Professional Documents
Culture Documents
jp3 27
jp3 27
T OF T H
EN E
TM HI
S W E' L L
DE
FE
T
ND
AR
AR
• DE P
MY
•
I CA
U NI
ER
TE
M
D
ST A
AT E S O F
Homeland Defense
10 April 2018
PREFACE
1. Scope
2. Purpose
This publication has been prepared under the direction of the Chairman of the Joint
Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of
the Armed Forces of the United States in joint operations, and it provides considerations for
military interaction with governmental and nongovernmental agencies, multinational forces,
and other interorganizational partners. It provides military guidance for the exercise of
authority by combatant commanders and other joint force commanders (JFCs), and prescribes
joint doctrine for operations and training. It provides military guidance for use by the Armed
Forces in preparing and executing their plans and orders. It is not the intent of this publication
to restrict the authority of the JFC from organizing the force and executing the mission in a
manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of
objectives.
3. Application
a. Joint doctrine established in this publication applies to the Joint Staff, commanders of
combatant commands, subordinate unified commands, joint task forces, subordinate
components of these commands, the Services, and combat support agencies.
b. The guidance in this publication is authoritative; as such, this doctrine will be followed
except when, in the judgment of the commander, exceptional circumstances dictate otherwise.
If conflicts arise between the contents of this publication and the contents of Service
publications, this publication will take precedence unless the CJCS, normally in coordination
with the other members of the Joint Chiefs of Staff, has provided more current and specific
guidance. Commanders of forces operating as part of a multinational (alliance or coalition)
military command should follow multinational doctrine and procedures ratified by the United
States. For doctrine and procedures not ratified by the US, commanders should evaluate and
follow the multinational command’s doctrine and procedures, where applicable and consistent
with US law, regulations, and doctrine.
KEVIN D. SCOTT
Vice Admiral, USN
Director, Joint Force Development
i
Preface
Intentionally Blank
ii JP 3-27
SUMMARY OF CHANGES
REVISION OF JOINT PUBLICATION 3-27
DATED 29 JULY 2013
iii
Summary of Changes
Intentionally Blank
iv JP 3-27
TABLE OF CONTENTS
EXECUTIVE SUMMARY .............................................................................................. vii
CHAPTER I
FUNDAMENTALS OF HOMELAND DEFENSE
CHAPTER II
COMMAND RELATIONSHIPS AND INTERORGANIZATIONAL
COOPERATION
General .......................................................................................................................II-1
Unified Action ...........................................................................................................II-1
Command and Control Relationships and Responsibilities .......................................II-3
Interagency Coordination.........................................................................................II-16
Interorganizational Cooperation Considerations .....................................................II-21
Multinational Forces ................................................................................................II-21
CHAPTER III
PLANNING AND OPERATIONS FOR HOMELAND DEFENSE
APPENDIX
v
Table of Contents
GLOSSARY
FIGURE
vi JP 3-27
EXECUTIVE SUMMARY
COMMANDER’S OVERVIEW
vii
Executive Summary
Active, Layered Defense Defending the homeland neither begins nor ends at
US borders, so DOD planning is guided by the
construct of an active, layered defense—a global
defense that aims to deter and defeat aggression
abroad and simultaneously protect the homeland.
It is a defense-in-depth that relies on collection,
analysis, and sharing of information and
intelligence; strategic and regional deterrence;
military presence in forward regions; and the
ability to rapidly generate and project warfighting
capabilities to defend the US, its allies, and its
interests. This defense strategy integrates US
capabilities in the forward regions of the world, in
the geographic approaches to US territory, and
within the US homeland.
viii JP 3-27
Executive Summary
ix
Executive Summary
x JP 3-27
Executive Summary
xi
Executive Summary
xii JP 3-27
Executive Summary
Movement and Maneuver in the HD land defense actions may include movement
Conduct of HD: and maneuver, fires (for lethal and nonlethal
effects), closing with and destroying an enemy,
sustaining a joint force, and setting conditions for
a return to peace. Specific HD land operations in
Land Operations in the Conduct support of HD may include security operations
of HD through force protection (FP) tasks or critical
infrastructure protection (CIP). Defensive land
operations will make use of existing USG
departments’ and agencies’ capabilities where
possible (e.g., DHS).
Space Operations in the Conduct To deter or preempt attacks and to protect military
of HD space assets, DOD conducts space operations in
support of HD. These activities may serve to
protect and defend the US’s ability to operate in
and through space. CDRUSSTRATCOM is the
supported commander for protecting and
xiii
Executive Summary
Cyberspace Operations in the The NMS for CO addresses three main roles: defense
Conduct of HD of the nation, national incident response, and CIP.
GCCs with geographic HD responsibilities should
ensure unified action at the theater level for CO. This
includes coordinating with multinational and
interagency partners as outlined in strategy, policy,
and agreements.
xiv JP 3-27
Executive Summary
CONCLUSION
xv
Executive Summary
Intentionally Blank
xvi JP 3-27
CHAPTER I
FUNDAMENTALS OF HOMELAND DEFENSE
“…the Secretary, with the approval of the President and after consultation with
the Chairman of the Joint Chiefs of Staff, shall provide, every two years or
more frequently as needed, to the Chairman written policy guidance for the
preparation and review of contingency plans, including plans for providing
support to civil authorities in an incident of national significance or a
catastrophic incident, for homeland defense, and for military support to civil
authorities. Such guidance shall include guidance on the employment of
forces, including specific force levels and specific supporting resource levels
projected to be available for the period of time for which such plans are to be
effective.”
1. General
a. The Homeland. The US homeland is the physical region that includes the
continental United States (CONUS), Alaska, Hawaii, US territories, and surrounding
territorial waters and airspace. The United States Government (USG) employs all
instruments of national power to continuously detect, deter, prevent, and defeat threats to
the homeland. This national imperative translates operationally into homeland security
(HS), defense support of civil authorities (DSCA), and homeland defense (HD). The
Department of Defense (DOD) is the lead federal agency (LFA) for defending against
traditional external threats or aggression (e.g., nation-state conventional forces or weapons
of mass destruction [WMD] attack) and against external asymmetric threats that are outside
of the scope of HS operations. The Department of Homeland Security (DHS) is the LFA
for HS, and the United States Coast Guard (USCG) is the LFA for maritime homeland
security (MHS). By law, DOD is responsible for two missions in the homeland: DSCA
and HD.
b. HS, DSCA, and HD operations and events may occur simultaneously and require
extensive coordination, integration, and synchronization. HS forms the foundation upon
which the USG counters threats and hazards, consistent with Presidential Policy Directive
(PPD)-8, National Preparedness. HS operations are constantly executed under legal
authorities that enforce the rule of law at all levels of government in all areas subject to US
jurisdiction, including the homeland and its approaches. DSCA and HD build upon the
foundation of HS to counter the most sophisticated and/or nation-state threats that either
exceed the scope of HS capabilities or require use of DOD authorities to defeat threats to
the homeland. Considerations regarding simultaneous HS, DSCA, and HD operations are
covered in more detail in Appendix A, “Relationships Between Homeland Security,
Homeland Defense, and Defense Support of Civil Authorities.”
I-1
Chapter I
(a) DHS missions under the general concept of HS include the following:
For more information on DHS missions, see the 2014 Quadrennial Homeland Security
Review at https://www.dhs.gov/quadrennial-homeland-security-review.
For more information on EP, see PPD-8, National Preparedness, and the National
Response Framework at https://www.fema.gov/national-response-framework.
I-2 JP 3-27
Fundamentals of Homeland Defense
For more information on DSCA, see Joint Publication (JP) 3-28, Defense Support of Civil
Authorities, and Department of Defense Directive (DODD) 3025.18, Defense Support of
Civil Authorities.
c. Within the homeland, HD, DSCA, and HS require pre-event and ongoing
coordination with interorganizational and multinational partners to integrate capabilities
and facilitate unified action. In this complex environment, there are numerous threats
across multiple jurisdictions (i.e., federal, state, local, and tribal) that are addressed by a
diverse group of actively involved stakeholders (e.g., international organizations,
multinational partnerships, nongovernmental organizations [NGOs], and the private
sector). DOD plans and prepares to operate in concert with other USG entities. For
example, DOD operations may coincide with other actions to counter violent extremist
threats, such as those of a hijacked commercial aircraft or attempts to perpetrate attacks
using WMD. A coordinated approach to unified action promotes early identification of the
desired USG objective(s) and subsequent coordination and collaboration with potential
participants. Guidance such as the Maritime Operational Threat Response (MOTR) Plan
is an example of this approach to operations.
I-3
Chapter I
2. Threats
a. HD should address all external threats and other threats (as directed by the
President) to facilitate a broad-based defense-in-depth. An external threat or aggression is
an action, incident, or circumstance that originates from outside of the homeland. Threats
planned, prompted, promoted, caused, or executed by external actors may develop or take
place inside the homeland. The reference to external threats does not limit where or how
attacks may be planned and executed. The USG has sought to shape the international
environment through the judicious application of diplomatic, informational, military, and
economic instruments of national power. Given the persistent presence of both traditional
nation-state and asymmetric threats, a proactive, comprehensive, and disciplined approach
to HD is required. Additionally, military operations conducted in the homeland require an
in-depth understanding of laws, policies, and procedures because of overlapping
jurisdictions and legal authorities on the use of military forces.
c. WMD. Adversaries have and continue to seek WMD and the means to deliver
them to enhance their influence and achieve greater strategic leverage against US
advantages. They may use the weapons to conduct an attack on US citizens, infrastructure,
and other vital interests and to exploit US power projection, sustainment, and force
protection (FP) vulnerabilities. Increased access to technology, materials, and expertise
heightens the risk that threats will develop, proliferate, and use WMD to achieve their
goals.
See JP 3-40, Countering Weapons of Mass Destruction, for more information on WMD.
I-4 JP 3-27
Fundamentals of Homeland Defense
See JP 3-41, Chemical, Biological, Radiological, and Nuclear Response, for more
information on DOD actions and capabilities to mitigate the effects of a chemical,
biological, radiological, and nuclear (CBRN) attack.
I-5
Chapter I
institutionalized processes and can therefore potentially be less thorough and subjected to
less rigor.
(1) Posse Comitatus Act (PCA). The PCA prohibits the use of the United States
Army (USA) and United States Air Force (USAF) to participate in civilian LE within the
homeland. Title 10, USC, also directs SecDef to promulgate regulations prohibiting
members of the USA, United States Navy (USN), USAF, and United States Marine Corps
(USMC) from providing direct assistance to civilian LE, which was accomplished in
Department of Defense Instruction (DODI) 3025.21, Defense Support of Civilian Law
Enforcement Agencies. HD is a Constitutional exception to the PCA. Military operations
conducted as HD are not LE activities, and thus, Title 10, USC, forces are not subject to
the restriction of the PCA. Additionally, several Act-of-Congress exceptions to the PCA
permit the Armed Forces to support LE activities under other conditions. The PCA does
not apply to NG forces under Title 32, USC, or state active duty status.
(2) Intelligence Activities. Intelligence activities refer to all activities that DOD
intelligence components are authorized to undertake in accordance with (IAW) Executive
Order (EO) 12333, United States Intelligence Activities (as amended); DODD 5240.01,
DOD Intelligence Activities; Department of Defense Manual (DODM) 5240.01,
Procedures Governing the Conduct of DOD Intelligence Activities; DOD 5240.1-R,
Procedures Governing the Activities of DOD Intelligence Components that Affect United
States Persons; Chief, National Guard Bureau (CNGB) Instruction 2000.01, National
Guard Intelligence Activities; and CNGB Manual 2000.01, National Guard Intelligence
Activities. Intelligence activities include the collection, retention, and dissemination of
intelligence by DOD intelligence components.
I-6 JP 3-27
Fundamentals of Homeland Defense
Figure I-2. Guidance and Policy for the Intelligence Oversight Program
outlined within the directive. DOD intelligence elements are not governed by this directive
and must look to DODM 5240.01, Procedures Governing the Conduct of DOD Intelligence
Activities; DODI 3115.12, Open Source Intelligence; DODD 5240.01, DOD Intelligence
Activities; and DOD 5240.1-R, Procedures Governing the Activities of DOD Intelligence
Components that Affect United States Persons, for guidance.
For more details regarding domestic use of UASs, refer to Deputy Secretary of Defense
Policy Memorandum 15-002, Guidance for the Domestic Use of Unmanned Aircraft
Systems. For additional details, refer to Deputy Secretary of Defense Memorandum 16-
003, Countering Small Unmanned Aircraft Systems in the Homeland.
I-7
Chapter I
DOD assets only when such actions cannot be performed by local entities or other USG
departments and agencies in a timely manner.
For more information on IAA, refer to JP 3-28, Defense Support of Civil Authorities, and
the Chairman of the Joint Chiefs of Staff (CJCS) Standing DSCA EXORD.
(3) MISO. MISO are not conducted against US persons IAW law and DOD
policy. However, in addition to HD activities outside of the US homeland, as part of the
discussion in paragraph 5, “The Homeland Defense Operational Framework,” military
information support forces and equipment may also be used to conduct civil authority
information support (CAIS) activities during domestic emergencies within the boundaries
of the US homeland. A CAIS element supports the designated primary agency or civil
authority to disseminate information during domestic emergencies (whether relating to
national security or disaster relief operations). CAIS activities are not part of any MISO
program. The Joint Staff issues specific guidance for military information support forces,
as well as the designated command and control (C2) authority for the mission-tailored
CAIS component.
See JP 3-13.2, Military Information Support Operations, for a more complete discussion
on MISO.
See Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 3121.01, (U) Standing Rules
of Engagement/Standing Rules for the Use of Force for US Forces, for additional
information.
(b) RUF are directives issued to guide US forces on the use of force during
various operations. The standing rules for the use of force (SRUF) apply to land HD
missions occurring within US territory and to DOD forces, civilians, and contractors
performing LE and security duties at all DOD installations (and off-installation, while
conducting official DOD security functions), within or outside US territory, unless
otherwise directed by SecDef. Geographic combatant commanders (GCCs) may augment
SRUF by submitting a request for mission-specific RUF to the CJCS for SecDef approval.
