TMW)/TMD information to the
BMD units. Units are currently forward stationed in three theaters (USCENTCOM, USEUCOM, and
USPACOM) to detect missile threats.
FM 3-27
3 January 2011
Appendix C
GMD Operations
This appendix gives a more in-depth view of operations and considerations GMD
units must apply to the conduct of their mission planning and execution. It outlines
the basic functions and sequences of GMD engagement operations. The appendix
includes GMD system training and certification, system trainers, and operational
readiness evaluations. This appendix introduces employment guidelines; CLS. Also,
it illustrates criteria for contractor maintenance concept; routine maintenance, and
site operations considerations and support with GMD implications, with the readiness
posture needed to balance GMD sites test-bed functions with actual operations.
GMD PLANNING
C-1. USSTRATCOM, through the JFCC-IMD, conducts centralized planning for BMDS and GMD.
USNORTHCOM defines all engagement criteria according to threat capability parameters, commanders
intent, and national security objectives within their AOR. Service components conduct the detailed
planning that maximizes Service capabilities.
C-2. GMD operational planning is linked with the planning of other BMDS capabilities that can engage
ballistic missiles capable of striking targets within the US. A critical element of operational planning is the
establishment of the combatant PCAL and creation of the DAL. To create the DAL, evaluate the PCAL
assets from the standpoint of criticality-vulnerability-threat (CVT). Assign a score to each asset based on
the evaluation of the four criteria, and then allocate available defensive efforts to assets according to the
supported CCDR priorities. Locations and priority of assets on the DAL affect the configuration of the
GMD systems defensive task plans.
SUCCESSION OF COMMAND
C-3. Maintenance of the command authority for operations is critical, given the short flight time of
ICBMs. Succession of command does not occur as long as commander, USNORTHCOM or designated
successor has voice communications with a functioning command center capable of HIC operations,
providing situational understanding and decision-making information. If minimum communications are
lost, the designated successor performs USNORTHCOMs GMD functions.
FM 3-27
C-1
Appendix C
strategic, operational or AOR missile defense mission priorities. Additionally, the deployment of terminal
assets such as THAAD, and PATRIOT contributes to the layered defense design and allows for added
assurance and defense in depth.
ENGAGEMENT CRITERIA
C-8. Engagement criteria are critical elements of planning. A competent military authority issues
engagement criteria directives to delineate the circumstances and limitations under which US forces initiate
and/or continue combat engagement with other forces. The standing ROE/standing RUF for US Forces,
Chairman of the Joint Chiefs of Staff instruction (CJCSI) 3221.01B provides fundamental policies and
procedures governing the actions of commanders and soldiers during all military operations. For GMD
there are four Engagement Criteria that must be answered yes before a determination can be made that
the GMD ROE is met. Procedurally, the four engagement criteria must be met before the GFC Crew
Director requests permission from the WRA to place the GFC into Weapons Free state. The WRA will
then grant permission to move to Weapons Free only for the current threat. The procedure for Weapons
Free must be reaccomplished for each additional threat.
C-9. Supplemental rules may augment the standing ROE/RUF. Approval of supplemental ROE/RUF
IAW CJCSI 3221.01B is necessary before issue. RUF directives are a guide for US forces for the use of
force during various operations. These directives may take the form of execution orders, deployment
orders, memoranda of agreement, or plans. Supplemental engagement criteria are always applicable unless
superseded by properly approved and directed supplemental ROE and RUF. Other directives issued by the
President, SECDEF, or other competent authority, such as those delineating WRA, may modify or
supersede provisions in the standing ROE.
ENGAGEMENT OPERATIONS
C-10. Although planning and engagement authorization is centralized for GMD, effective engagements
require decentralized execution. The speed at which attacking ballistic missiles can travel and the range
and the speed at which GMD intercepts occur makes rapid responses essential. GMD execution uses
automated processes with a HIC.
C-11. The DSP/SBIRS provide the first indication of a ballistic missile launch. These sensors also provide
the first indication of a ballistic missile launch threatening the DA. DSP/SBIRS sensors will continue to
track the missile until booster burnout. GMD operators track the launch throughout its trajectory based on
data received from sea based, ground-based and DSP/SBIRS data collection platforms, providing greater
fidelity on predicted impact. Once a determination is made that ROE criteria have been met, the WRA
authorizes Weapons Free and the MDO passes authorization to the MDE Crew Director who enters the
Weapons Free state into the GFC. The FDC crew then initiates the engagement sequence to ensure
commander intent is met.
FM 3-27
3 January 2011
GMD Operations
C-12. The GFC/C generates and sends the WTP to the GBI. While the interceptor is in-flight, the EKV
receives/sends communication events from the IFICS. During communication event 1, the GFC/C
generates an update to track data sent to the EKV and then the EKV sends an IFSR message to the GFC/C,
updating its status. During communication event 2, the GFC/C generates another IFTU to relay final track
data to the EKV. The interceptor uses communications data provided by the IFTU and IFSR to acquire the
threat object, discriminate the RV target from decoys, distinguish the RV from decoys, and guide itself to
the target (see figure C-1). For additional GBI firings, the GFC/C provides engagement and hit information
and passes recommendations.
Retain flexibility.
Maintain SA.
FM 3-27
C-3
Appendix C
The GMD operators must conduct a thorough mission analysis to understand the commanders
intent and guidance for the GMD fight.
Translate the commanders intent and guidance into requirements on how to configure the GMD
system, which tells the system how to allocate interceptors against threats.
Understanding the commanders intent for the system DS/XP against ICBM threats to the DA.
All changes to the system configuration that are authorized for implementation during the course
of the battle are necessary to meet the commanders intent for missile allocation.
Understand all the situations that the GMD operator will have to face in order to achieve the
commanders intent.
GFC DA A geographical area, which defines for the GFC what to defend.
GFC DS/XP Values that define interceptor allocation (cut-offs & thresholds) and defended
asset prioritization (by category) in the DA.
Mission Constraints Control parameters that further refine interceptor allocation and
engagement execution against a threat.
RETAIN FLEXIBILITY
C-19. Various DS/XP settings enable the GMD operator to retain flexibility throughout the engagement
sequence. This guideline includes all actions associated with battle redirection actions applied to inbound
threats on a case-by-case basis. The GMD operator will adhere to this GMD employment guideline.
Operators recommend all MBE actions based on shot doctrine associated with manipulating the automated
missile allocation based upon a track-by-track analysis and accounting for any near term future threat.
C-20. GMD operators will evaluate each threat and determine if they are correctly implementing the
commanders intent. If not, they will manipulate the allocation so that the commanders intent is met.
When accounting for the near term, future, or follow-on threats, the GFC system can only fight threats it
can see. It is up to the GMD operator, with guidance from higher headquarters, to determine if retaining a
portion of the available interceptors is necessary for future allocation against near term future threats.
FM 3-27
3 January 2011
GMD Operations
SECURITY
C-22. GMD installations face similar security environments as other high-priority defense installations.
Complexity and geographic separation of the GMD components require thorough planning against threats
(such as ground and air attacks, sea-based attacks on island or coastline facilities, and electronic and cyber
attacks). GMD components must also be vigilant against acts of terrorism, sabotage, and interference from
protesters and agitators.
C-23. The Army provides security for the GMD components under its control. Since GMD requires a high
state of readiness and around-the-clock staffing, there must be sufficient crews for continuous operation.
See Appendix B for more details and guidance regarding security force operations.
Fixed sites GMD systems include large, fixed structures permanently situated in several
locations. The system is neither mobile nor deployable. Most sites are in northern latitudes
where operation in cold weather is a factor.
Limited number of sites There are a limited number of sites, creating a very low density of
equipment items and GMD trained MOS positions. In addition, not all sites are equipped with
all system end items.
Continuous (24 hours a day/7 days a week) operation GMD systems must always be ready.
Therefore, military staffing must be consistent and include careful scheduling of maintenance
and training activities.
Extensive contractor support The maintenance concept is contractor life-cycle support. This
is an outcome of the GMD system being fixed, low density, highly complex, with a dual role as
a test bed in its initial stages.
Highly automated Extensive computer operation of GMD systems allows for highly
sophisticated detection, isolation, and reporting of faults. Embedded diagnostics will be a
mainstay of this capability.
Planned upgrades The upgrade plan is to deploy GMD in phased blocks. Successive blocks
increase the overall capability of the system to meet the evolving threat. However, planned
upgrades pose operational challenges, because the system will maintain engagement capability
while installing upgrades.
FM 3-27
C-5
Appendix C
SUPPORT PRINCIPLES
C-25. Even though GMD is unique in many aspects, some common Army principles of support apply. The
principals are responsiveness, simplicity, flexibility, logistic economy, attainability, sustainability,
survivability, and integration.
Responsiveness is the right support in the right quantity in the right place at the right time.
Among the logistic principles, responsiveness is the keystone; all else becomes irrelevant if the
logistic system cannot support the concept of operations of the supported commander.
Simplicity often fosters efficiency in the planning, execution of national, and AOR logistic
operations. Mission-type orders and standardized, interoperable procedures contribute to
simplicity. Establishment of priorities and pre-allocation of supplies and services by the
supported unit may simplify logistic sustainment.
Flexibility is the ability to adapt logistic structures and procedures to changing situations,
missions, and concepts of operation. Logistic plans and operations must be flexible in order to
achieve both responsiveness and economy. This principle is a guide for strategic thinking and
forms the template for synchronized and coordinated Joint logistic planning.
Logistic economy is achieved when effective support is provided using the fewest resources at
the least cost, and within acceptable levels of risk. At some level and to some degree, resources
are always limited. When prioritizing and allocating resources, the CDR must continuously
consider economy and optimize use of resources to ensure effectiveness and mission success
while supporting every effort toward achieving efficiency.
Attainability (or adequacy) is the ability to provide the minimum essential supplies and services
required to begin combat operations. The commanders logistic staff develops the concept of
logistic support, completes the logistic estimate, and initiates resource identification based on
the supported commanders requirements, priorities, and apportionment.
Sustainability is a measure of the ability to maintain logistic support to all users throughout the
AOR for the duration of the operation. Sustainability focuses the supporting commanders
attention on long-term objectives and capabilities of the supported forces. Long-term support is
the greatest challenge for the logistician, who must not only attain the minimum essential
materiel levels to initiate combat operations (readiness) but must also sustain those operations.
Survivability is the capacity of the organization to prevail in the face of potential destruction.
Logistic units and installations are also high-value targets that must be safeguarded by both
active and passive measures. Active measures must include a defense plan for supply with
provisions for reinforcement and fire support. Passive measures include dispersion, physical
protection of personnel and equipment, deception, and limiting the size of an installation to what
is essential for the mission.
Integration consists of synchronizing general civil support operations with all aspects of military
and civilian, Joint and multinational partners. First, it involves total integration of Army
sustainment process. Support of the commanders plan is the goal of all sustainment efforts.
Effective support requires a thorough understanding of the commanders intent and
synchronizing support plans with the concept of operations. ARFOR conduct operations as part
of Joint, multinational, and interagency teams in unified actions.
SUPPORT CONCEPT
C-26. Originally, GMD was a test bed operation and primarily designed to serve as a test and development
environment. Then, in response to Presidential directions, MDA directed that GMD provide an initial,
limited defensive operational capability. Yet the requirement remained to use GMD as a test bed to
perform non-operational development, test, exercise/training, and maintenance activities. There is a
requirement to allow concurrent or simultaneous use of the GMD system to conduct both tactical
operations and other necessary activities. Concurrent or simultaneous means that regardless of any non-
FM 3-27
3 January 2011
GMD Operations
operational activities taking place, at least a partial set of assets is continuously available and on
operational alert.
C-27. The GMD support concept maximizes support to the GMD commander by including.
A single life-cycle support contractor - One contractor is responsible for all GMD peculiar
maintenance support and is responsive to the commanders direction. Through its PCSS, the
prime contractor will manage:
Supply support.
Technical data.
Computer resources.
The centralized GMD logistics management support structure is under the support contractors
responsibility:
A GMD LOGCC is the support contractors responsibility. The LOGCC provides a single
point of contact for all sustainment actions and readily accessible sustainment information
(such as repair parts usage, due-ins, equipment status, and equipment readiness reporting
data).
The contractor also operates the OSSC tailored to the needs of the GMD assets at each
location. The OSSC is the main element through which the contractor manages the
maintenance support of GMD elements and reports to the commander. Within the OSSC,
the MMC is the single point of contact to facilitate the military oversight of the support
contractor, and ensures the contractors responsiveness to the commanders direction.
Staffing for these elements are 24 hours a day/365 days a year.
The maintenance of GMD exists at two levels, on-site (unit) and off-site maintenance (depot):
Because of the requirement for continuous operations (24 hours a day/365 days a year),
some depot-level maintenance may be performed onsite.
Extensive use of BITE and BIT procedures automatically detect and isolate faults (down to
the LRU level) without interfering with mission performance (while the system is
operational).
The contractor replaces the LRU and repairs it onsite or offsite, as required.
For the long term, the Army considers the use of commercial equipment and practices best
for the fixed sites.
Reach-back While different from JP 3-30, BMDS transition and transfer (T2) plan defines
this as the use of GMD prime contractor assets outside of the support contract when it becomes
necessary to sustain acquisition or construction, maintenance, operation, and disposition of
facilities.
Fix or fight criteria - Operators and maintainers determine SYSCAP failure analysis criteria to
evaluate systems capabilities, to determine if components will fail during crisis or combat
operations.
Parameters that should be considered in the effects of the failure on probability of engagement
success: time to troubleshoot/time to repair, availability of LRU for repair operations, criticality
of defended asset, and time to impact.
These criteria determine if operations proceed or if a system is taken offline for repair.
C-28. The key imperative is that contractor support must be responsive to the military commander and
provided on a noninterference basis. This is critical given the importance of the GMD mission and the need
to generate forces in crises. Commanders must be familiar with FM 3-100.21, to ensure contractor
operations support the mission.
FM 3-27
C-7
Appendix C
Unit Readiness
C-29. The 49th MD BN (GMD) ensures GMD elements are operationally ready according to the potential
for attack, the threat level, FPCON, and the REDCON. Systems must be ready to complete its mission,
while managing many factors such as routine maintenance, weather, training, and equipment upgrades.