(c) ROE and RUF must conform to appropriate laws, including federal law
(to include military law), the law of war, and other relevant international laws, and they
I-8 JP 3-27
Fundamentals of Homeland Defense
must conform to the situation and locality involved. When NG forces are in state active
duty or Title 32, USC, status, the state RUF will apply. Commanders are responsible for
the education and training of their personnel on ROE, RUF, and the use of nonlethal
and lethal force before they deploy from home station to perform a DSCA or HD
mission. Escalation of force (i.e., moving from nonlethal to lethal force as the situation
dictates) also needs to be part of the training. Self-defense is an inherent right and
obligation exercised by the unit commander in response to a hostile act or demonstrated
hostile intent. Individual self-defense is exercised IAW established ROE or RUF.
a. Defending the homeland neither begins nor ends at US borders, so DOD planning
is guided by the construct of an active, layered defense—a global defense that aims to deter
and defeat aggression abroad and simultaneously protect the homeland. It is a defense-in-
depth that relies on collection, analysis, and sharing of information and intelligence;
strategic and regional deterrence; military presence in forward regions; and the ability to
rapidly generate and project warfighting capabilities to defend the US, its allies, and its
interests. This defense strategy integrates US capabilities in the forward regions of the
world, in the geographic approaches to US territory, and within the US homeland.
b. The Forward Regions. In the forward regions outside US territories, the objective
is to detect, prevent, shape, or when necessary, defeat threats to the US. Actions may
include combat operations; security cooperation; military engagement activities; peace
operations; intelligence operations; or preemptive measures such as direct action missions,
cyberspace operations (CO), or global strike.
c. The Approaches. The approaches extend from the limits of the homeland to the
forward regions. The approaches are not uniformly defined, may not have boundaries, and
I-9
Chapter I
may be characterized based on a specific situation. The primary objective of actions within
the approaches is to locate threats as far from the homeland as possible and defeat them at
a safe distance. The National Military Strategy (NMS) emphasizes the importance of
joining the efforts of multinational and interagency partners to form an integrated defense.
Protecting these approaches requires intelligence and, when possible, enhanced, persistent
surveillance that allows the US to detect, track and, if required, interdict and defeat
potential threats.
a. The HD operational framework includes the plans and actions taken to detect, deter,
prevent, shape, and defeat threats and aggression against the homeland. The purpose of
HD is to protect against incursions or attacks on sovereign US territory, the domestic
population, and critical infrastructure and key resources (CI/KR) as directed. The
following are DOD HD objectives:
(1) Dissuade threats from undertaking programs or conducting actions that could
pose a threat to the US homeland.
(2) Ensure defense of the homeland and deny a threat’s access to the nation’s
sovereign airspace, territory, and territorial seas.
(7) Recover the military force to restore readiness and capabilities after any attack
or incident.
b. The diversity of threats requires DOD, the military instrument of national power,
take a broad role to coordinate all the requirements and objectives of the HD operational
framework. HD operations require integration of capabilities and synchronization of
activities (i.e., arrangement of activities across time, space, and purpose) through
interagency coordination, and, when necessary, interorganizational coordination.
I-10 JP 3-27
Fundamentals of Homeland Defense
(1) Outside the US (in the forward regions and approaches), DOD conducts
activities to maintain the freedom to operate in portions of the OE, access information, and
conduct operations or campaigns to disrupt and defeat terrorists and other enemies before
they are able to execute attacks against the US homeland. Per CJCSI 3110.01, (U) Joint
Strategic Capabilities Plan (JSCP), HD must be integrated into the global campaign plans.
Identity activities are used to restrict mobility and access. Collected identity information
and identity intelligence analytical methodologies are leveraged to identify threat actors
and produce widely releasable products to support targeting, tactical screening, vetting, and
FP initiatives that support global operations, HD, national security screening, and vetting
activities by interagency partners. DOD security cooperation activities (e.g., exercises,
exchanges) and counterproliferation and nonproliferation activities also advance working
relationships, gain or maintain access to a partner nation (PN), and increase interoperability
with friends and allies. The DOD State Partnership Program (SPP) contributes to these
initiatives and is part of the GCCs’ security cooperation program.
See Joint Doctrine Note (JDN) 2-16, Identity Activities, for more information on identity
information and identity intelligence.
(2) Within the homeland, military activities are conducted in, or adjacent to, the
land mass, airspace, and territorial waters of the US. These activities require freedom of
action and full access and use of capabilities in cyberspace and space. HD includes ballistic
missile defense (BMD); cruise missile (CM) defense; interdiction; land operations, to
include protection of critical infrastructure; and defensive cyberspace operations (DCO).
The defense of the homeland requires a multi-domain approach.
I-11
Chapter I
information and intelligence collection and analysis in support of national policy and
interagency decision makers at all levels of the USG. Additionally, maritime warning
utilizes mutual support agreements with other commands and agencies responsible for
maritime defense and security to enable identification, validation, and response to threats
to North America. Another essential interagency organization is the National
Counterterrorism Center (NCTC) that has the specific and unique mission to acquire,
integrate, analyze, and disseminate all available USG information about terrorist threats
and identities. The US and its multinational partners seek a global awareness of all threats
to national security, individually and collectively, to increase the ability to deal with a range
of threats at home and abroad. Early detection of CBRN threats emanating from any theater
must be integrated throughout intelligence planning and execution from collection to
dissemination.
I-12 JP 3-27
Fundamentals of Homeland Defense
effectiveness. They also include deception, mobility, dispersion, systems hardening and
protective construction, warning and surveillance, and operations security.
I-13
Chapter I
Intentionally Blank
I-14 JP 3-27
CHAPTER II
COMMAND RELATIONSHIPS AND INTERORGANIZATIONAL
COOPERATION
1. General
a. HD is part of a global active, layered defense-in-depth that aims to deter and defeat
aggression abroad and simultaneously protect the homeland. It includes the forward
regions, the approaches, and the homeland. The relationships of participants for some HD
activities/operations may be simple and others may be complex, but the supported joint
force commander (JFC) is responsible for all participants understanding their established
command and organizational relationships for the unity of command and
interorganizational cooperation required for unified action during an HD operation.
For more details regarding the relationships and process for federated targeting support,
see JP 3-60, Joint Targeting.
2. Unified Action
II-1
Chapter II
c. During preparation for potential HD land operations, specific USA, USMC, and
special operations units, in conjunction with USNORTHCOM and USPACOM
components and subordinate unified commands, coordinate and conduct exercises with
DHS and other interagency partners. ARNG may support HD as a functionary of the
individual states and territories under Title 32, USC, status or in state active duty status.
The USA and USMC interact with mission partners through civil-military operations
centers (CMOCs) or state emergency management agencies staffed with an emergency
preparedness liaison officer (EPLO). The CMOC capability is established and manned by
civil affairs personnel, but works best when tailored to the specific task associated with the
mission and augmented by assets (e.g., engineer, medical, transportation) available to the
supported commander and unified action partners to synchronize resources, personnel, and
stabilization efforts. The components and subordinate unified commands also work with
Canadian forces to conduct a cooperative defense to secure the land approaches supporting
in-depth defense of the homeland. Command relationships and interagency coordination
required for the complex OE for HD are planned and routinely rehearsed in national-level
exercises.
d. The Royal Canadian Navy teams with USN (i.e., US Naval Forces, Northern
Command) and USCG forces through cooperative training and combined exercises to
ensure both nations’ maritime forces and agencies are poised to respond to maritime threats
to either nation. In the US, DOD has the lead for HD, but many USG departments and
agencies are partners in a collaborative approach.
e. The use of civilian and military space capabilities is essential to the effectiveness
of conducting HD. Canadian forces work with US forces to provide aerospace warning of
space and missile attack through the NORAD Agreement. The Joint Functional
Component Command for Space (JFCC Space) at United States Strategic Command
(USSTRATCOM) and the Service space forces conduct operations to protect and defend
the right to operate in space and are responsible for securing DOD critical assets in space.
GCCs with HD responsibilities provide FP for those ground-based space assets located in
their respective AORs. USSTRATCOM and JFCC Space coordinate with the CJCS, other
CCMDs, DOD, other USG departments and agencies (e.g., Defense Information Systems
II-2 JP 3-27
Command Relationships and Interorganizational Cooperation
a. Military forces remain under control of the established chain of command when
conducting HD operations. IAW with DODD 3160.01, Homeland Defense Activities
Conducted by the National Guard, in exceptional circumstances, NG forces may conduct
HD activities in a state active duty or Title 32, USC, status. These NG forces may
subsequently transition to Title 10, USC, status as authorized by law.
(1) SecDef. SecDef is the President’s principal assistant in all matters related to
DOD. Subject to the direction of the President and law, SecDef has authority, direction,
and control over DOD. Unless otherwise directed by the President, the operational chain
of command runs from the President to SecDef and from SecDef to the CCDRs.
II-3
Chapter II
(3) CJCS. As senior military advisor to the President, the National Security
Council (NSC), the Homeland Security Council (HSC), and SecDef, the CJCS has
numerous responsibilities relating to HD and DSCA. These include advising the President
and SecDef on operational policies, responsibilities, and programs; assisting SecDef in
implementing operational responses to threats or acts of terrorism; and translating SecDef
guidance into strategic plans, including those which conform to resource levels projected
by SecDef. The CJCS also provides for the preparation and review of contingency plans,
which conform to policy guidance from the President and SecDef. The CJCS reviews HD
plans and operations for compatibility with other military plans and assists CCDRs in
meeting their operational requirements. Finally, IAW established DOD policy, the CJCS
reviews and assesses requests from governors for NG HD activities and provides
recommendations to SecDef.
(4) Joint Chiefs of Staff (JCS). The JCS is made up of the CJCS; the Vice
CJCS; the Chiefs of Staff of the Army and Air Force; the Chief of Naval Operations; the
Commandant of the Marine Corps; and the CNGB. While the CJCS is the senior military
advisor, the other members of the JCS are military advisors to the President, the NSC, the
HSC, and SecDef, as well. A member of the JCS may submit to the CJCS advice or an
opinion in disagreement with, or in addition to, the advice or opinion presented by the
CJCS. If a member submits such advice or opinion, the CJCS shall present that advice or
opinion to the President, NSC, HSC, or SecDef at the same time that he presents his own
advice. The individual members of the JCS may also provide advice when specifically
requested.
(5) Commandant, USCG. The Commandant of the USCG advises the JCS on
matters related to HD, HS, and DSCA from the USCG perspective and, as a force provider,
allocates forces under Title 10, USC. The USCG’s supporting roles in HD include
maritime interception and interdiction operations, port security and harbor defense, coastal
sea control, MOTR support, and protection in cyberspace. The Secretary of Homeland
Security delegated authority to the Commandant, USCG, to conduct all MHS activities,
and the Commandant, USCG, conducts MHS under Title 14, USC, authority, through area,
district, and sector commanders. Pursuant to the Memorandum of Agreement Between the
Department of Defense and Department of Homeland Security for the Inclusion of the US
II-4 JP 3-27
Command Relationships and Interorganizational Cooperation
Coast Guard in Support of Maritime Homeland Defense, Commanders Atlantic Area and
Pacific Area continuously exist within DOD as Commander, Coast Guard Defense Force
(CGDEFOR), East and West, respectively. USCG forces must maintain a state of readiness
to rapidly transition from carrying out MHS roles and missions under Title 14, USC, and
the C2 of USCG commanders to execute specific maritime homeland defense (MHD) tasks
under Title 10, USC, and the C2 of CGDEFOR.
(6) CNGB. The CNGB serves as a principal advisor to SecDef, through the
CJCS, on matters involving non-federalized NG and on other matters as determined by
SecDef. As the principal advisor to the Secretary of the Army and the Secretary of the Air
Force on NG matters, the CNGB assists the state adjutants general in supporting,
synchronizing, and facilitating NG HD activities.
II-5
Chapter II
For additional information on C2, see JP 1, Doctrine for the Armed Forces of the United
States.
II-6 JP 3-27
Command Relationships and Interorganizational Cooperation
USNORTHCOM TAG
NORAD NGB
USELEMNORAD
Designated NG
Command CGDEFOR CGDEFOR JFHQ-
Element West East State
Legend
AFNORTH Air Force North combatant command
ALCOM United States Alaskan Command (command authority)
ANR Alaskan North American Aerospace Defense Command Region supporting
CANR Canadian North American Aerospace Defense Command Region operational control
CGDEFOR Coast Guard defense force coordination
CONR continental United States North American Aerospace Defense direct support
Command Region
JFACC joint force air component commander
JFHQ-NCR Joint Force Headquarters-National Capital Region
JFLCC joint force land component commander
JFMCC joint force maritime component commander
JTF-N Joint Task Force-North
MARFORNORTH United States Marine Corps Forces, North
NGB National Guard Bureau
NG JFHQ-State National Guard joint force headquarters-state
NORAD North American Aerospace Defense Command
SOCNORTH United States Special Operations Command, North
TAG the adjutant general
USARNORTH United States Army, North
USELEMNORAD United States Element, North American Aerospace Defense
Command
USNAVNORTH United States Naval Forces, Northern Command
USNORTHCOM United States Northern Command
II-7
Chapter II
the component commander to CDRUSNORTHCOM and has been designated as the joint
force maritime component commander (JFMCC). COMUSNAVNORTH conducts MHD
operations in the USNORTHCOM AOR and supports USCG MHS operations. Upon
declaration of an MHD mission in the USNORTHCOM AOR, the USCG allocates forces
to USNORTHCOM, when requested, for execution of JFMCC-assigned tasks under the
C2 of CGDEFORs East and West. USCG forces allocated to USNORTHCOM for MHD
tasking may be attached with specification of tactical control (TACON) of the JFMCC, to
USNORTHCOM, or OPCON if mutually agreed with the USCG. Figure II-2 depicts the
applicable MHD and MHS command relationships.
II-8 JP 3-27
Command Relationships and Interorganizational Cooperation
CGDEFOR Forces (under Title 10, USCG Forces (under Title 14,
USC, Command) USC, Command)
Allocated DOD and USCG forces USCG area commanders retain OPCON
carrying out MHD tasks are TACON to of USCG forces that are TACON to
CGDEFOR* CGDEFORs*
Conduct JFMCC-assigned MHD tasks Conduct commandant-assigned MHS
SROE Applies tasks including MLE, PWCS, and
regulatory functions
USCG use of force policy applies
Allocated DOD forces to support MHS
tasks are TACON to USCG commander
Legend
CCDR combatant commander USC United States Code
CGDEFOR Coast Guard defense force USCD UOF United States Coast Guard Use of
COCOM combatant command (command authority) Force Policy
JFMCC joint force maritime component commander * unless otherwise agreed
MHD maritime homeland defense
command authority (as specified)
MHS maritime homeland security
OPCON
MLE maritime law enforcement
TACON
OPCON operational control
PWCS port, waterways, and coastal security
SROE standing rules of engagement Joint Service
TACON tactical control
Figure II-2. Maritime Homeland Defense and Maritime Homeland Security Command
Relationships
II-9
Chapter II
responsive and scalable capability to C2 SOF and conventional forces, when attached, in
support of USNORTHCOM’s mission. Commander, SOCNORTH, is the principal SOF
advisor to CDRUSNORTHCOM. The SOCNORTH staff provides special operations
expertise, advice, and assistance to USNORTHCOM, its Service components, and
subordinate commands. SecDef assigns the TSOCs to US Special Operations Command
under CDRUSSOCOM’s COCOM and assigns OPCON of the TSOCs to the GCCs.