Ultimately, the GMD commander participates in asset management conferences and has a voice in
schedules and readiness decisions.
SECURITY OPERATIONS
C-31. This mission of the Military Police (MP) GBI Security Company is to provide area security for the
GMD GBI site. This security is for worldwide GMD operations. The Security Company provides tactical
forces to detect, identify, and eliminate hostile threats to the MDC. The MDC site is protected to an SSLA. Unit capabilities are; fixed facility security for a GBI site, reaction force personnel, physical security
survey and inspection, defense of the GBI area, planning, direction, and coordination of the physical
security activities on site, and defend the site facility. The task organization for security operations for any
future site will have to be revised based upon the specific postulated threat, distances security forces must
travel, climate/weather, configuration of the site, and the number of SSL-A resources.
FM 3-27
3 January 2011
GMD Operations
ARNG personnel man the GMD MP Security Company. The equipment designated in the TOE
and table of distribution and allowance must be available.
Designate the GMD GBI site and other selected local GMD assets as restricted areas.
DESIGN TO THREAT
C-34. Changes to the threat guidance occurred since the approval of the initial GMD unit structure in July
2001. The security force design may undergo other changes as GMD systems evolve. The security force
leaders may need to manage operations aggressively to continue to succeed with the available forces. This
appendix provides a framework from which to base future adaptations.
C-35. The threat to, or aggressors against GMD systems may be criminals, vandals, activists, extremists,
protest groups, terrorists, and/or enemy special forces. They may employ all possible tactics (to include
moving vehicle bombs; stationary vehicle bombs; small arms and standoff attacks on the facility; forced or
covert entry; insider compromise; visual, acoustic, and electronic-emanations surveillance; mail and
supply-bombs; airborne and waterborne contamination; and intrusion or attack) to achieve their intended
purpose. Determine the tactics the aggressors use such as vandalism, public attention, disruption, or
destruction of GMD systems.
C-36. Threat assessment must be continuous. The 49th MD BN (GMD) commander, installation
commander, and the security force must continuously review and assess threats to the GMD installation.
Normally, threat assessment is a Military Intelligence (MI) responsibility. The MI personnel focus on
security threats (such as terrorists and military forces). However, within the US, the Federal Bureau of
Investigation (FBI) has primary responsibility for both foreign and domestic terrorists, and the US Army
Criminal Investigations Division Command (USACIDC) has police information operations (PIO)
collection capability.
C-37. Military police success in effecting law and order relies upon acquisition, processing, and application
of certain essential information. Police information aids in crime prevention and criminal investigations.
Police information supports the commander in administering to unit or installation. Police information in
the US Army is one of the elements of command intelligence. During normal operations, the PIO ensures
MPs and local law-enforcement agencies gather information and provide intelligence input which is
evaluated for relevant intelligence value, and turned into action or intelligence reports. Routine
coordination among these elements is essential to maintaining an effective security program.
C-38. The force design of the MP Security Company organization is to defeat a level II threat. MP Security
Company forces employ organic platoons, standard procedures and tactics, and external assistance
arrangements to resist attacks by small tactical units and special operations forces. The security company
accomplishes security coordination IAW unit SOP and MOA with the garrison security forces and local
and state law enforcement.
Note. A level II threat, as defined in FM 3-39, is a small tactical unit or unconventional-warfare
forces. Special operations forces are highly trained in unconventional-warfare techniques.
PHYSICAL SECURITY
C-39. Physical security is the responsibility of commanders, directors, supervisors, and officers in charge,
whether military or civilian. IAW AR 190-16, physical security programs will provide the means to
counter threat entities during peacetime, mobilization, and wartime. These include:
Paramilitary forces.
Terrorist or saboteurs.
Criminal elements.
FM 3-27
C-9
Appendix C
Protest groups.
Disaffected persons.
C-40. Physical security measures are physical security equipment, procedures, or devices used to protect
security interests from possible threats. They include, but are not limited to:
Security guards.
Physical barriers.
Badge systems.
Secure containers.
Locking devices.
Security lighting.
Facility hardening.
IRF.
Provide personnel security oversight of the contractors and soldiers working within the GBI
missile fields.
Entry Control Facility (ECF) is designed to assist security forces in controlling entry and exit
from restricted areas. The ECF requires five security personnel on duty at all times in order to
FM 3-27
3 January 2011
GMD Operations
perform the required tasks of badge exchange, personnel search and vehicle search. All
personnel and vehicles entering and exiting the MDC must pass through the ECF with the
personnel searches and issuing of badges in one part of the building, and vehicle searches
conducted in a separate part of the building.
Electronic security system (ESS) monitoring is the responsibility of the sergeant of the guard
(SOG), who is the senior MP on duty. From this location, the SOG directs the monitoring of the
integrated electronic security system (IESS) and directs the activities of the security response
forces. One individual is required to operate the IESS (cameras) which consists of perimeter
zone cameras. The number of cameras depends upon the size, construction, topography, and
climate for the MDC site.
Security Response Team/Immediate Response Force will have a dedicated three-person
security response team posted for each SSL-A resource. Additionally, a dedicated three-person
IRF will be posted for the entire MDC as supporting forces for the other four response teams.
Security force personnel shall not be tasked to perform functions unrelated to the security
mission while on duty.
SCC is required at every installation supporting SSL-A, -B, or C resources to provide
command, control, and communications for on-duty security forces. From this location, Soldiers
direct the monitoring of the IESS and the activities of the security response forces.
FM 3-27
C-11
Appendix C
C-51. The command and support relationships of the ARNG GMD security force are both complex and
dynamic command relationships for security operations (see figure C-3).
RESPONSIBILITIES
C-54. USASMDC/ARSTRAT is the ASCC to USSTRATCOM, which has integration responsibility for
missile defense. USASMDC/ARSTRAT and 100th MD BDE OE exercises Title 10 C2 over the GMD
forces. USNORTHCOM may assume OPCON of these forces when required to execute their HLD mission
in response to ballistic missile threat. USASMDC/ARSTRAT responsibilities include:
Organizing, training, equipping, and supplying ARFOR to maintain and operate the site security
system.
Designing and directing an evaluation and certification program for Army security crews to
achieve specified standards.
Coordinating with JPO, ASCC, CCDR, and the State ARNG to ensure support of the installation
commander for the site security mission.
C-55. The 49th MD BN (GMD) commander directly supports the 100th MD BDE (GMD), ARSTRAT, and
the JPO by providing physical security for the site and other selected GMD assets. The commanders
responsibilities include:
Planning and conducting day-to-day GMD operations (training, tests, exercises, and
maintenance).
FM 3-27
3 January 2011
GMD Operations
Supporting security system readiness evaluations and certification program for Army security
crews to specified standards.
Conducting real-time operational and tactical planning for potential attacks and site penetration
attempts.
Providing physical security recommendations to JPO, USASMDC/ARSTRAT, and 100th MD
BDE (GMD) to improve site physical security preparation in response to espionage, sabotage,
terrorism, and damage.
Conducting the tactical execution of the security mission and providing performance assessment
of Soldiers performing the GMD mission.
C-56. The Adjutant General (TAG) is responsible to provide personnel for NG units. TAG must plan
activation, support, and recruitment of the personnel to staff the 100th MD BDE (GMD) and 49th MD BN
(GMD). Responsibilities include:
Providing personnel management for State ARNG Soldiers working GMD mission.
Providing training for State ARNG Soldiers working GMD mission to be proficient in their
common Soldier, individual MOS tasks, and required tasks unique to the AOR.
Ensure Title 32 Soldiers perform Title 32 Active Guard and Reserve (AGR) duties when not
performing the federal mission. AGR soldiers in Title 32 duty status organize, administer,
recruit, instruct, or train the reserve components. Duty descriptions of Title 32 AGR soldiers
will reflect these duties the soldier performs on a regular basis.
C-57. USASMDC/ARSTRAT establishes policies governing GMD site security and the 49th MD BN
(GMD) commander has overall responsibility for GMD site security. The GMD site installation
commander has overall responsibility for physical security and protection of the installation, and
establishes installation policies for personnel protection and physical security measures.
FM 3-27
C-13
Glossary
SECTION I ACRONYMS AND ABBREVIATIONS
AAMDC
AAMDD
AADC
AADP
ABM
Anti-ballistic Missile
ACS
ADA
ADCON
ADSI
Administrative Control
Air Defense System Integrator
AFB
AGR
AMD
AN/TPY-2 (FBM)
AN/SPY-1
AOR
AR
ARFOR
ARNG
ARSTRAT
ASCC
Army Regulation
Army Forces
Army National Guard
US Army Strategic Command
Army Service Component Command
BAM
BCN
FM 3-27
Glossary-1
Glossary
BIT
Built-In Test
BITE
BMD
BMDS
BMEWS
BNOSC
BORRS
C2
C2BMC
C2BM
CAC
CBM+
CBRNE
CCD
CCDR
CDR
CFACC
CLE
CLEAPS
CLS
CMC
CNE
CNIP
COCOM
COMNET
CONOPS
CONPLAN
CONUS
CRM
CSCI
DA
DAADC
- or -
Defended Area
DAL
DCC
DISA
DISN
DOD
Department of Defense
DODD
DMETS
DRSN
FM 3-27
3 January 2011
Glossary
DS
DSCS
Defense Strategy
Defense Satellite Communications System (satellite)
DSN
DSP
ECF
EKV
EHF
EMP
Electomagnetic Pulse
EP
Engagement Planner
ESI
ESS
FBM
FDC
FGA
FM
FPCON
FORSCOM
FRAGO
GBI
Field Manual
Force Protection Condition
Army Forces Command
Fragmentary Orders
Ground-Based Interceptor
GBMD
GCN
GFC
GFC/C
GFE
GINIC
GMD
GFC Communications
Government Furnished Equipment
Global IMD NetOps Integration Center
Ground-based Midcourse Defense
GNCC
GNO
GNOC
GS
GSD
GST
HIC
Human-In-Control
HLD
Homeland Defense
HEMP
HN
HNA
HQ
IBMP
IAMD
FM 3-27
Glossary-3
Glossary
IAW
ICBM
IDT
IFICS
In accordance with
Intercontinental Ballistic Missile
IFICS Data Terminal
In-Flight Interceptor Communications System
IFSR
IFTU
IMCOM
IMD
IO
Information Operations
IR
Infrared
IRBM
IRF
ISR
ITP
ITW/AA
JFC
JFACC
JFCC
JFLCC
JFTOC
JLENS
JP
JPO
JTAGS
Joint Publication
Joint Program Office
Joint Tactical Ground Station
JTAMD
JWARN
LE/MCr
LGCE
LHC
LOGCC
LRU
LSC
LSE
LSOPS
LSS
MAPL
MBE
Management By Exception
MCS
MDA
FM 3-27
3 January 2011
Glossary
MDC
MDE
MDIOC
MDMP
MDO
METT-TC
MILSTAR
MMC
MOA
Memorandum of Agreement
MOS
MRBM
MTJ
N2C2
NAI
NCTAMS
NG
NGB
NORAD
NSPD
OCA
OCONUS
OE
OEM
OPCON
OPIR
OPLAN
Operation Plan
OPORD
Operations Orders
OPSCAP
OPSEC
Operations Capability
Operations Security
OSSC
PAC-3
PATRIOT
PCAL
PCSS
PDS-M
PED
PIV
PME
POM
FM 3-27
Glossary-5
Glossary
PROCAP
PSE
Protection Capability
Peculiar Support Equipment
RAM
RCM
REDCON
Readiness Condition
RFF
ROE
Rules of Engagement
RSE
RSTA
RUF
RV
Reentery Vehicle
SA
Situational Awareness
SATCOM
SBIRS
Satellite Communications
Space-Based Infared System (satellite)
SBX
SCC
SCM
SECARMY
SECDEF
SI
SIV
SLBM
SM-3
SOFA
SOP
SOW
SRBM
SSL-A
STJ
STP
SYSCAP
S&HE
T2
TADIL-J
TAG
TAMD
TAAMDCOORD
TBM
THAAD
TMD
System Capability
Support and Handling Equipment
Transition and Transfer
Tactical Automated DataInformation Link - Joint
The Adjutant General
Theater Air and Missile Defense
Theater Army Air and Missile Defense Coordinator
Theater Ballistic Missile
Terminal High Altitude Area Defense
Theater Missile Defense
FM 3-27
3 January 2011
Glossary
TMDE
TMN
TMW
TNC
TNCC
TOE
TTP
UCP
UEWR
UFO
UHF
US
USASMDC
USC
USCENTCOM
United States
United States Army Space and Missile Defense Command
United States Code
United States Central Command
USEUCOM
USNORTHCOM
USPACOM
USSTRATCOM
WAN
WCS
WMD
WRA
WTP
XP
Execution Plan
FM 3-27
Glossary-7
Glossary
FM 3-27
3 January 2011
Glossary
centralized planning
The process whereby one commander has responsibility and authority for planning and coordinating a military
operation or group/category of operations.
combatant command (command authority)
(Joint) Nontransferable command authority established by Title 10 (Armed Forces), USC, Section 164,
exercised only by commanders of specified combatant commands unless otherwise directed by the President or
the SECDEF. COCOM (command authority) cannot be delegated and is the authority of a CCDR to perform
those functions of command over assigned forces involving organizing and employing commands and forces,
assigning tasks, designating objectives, and giving authoritative direction over all aspects of military
operations, Joint training, and sustainment necessary to accomplish the missions assigned to the command.
COCOM (command authority) should be exercised through the commanders of subordinate organizations.