SecDef also authorizes CDRUSSOCOM and the GCCs to establish support relationships
when SOF commanders are required to simultaneously support multiple operations or
commanders.
(i) Joint Task Force-North (JTF-N). JTF-N coordinates with DHS and
other federal, state, and local drug law enforcement agencies (LEAs) to leverage military
activities to support CT, counterdrug (CD), and counter transnational organized crime
operations along US borders and littorals to disrupt transnational criminal organizations
(TCOs) and deter their freedom of action in order to protect the homeland. JTF-N is an
element of USNORTHCOM under OPCON of CDRUSARNORTH.
II-10 JP 3-27
Command Relationships and Interorganizational Cooperation
Mariana Islands; Guam; Baker, Howland, and Jarvis Islands; Johnston Atoll; Kingman
Reef; Midway Atoll; Palmyra Atoll; Wake Atoll; the Federated States of Micronesia; the
Republic of the Marshall Islands; and the Republic of Palau. USPACOM also contributes
to the active, layered defense-in-depth of the western approaches to CONUS and Alaska.
CDRUSPACOM is the supported commander for HD within the USPACOM AOR.
Support relationships are coordinated among CCDRs with geographic HD responsibilities
such as against threats from outside the AOR (e.g., USPACOM supporting
USNORTHCOM). CDRUSPACOM may be tasked to support the collaborative federated
architecture for targeting required by CDRUSNORTHCOM.
See JP 3-30, Command and Control of Joint Air Operations, for details regarding theater
JFACC, the joint air operations center, and C2 for joint air operations.
II-11
Chapter II
(a) Interdiction of air and maritime threats to the homeland before they enter
the USNORTHCOM AOR and C2 military handoff when/as appropriate.
II-12 JP 3-27
Command Relationships and Interorganizational Cooperation
(b) Designated lead CCDR element within Joint Interagency Task Force-
South (JIATF-S). JIATF-S works with PNs and US LEAs to stem illegal production and
trafficking of illicit drugs and precursors and to counter the affiliated TCOs, which
undermine the security of nations in the USSOUTHCOM and USNORTHCOM AORs and
threaten overall US national security. USSOUTHCOM’s role provides significant insight
into extant and emerging threats to the homeland. This includes contacts established during
JIATF-S missions that may be determined by USSOUTHCOM or USNORTHCOM to be
an HD threat.
(a) Synchronizes planning for global missile defense and coordinates global
missile defense operations support. Provides missile warning information to CCDRs and
allies, and assessment of missile attack if the appropriate CCMD is unable to do so.
Provides alternate global missile defense execution capability as directed and, as required,
to ensure COOP.
II-13
Chapter II
For details regarding USCYBERCOM and all aspects of CO, see JP 3-12, Cyberspace
Operations.
e. NG. The NG is forward-based in nearly 3,000 communities throughout the US; the
territories of Guam, the US Virgin Islands, and Puerto Rico; and the District of Columbia.
It is readily available to conduct domestic operations, including HD, DSCA, NG civil
support, and HS activities. As a military organization, the NG routinely interacts with state
and local emergency managers; local LE; first responders; and Title 10, USC, forces. The
NG is experienced in supporting neighboring communities in times of crisis. NG forces
II-14 JP 3-27
Command Relationships and Interorganizational Cooperation
have both federal and state responsibilities specified in the Constitution of the US; Title
10, USC; Title 32, USC; and applicable state constitutional provisions and statutes. It
operates not only as RCs of the USA and the USAF supporting the President and their
assigned CCMDs when under Titles 10 and/or Title 32, USC, in time of war and in national
contingencies, but also as an organized militia supporting governors in domestic operations
in Title 32, USC, or state active duty status. It is important that other Service/component
commanders and staffs understand that the statutory roles and authorities of NG forces,
when acting under state control, vary from state to state. Governors may employ the NG
for the HD mission in state active duty status or as provided in Title 32, USC, Section 902,
when approved by SecDef, for HD activities such as critical infrastructure protection (CIP).
When federalized pursuant to Title 10, USC, NG units and personnel are subject to federal
C2.
For more detailed information regarding the NG and HD, see DODD 3160.01, Homeland
Defense Activities Conducted by the National Guard.
(1) NGB. NGB is a joint activity of DOD and serves as the channel of
communications for all matters pertaining to the NG between the Departments of the Army
and Air Force, the 50 states, District of Columbia, Commonwealth of Puerto Rico, Guam,
and the US Virgin Islands. CNGB is the principal advisor to SecDef, through the CJCS,
on matters involving non-federalized NG forces and on NG matters to the Secretaries of
the Army and Air Force and to the Service chiefs of the Army and Air Force. The NGB
participates with the USA and USAF staffs in the development and coordination of
programs pertaining to or affecting the NG. The NGB formulates and administers the
programs for the training, development, and maintenance of the ARNG and ANG.
For more information on the roles and responsibilities of TAGs, see DODD 5105.83,
National Guard Joint Force Headquarters-State (NG JFHQs-State).
(3) Reserves. The reserves, at all times, are subject to a federal chain of
command pursuant to Title 10, USC, as defined by their parent Service. The USCG
Reserve is subject to both Title 10, USC, and Title 14, USC, under the direction of the
Commandant of the USCG.
II-15
Chapter II
unified action. Federal and international law, international and command agreements,
DOD policies, and selected plans provide guidance which the CCDR must integrate to
achieve synchronization. Command arrangement agreements (CAAs) establish
procedures and delineate responsibilities between two or more CCDRs concerning mutual
support, interface, and cooperation. They prescribe the arrangement necessary to support
the employment of forces from one CCDR to another and the control of these forces
operating within a specific AOR or JOA. CAAs may also delineate information and
intelligence dissemination requirements in order to enhance coordination for planning and
execution of cross-AOR operations. CAAs must remain consistent with DOD guidance as
promulgated from SecDef and the CJCS. The CAA between CDRUSNORTHCOM and
CDRUSPACOM establishes the methodology under which transfer of forces between the
two CCMDs is executed in support of HD missions. Additionally, per DOD policies,
CNGB and the state NG forces must be coordinated and synchronized within both the
planning and execution phases to ensure unity of effort. Processes, C2 arrangements, and
communication requirements are representative items addressed in the document.
4. Interagency Coordination
(1) Within the US homeland and its approaches, forces may face continuous
media scrutiny. When faced with media questions or scrutiny, consult with the public
affairs (PA) office before responding. This is due to the sensitive jurisdictional
considerations and political dimensions of a domestic response.
II-16 JP 3-27
Command Relationships and Interorganizational Cooperation
(3) Each CCDR has the prerogative to organize or tailor the interorganizational
coordination function differently based on mission requirements. Regardless of the title of
the interorganizational coordination effort, it should include agency representatives,
command liaison officers (LNOs), and staff representatives who collaborate to share
information; analyze ongoing activities, actions, implications, and/or consequences; and
participate in planning. Interorganizational coordination efforts should ensure the
commander and staff are completely informed on interagency issues and implications.
b. MHD and MHS Coordination. MHD and MHS are closely related, but separate
activities based on the distinct authorities used to implement either MHD or MHS tasks.
The Title 14, USC, functions and powers of the USCG enable USCG commanders to
conduct a broad spectrum of regulatory functions and MHS activities, while maintaining
the capability and readiness to rapidly transition to execute Title 10, USC, MHD tasking
when required. USCG regulatory functions, such as captain of the port (COTP) authorities
and marine transportation system/waterways management activities, may be used to
support or complement MHD operations. MHS activities and USCG regulatory functions
are not conducted under CGDEFOR C2 due to the limitations of Title 10, USC, authority.
JFCs seeking to leverage USCG regulatory functions or MHS activities must coordinate
with the appropriate USCG area commander. DOD forces that are provided to support
MHS operations are TACON to specifically designated USCG commanders. Figure II-2
depicts the C2 of both MHD tasks pertaining to CGDEFOR, as discussed in applicable
EXORDs and interdepartmental agreements, and MHS tasks that are conducted under
USCG-specific authorities.
II-17
Chapter II
(1) MHD Tasks. MHD tasks conducted under the C2 of DOD forces are
categorized under the joint functions and are subject to SROE (see Chapter III, “Planning
and Operations for Homeland Defense”).
(2) MHS Tasks. MHS tasks and related regulatory functions are conducted
under the C2 of USCG commanders, are further described in USCG policy directives and
doctrine, and are subject to USCG use of force policy. Certain MHS tasks may require
immediate USCG access to DOD capabilities and forces. CDRUSNORTHCOM,
CDRUSPACOM, and CDRUSSOUTHCOM may transfer forces to operate under the
TACON of USCG commanders for MHS operations upon request by the USCG. In certain
circumstances, SecDef authorization may be required to reallocate forces or approve a
request for assistance to support MHS for 48 hours or more. DOD forces conducting MHS
operations under USCG C2 must adhere to USCG use of force policy for warning shots
and disabling fire.
For more information on MHS tasks and USCG use of force policy, see Commandant
Instruction (COMDTINST) M16600.6, Maritime Security and Response Operations
(MSRO) Manual; COMDTINST M16247.1, Maritime Law Enforcement Manual (MLEM);
COMDTINST M16600.3, Underwater Port Security Operations Manual; and Coast Guard
Publication 3-0, Operations.
For more information on USCG regulatory functions concerning ports and waterways, see
COMDTINST M16000.11, Marine Safety Manual, Volume VI, Ports and Waterways
Activities.
For more information on the force transfer process for DOD support to MHS operations,
see the CJCS MHD EXORD, CJCS DSCA EXORD, and the Memorandum of Agreement
Between the Department of Defense and the Department of Homeland Security for
Department of Defense Support to the United States Coast Guard for Maritime Homeland
Security.
c. MOTR Process
(1) The MOTR Plan aligns the response to maritime threats against the US. The
MOTR Plan has been used to facilitate the resolution of many maritime threat responses
ranging from migrant interdictions and drug seizures to terrorism and piracy. Operational
protocols complement the plan with detailed guidance for specific types of cases and
agency/department contact information.
(2) The MOTR Plan provides the framework for integrated military, LE,
diplomatic, and intelligence community (IC) action. Ensuring an aligned response is
particularly challenging in the maritime environment where multiple USG departments and
agencies may be involved, each having separate authorities, responsibilities, and
capabilities.
(3) The MOTR Plan supports, for example, the coordinated response to a vessel
suspected of illicit trafficking. Such a response may include identifying the legal basis for
boarding, enactment of diplomatic efforts with a vessel’s flag state, and resolution of
II-18 JP 3-27
Command Relationships and Interorganizational Cooperation
investigative and disposition determinations, all of which potentially involve multiple USG
departments’ and agencies’ authority and jurisdiction.
(4) The Global MOTR Coordination Center facilitates the coordination process
and serves as the executive secretariat for implementation of the MOTR Plan. During
MOTR coordination activities, the Global MOTR Coordination Center is accountable to
the NSC staff (see National Security Presidential Directive [NSPD]-41/Homeland Security
Presidential Directive [HSPD]-13, Maritime Security Policy).
(1) The homeland is a unique theater of operations for US ground forces and is
subject to special requirements. The USA and USMC components to USNORTHCOM
and USPACOM work with DHS, other interagency partners, and civil authorities to
support HS, which complements some aspects of HD. The USA and USARNORTH also
support security cooperation activities with North American partners to help build a
cooperative military defense as part of the effort to secure the land approaches and ensure
defense of the homeland in-depth.
(2) Many of the missions and activities that are conducted by the land component
during shaping operations support other interagency partners and civil authorities, (e.g.
defense support of LEAs, CD, CWMD, countering TCOs, FP, security cooperation
activities with Mexico and The Bahamas, and partnership with Canada). These efforts
contribute to, and are enablers to, both HS and HD. Those efforts help constitute the
prevent aspect of HD. The sharing of identity information between interagency partners is
a key enabler to manage and track cross-border movement. NSPD-59/HSPD-24,
Biometrics for Identification and Screening to Enhance National Security, instructs all
federal agencies to make available to other agencies biometric and associated biographical
and contextual information associated with persons of interest. Operational commanders
collect and provide identity information on terrorists encountered in the OE to the NCTC
through the Defense Intelligence Agency (DIA) Watch Listing Division.
For additional information on joint land operations, refer to JP 3-31, Command and
Control for Joint Land Operations.
e. AOTR Process
II-19
Chapter II
prescribes the AOTR Plan as part of the overall national aviation policy. Simply stated,
the AOTR is primarily to counter asymmetric threats involving civilian aviation, but
includes considerations for interagency coordination to defend against foreign military air
and missile attacks. Several DOD HD responsibilities fall within the protocols of the
AOTR. DOD response capabilities remain an integral part of the overall national response
in support of HD and HS complementary objectives and missions.
(3) Upon AOTR execution and time permitting, DOD initiates secure
communications with appropriate departments and agencies to facilitate the timely flow of
information. This will allow for appropriate consultation related to the initial DOD
airborne operational response, as well as coordination of related LE actions or other
security measures. DOD performs the following activities specific to AOTR, as
appropriate:
(a) Specific Airborne Threats (an ongoing or potential attack from the air):
II-20 JP 3-27
Command Relationships and Interorganizational Cooperation
For more information on the full range of air operations, refer to JP 3-01, Countering Air
and Missile Threats, and JP 3-30, Command and Control of Joint Air Operations. For
more information on the AOTR, refer to the Aviation Operational Threat Response Plan.
a. The threat exists across a continuum that ranges from nation states down to
individuals and small groups, who are intent on doing harm to the US. Today, HD mission
response forces involve multiple organizations. Operation NOBLE EAGLE (ONE), the
NORAD, USNORTHCOM, and USPACOM operation aimed at defending the homeland,
involves active duty personnel from the USAF, USN, Canadian Forces, and NG members
federalized for the mission. These military forces coordinate with DOT (FAA), DHS, the
Department of Justice (DOJ), and other USG departments and agencies, as appropriate. A
response to a possible hijack situation would involve the private sector as well as local first
responders. For example, airline companies, private or municipal airports, local
municipalities, and other non-federal entities are responsible for the aircraft and any
airports where the aircraft may attempt to land or be directed to land. This demonstrates
the complex environment in which DOD forces must respond to threats that involve
multiple jurisdictions (federal, state, territorial, local, and tribal) with domestic partners
and international/multinational partners (e.g., NORAD).