Normally this authority is exercised through subordinate JFCs and Service and/or functional component
commanders. COCOM (command authority) provides full authority to organize and employ commands and
forces as the CCDR considers necessary to accomplish assigned missions. OPCON is inherent in COCOM
(command authority). (JP 1)
deterrence
(Joint) The prevention from action by fear of the consequences. Deterrence is a state of mind brought about by
the existence of a credible threat of unacceptable counteraction. (JP 1-02)
force protection
(Joint) Preventive measures taken to mitigate hostile actions against DOD personnel (to include family
members), resources, facilities, and critical information. Force protection does not include actions to defeat the
enemy or protect against accidents, weather, or disease. (JP 3-0)
global ballistic missile defense
USSTRATCOM defines GBMD as defensive measures designed to destroy, nullify, or reduce the effectiveness
of adversary ballistic missile attacks that cross COCOM AOR boundaries and require coordination or
integration among the affected combatant commands. Coordinate the employment of GBMD and strike forces
to defeat limited ballistic missile attacks in all phases of flight, or prior to their launch, and defend US deployed
forces, friends, and allies.
information operations
(Army) The employment of the core capabilities of electronic warfare, computer network operations,
psychological operations, military deception, and OPSEC, in concert with specified supporting and related
capabilities, to affect and defend information and information systems and to influence decision making.
joint forces land component commander
(Joint) The commander within a combatant command, subordinate command, or Joint task force responsible to
the establishing commander for making recommendations on the proper employment of assigned, attached,
and/or made available for tasking land forces, planning and coordinating land operations, or accomplishing
such operational missions as may be assigned. The JFLCC is given the authority necessary to accomplish
missions and tasks assigned by the establishing commander. (JP 3-0)
FM 3-27
Glossary-9
Glossary
FM 3-27
3 January 2011
Glossary
operations security
(Joint) A process of identifying critical information and subsequently analyzing friendly actions attendant to
military operations and other activities to: a. identify those actions that can be observed by adversary
intelligence systems; b. determine indicators hostile intelligence systems might obtain that could be interpreted
or pieced together to derive critical information in time to be useful to adversaries; and c. select and execute
measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary
exploitation. [Note: the Army replaces critical information with essential elements of friendly information.
(JP 3-13.3)
passive defense
(Army) Operations that provide essential individual and collective protection for friendly forces, population
centers, and critical assets. The principal measures used to accomplish passive defense are tactical warning,
reducing target effectiveness, reducing vulnerability, and recovery and reconstitution.
Re-entry vehicle
(Joint) That part of a space vehicle designed to reenter the Earths atmosphere in the terminal portion of its
trajectory. (JP 1-02)
rules of engagement
(Joint) Directives issued by competent military authority that delineate the circumstances and limitations under
which US forces will initiate and/or continue combat engagement with other forces encountered. (JP 1-02)
scud
a mobile, short range theater ballistic missile system.
state vector
Grouping of six mathematical values that describe the three-dimensional location, direction, and speed of an
airborne or spaceborne object in relation to the Earths surface.
system of systems
Capability that is primarily composed of previously existing systems, items, or capabilities, generally more
limited or simpler in function.
system security level A
A level of protection applied when the loss, theft, destruction, or misuse of the resource will result in great
harm to US strategic capability.
terminal high altitude area defense
An Army system that will destroy a ballistic missile as it transitions from the mid-course to the terminal phase
of its flight. It is a land-based element that has the capability to intercept both inside and outside of the
atmosphere.
FM 3-27
Glossary-11
Glossary
FM 3-27
3 January 2011
References
REQUIRED PUBLICATIONS
Required publications are sources that users must read in order to understand or to comply with this
publication.
Joint and Multi-Service Publications
All Joint publications are located at http://www.dtic.mil/doctrine/new_pubs/Jointpub.htm .
JP 1, Doctrine for the Armed Forces of the United States, 2 May 2007, change 1, 20 May 2009.
JP 1-0, Personnel Support to Joint Operations, 16 October 2006.
JP 1-02, Department of Defense Dictionary of Military and Associated Terms, 12 April 2001.
JP 2-01.3, Joint Intelligence Preparation of the Operational Environment, 16 June 2009.
JP 2-03, Geospatial Intelligence Support to Joint Operations, 22 March 2007.
JP 3-0, Joint Operations, 17 September 2006, Change 2, 22 March 2010.
JP 3-01, Countering Air and Missile Threats, 05 February 2007.
JP 3-13.3, Operations Security, 29 June 2006 .
JP 3-27, Homeland Defense, 12 July 2007.
JP 3-52, Joint Airspace Control, 20 May 2010.
JP 4-0, Joint Logistics, 18 July 2008.
Strategic Command Instruction (SI) 538-1 Vol. I, Ballistic Missile Defense System Description and
Asset Management, 22 June 2007, change 1, 7 August 2008.
SI 538-1, Vol II, BMDS Logistics Reporting and Assessment Procedures, 22 June 2007.
SI 538-2, Global Ballistic Missile Defense System (GBMDS) Physical Security Program, 20 May
2007.
SI 538-4, Ballistic Missile Defense (BMD) Communications Network (COMNET) Planning,
Integration and Network Operations (NETOPS) Reporting Procedures, 7 August 2007.
United States Strategic Command, Global Missile Defense Concept of Operations (S), 28 February
2010.
MDA Directive 3110.01, Ballistic Missile Defense System Operational Readiness Reporting System,
01 June 2007.
MDA Manual 3110.01-M, Ballistic Missile Defense System Operational Readiness Reporting System,
04 January 2010.
Strategic Command Global Missile Defense Lexicon, 01 June 2009.
Department of Defense Policy
Strategy for homeland Defense and Civil Support, Gordon England Deputy SECDEF, published by
DOD, June 2005 http://www.defense.gov/news/Jun2005/d20050630homeland.pdf
Joint Vision 2020, June 2000, http://www.defense.gov/news/newsarticle.aspx?id=45289
Executive Summary of the Report of the Commission to Assess the Ballistic Missile Threat to the
United States, July 15, 1998 http://www.fas.org/irp/threat/bm-threat.htm
Remarks by President George W. Bush to the Students and Faculty of the National Defense
University, 1 May 2001, http://www.johnstonsarchive.net/nuclear/presidentnmd.html
Title 10, Armed Forces, (http://www.gpoaccess.gov/uscode/browse.html)
FM 3-27
References-1
References
Title 14, Coast Guard, based on the 2006 edition (January 3,2007) (http://frwebgate.access.gpo.gov/cgibin/usc.cgi?ACTION=BROWSE&title=14usc&PDFS=YES)
Title 32National Guard, http://frwebgate.access.gpo.gov/cgibin/usc.cgi?ACTION=BROWSE&title=32usc&PDFS=YES
DoD 5200.08-R, Physical Security Program, 9 April 2007.
CJCSI 3121.01B, Standing Rules of Engagement/Standing rules for the Use of Force for US Forces,
13 June 2005.
DODD 5134.09, Missile Defense Agency (MDA) 17 September 2009.
NSPD 23, National Policy on Ballistic Missile Defense, December 16, 2002,
http://www.fas.org/irp/offdocs/nspd/nspd-23.htm
Joint Electronics Type Designation System (JETDS), MIL-STD-196E 17 February 1998;
https://assist.daps.dla.mil/quicksearch/basic_profile.cfm?ident_number=35607
Army Publications
AR 10-87, Army Commands, Army Service Component Commands and Direct Reporting Units, 4
September 2007.
AR 190-13, Physical Security, 30 September 1993.
FM 1, The Army, 14 June 2005.
FM 3-01, US Army Air and Missile Defense Operations, 25 November 2009.
FM 3-01.15, Multi-Service Tactics Techniques and Procedures for an Integrated Air Defense System,
1 May 2009 .
FM 3-27.10, Army Ground-based Midcourse Defense System Operations, 24 April 2008.
FM 3-39, Military Police Operations, 16 February 2010.