6. Multinational Forces
To conduct the full range of HD operations, CCDRs should consider multinational and
nonmilitary organizations. When a response force resides within an alliance, the
procedures and structure of that alliance will normally determine the operational-level
leadership. When a response force is based in a coalition (or a lead-nation structure in an
II-21
Chapter II
alliance), the designated lead nation or other leadership mechanism will normally select
the operational-level leadership. While the President and SecDef retain command
authority over US forces, it is often prudent or advantageous to place appropriate US forces
under the TACON of a foreign commander for reasons such as maximizing military
effectiveness and ensuring unity of effort.
(1) In the forward regions, CCDRs and their components conduct security
cooperation activities with PNs that help provide the outer layer of HD.
(2) GCCs with geographic HD responsibilities have AORs with very different
characteristics. In addition to its vast airspace, the USPACOM AOR is predominantly
maritime and includes considerable political, religious, cultural, social, and economic
diversity. It encompasses the Asia-Pacific region, with numerous sovereign nations and
one-half of the Earth’s surface. The area includes five of seven US security treaty alliances
and extensive international waters covered by international law, as well as US territories
under US law, treaties, or compacts. The USNORTHCOM AOR is primarily continental,
with extensive land borders and coastal regions. It includes Canada, Mexico, The
Bahamas, Turks and Caicos Islands, Bermuda, the British Virgin Islands, Puerto Rico, the
US Virgin Islands, and the US (excluding Hawaii and Pacific territories) with multiple
legal and policy concerns. USNORTHCOM security cooperation efforts with Canada and
Mexico directly impact US defense-in-depth.
II-22 JP 3-27
Command Relationships and Interorganizational Cooperation
LNOs, and other activities that facilitate HD. Cooperative defense helps foster appropriate
relationships to leverage complementary capabilities and capitalize on limited resources.
Finally, current efforts toward an integrated North American defense warrant an increase
in HD exercises and personnel exchanges.
(3) Various initiatives and agreements exist that forge relationships and provide
for multinational coordination in the defense of the homeland. For example, the Canada-
United States Combined Defense Plan is another step towards an integrated North
American defense.
d. The OE and the coordinated and integrated action of all contributors may blur the
distinct contribution of any individual organization or capability in isolation from all
others. This is particularly true when contemplating the complex environment within the
II-23
Chapter II
homeland. Each organization has unique capabilities that may not be easily duplicated by
other departments, agencies, or organizations. The supported JFC should continually
address the challenge of coordinating, integrating, and synchronizing the wide range of
available capabilities to defend the homeland. Employment of nonlethal capabilities
should be considered in any situation requiring direct fire capabilities.
e. To achieve the objectives, unified action, and the synchronization and integration
of military operations in time, space, and purpose, the JFC must consider many factors, to
include:
(1) What objectives, when achieved, will attain the desired end state?
(3) How can the resources of the joint force and interorganizational and
multinational partners be applied to accomplish that sequence of actions?
(4) What is the likely cost or risk to the joint force in performing that sequence
of actions?
II-24 JP 3-27
CHAPTER III
PLANNING AND OPERATIONS FOR HOMELAND DEFENSE
1. General
The threat to the homeland is both difficult to predict and increasingly diverse. The
likelihood of conventional large-scale land attack on the US may be remote. However, the
wide range of threats that does exist must be addressed. In modern times, US forces have
concentrated on defeating threats as far away from the homeland as possible and that
remains the objective. The central idea is to protect the homeland from external threats
and aggression using integrated strategic, operational, and tactical offensive and defensive
measures as necessary. The ability to detect, deter, prevent, or, if necessary, defeat threats
is a required capability to protect the homeland. Specific planning factors, requirements,
and objectives for HD operations are contained in OPLANs and CONPLANs associated
with the mission.
2. Strategic Guidance
3. Operational Factors
For additional information on civil and military relationships during a domestic incident,
see PPD-25, Guideline for US Government Interagency Response to Terrorist Threats or
Incidents in the US and Overseas.
III-1
Chapter III
(1) CJCSM 3130.03, Adaptive Planning and Execution (APEX) Formats and
Guidance, requires the JFC to include communication goals and objectives in the
commander’s intent and to have a communication approach that ensures unity of themes,
objectives, and messages among key activities; consistency in intent or effect between
command operations, actions, and information; and a risk assessment of the information
that may reach unintended audiences, create unintended consequences, and require risk
mitigation measures.
For more information, see JP 3-0, Joint Operations; JP 3-61, Public Affairs; and JDN 2-
13, Commander’s Communication Synchronization.
(2) Commanders and their staffs should consider the interrelationship between
HD and DSCA operations (i.e., the potential for transition between the missions and
simultaneous operations).
III-2 JP 3-27
Planning and Operations for Homeland Defense
domestically. Coordination with the servicing office of the staff judge advocate for legal
advice should be as early in the operation planning process as possible.
d. The parameters under which DOD operates are different in the US than they are
overseas. In the past, one individual typically dealt with foreign information and the other
domestic. Today both involve elements of foreign and domestic information. Determining
the nature of the data required and the right units to gather it are areas that often require
judge advocate input regarding the legal authorities for information gathering. Intelligence
activities in the homeland are strictly governed by the Constitution; applicable laws; the
policies and procedures authorized in DODD 5240.01, DOD Intelligence Activities; and
other relevant DOD policies (e.g., intelligence oversight). These policies permit DOD
intelligence missions in the homeland if the subject of the intelligence effort is definitively
linked to defense-related foreign intelligence and CI activities. Intelligence oversight
policies also provide established guidance and requirements to perform activities or
missions not intelligence related (e.g., using domestic imagery for incident assessment and
awareness). However, intelligence oversight policies also provide specific guidance and
regulations to ensure or safeguard against unauthorized collection against US persons
(citizens, legal residents, and organizations). Special emphasis shall be given to the
protection of the Constitutional and privacy rights of US persons.
III-3
Chapter III
5. Joint Fires
Joint fires are fires delivered during the employment of forces from two or more
components in coordinated action to produce desired effects in support of a common
objective. Joint fires may be provided to assist air, land, maritime, or special operations
forces in conducting HD activities within an OE framed by complex legal authorities and
significant interagency coordination. Although major operations against an enemy in the
US remain highly unlikely, various threats require capabilities and preparations to deter or
defeat them. For that reason, the supported JFCs for HD have plans/orders for HD
operations that anticipate the use of joint fires across the range of military operations. The
following preparations provide useful examples of the challenges of employing joint fires
in HD.
(1) The threat of ballistic missile attack against the homeland is the one strategic
threat that would require the use of fires to protect the homeland. The limited defense
option for BMD is discussed under paragraph 7, “Protection.”
(3) Terrorist threats to the homeland from overseas may require use of joint fires
through military CT operations or in support of LE activities. Terrorist threats within the
III-4 JP 3-27
Planning and Operations for Homeland Defense
homeland are an HS mission rather than a matter of HD, unless directed otherwise by the
President.
b. Maritime Joint Fires. Maritime joint fires provide significant capabilities against
any maritime-based threat to the homeland. The maritime environment, including the sea
approaches to the homeland, may afford opportunities to employ joint fires in support of
both HS and HD. Maritime forces can be employed to rapidly destroy, intercept, or
neutralize conventional and terrorist threats, both at sea and ashore. These assets are used
to keep potential threats at bay, far from US shores, but could be deployed close to home
if threats dictate. Use of fires for lethal or nonlethal effects are options. The maritime
aspect of air and missile defenses are discussed under paragraph 7, “Protection.”
(1) A variety of maritime threats to the homeland exists and may include cargo
ships, fishing boats, semi-submersibles, and military vessels. Once a vessel has been
identified as a threat to the homeland, maritime forces’ options may be employed to detect,
deter, prevent, and defeat the delivery of the weapons, cargo, or people to the intended
target(s). Maritime forces may take action as defined by the chain of command, the SROE
and supplementary measures, if any.
(2) Depending on the threat, MHD options may be determined through the
MOTR Plan protocol process. Within the USNORTHCOM AOR, the JFMCC directs
MHD operations that may include appropriate Service or SOF assets to detect, deter,
prevent, and defeat threat vessels.
c. Land-Based Fires. HD presents complex operational challenges for joint fires due
to the necessity to achieve unity of effort within an OE of sovereign states (with NG units)
and the need to interface with a number of disparate government agencies, NGOs, and the
private sector. Land-based fires for HD operations require interorganizational cooperation,
especially since there is significant overlap between DOD executing HD and LE
organizations executing HS and supporting HD. Land-based fires for air and missile
defenses are discussed under paragraph 7, “Protection.”
d. Supporting Fires. Conducting HD, US-only air missions may require a high
degree of dynamic targeting that relies on rapid coordination and integration of assessment,
surveillance, and attack assets in real time. In the homeland, it is likely dynamic targeting
and deliberate targeting (via air tasking orders [ATOs]) would require close coordination
and integration with FAA operations.
See JP 3-30, Command and Control of Joint Air Operations, for information on
coordinating and executing ATOs, and JP 3-60, Joint Targeting, for information on
dynamic targeting.
e. CO. HD also presents unique challenges for the JFC in the selection and
engagement of the cyberspace elements of targets. Since specific attribution of cyberspace
threats and their geographic locations are often difficult to determine, the JFC must
carefully coordinate cyberspace fires based upon best available target intelligence and the
specific effects authorized in their order.
III-5
Chapter III
(1) The GCCs with geographic HD responsibilities should anticipate, plan, and
be prepared for offensive and defensive land operations. Large-scale HD operations
involving maneuver forces, combined arms maneuver, and the conduct of major combat
offensive or defensive operations would be an extraordinary circumstance involving
extraordinary decisions by the President. However, these types of operations are planned
and prepared for within the doctrinal realm of HD. HD land defense actions may include
movement and maneuver, fires (for lethal and nonlethal effects), closing with and
destroying an enemy, sustaining a joint force, and setting conditions for a return to peace.
Specific HD land operations in support of HD may include security operations through FP
tasks or CIP. Defensive land operations will make use of existing USG departments’ and
agencies’ capabilities where possible (e.g., DHS).
(2) Land operations in the conduct of HD are planned and executed by the GCCs
through their subordinate commands and either Service-specific task force HQs or JTFs.
Commanders consider the scope of the OE, the specified and implied tasks, and span of
control when selecting the appropriate C2 relationship. In addition, commanders should
consider the interagency environment; the effect of current operations on the civilian
populace; and the role of the state, tribal, and local LEAs when executing HD operations.
Based upon available forces, each GCC with geographic HD responsibilities has identified
subordinate commands that establish or source HQs for HD operations. The JFLCC may
utilize the respective DCE assigned to the region as an advance element to provide
situational awareness within the AOR and coordinate with interagency partners during
DSCA and/or HD operations. Service components may utilize their respective EPLOs as
an advance element to provide situational awareness within the AOR and coordinate with
interagency partners during DSCA and/or HD.
(3) Although land defense forces may be required to defend in the short term,
decisive results require shifting to the offense as soon as possible. However, HD operations
should be of limited duration and conclude when the land forces achieve the objectives of
the operation.
III-6 JP 3-27
Planning and Operations for Homeland Defense
situation IAW Title 32, USC, Sections 901-908, and DODD 3160.01, Homeland Defense
Activities Conducted by the National Guard.
1. Figure III-1 shows how land forces may be provided and employed
for a rapid response. When directed by the President or SecDef to conduct HD operations,
CDRUSNORTHCOM can consider several initial land force options: employ a QRF or
RRF, employ a JTF with OPCON over a QRF or RRF, employ a JFLCC with OPCON
over a QRF or RRF, or employ USARNORTH as a single-Service HQ with OPCON of a
QRF or RRF. Based on this decision, CDRUSNORTHCOM sends a request for forces
(RFF) to the Joint Staff. Once SecDef approves the RFF, force providers are directed to
source personnel and equipment through Service components and provide them to
CDRUSNORTHCOM. If a larger force is required, then follow-on forces can be
employed. These follow-on forces may combine with the QRF or RRF as a task force,
under a JTF. A dedicated QRF/RRF would only be utilized in a very small or isolated
incident requiring quick reaction.
President
Secretary of Defense
Forces Commander
Force Providers CNGB TAG
USNORTHCOM
NG
JFHQ-
QRF or USARNORTH or State
RRF or
JTF or JFLCC or
MARFORNORTH
NG
QRF or QRF or QRF
Execution QRF or RRF
RRF RRF
Task Force
(Follow on force,
if employed)
Legend
CNGB Chief, National Guard Bureau TAG the adjutant general
JFLCC joint force land component commander USARNORTH United States Army, North
JTF joint task force USNORTHCOM United States Northern Command
MARFORNORTH United States Marine Corps Forces
North command authority
NG National Guard operational control
NG JFHQ-State National Guard joint force coordination
headquarters-state
QRF quick response force force option
RRF rapid response force
III-7
Chapter III
III-8 JP 3-27
Planning and Operations for Homeland Defense
President
2. Approved
RFF
Secretary of Defense
3. Forces Commander
Force Providers USNORTHCOM
Execution
Legend
JFLCC joint force land component commander command authority
RFF request for forces operational control
USMC United States Marine Corps
USNORTHCOM United States Northern Command force option
When directed by the President, responsibility for the security and defense of the homeland
and its maritime approaches is shared between DOD and the USCG.
III-9
Chapter III
supporting binational NORAD missions when required, including maritime warning and
aerospace warning and control (air defense).
For further information, see JP 3-32, Command and Control for Joint Maritime
Operations. For additional discussion of USN C2 and commander, task force, integrated
air and missile defense (IAMD), see Navy Warfare Publication (NWP) 3-32, Maritime
Operations at the Operational Level of War, and NTTP 3-32.1, Maritime Operations
Center. For further information on the maritime composite warfare commander, see NWP
3-56, Composite Warfare: Maritime Operations at the Tactical Level of War. For more
information, refer to USNORTHCOM CONPLAN 3400, Homeland Defense, and
USPACOM MHD EXORD.
III-10 JP 3-27
Planning and Operations for Homeland Defense
(b) Limited access areas such as safety or security zones may be required to
support MCM operations. MCM forces must coordinate these regulatory functions with
USCG COTPs, through the cognizant USCG area commander, when the MCM AO
encompasses waters subject to US jurisdiction. DOD forces, through the senior naval
officer present in command, have authority to enforce exclusionary zones established
around large naval vessels, 100 feet or longer, whenever the USCG is not present in an
effective MHS/LE capacity. These naval vessel protection zones are always in effect when
large naval vessels transit waters subject to US jurisdiction.
For more information, see JP 3-08, Interorganizational Cooperation, and Title 33, Code of
Federal Regulations, Parts 6 and 165.
For further information, see JP 3-15, Barriers, Obstacles, and Mine Warfare for Joint
Operations.
For more information on USCG military outload protection, see COMDTINST M16600.6,
Maritime Security and Response Operations (MSRO) Manual.
III-11
Chapter III
(a) MIO are designed to halt the movement of designated items into or out
of a nation or area. Units involved in MIO not only provide unit presence, but may also
use reasonable force if a boarding is noncompliant or opposed, subject to applicable ROE.
The specific political, geographic, and tactical factors and the legal authority on which the
MIO are based influence the enforcement procedures. Under certain circumstances, MIO
conducted by a JFC may lead to a DOD-initiated MOTR process if additional interagency
authorities, capabilities, disposition, and/or application of US jurisdiction are in the USG’s
interest.
(b) MIO are a USN core mission. Most USN ships and USCG cutters are
capable of conducting compliant and certain types of noncompliant boardings. USN ships
and USCG cutters must be augmented by other forces (e.g., SOF, USMC maritime raid
forces, USCG LE detachment or maritime security response team) to conduct certain types
of noncompliant boardings or to conduct opposed boardings.
For more information on compliant, non-compliant, and opposed boardings, see NTTP 3-
07.11M/CGTTP 3-93.3/Marine Corps Interim Publication (MCIP) 3-33.04, Visit, Board,
Search, and Seizure Operations.
(c) Maritime forces may also be tasked to conduct EMIO. EMIO are
authorized by the President through SecDef to deter, degrade, disrupt, or prevent attacks
against the US and its allies. EMIO involve interception of targeted personnel or materiel
that poses an imminent threat to the US and its allies. EMIO may be implemented without
sanctions and may involve multinational forces. For further reference, see NTTP 3-
07.11M/CGTTP 3-07.11/MCIP 3-33.04, Visit, Board, Search, and Seizure Operations.
See also JP 3-03, Joint Interdiction.
(8) Littoral Operations. Both MHS and MHD operations may occur
simultaneously in the homeland’s littoral areas. The USCG conducts MHS operations at
all times to prevent, disrupt, and respond to terrorism, sabotage, espionage, or subversive
acts. During a declared MHD mission, MHD in the littoral regions includes maritime
forces conducting harbor approach defense to protect shipping in designated harbor
approach areas, to assure unimpeded use of harbor approach areas and application of lethal
and nonlethal force under SROE to deny the use of these areas by enemy forces.
III-12 JP 3-27
Planning and Operations for Homeland Defense
(2) Aerospace defense operations within the homeland provide some unique
concerns for CDRUSNORTHCOM and CDRUSPACOM.
(a) Size. The GCCs’ HD responsibilities include vast areas of airspace, land
masses, and water. In particular, North America is a huge land mass with multiple avenues
of approach that an adversary could use to advantage.
(e) ROE. The airspace over areas of the homeland is congested. For
example, there may be up to 5,000 aircraft at a given time over CONUS. ONE operates
with strict ROE in this very dense airspace. The ROE for operating in US airspace often
produce a constrained engagement environment.
(b) The OA includes the portions of the homeland that fall within the
USNORTHCOM AOR, specifically CONUS, Alaska, the US Virgin Islands, and Puerto
Rico. CDRUSPACOM is the designated CCDR for HD missions within the USPACOM
AOR. CDRUSNORTHCOM is the supported CCDR for HD missions within the
USNORTHCOM AOR that are not under the direction of CDRNORAD.
III-13
Chapter III
threat to quickly deploy and execute a decisive response. NORAD plays a critical role in
the air and space defense of Canada and HD of the US by providing aerospace warning
and airspace control and maritime warning for North America.
(a) ONE. ONE is the operation covering aerospace warning and control
aspects of HD for CONUS, Alaska, the US Virgin Islands, and Puerto Rico. As the
binational element of this operation, NORAD is tasked to support ONE by employing the
forces and C2 necessary to protect these areas from air attack. USPACOM provides C2
(through Pacific Air Forces) for ONE support to Hawaii and US territories in USPACOM’s
AOR.
(b) The authority and decision to engage is made at the highest levels of
command. NORAD constantly refines its procedures and coordinates with DHS; Public
Safety Canada; Emergency Preparedness Canada; the FAA and its Canadian equivalent,
NAV CANADA (air traffic control agency); and with civilian LE organizations and other
government agencies within the US and Canada.
For a more complete description of the NORAD missions, organization, and structure, see
Appendix C, “North American Aerospace Defense Command, Missions, Organization, and
Structure.” For more information, refer to NORAD CONPLAN 3310, Aerospace Defense
& Maritime Warning, and ONE EXORD.
d. Space Operations in the Conduct of HD. The region in space above the US and
other countries cannot be owned or possessed like territory. However, it is USG policy
that purposeful interference with US space systems will be viewed as an infringement on
the nation’s sovereign rights. In order to deter or preempt attacks and to protect military
space assets, DOD conducts space operations in support of HD. DOD defense critical
infrastructure (DCI) activities may be closely related to military space operations, given
that selected space capabilities may be classified as DCI. These activities may serve to
protect and defend the US’s ability to operate in and through space. CDRUSSTRATCOM
is the supported commander for protecting and defending the right to operate in space and
is responsible for identifying, assessing, and securing DOD critical assets in space.
III-14 JP 3-27
Planning and Operations for Homeland Defense
(1) The NMS for CO and the DOD Cyber Strategy offers a comprehensive
strategy for DOD to enhance US superiority in cyberspace. The NMS for CO addresses
three main roles: defense of the nation, national incident response, and CIP. GCCs with
geographic HD responsibilities should ensure unified action at the theater level for CO.
III-15
Chapter III
(c) As LFA for the maritime transportation system under the DHS National
Infrastructure Protection Plan, the USCG leads overall unity of effort required to protect
the maritime transportation sector from cyberspace attacks while supporting DODIN
operations.
For more information on USCG roles in CO, see the USCG Cyber Strategy, at
https://www.uscg.mil/seniorleadership/DOCS/cyber.pdf.
(3) NG support to CO at the state level consists of CO squadrons within the ANG
and cyber protection teams within the ARNG.
III-16 JP 3-27
Planning and Operations for Homeland Defense
infrastructure that enable individuals and organizations to create effects. The informational
dimension specifies where and how information is collected, processed, stored,
disseminated, and protected. The cognitive dimension encompasses the minds of those
who transmit, receive, and respond to or act on information. Information-related
capabilities such as MISO as part of commander’s communication synchronization are
used to create effects in the information environment.
(a) Consistent with laws and policy, Services, DOD agencies, and non-DOD
agencies should provide capabilities to support CCMD requirements to ensure the
interoperability, availability, and shared situational awareness and understanding of the HD
information environment. This includes capabilities to detect, deter, prevent, and defeat
virtual and physical attacks against DODIN infrastructure that directly or indirectly
supports HD missions.
(b) There are three primary aspects to providing available and effective
systems to execute HD. These are: providing a reliable, robust HD communication
system; improving information sharing among HD mission partners; and assuring and
defending the critical DODIN infrastructure against threats and aggression.
For more information on DODIN, see JP 3-12, Cyberspace Operations, and JP 6-0, Joint
Communications System.
III-17
Chapter III
(1) JRSOI for a large force can/will most likely require resources beyond that of
the designated base support installation (BSI). The supported CCDR should request
sufficient JRSOI support to ensure the designated BSI can perform JRSOI.
(2) Reception operations include all those functions required to receive and clear
unit personnel, equipment, and materiel through the BSI or reception area. For HD
operations within the USNORTHCOM AOR, the personnel, equipment, and materiel will
likely originate from within the JOA. In that case, personnel, equipment, and materiel are
already accounted for at the home base, making the home base essentially the point of
departure. Component support plans should address processes for in-place personnel
reporting to the CJTF.
III-18 JP 3-27
Planning and Operations for Homeland Defense
(4) Onward movement is the process of moving units and accompanying materiel
from reception facilities, marshalling areas, and staging areas to tactical assembly areas
(TAAs), OAs, or other theater destinations. Because units and forces employed in HD
operations within the USNORTHCOM AOR are likely to be geographically close to the
JOAs, the TAA can be located at the unit’s or force’s home base. Onward movement, in
many instances, can be accomplished concurrently with reception and staging activities at
the home base. When a unit or force is not geographically close to an OA and a TAA other
than the home base is desired, then discrete, onward movement activities would be
required. Oftentimes, a TAA would be located at a designated BSI that would provide
logistics support and be located near the OA.
For more information on JRSOI, see JP 3-35, Deployment and Redeployment Operations.
7. Protection
The protection function focuses on conserving the joint force’s fighting potential in
four primary ways: active defensive measures employed outside the defended area that
protect the joint force, its information, its bases, necessary infrastructure, and lines of
communications from an enemy’s attack by employing limited offensive action and
counterattacks; passive defensive measures employed within a defended area that make
friendly forces, systems, and facilities difficult to locate, strike, and destroy and to
minimize damage from enemy attacks; application of technology and procedures to
reduce the risk of friendly fire; and emergency management and response to reduce the
loss of personnel and capabilities due to an all-hazards incident. It includes, but extends
beyond, FP to encompass protection of US noncombatants; the forces, systems, and civil
infrastructure of friendly nations; and other USG departments and agencies, international
organizations, and NGOs. Planning for HD includes combating terrorism, criminal
enterprises, environmental threats/hazards, and CO. Joint intelligence preparation of the
OE must be conducted to ensure adequate planning and implementation of protection
III-19
Chapter III
For additional information on the protection function, see JP 3-0, Joint Operations. For
more information on DOD AT and FP programs, refer to DODI 2000.12, DOD
Antiterrorism (AT) Program; DODI O-2000.16, Volume 1, DOD Antiterrorism (AT)
Program Implementation: DOD AT Standards; DODI O-2000.16, Volume 2, DOD
Antiterrorism (AT) Program Implementation: DOD Force Protection (FPCON) System;
and JP 3-07.2, Antiterrorism.
For further discussions on missile defense, refer to JP 3-01, Countering Air and Missile
Threats.
(1) Air Defense. CDRNORAD is tasked to provide aerospace control for North
America, which includes surveillance and control of Canadian and US airspace, as well as
ensuring air sovereignty and air defense against aircraft and CMs. NORAD has the
responsibility to protect the US and Canadian homelands against military or civilian
airborne threats.
For more detailed discussions on air and missile defense, refer to JP 3-01, Countering Air
and Missile Threats.
(b) CMs. CMs are air-breathing threats capable of delivering a full range of
warheads, from conventional to WMD. Because they are air breathing threats, CMs are
III-20 JP 3-27
Planning and Operations for Homeland Defense
part of the air defense role executed by NORAD. CMs present significant detection
difficulties due to standoff range and very small radar cross-section.
(2) NCR-IADS. Defense of the NCR is a special case of air defense in the
homeland. DOD employs an integrated air defense system (sensors, weapons, visual
warning system, C2 systems, and personnel) as part of the around-the-clock, multilayered,
military, and interagency effort to protect the NCR.
For additional information on air operations, refer to JP 3-01, Countering Air and Missile
Threats; JP 3-30, Command and Control of Joint Air Operations; and JP 3-52, Joint
Airspace Control.
(3) BMD. BMD capabilities are designed to detect, deter, prevent, and defeat
adversary ballistic missile threats and help protect the US domestic population and critical
infrastructure. US homeland BMD includes not only the means for active and passive
defenses, but the capability to strike in retaliation or to preempt the launch of a missile
threat. For HD, there are BMD capabilities against limited attacks by rogue states using
ICBMs and capabilities against threats from short-range ballistic missiles, medium-range
ballistic missiles, and intermediate-range ballistic missiles. ICBM threats are deterred by
US capabilities that include global strike. BMD is a key element of HD. However, BMD
activities do not include defense against CMs or tactical air-to-surface missiles.
III-21
Chapter III
(a) BMD System. The BMD system includes the sensors (air, land, sea, and
space), anti-ballistic missiles, communications, and C2 for launch warnings and
assessment for all categories of ballistic missile launches, whether targeted against the
homeland or other AORs. The ground-based midcourse defense (GMD) element of the
BMD system provides USNORTHCOM the capability to engage and destroy limited
intermediate- and long-range ballistic missile threats in space to protect the US. The GMD
system is composed of ground-based interceptors and associated sensors and fire control
systems. The ground-based interceptor is a multi-stage, solid fuel booster with a lethal
payload. Fire control systems consist of redundant fire control nodes, interceptor launch
facilities, and a communications network.
(b) BMD Roles and Responsibilities. GCCs are responsible for planning
and executing BMD against ballistic missile threats that target their AORs, to include
threats that cross AOR boundaries. This is supported by shared situational awareness,
integrated battle management, adaptive planning, and accurate and responsive battle
damage assessment. The following have specific BMD responsibilities to support HD.
(4) Space Operations and BMD. Space operations are considered critical
enabling activities for BMD. For example, space-based surveillance and sensor
capabilities provide ballistic missile early warning, assist in intelligence gathering, and
facilitate tracking inbound missiles.
b. CIP
III-22 JP 3-27
Planning and Operations for Homeland Defense
(1) DCI. DCI consists of DOD and non-DOD networked assets essential to
project, support, and sustain military forces and operations worldwide. Assets are people,
physical entities, or information. Physical assets include infrastructure such as
installations, facilities, ports, bridges, power stations, telecommunication lines, and
pipelines, most of which will not be located on USG property.
(b) Mission Assurance and the DIB. Mission assurance is the process to
protect or ensure the continued function and resilience of capabilities and assets—including
personnel, equipment, facilities, networks, information and information systems,
infrastructure, and supply chains—critical to the execution of DOD mission-essential
functions in any OE or condition. Mission assurance focuses on the “protection,”
“continued function,” and “rapid reconstitution” of critical assets which support mission
essential functions, rather than the execution of these missions themselves. Threats to non-
DOD government and commercially owned infrastructure, facilities, and capabilities, to
include the DIB, can jeopardize DOD HD mission execution. Mission assurance focused
only on assessing and protecting, or enhancing resilience against DOD-specific
vulnerabilities, will fail. Thus, it is necessary to comprehensively assess and mitigate risk
in a way that accounts for DOD dependence on civilian assets and systems and the
cascading consequences of their disruption. These include, but are not limited to,
transportation networks, global supply chains, electric power, telecommunications, and
information technology infrastructures. Simultaneously, one must also recognize the lead
role of other USG departments and agencies, especially DHS, the Department of Energy
(DOE), and DOT, in coordinating risk mitigation for threats to civilian infrastructure.