USASMDC Operational Concept for the AN/TPY-2 Forward Based Mode (FBM) Radar, 25 June
2010.
Nonmilitary Publications
Garamone, Jim, A Short History of homeland Defense. American Forces Press Service, 25 October
2001, http://www.defense.gov/news/newsarticle.aspx?id=44614
Mapping the Global Future Report of the National Intelligence Councils 2020 Project, Dec 2004
http://www.foia.cia.gov/2020/2020.pdf
RELATED PUBLICATIONS
These documents must be available to the intended users of this publication.
AR 190-11, Physical Security of Arms, Ammunition, and Explosives, 15 November 2006 .
AR 190-14, Carrying of Firearms and Use of Force for Law Enforcement and Security Duties, 12
March 1993.
AR 420-1, Army Facilities Management, 12 February 2008.
AR 530-1, Operations Security (OPSEC), 19 April 2007.
FM 1-02, Operational Terms and Graphics, 21 September 2004.
FM 1-02.1, Multi-Service Brevity Codes, 17 April 2010.
FM 2-01.3, Intelligence Preparation of the Battlefield, 15 October 2009, change 1, 27 October 2010.
FM 3-13, Information Operations: Doctrine, Tactics, Techniques, and Procedures, 28 November
2003.
References-2
FM 3-27
3 January 2011
References
Readings Recommended
MDA, HTTP://www.mda.mil
National Intelligence Council, Foreign Missile Developments and the Ballistic Missile Threat through
20. http://www.dni.gov/nic/PDF_GIF_otherprod/missilethreat2001.pdf
Office of the SECDEF, Proliferation: Threat and Response, 10 January 2001,
www.dod.gov/pubs/ptr20010110.pdf
NSPD 23, Ballistic Missile Defense, 16 December 2002, http://www.fas.org/irp/offdocs/nspd/nspd23.htm
CRS Report for Congress, Missile Survey: Ballistic and Cruise Missiles of Selected Foreign Countries
Updated July 26, 2005 Strategy for homeland Defense and Civil Support: Department of Defense
Washington, D.C., June 2000, http://www.fas.org/sgp/crs/weapons/RL30427.pdf
PRESCRIBED FORMS
REFERENCE FORMS
Department of the Army (DA) forms are available at the Army Publishing Directorate (APD) Web site at
http://www.apd.army.mil.
FM 3-27
References-3
Index
1
100th MD BDE (GMD), 1-9, 1-
10, 1-11, 1-12, 2-4, 2-5, 26, 4-8, 5-4, 6-8, 6-9, 6-10,
6-11, C-8, C-12, C-13, C14
2
21st century, 3-1, A-19, A-28
Global threat environment,
A-3
4
th
14
Administrative Control, 1-8, 1-
B
Ballistic missile threats, 1-1, 12, 1-3, 1-4, 1-5, 1-6, 1-7, 1-9,
1-10, 1-12, 2-1, 2-2, 2-3, 2-4,
3-1, 3-4, 3-5, 3-7, 3-8, 4-1, 48, 5-5, 6-1, 6-2, 6-8, 6-13, A1, A-18, A-19, A-20, A-21, A22, A-23, A-24, A-26, A-27,
B-1, B-2, B-3, B-4, B-5, B-7,
B-9, B-10, C-1, C-2, C-4, C5, C-13
global, 1-1, 1-2, 1-3, 2-1,
2-2, 3-4, A-1, A-18, A19, A-20, A-24
trends, A-19
missiles, 1-1, 1-2, 1-3, 1-4,
1-5, 1-6, 1-7, 1-9, 1-10,
2-1, 2-3, 2-4, 3-1, 3-3, 34, 3-5, 3-7, 3-8, 4-1, 4-8,
5-5, 6-1, 6-2, 6-8, 6-13,
6-14, A-1, A-18, A-6, A7, A-19, A-20, A-21, A22, A-23, A-24, A-26, A27, B-1, B-2, B-3, B-4,
B-5, B-7, B-9, B-10, C-1,
C-2, C-5, C-13
FM 3-27
Index-1
Index
DSP, 1-5, 2-3, 3-5, 3-6, 54, 6-1, 6-8, 6-14, B-1, B3, B-4, C-2
JTAGS, 1-9, B-10
MDE, 1-12, 2-5, 3-5, 3-6,
3-7, 4-6, 5-4, 6-2, 6-3, 67, 6-8, 6-9, 6-10, 6-11,
6-12, C-8
Space components, B-3
SBX, 1-1, 1-6, 3-5, 3-6, 38, 5-4, 6-8, 6-13, B-1, B2, B-7, B-8
SBIRS, 1-5, 2-3, 3-5, 3-6,
5-4, 6-1, 6-8, 6-14, B-1,
B-3, B-4, C-2
BMDS Network Operations
Support Center, 5-7
Booster Avionics Module, 6-6
C
C2BMC Network Interface
Processor, 2-3, 5-4, 6-13
Chemical, Biological,
Radiological, Nuclear, and
high-yield Explosives, 1-3, 46, 6-16, A-1, A-19
Cheyenne Mountain Complex,
5-8, 6-8
CLE Applications, 6-3
COBRA Dane, 1-1, 1-6, 2-3, 35, 3-6, 3-8, 6-1, 6-8, B-1, B2, B-4, B-6, B-7
Combatant Command, 1-1, 17, 1-9, 2-1, 2-2, 4-10
Combatant Commander, 1-1,
1-2, 1-9, 1-10, 1-11, 2-4, 2-5,
3-4, 3-5, 4-1, 6-11, A-19, C1, C-12, C-13
Combined Forces Air
Component Command, 1-11
Command & Control, 2-1, 2-22,
3-4
GBMD, 2-1, 2-2