(c) All CCDRs, in coordination with DOD asset owners, DOD components,
and the defense infrastructure sector lead agents, take action to prevent or mitigate the loss
or degradation of DOD-owned DCI within their assigned AOR.
For more information concerning CIP and the DCIP, see DODD 3020.40, Mission
Assurance (MA), and DODI 5220.22, National Industrial Security Program.
(2) CI/KR. As stated in the Critical Infrastructure and Key Resources Support
Annex to the NRF, “CI/KR includes those assets, systems, networks, and functions—
physical or virtual—so vital to the US that their incapacitation or destruction would have
a debilitating impact on HS, national economic security, public health or safety, or any
III-23
Chapter III
combination of those matters. Key resources are publicly or privately controlled resources
essential to minimal operation of the economy and the government.” An attack on CI/KR
could significantly disrupt the functioning of government and business alike and produce
cascading effects far beyond the physical location of the incident. Although DOD’s role
is normally one of administrative and logistical support to DHS or another sector-specific
agency through DSCA or direct MHS support, in certain circumstances, the President may
direct DOD to provide military protection to CI/KR.
For further information, see PPD-25, Guideline for US Government Interagency Response
to Terrorist Threats or Incidents in the US and Overseas; HSPD-7, Critical Infrastructure
Identification, Prioritization, and Protection; the National Strategy for Physical Protection
of Critical Infrastructure and Key Assets; the National Infrastructure Protection Plan; and
HSPD-23/NSPD-54, US Cyber Security Policy. See also the NRF at
https://www.fema.gov/national-planning-frameworks.
c. CWMD
(1) WMD capabilities are of particular concern to the USG. Threats may use
WMD as a tool to inflict mass casualties on homeland civilian populations or cause
disruption or destruction to critical infrastructure.
(2) CWMD, as a part of HD, is a global mission with potential consequences that
cross AOR boundaries. CWMD requires an integrated and synchronized effort from
numerous interagency and multinational partners for effective mission accomplishment.
CWMD is a continuous effort that requires a coordinated, unified effort to curtail the
conceptualization, development, possession, proliferation, use, and effects of WMD-
related expertise, materials, and technologies.
(4) CWMD includes DOD CBRN Response Enterprise, which has the primary
mission to detect and respond to WMD incidents in the homeland.
For more information on CWMD, see JP 3-40, Countering Weapons of Mass Destruction;
JP 3-41, Chemical, Biological, Radiological, and Nuclear Response; and JP 3-11,
Operations in Chemical, Biological, Radiological, and Nuclear Environments.
d. CO and DODIN Operations. Each CCMD, Service, and DOD agency contributes
to overall HD cybersecurity by rigorous implementation of cybersecurity policies and
procedures. CCMDs, Services, and DOD agencies employ appropriate cyberspace security
actions to prevent intrusions and defeat other adversary activities on DOD networks and
systems that are not a part of what is specifically defined as the DODIN. There are
subordinate HQs of USCYBERCOM that execute C2 of the Cyber Mission Force and other
cyberspace forces. These include the Cyber National Mission Force-Headquarters, the
III-24 JP 3-27
Planning and Operations for Homeland Defense
e. FP. GCCs are responsible for FP within their respective AORs. FP includes
actions taken to prevent or mitigate hostile actions against DOD personnel (to include
family members), resources, facilities, and critical information. It does not include actions
to defeat the enemy or protect against accidents, weather, or disease. All GCCs have FP
responsibilities, including those with AORs which contain geographic areas of the
homeland. Force health protection (FHP), the protection component of health services,
complements FP and includes all measures to ensure a healthy and fit force, prevent injury
and illness, and protect the force from health hazards.
(1) AT and FP. GCCs have overall AT responsibility within their respective
AORs, except for those DOD elements and personnel for whom another commander has
security responsibility pursuant to law or a memorandum of agreement. The AT program
is designed to prevent and detect terrorist attacks against DOD personnel, their families,
facilities, resources, installations, and DCI, as well as to prepare to defend against, and plan
the response to the consequences of, terrorist incidents. TACON (for FP) applies to all
DOD personnel assigned, permanently or temporarily; transiting through; or performing
exercises or training in the GCC’s AOR. GCCs have the authority to modify FP conditions
for covered individuals. CDRUSNORTHCOM has overall DOD AT program and FP
responsibility in CONUS. USNORTHCOM’s FP mission and AT program are outlined in
the USNORTHCOM Instruction 10-222, Force Protection Mission and Antiterrorism
Program.
(2) FHP. FHP provides the framework for optimizing health readiness and
protecting Service members from all health threats. In general, US states and territories
are normally at low risk for endemic diseases, although pandemic disease outbreaks have
the potential to rapidly place the US military and wider population at risk. Additionally,
some areas within the homeland are heavily industrialized and have the potential for
deliberate or accidental release of a large variety of toxic industrial chemicals/materials at
production sites and during transportation. Furthermore, WMD attacks pose unique FHP
risks due to the health effects and threats of CBRN agents. Thus, man-made hazards
(deliberate or accidental) may present the greatest potential health risk to forces conducting
HD operations.
III-25
Chapter III
(1) Thwart or defeat terrorist attacks against the US, its PNs, and its interests.
(4) Establish conditions that allow PNs to govern their territory effectively and
defeat terrorists.
For more information on countering threat networks and CT, refer to JP 3-25, Countering
Threat Networks, and JP 3-26, Counterterrorism.
8. Sustainment
a. Personnel
III-26 JP 3-27
Planning and Operations for Homeland Defense
(1) JP 1, Doctrine for the Armed Forces of the United States, states “exercise of
directive authority for logistics by a CCDR includes the authority to delegate authority to
issue directives to subordinate commanders” and “CCDRs exercise COCOM over assigned
forces.” Within the USNORTHCOM AOR, the CDRUSNORTHCOM executes OPCON
or TACON over attached forces, normally without directive authority for logistics. Given
the robust capabilities within each Service component, DOD combat support agency
(CSA), and the commercial contracting infrastructure in USNORTHCOM AOR, directive
authority for logistics is not necessary to execute the HD mission. CDRUSNORTHCOM
has theater- and operational-assigned and allocated logistical forces and capabilities
executing OPCON of those forces via Service component HQs. CDRUSNORTHCOM
may still exercise directive authority for logistics in responding to an HD threat; the
President or SecDef may also extend this authority to attached forces when transferring
those forces for a specific mission.
(3) In the case where multiple agencies, PNs, international organizations, NGOs,
and private sector entities are involved in HD operations, each is ultimately responsible for
III-27
Chapter III
providing logistics support for their own personnel. However, the GCC should strive to
integrate efforts through the use of acquisition and cross-servicing agreements along with
associated implementing arrangements to ensure needed logistics support. Optimizing the
capabilities should result in greater flexibility, more options, and more effective logistics
support. In allocation of logistics support to HD activities, unit force activity designators
should be reviewed for possible improvement or downgrade based on mission criticality.
III-28 JP 3-27
Planning and Operations for Homeland Defense
prioritizes transportation assets, synchronizes deployment force flow and distribution, and
provides in-transit visibility.
(e) Operational Contract Support (OCS). OCS provides the CCDR the
tools and processes to manage the variety of services that may be required. Within OCS
are contract support integration, contractor management, and contracting support.
For more information on OCS, see JP 4-10, Operational Contract Support, and DODI
3120.41, Operational Contract Support.
For additional information on engineer organizations and assets of Services, see JP 3-34,
Joint Engineer Operations.
III-29
Chapter III
circumstances is still a DOD objective. Commands will initiate actions to curtail further
environmental damage and to resolve environmental impacts.
See JP 4-06, Mortuary Affairs, for details on employment of DOD MA assets in DSCA,
mass-fatality management, CBRN response, and HD operations.
(1) DOD coordinates, employs, and integrates medical response through the
capabilities of care: first responder care, forward resuscitative care, theater hospitalization,
and definitive care.
(3) DOD medical assets and organizations may also be involved in support to
local and state health providers in dealing with the aftermath of a CBRN attack and other
large-scale, casualty-producing attacks. As part of HD, there may be a requirement to
augment civilian medical capabilities in the handling of casualties resulting from CBRN
attacks or other toxic materials release. The ability of state and local medical facilities to
III-30 JP 3-27
Planning and Operations for Homeland Defense
handle mass casualties from CBRN effects must be assessed and factored into DOD
planning.
For additional information, see JP 3-28, Defense Support of Civil Authorities, and JP 4-
02, Joint Health Services.
a. Arctic Region. The overarching strategic national security objective in the Arctic
is a stable and secure region where US national interests are safeguarded and the US
homeland is protected. This objective is consistent with current international law and
diplomatic engagement, but also with demonstrated ability and commitment to defend the
northern approaches to North America.
(1) DOD takes steps to anticipate and prepare for Arctic operations. Capabilities
are reevaluated as conditions change, and gaps are addressed in order to prepare for
operations in a more accessible Arctic. Key challenges include shortfalls in ice and weather
reporting and forecasting, limitations in C2, communications, computer connectivity,
intelligence, harsh environmental conditions, limited inventory of ice-capable vessels, and
limited shore-based infrastructure. The US has a vital Arctic neighbor and partner in
Canada, with its shared values and interests in the region. DOD works with the Canadian
Department of National Defence to ensure common Arctic interests are addressed in a
complementary manner.
(2) There are two GCCs with Arctic responsibilities: CDRUSEUCOM and
CDRUSNORTHCOM are each responsible for a portion of the Arctic Ocean aligned with
adjacent land boundaries—an arrangement suited to achieve unity of effort with key
regional partners.
b. Information Sharing
(2) Proper organization of the battle staff support structure is another way to
synchronize and share information. In an adaptive HQ model, for example, the staff
reorganizes from its normal functional areas of personnel, intelligence, operations,
logistics, plans, and communications to working groups that address current operations,
future operations, joint plans, joint support, and interorganizational coordination. The
organization must also transcend culture, policy, and technical barriers to be effective.
III-31
Chapter III
Intentionally Blank
III-32 JP 3-27
APPENDIX A
RELATIONSHIPS BETWEEN HOMELAND SECURITY, HOMELAND
DEFENSE, AND DEFENSE SUPPORT OF CIVIL AUTHORITIES
1. General
a. Achieving Unity of Effort Through HS, HD, and DSCA. Perhaps one of the
greatest challenges for a military staff is conducting military operations in or near the
homeland that integrate into the overall USG unity of effort to secure and defend the
homeland. This effort entails USG departments or agencies inherent authorities and
jurisdiction at the federal, state, and local level, which DOD may support directly by
providing forces or capabilities to HS operations, through DSCA, or if the magnitude of
threat exceeds the capabilities of the HS enterprise, through HD operations. These TMM
challenges are set against the evolving range of threats to the homeland, countering diverse
threat networks, transregional terrorist organizations, potential nation state, and individual
threats both internal and external to the US. This appendix provides additional context and
considerations for the JFC and military staffs that plan and execute HD and DSCA
missions, or otherwise directly support HS. Figure A-1 depicts the relationship between
HD, DSCA, and HS missions and provides examples of the types of operations that can
take place for each mission. Those missions could be conducted in a simultaneous, near-
simultaneous, or sequential fashion, across the threat spectrum, within or near the
homeland. A full range of threats and hazards confronts the homeland. However, many
threats may not require a DOD-led response and may only require a response from one or
more USG departments or agencies. Depending on the type of threat and its magnitude,
the lead and supporting relationships may vary across the specific types of operations that
can take place for each mission. HD, DSCA, and HS operations may occur in parallel and
require extensive synchronization.
(2) Transitioning Between HD, DSCA, and HS. In addition, operations may
also transition from HD to DSCA to HS or vice versa (e.g., maritime security) with the
lead depending on the situation and USG’s desired outcome (as depicted in Figure A-1).
While the lead may transition, a single agency will always have the lead at any given time
for a particular activity. However, in the areas of overlapping responsibility, the
designation of LFA may not be predetermined. In time-critical situations, on-scene leaders
are empowered to conduct appropriate operations in response to a particular threat. The
MOTR protocols provide guidance for maritime security, which can transition between
A-1
Appendix A
Homeland
6 Defense
DOD
Lead Role
DOD
ROE/RUF 11
Applies
Magnitude of Threat
Homeland Security
3 7 9 10
Defense Support
of Civil Authorities
2 8 12* DOD
Support Role
Legend
HD, DSCA, and HS (see Chapter III, “Planning and Operations for Homeland Defense”).
The NG and the reserves also play a vital role in the defense of the homeland. Figure A-1
depicts NG Title 10, USC, authorities for HD and DSCA under DOD C2. It also depicts
A-2 JP 3-27
Relationships Between Homeland Security, Homeland Defense, and
Defense Support of Civil Authorities
NG Title 32, USC, authorities for HS, HD activities, and DSCA. Figure A-1 also depicts
the fact that, in exceptional circumstances, NG forces may perform HD activities in state
active duty. Title 32, USC, and state active duty fall under state or territory C2. EP remains
part of DOD’s overall preparedness activities. It spans HD, DSCA, and HS and includes
DOD’s lead, support, and enable functions. Mobile command centers and DOD aviation
support to the US Secret Service are just two examples of how DOD prepares for and
supports EP operations. HD efforts often complement HS efforts and the reverse is also
true.
(2) DOJ. DOJ has lead responsibility for criminal investigations of terrorist acts
or terrorist threats by individuals or groups inside the US, or directed at US citizens or
institutions abroad, where such acts are within federal criminal jurisdiction of the US. They
also have lead responsibility for related intelligence collection activities within the US,
subject to the National Security Act of 1947 and other applicable law.
(3) DOD. DOD is a key part of the HS enterprise that protects the homeland
through two distinct but interrelated missions, HD and DSCA. DOD is the federal agency
with lead responsibility for HD, which may be executed by DOD alone (e.g., BMD) or
include support from other USG departments and agencies. DOD’s role in the DSCA
mission consists of support of US civil authorities (DHS or other USG departments or
agencies), as well as state, local, or tribal entities for domestic emergencies and for
designated LE and other activities. While these missions are distinct, some department
roles and responsibilities overlap and operations require extensive coordination between
lead and supporting agencies. HD and DSCA operations may occur in parallel and require
extensive integration and synchronization with HS operations. Understanding the roles
and responsibilities of AC and RC forces and how they are used and the various duty
statuses used to employ NG forces (Title 10 and Title 32, USC, and state active duty) is
critical to achieve integration and synchronization.
A-3
Appendix A
of DOD missions, DODI 6055.17, DOD Emergency Management (IEM) Program, directs
that DOD installations will adopt and implement procedures consistent with the National
Incident Management System (NIMS). Procedures will include a well-defined
communication plan that includes the capability to communicate within DOD, with
personnel conducting the response, as well as with civil authorities. For interoperability,
the Incident Command System per the NIMS will be used in the civil sector. This approach
provides for common interaction when DOD is in support of civil authorities and requires
planning consideration by the JFC performing such dual mission sets.
c. USCG. The USCG has inherent authorities and capability to seamlessly transition
between HS and HD operations. As discussed in Chapter II, “Command Relationships and
Interorganizationl Cooperation,” USCG execution of MHD tasks will be under the C2 of
CGDEFOR, and USCG execution of MHS tasks will be under the C2 of USCG
commanders. Additional considerations for the transition of USCG operations between
MHS and MHD include the following:
A-4 JP 3-27
Relationships Between Homeland Security, Homeland Defense, and
Defense Support of Civil Authorities
(1) Ports, Waterways, and Coastal Security (PWCS). In general, the USCG
PWCS mission under the regime of MHS overlaps with many MHD port security and
harbor defense activities. It is important for JFC planning purposes to note that MHS
operations are always in effect, and there are significant force demands within the USCG
to conduct MHS, especially if maritime security conditions increase in a heightened threat
environment. The USCG may also raise maritime security condition levels, which
generally increases vessel and port security activities at the federal, state, and local levels
and across commercial enterprise within the maritime transportation system and may lead
to USCG force requirements for DOD to support MHS. A particular advantage of PWCS
over MHD port security and harbor defense activities is the more flexible USCG use of
force policy, compared to more restrictive SROE. Only in circumstances where SROE is
necessary to defeat a particular threat should a transition from PWCS to MHD be
considered.
(2) COTP Functions. The USCG’s regulatory functions are also a key planning
factor for JFC staffs planning maritime operations in areas subject to US jurisdiction. Both
the Magnuson Act and Port Waterways Safety Act grant regulatory powers to the USCG
Commandant and the various designated COTPs. JFC staffs may coordinate regularly with
USCG staffs to identify pre-planned regulatory actions, including safety and security zones
that may be required to support joint MHD operations.
For more information on COTP functions, see Title 33, Code of Federal Regulations, Parts
6 and 165, and COMDTINST M16000.11, Marine Safety Manual, Volume VI, Ports and
Waterways Activities.
(3) Balancing Enforcement and Security with Defense. The USCG conducts
LE operations and joint MIO using cutter and shore based boarding teams, LE detachments,
and maritime security response team direct action sections, as needed. The USCG will
normally require DOD-provided lift and surface assets under the auspices of direct MHS
support if USCG cutters or aircraft are unavailable to support short-notice maritime
response operations. When necessary, USCG assets conduct operations that preserve
evidence required for prosecution of a maritime threat under US law while balancing risk
associated with certain types of boarding operations. As a member of the IC, the USCG
may also contribute to tactical intelligence exploitation in support of other federal agencies
when such activities are authorized by US law and policy.
For more information, see COMDTINST M16247.1, Maritime Law Enforcement Manual
(MLEM); COMDTINST M16600.6, Maritime Security and Response Operations (MSRO)
Manual; and Coast Guard Publication 3-2, Short Notice Maritime Response.
A-5
Appendix A
facilitate the sharing of information. Domestically, the USCG-led area maritime security
committees carry out much of the maritime security regime effort. COTPs, in their role as
federal maritime security coordinator, lead the area maritime security committees through
state-wide and municipal-level coordination with federal, state, and local LEAs and
commercial port partners. In exercising COTP authority, COTPs consider all equities in
the port environment as certain regulatory actions can have significant economic impact
and may dictate trade-offs with security demands.
For more information on USCG domestic and international port security compliance, see
COMDTINST M16000.12, Port Security Compliance Manual.
d. Auxiliary Organizations
(1) USAF Auxiliary. The USAF Auxiliary, also known as Civil Air Patrol
(CAP), has forces with unique capabilities that can contribute to the successful prosecution
of HD air operations. Air Education and Training Command serves as the force provider
of CAP to CCDRs. CAP, a volunteer, federally chartered, nonprofit organization, may
function as an auxiliary of the USAF IAW Title 10, USC, Section 9442, to support USAF
noncombat programs and missions. Such missions may include airborne surveillance and
reconnaissance using visual observation and imagery, search and rescue, light airlift, or
utilizing CAP aircraft as an “airborne target” during air intercept training.
(2) USCG Auxiliary. The USCG Auxiliary was established by Congress in 1939
under Title 14, USC. The USCG Auxiliary supports MHS through the USCG Port Safety
and Security Program. For more information, see COMDTINST M16790.1, Auxiliary
Manual.
(3) Military Auxiliary Radio System. Both the USA and the USAF maintain
auxiliary communications that can handle unclassified message traffic, including
encryption capabilities.
e. State Defense Forces. State defense forces (e.g., state military, state guards, or
state military reserves) are military units that operate under the sole authority of a state
government; they are partially regulated by the NGB but they are not a part of the ARNG.
State defense forces are authorized by state and federal law and are under the command of
the governor of each state. There are active state defense forces in 20 states and the US
territory of Puerto Rico. At the discretion of individual states or territories, state defense
forces may support, assist, and augment their state’s NG forces and civilian authorities
such as police and fire departments.
f. Chapter 18 (Title 10, USC, Sections 271-282). This chapter concerns military
support for civilian LEAs and provides statutory authority for specific types of military
A-6 JP 3-27
Relationships Between Homeland Security, Homeland Defense, and
Defense Support of Civil Authorities
support to LE. Title 10, USC, Section 275, directs SecDef to promulgate regulations that
prohibit “direct participation by a member of the Army, Navy, Air Force, or Marine Corps
in a search, seizure, arrest, or other similar activity unless participation in such activity by
such member is otherwise authorized by law.” This guidance is currently set forth in DODI
3025.21, Defense Support of Civilian Law Enforcement Agencies.
g. Insurrection (Title 10, USC, Sections 251-255). These statutory provisions allow
the President, at the request of a state governor or legislature, or unilaterally in some
circumstances, to employ the US Armed Forces to suppress insurrection against state
authority, to enforce federal laws, or to suppress rebellion. When support is directed for
such HD-related purposes in the US, the designated JFC should utilize this special
application knowing the main purpose of such employment is to help restore law and order
with minimal harm to the people and property and with due respect for all law-abiding
citizens.
h. CIP. Most infrastructure assets are inherently interconnected and part of larger
integrated systems. Therefore, the removal of one asset’s functionality due to an outage or
attack could have devastating effects on larger infrastructure networks, causing broad
service disruptions and potentially adverse regional impacts. Almost all national and
defense response capabilities rely, to some extent, on commercial infrastructures. National
and DCI supporting national security functions must be available when required to protect
the homeland. These will include DCI assets and DIB assets, the protection of which is
the responsibility of DOD. JFCs’ preparations to conduct CIP should consider those in
either a HD or DSCA role or as one transitions from one to another. For example, an
explosion occurs at a major dam or nuclear facility. These are considered key assets from
a national perspective. With no initial determination of cause, authorities suspect terrorism.
National leadership makes the initial determination to deploy a QRF for HD to protect
critical infrastructure due to unknown intent and for the purpose of expediency.
Subsequent to QRF arrival, an assessment is made whether an external threat or terrorism
caused the event. Upon such determination of threat, but if a need for security remains,
the QRF would perform security in a DSCA role until sufficient numbers of other federal
agency, local LE, and/or NG (Title 32, USC) can provide necessary support.
For complete details on the DSCA mission, see JP 3-28, Defense Support of Civil
Authorities.
A-7
Appendix A
Intentionally Blank
A-8 JP 3-27
APPENDIX B
FACILITATING INTERORGANIZATIONAL COOPERATION
1. General
DOD leads HD missions and will be supported by other USG departments and
agencies while conducting such missions. Conversely, DOD supports other USG
departments and agencies for DSCA missions. Events or operations that begin as HD
missions may transition to a DSCA mission (normally for response to an incident) or
evolve to a concurrent DSCA mission. This appendix identifies organizations that
normally support HD missions in some fashion, notwithstanding that some may also
support DSCA missions separately, concurrently, or as a follow-on requirement.
a. DISA. DISA provides, operates, and assures C2, information sharing capabilities,
and a globally accessible enterprise information infrastructure in direct support to joint
warfighters, national-level leaders, and other mission and coalition partners. DISA
supports national security communications requirements and functions within the
following core mission areas: communications; C2 capabilities; cybersecurity; computing
services; interoperability, testing, and standards; DODIN services; engineering; and
acquisition. It is the Defense Infrastructure Sector Lead Agent for the DODINs, per DODD
3020.40, Mission Assurance (MA), and implements and executes the DCIP requirements.
Joint Force HQ-DODIN, a staff subordinate to CDRUSCYBERCOM, plans, directs,
coordinates, integrates, and synchronizes execution of global DODIN operations and DCO
internal defensive measures to secure, operate, and defend the DODIN.
For more information on DISA, see DODD 5105.19, Defense Information Systems Agency
(DISA).
For more information on DIA, see DODD 5105.21, Defense Intelligence Agency (DIA).
See also JP 2-0, Joint Intelligence.
c. DLA. DLA provides worldwide logistics support for the missions of the Military
Departments and the CCMDs. Specifically:
B-1
Appendix B
(1) DLA provides support to other DOD components and USG departments and
agencies, and, when authorized by law, state and local government organizations, foreign
governments, and international organizations.
(2) DLA provides support to USNORTHCOM and USPACOM for planning and
execution of HD. DLA has many capabilities in USPACOM’s AOR led by the DLA-
Pacific Regional Command. DLA has LNOs positioned at USNORTHCOM that can be
augmented during a crisis. An operational planning team is located at DLA HQ, with
planners dedicated to each CCMD. A catalog of DLA-type unit capabilities is available to
both commands for planning and execution in the Adaptive Planning and Execution
system. The Defense Logistics Agency support team, a type unit capability, that when
deployed/employed in a JOA, is the primary focal point for disseminating, coordinating,
and tracking issues of the CCDR or JFC concerning DLA.
(3) Provides enabler OCS support to CCDR planning efforts and training events
and, when requested, advises, assists, and JFC oversight of OCS during HD and DSCA
operations.
For more information on DLA, see DODD 5105.22, Defense Logistics Agency (DLA), and
JP 4-0, Joint Logistics.
(2) SIGINT for an effective, unified organization and control of all the foreign
signals collection and processing activities of the US. NSA is authorized to produce
SIGINT IAW objectives, requirements, and priorities established by the Director of
National Intelligence with the advice of the National Foreign Intelligence Board.
For more information on the responsibilities of NSA, refer to EO 12333, United States
Intelligence Activities.
B-2 JP 3-27
Facilitating Interorganizational Cooperation
to describe, assess, and visually depict physical features and geographically referenced
activities on the Earth. GEOINT consists of imagery, imagery intelligence, and geospatial
information. NGA also:
(1) Supports customers in the defense, LE, intelligence, federal, and civil
communities with its analytic GEOINT capabilities.
(2) Supports DOD and civil authorities by building integrated datasets to support
the COP and situational awareness. These datasets provide a common frame of reference
for USG decision makers and operational planners regarding critical infrastructure
vulnerability analysis, domestic incident management, and CIP.
(3) In concert with other federal partners, serves as the imagery and geospatial
data broker, integrator, and consolidator in building a single database to support domestic
situational awareness, incident management, and CIP.
(5) Deploys fully equipped geospatial analytic teams to support military and
civilian exercises, as well as other crisis and national special security events in real time.
g. DTRA. DTRA’s mission is to safeguard the US and its allies from global WMD
and improvised threats by integrating, synchronizing, and providing expertise,
technologies, and capabilities. DTRA provides integrated technical and operational
solutions, as well as intellectual capital, to inform and support national-level and DOD
policies and strategies that address WMD and improvised threats to the homeland and the
warfighter. Additionally, DTRA provides support to DOD components, interagency
stakeholders, and allied partners to ensure a safe, secure, reliable, and effective strategic
nuclear deterrent for defense of the homeland. Specific DTRA capabilities that help
prevent acquisition of WMD and related materials, contain and reduce threats, and respond
to crisis in defense of the homeland include the following functions:
B-3
Appendix B
(1) Provide continuous support to the warfighter through its National CWMD
Technical Reachback Enterprise, a national CWMD support element that provides CWMD
analysis and decision support capability for planning, operations, and post-event analysis
to CCMDs, the Office of the Secretary of Defense, the JCS, the IC, DOD command
elements, other USG departments and agencies, and first responders.
(3) CBRN military advisory teams, when requested, provide technical and
scientific subject matter experts, planners, and hazard prediction modeling support to
CCDRs and federal coordinating agencies or their delegated representatives in response to
catastrophic incidents involving WMD in the US and abroad.
(7) DTRA serves as DOD lead for US nuclear weapon incident training and
executes the Nuclear Weapon Accident Incident Exercise program along with supporting
training events.
B-4 JP 3-27
Facilitating Interorganizational Cooperation
(c) Peacetime, contingency, and crisis support that enables the pursuit of
threat networks, their urgent and emerging use of technologies, and counter-threat
requirements and solutions.
(e) Applying weapons technical intelligence tools and solutions for forensic
and technical exploitation of asymmetric/improvised weapons.
For additional information on DTRA capabilities, see DODD 5105.62, Defense Threat
Reduction Agency (DTRA).
B-5
Appendix B
illicit drugs in the USPACOM AOR; the OE is less permissive for their activities, and
regional partnerships and stability are enhanced.
(1) DCISE is the focal point and clearinghouse for referrals of intrusion events
on DIB unclassified corporate networks. The DCISE is a collaborative information sharing
environment among multiple partners that produces threat information products for
industry partners with reciprocal responsibilities of providing notice of anomalies and
sharing of relevant media.
(2) The NCIJTF-AG coordinates with the National Cyber Investigative Joint
Task Force, a cyberspace investigation coordination organization overseen by the FBI
which serves as a multi-agency national focal point for coordinating, integrating, and
sharing pertinent information related to cyberspace threat investigations. The NCIJTF-AG
mitigates, neutralizes, and disrupts cyberspace intrusions presenting a national security
threat. The NCIJTF-AG synthesizes a COP of hostile intrusion related activity to aid
investigations, review all source data, and support timely reporting in order to shrink the
cyberspace CI response time on defense-related intrusions.