Systems, 2-1, 2-2, 3-4
Command and Control, Battle
Management and
Communications, 1-1, 1-4, 22, 2-3, 2-4, 3-5, 3-9, 4-9, 52, 5-4, 5-5, 5-7, 6-1, 6-13, 614, 6-15, 6-17, B-1, B-2
Command and Launch
Equipment, 6-2, 6-3, 6-4, 6-5,
6-9
Command relationships, 1-11, 21, 2-4, 2-5, 3-4, C-12
Commanders Intent, 2-3, 3-5,
3-6, 3-8, 3-9, 4-2, 6-9, C-1,
C-2, C-3, C-4, C-5, C-7, C-11
E
Early warning sensors, 1-1, 13, 1-5, 1-6, 1-9, 2-2, 3-5, 3-6,
3-8, 5-2, 6-1, 6-8, B-1, B-2,
B-4, B-5, B-6, B-7, B-10,
land components, 1-1, 1-6,
2-2, 3-5, 3-6, 3-8, 6-1, 68, B-1, B-2, B-4, B-5, B6, B-10
sea components, 1-1, 1-6,
2-2, 3-5, 6-8, B-1, B-2,
B-7
space components, 1-1, 15, 1-9, 3-5, 6-1, B-2, B3,
Electromagnetic Pulse, 4-8
Electronic Security System, C10
G
Geographical Combatant
Command, 1-1, 1-2, 1-3, 1-7,
1-9, 1-10, 2-1, 2-2, 2-3, 2-4,
2-5, 2-6, 3-1, 3-2, 3-4, 3-5, 39, 4-1, 4-9, 5-1, 5-4, 5-5, 5-6,
6-14, 6-15, 6-17, A-20, B-20,
C-1, C-2
Global Ballistic Missile
Defense, 1-1, 1-2, 1-3, 1-6,
1-7, 1-8, 1-9, 1-10, 1-11, 2-1,
2-2, 2-4, 3-1, 3-2, 3-3, 3-5, 39, 3-10, 4-1, 4-3, 4-6, 4-7, 48, 4-9, 4-10, 5-1, 5-2, 5-4, 55, 5-6, 5-7, A-18, B-1, B-3,
B-4, B-6
Preface, 1-1, 3-3
mission, 1-2, 1-3, 1-8, 1-9,
1-10, 1-11, 2-1, 2-2, 3-3,
4-6, 4-7, 4-8, 4-10, 5-1,
A-18, B-3, B-4, B-6
networks, 3-2, 3-3, 5-1, 52, 5-4, 5-5, 5-6, B-1
organizations, 1-1, 1-6, 17, 1-8, 2-1
operations, 1-7, 1-9, 1-10,
2-2, 2-4, 3-1, 3-2, 3-3, 35, 3-10, 4-6, 4-7, 5-2, 55, B-3
structure, 1-9, 2-1, 4-1
FM 3-27
3 January 2011
Index
sustainment, 4-1, 4-3, 4-9,
4-10
Army role, 1-1, 1-2, 1-11,
3-9
C2 relationships, 2-1, 2-2,
3-9, 6-1
C2 systems, 2-1, 2-2, 5-1,
5-7
Global IMD Netops Integration
Center, 5-4, 5-7
Global Operations, 3-2, 5-7
GMD Communications
Network, 5-2, 5-3, 5-4, 5-5,
5-6, 5-7, 6-2, B-8
GMD Fire Control, 1-6, 1-12, 21, 2-2, 2-3, 2-5, 3-5, 3-7, 3-8,
3-9, 4-6, 5-2, 5-3, 5-4, 5-5, 61, 6-2, 6-3, 6-4, 6-5, 6-6, 6-7,
6-8, 6-9, 6-10, 6-11, 6-12, 613, 6-14, B-1, B-2, B-4, B-5,
B-7, B-9, C-3, C-4, C-5, C-8,
C-11
FDC, 1-12, 2-5, 3-6, 3-7,
4-6, 6-2, 6-3, 6-8, 6-9, 610, 6-11, 6-12, 6-13, C3, C-8, C-11
GFC, 1-12, 2-2, 2-3, 3-5,
3-6, 3-7, 3-8, 3-9, 5-2, 53, 5-4, 5-5, 6-1, 6-2, 6-3,
6-4, 6-5, 6-6, 6-7, 6-8, 69, 6-13, 6-14, B-1, B-2,
B-4, B-5, B-7, B-9, C-3,
C-4, C-5
MDE, 1-12, 2-5, 3-5, 3-6,
3-7, 4-6, 5-4, 6-2, 6-3, 67, 6-8, 6-9, 6-10, 6-11,
6-12, C-8
NG, 2-1, 2-5, 6-10, 6-11
GMD System Trainer, 6-3, C-1
GFC/Communications, 6-1, 62, 6-3, 6-4, C-3, C-4
Ground-Based Interceptor, 2-3,
3-6, 3-8, 3-9, 3-11, 4-10, 5-3,
6-1, 6-2, 6-3, 6-4, 6-5, 6-6, 67, 6-8, B-1, B-2, B-9, C-2, C3, C-8, C-9, C-10, C-11, C12
Ground Safing Device, 6-5
H
High Altitude Electromagnetic
Pulse, 5-6
Homeland Defense, 1-2, 1-10,
2-1, 2-4, 2-5, 3-1, 3-2, 3-9,
C-13
I
IFICS Data Terminal, 4-8, 5-4,
6-2, 6-8, B-8
Immediate Response Force, C11
In-Flight Interceptor
Communications System, 36, 5-4, 6-2, B-2, C-3
In-Flight Status Report, 3-7, 54, C-3
In-Flight Target Update, 3-6, 54, 6-1, B-2, C-3
Information Operations, 3-14,
A-4, A-8, A-10
Integrated Air & Missile
Defense, 1-8, 1-10, 3-3, 3-9,
4-1
Integrated Battle Management
Picture, 2-3, 2-4
Integrated Missile Defense, 11, 1-7, 1-9, 1-10, 1-11, 2-3,
2-4, 3-3, 5-4, 5-6, 5-7, 6-1, 68, C-1
Integrated Tactical Warning &
Attack Assessment, 1-9, 110, 6-3, B-3, B-5
Intelligence, Surveillance and
Reconnaissance, 1-9, 1-10,
3-14, B-5
Intercontinental Ballistic
Missile, 1-2, 1-6, 1-11, 1-12,
2-2, 2-3, 3-1, 3-5, 3-6, 6-1,
A-3, A-5, A-6, C-1, C-4
Intermediate Range Ballistic
Missiles, 1-2, 1-6, 3-1, 3-9,
A-5
J
JLENS, 3-3
Joint commands/organizations
with a role in GBMD, 3-3
USCENTCOM, 1-11, B-10
USEUCOM, 1-11, 2-3, 5-8,
B-10
USNORTHCOM, 1-10, 111, 2-2, 2-3, 2-4, 2-5, 26, 3-2, 3-5, 5-4, 5-5, 5-7,
5-8, 6-3, 6-8, 6-11, 6-15,
C-1, C-12, C-13
L
Launch Essential, Mission
Critical, 4-8
Launch farm complex, 4-8
Launch Ground Comm.
Equipment, 6-3, 6-4, 6-5
Launch Site Components, 6-3,
6-4, 6-5
Launch Station Equipment, 6-3,
6-4, 6-5
Launch Station Operations, 6-4
Launch Support System, 6-2,
6-3, 6-5
Logistics Control Center, 4-3,
4-4, 4-5, C-7
Long-Haul Communications, 53, 5-4
M
Maintenance Management
Center, 4-3, C-7
FM 3-27
Index-3
Index
Medium Range Ballistic
Missile, 3-1, 3-9, B-9
Memorandum of Agreement, 49, 4-10, C-10, C-12
METT-TC, 1-4, 2-5, 4-9, 6-14,
6-15
Military Decision-Making
Process, 1-3, 3-2, C-2
Military Occupational Specialty,
4-1, 4-9, C-5, C-13
MILSTAR, 5-2, 5-6
Missile Defence Agency, 1-3,
1-4, 1-9, 1-11, 4-1, 4-5, 4-6,
4-7, 4-10, 4-9, 5-6, 5-7, 6-15,
B-1, B-8, C-7
Missile defense complex, 1-12,
3-12, 4-8, 6-4, C-8, C-11
Missile Defense Integration &
Operations Center, 2-3, 5-4,
6-8
Mission Applications, 6-3
Mission Control Station, 3-6, 54, 6-14, B-3
Management By Exception, 69, C-4
Missile defense doctrine
definations, 1-1
BMDS, 1-1
GBMD, 1-1, 1-2
GMD, 1-2
TBM, 1-1
Missile Defense Element, 1-12,
2-5, 3-5, 3-6, 3-7, 4-6, 5-4, 62, 6-3, 6-7, 6-8, 6-9, 6-10, 611, 6-12, C-8
Missile Defense Officer, 3-5, 68, 6-11, C-2
Missle defense warfighting
principles, 1-1, 1-3, 3-4
N
N2C2, 6-8
National Security Presidential
Directive 23, 3-1, A-2
National Guard, See Army
National Guard
National Guard Bureau, 6-10,
C-12
NCTAMS, 5-8
NORAD, 1-10, 6-8
O
OCONUS, 4-8, 6-10, A-26, C-1
Operations Capability, 4-6, B-1,
C-8
Operational Control, 1-10, 111, 2-4, 2-5, 2-6, 5-2, 5-4, 611, C-12, C-13
Operation Plan (OPLAN), 2-4,
3-4, 3-5, 3-9, C-1, C-2,
Operations Security, 3-14, A-8
Overhead Persistent Infrared,
3-5, 3-8, B-2
P
PATRIOT Advanced
Capability-3, 1-6, 3-4
PATRIOT, 1-6, 3-3, 3-4, C-2
Peculiar Support Equipment,
6-3, 6-4, 6-5
Personal Identity Verification,
3-10
Physical attack (Sabotage,
Terrorism), 3-1, 3-10, 3-11,
4-6, A-1, A-2, A-7, A-8, A-9,
A-10, C-5, C-13,
Physical security, 3-9, 3-10, 311, C-8, C-10, C-11, C-13,
C-14
Prime Contractor Support
System, 4-3, 4-4, 4-5, 4-6, C7
Prime Mission Equipment, 4-5
Prioritized Critical Asset List, 34, C-1
Processing Display System
Migration, 3-9
Processing, Exploitation &
Disseminatino, 1-9, 1-10
Protection, 1-2, 1-3, 1-6, 3-1, 39, 3-11, 3-12, 4-2, 4-6, 4-9,
5-2, 6-6, 6-16, B-1, B-9, C-6,
C-11, C-14
Protection capability, B-1
R
Readiness Condition, 4-6, 4-7,
6-12, C-8
Readiness Station Equipment,
6-3, 6-4, 6-5
Re-entry Vehicle, 1-4, 1-5, 1-6,
2-3, 3-1, 3-6, 3-8, 6-1, 6-2, 65, 6-13, A-3, A-5, A-6, B-1,
B-4, B-5, C-3
Reliability, Availability &
Maintainability, 4-6
Reliability Centered
Maintenance, 4-2
Request For Forces, 6-17
Rules of Engagement, 3-2, 3-4,
3-5, C-2
S
Satellite Communications, 5-1,
5-3, 5-4, 5-6, A-3
Sea-Based X-band radar, 1-1,
1-6, 3-5, 3-6, 3-8, 5-4, 6-8, 613, B-1, B-2, B-7, B-8
Secretary of the Army, 1-10, 26, 6-11, C-11, C-12
Secretary of Defense, 1-9, 110, 2-1, 2-2, 2-4, 3-9, C-2, C13
Security force considerations,
3-11
Security System Level-A, 3-9,
3-10, 6-16, 6-17, C-8, C-9,
C-11
Sensor Task Plan, 3-7
Short Range Ballistic Missile,
1-7, 3-1, 3-9
Silo Closure Mechanism, 6-4
Silo Interface Vault, 6-3, 6-4
Situational Awareness, 1-9, 23, 2-4, 3-5, 3-7, 4-6, 5-1, 5-2,
5-4, 5-5, 6-2, 6-8, B-1, B-2,
B-5, C-3, C-5, C-8
Space, 1-2, 1-5, 1-6, 1-8, 1-9,
1-10, 2-2, 2-6, 3-3, 3-5, 4-10,
5-1, 5-5, 6-2, 6-3, 6-6, 6-13,
6-14, A-3, A-4, A-5, A-7, B-1,
B-2, B-3, B-5, B-8, B-10, C-1
Space-Based Infrared System,
1-5, 2-3, 3-5, 3-6, 5-4, 6-1, 68, 6-14, B-1, B-3, B-4, C-2
Space Control Center, C-11
Standard Missile-3, B-9
State Governor/State Adjutant
General, 2-6, 6-10, C-12
Status of Forces Agreement, 48, 6-15, 6-16
Submarine Launched Ballistic
Missile, A-5, A-6
Support & Handling Equipment,
6-5
Support concept, 4-3, C-7
Support Principles, 4-2, C-6
Sustainment reporting, 4-6, C-8
System Capability (SYSCAP),
4-3, 4-9, 6-12, A-1, C-8
T
Table of Org. & Equipment, 26, 6-16, 6-17, C-9, C-10
FM 3-27
3 January 2011
Index
TADIL-J, 2-3, 2-4, 5-2, 5-7, 613
Terminal High Altitude Area
Defense, 1-1, 1-2, 1-6, 2-2,
2-4, 3-3, 3-9, 4-1, 6-13, B-4,
C-2
The Adjutant General, C-1
Theater air and missile defense
1-11
Planning, 1-11
Theater Ballistic Missile, 1-1, 614, B-10
Theater Missile Defense, 1-7,
3-3, 6-10, B-5, B-10
Theater Missile Warning, B-10
Threat Evolution, A-3
Ticonderoga-class cruisers, B9
TMDE, 6-4, 6-5
U
UHF/UFO, 5-2, 5-6
Unified Command Plan, 1-1, 19, 2-1, 2-2, 2-5, 2-6, 4-9, 610
United States Code, 1-11
Upgraded Early Warning
Radar, 1-1, 1-6, 2-2, 3-5, 36, 3-8, 6-1, 6-8, B-1, B-2, B4, B-5, B-6
USASMDC 1-2, 1-8, 1-9, 1-10,
1-11, 2-1, 2-6, 3-3, 3-11, 6-8,
6-10, 6-11, C-12, C-13
USCENTCOM, 1-11, B-10
USEUCOM, 1-11, 2-3, 5-8, B10
USNORTHCOM, 1-10, 1-11, 22, 2-3, 2-4, 2-5, 2-6, 3-2, 3-5,
5-4, 5-5, 5-7, 5-8, 6-3, 6-8, 611, 6-15, C-1, C-12, C-13
USPACOM, 1-11, 2-2, 2-3, 5-5,
6-15, B-10
USSTRATCOM, 1-1, 1-2, 1-7,
1-8, 1-9, 1-10, 1-11, 2-1, 2-3,
2-4, 2-5, 2-6, 3-2, 3-3, 3-9, 54, 5-5, 5-6, 5-7, 6-13, 6-14,
C-15, B-6, B-10, C-1, C-2, C12, C-13
W
Weapons Control Status, 3-7,
6-8
Weapons of Mass Destruction,
1-1, 3-1, A-1, A-2, A-3, A-4,
A-5, A-7, A-9
Weapons Release Authority, 35, 3-6, 6-1, C-2
Weapons Task Plan, 2-3, 3-6,
6-3, C-3
FM 3-27
Index-5
FM 3-27(FM 3-27.10)
3 January 2011
JOYCE E. MORROW
Administrative Assistant to the
Secretary of the Army
1034701
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: Not to be distributed; electronic
media only.
PIN: 086285-000