B-6 JP 3-27
Facilitating Interorganizational Cooperation
(2) DFBA performs the dissemination of the DOD Biometric Enabled Watch List
on behalf of DIA and provides the conduit for matching against interagency authoritative
data sets (DHS’s IDENT [Automated Biometric Identification System] and the FBI’s NGI
[Next Generation Identification] databases).
a. DHS. Key directorates and components of DHS, as they relate to HD, include:
(1) The Science and Technology Directorate is the primary research and
development arm of DHS. The Science and Technology Directorate provides federal, state,
and local officials with the technology and capabilities to protect the homeland.
(2) The National Protection and Programs Directorate bolsters the nation’s
security through a multilayered system of preparedness measures based on risk assessment
and management. Working with state, local, and private sector partners, the directorate
identifies threats, determines vulnerabilities, and targets resources where risk is greatest.
Through grants and training on both national and local levels, DHS fosters a layered system
of protective measures to safeguard US borders, seaports, bridges and highways, and
critical information systems. The directorate has five divisions: Federal Protective
Services, CS&C, Office of Infrastructure Protection, Office of Risk Management and
Analysis, and United States Visitor and Immigrant Status Indicator Technology
(biometrics-based technological solutions).
(4) The Office of Health Affairs is DHS’s principal authority for all medical and
health issues. This office anticipates the public health impact of biological attacks,
chemical releases, pandemics and infectious disease threats, and disasters to help prepare
the nation to respond and rebound.
B-7
Appendix B
interests of these stakeholders through DHS’s policy making process and as a conduit for
the Secretary of Homeland Security to engage with stakeholders or share information.
(6) The Office of Intelligence and Analysis uses information and intelligence
from multiple sources to identify and assess current and future threats to the US.
(11) US Citizenship and Immigration Services is the USG agency that oversees
lawful immigration to the US. It administers immigration and naturalization adjudication
functions and establishes immigration services policies and priorities.
(12) The USCG is one of the five military Services under Title 10, USC, and
established separately within DHS under Title 14, USC.
B-8 JP 3-27
Facilitating Interorganizational Cooperation
sites, and national special security events. The US Secret Service’s partnerships—public
and private, domestic and international, LE and civilian—play a critical role in preventing,
detecting, investigating, and mitigating the effects of electronic and financial crimes.
b. DOJ/FBI. As the lead for crisis management and CT, the Attorney General
investigates terrorist acts or threats; coordinates LE activities to detect, prevent, preempt,
and disrupt terrorist attacks; and, if an attack occurs, to identify and prosecute the
perpetrators. The FBI, as LFA, manages the federal LE response to threats or acts of
terrorism that take place within US territory or those occurring in international waters that
do not involve flag vessels of foreign countries. The FBI maintains two operational
watches within a single operations center, the Strategic Information and Operations Center
(SIOC) Watch and CT Watch. The SIOC Watch retains primary daily responsibility for
criminal investigative matters, administrative issues, and information management. The
CT Watch works side-by-side with the SIOC Watch to support seamless and efficient
handling of strategic information and emerging events, both domestically and globally.
The dual location of both watches supports the proper flow of information to FBI HQ, field
divisions, legal attachés, and other government agency operations centers within the IC.
The Crisis Coordination and Administration Unit within the SIOC coordinates and
prepares the operational activation system at FBI HQ for a watch, threat or incident, special
event, or natural disaster. This includes coordination with field offices, legal attachés, and
specialized national assets when required to manage a critical incident. Additionally, the
SIOC supports FBI field commanders who represent the FBI worldwide in major
investigations, tactical operations, and other matters.
(1) DOE also has a variety of emergency response assets. These assets
encompass four core competencies: core knowledge of US nuclear weapons, “dirty
bombs,” and crude nuclear devices; core knowledge of use and interpretation of specialized
radiation detection equipment; core technical operations; and core technical support
requirements.
B-9
Appendix B
(a) Aerial Measuring System. The Aerial Measuring System utilizes aerial
platforms to characterize ground-deposited radiation. These platforms include fixed-wing
and rotary-wing aircraft with radiological measuring equipment; computer analysis of
aerial measurements; and equipment to locate lost radioactive sources, conduct aerial
surveys, or map large areas of contamination.
d. DOT/FAA. The mission of DOT is to ensure a fast, safe, efficient, accessible, and
convenient transportation system that meets US vital national interests and enhances the
quality of life of the American people. Under DOT, the FAA provides air movement and
flight plan data for all aircraft operations. It oversees the safety of civil aviation and
maintains primary jurisdiction over all air space within the US National Airspace System.
In close coordination with DOD and NORAD, the FAA clears air traffic as needed to
expedite intercept operations. The safety mission of the FAA is first and foremost and
includes the issuance and enforcement of regulations and standards related to the
B-10 JP 3-27
Facilitating Interorganizational Cooperation
manufacture, operation, certification, and maintenance of aircraft. The agency rates and
certifies airmen and airports serving air carriers. It also regulates a program to protect the
security of civil aviation and enforces regulations under the Hazardous Materials
Transportation Act for shipments by air. The FAA, which operates a network of airport
towers, air route traffic control centers, and flight service stations, develops air traffic rules,
allocates the use of airspace, and provides for the security control of air traffic to meet
national defense requirements. Other responsibilities include maintaining most of the
radars which perform air surveillance over the CONUS FAA control centers, providing
cueing for targets of interest, and providing maintenance and logistics support for nearly
all ground-to-air radios used by the air defense sectors (ADSs). These and other support
activities and procedures are governed by a series of agreements and FAA orders.
e. NCTC. The NCTC is organizationally part of the Office of the Director of National
Intelligence and is staffed by more than 16 departments and agencies. NCTC has two core
missions. The first is to serve as the primary organization in the USG for analysis and
integration of all terrorism intelligence and, in that capacity, the Director reports to the
Director of National Intelligence. The second mission is to conduct strategic operational
planning for CT activities integrating all elements of US national power. In this role, the
Director reports to the President. The NCTC serves as the central and shared knowledge
bank on terrorism information, provides all-source intelligence support to government-
wide CT activities, and establishes the information technology systems and architectures
within the NCTC and between the NCTC and other agencies that enable access to, as well
as integration, dissemination, and use of, terrorism information. One way the NCTC
supports HD is its operation of a secure website, NCTC Online CURRENT, which serves
as the primary dissemination mechanism for terrorism information produced by the NCTC
and other CT mission partners, to include international partners. NCTC Online CURRENT
is directly available to a broad audience and includes USG partners with an operational
focus (e.g., FBI’s JTTFs and DOD’s CCMDs).
f. DHHS
(1) The Centers for Disease Control and Prevention (CDC). The CDC is a
USG agency under DHHS. It is the US’s national-level public health institute and works
to protect public health and safety by providing information to enhance health decisions,
and it promotes health through partnerships with state health departments and other
organizations.
B-11
Appendix B
Intentionally Blank
B-12 JP 3-27
APPENDIX C
NORTH AMERICAN AEROSPACE DEFENSE COMMAND MISSIONS,
ORGANIZATION, AND STRUCTURE
“Mindful in the years since the first NORAD [North American Aerospace
Defense Command] Agreement was concluded in May 12, 1958, NORAD, as
a distinct command, has evolved to address the continuing changes in the
nature of threats to North America and that it will need to adapt to future shared
security interests.”
a. Since 1957, Canada and the US have defended the skies of North America. A
formal NORAD Agreement between the two governments was signed on 12 May 1958 to
establish NORAD as a bi-national command. Using data from satellites, as well as airborne
and ground-based radars, NORAD monitors, validates, and warns of attack against the
Canadian and US homelands by aircraft, missiles, and space vehicles. The command
ensures Canadian and US air sovereignty through a network of alert fighters, tankers,
airborne early warning aircraft, and ground-based air defense assets cued by military and
interagency surveillance radars, such as those of the FAA and its Canadian equivalent,
NAV CANADA.
2. Missions
C-1
Appendix C
C-2 JP 3-27
North American Aerospace Defense Command Missions, Organization, and Structure
(1) Day-to-day surveillance and control of the airspace approaches to, and the
airspace within, North America to safeguard the sovereign airspace of both Canada and the
US. Surveillance and control includes the capability to detect, identify, monitor, and, if
necessary, take appropriate actions (ranging from visual identification to destruction)
against manned or UA approaching North America.
(2) Air defense against manned or UA weapon systems attacking North America.
C-3
Appendix C
detecting, monitoring, and apprehending aerial drug traffic; and integrates NORAD
operations into an effective CD network.
For more information on the differences between Canadian and US law for military
support to LEAs, refer to NORAD Instruction 10-24, (U) Counterdrug (CD)/Counter
Narcoterrorism (CNT) Operations.
NORAD is organized on three distinct levels. The HQ NORAD staff and the
command center operate at the strategic level. The three NORAD regions conduct
activities at the operational level, and the ADSs and their TACON forces operate at the
tactical level.
C-4 JP 3-27
North American Aerospace Defense Command Missions, Organization, and Structure
(2) USNORTHCOM coordinates with NORAD and CJOC for the ground and
maritime defense of North America.
(1) Provide the missile warning and space surveillance information necessary to
fulfill the US commitment to the NORAD Agreement.
(2) Provide ITW/AA of space, missile, and air attacks on CONUS and Alaska if
NORAD becomes unable to accomplish the aerospace warning mission.
C-5
Appendix C
(2) Support NORAD deployment, resupply, and redeployment with air, sea, and
other assets, as directed by SecDef.
e. USEUCOM. USEUCOM’s AOR extends across the Atlantic Ocean to the west
coast of Greenland and west to approximately 45 degrees west longitude. NORAD’s OA
and USEUCOM’s AOR overlap.
a. NORAD aerospace warning and air control operations are conducted by its three
subordinate regions. Each region has an air operations center and is further subdivided into
one or more ADSs for tactical execution. The ADS operates a battle control center (BCC),
a tactical C2 node that supports air battle management, air weapons control, surveillance
and identification, data links, and airspace management.
b. Each BCC contains a combat mission crew and battle staff. When formed, the
battle staff directs sector air control activities. The BCC operates on a continuous basis
and closely coordinates air sovereignty activities with FAA air traffic control centers to
ensure HD activities can be safely and successfully executed.
C-6 JP 3-27
North American Aerospace Defense Command Missions, Organization, and Structure
and airborne warning and control systems) share air picture information with the associated
BCC. A more detailed description of each of the three NORAD regions is provided below.
(1) ANR. ANR is the bi-national organization responsible for performing the
NORAD air sovereignty and air control mission over the state of Alaska and the northwest
approaches to North America. HQ ANR is collocated at Joint Base Elmendorf-Richardson,
Alaska, with HQ US ALCOM, a subordinate unified command of USNORTHCOM. The
ANR Commander is also the Commander, 11th Air Force, as well as commander of
ALCOM. ANR is supported by both active duty Canadian forces and US forces, as well
as Alaska ANG units. The ANR’s BCC is manned by both US personnel and Canadian
forces to maintain continuous surveillance of its OA. The Alaska Air Defense Sector is
the single ADS within the ANR and is collocated at Joint Base Elmendorf-Richardson.
(b) EADS. EADS, located at Rome ANG Base, New York, is responsible
for all CONR air operations east of the western boundary of the following states:
Wisconsin, Illinois, Kentucky, Tennessee, and Alabama.
(c) Western Air Defense Sector (WADS). WADS, located at Joint Base
Lewis-McChord, Washington, is responsible for all CONR air operations west of the
eastern boundary of the following states: Minnesota, Iowa, Missouri, Arkansas, and
Mississippi.
C-7
Appendix C
7. Other Forces
b. 1 CAD. Winnipeg, Manitoba, is home to the dual HQ for 1 CAD and the CANR.
The HQ serves as the central point of C2 for Canada’s operational Air Force and oversees
the monitoring of Canada’s airspace in support of commitments to NORAD.
C-8 JP 3-27
APPENDIX D
JOINT TASK FORCE HEADQUARTERS ENABLING CAPABILITIES
POINTS OF CONTACT
D-1
Appendix D
D-2 JP 3-27
APPENDIX E
REFERENCES
1. General
c. National Strategy for Physical Protection of Critical Infrastructure and Key Assets.
E-1
Appendix E
E-2 JP 3-27
References
nn. PPD-25, Guideline for U.S. Government Interagency Response to Terrorist Threats
or Incidents in the U.S. and Overseas.
uu. EO 13223, Ordering the Ready Reserve of the Armed Forces to Active Duty and
Delegating Certain Authorities to the Secretary of Defense and the Secretary of
Transportation.
vv. EO 13228, Establishing the Office of Homeland Security and the Homeland
Security Council.
E-3
Appendix E
E-4 JP 3-27
References
hh. Global Force Management Guidance. Section II, Assignment of Forces (Forces
For Unified Commands).
E-5
Appendix E
mm. The North American Aerospace Defense Command (NORAD) Agreement and
Terms of Reference.
uu. Unified Facilities Criteria 4-010-01, DOD Minimum Standards for Buildings.
c. CJCSI 3121.01B, (U) Standing Rules of Engagement/Standing Rules for the Use of
Force for US Forces.
E-6 JP 3-27
References
r. JP 3-07.2, Antiterrorism.
aa. JP 3-15, Barriers, Obstacles, and Mine Warfare for Joint Operations.
E-7
Appendix E
5. Multi-Service Publications
6. Army Publications
E-8 JP 3-27
References
8. Navy Publications
e. Air Force Instruction 10-2701, Organization and Function of the Civil Air Patrol.
E-9
Appendix E
E-10 JP 3-27
APPENDIX F
ADMINISTRATIVE INSTRUCTIONS
1. User Comments
Users in the field are highly encouraged to submit comments on this publication using
the Joint Doctrine Feedback Form located at:
https://jdeis.js.mil/jdeis/jel/jp_feedback_form.pdf and e-mail it to: js.pentagon.j7.mbx.jedd-
[email protected]. These comments should address content (accuracy, usefulness,
consistency, and organization), writing, and appearance.
2. Authorship
a. The lead agent for this publication is US Northern Command. The Joint Staff
doctrine sponsor for this publication is the Director for Operations (J-3).
b. The following staff, in conjunction with the joint doctrine development community,
made a valuable contribution to the revision of this joint publication: lead agent, Mr. Mark
Clements, US Northern Command; Joint Staff doctrine sponsor, LCDR Justin Cooper, Joint
Staff J-3; Mr. Robert Brodel, Joint Staff J-7, Joint Doctrine Analysis Division; and Lt Col
Mark Newell, Joint Staff J-7, Joint Doctrine Division.
3. Supersession
4. Change Recommendations
b. When a Joint Staff directorate submits a proposal to the CJCS that would change
source document information reflected in this publication, that directorate will include a
proposed change to this publication as an enclosure to its proposal. The Services and other
organizations are requested to notify the Joint Staff J-7 when changes to source documents
reflected in this publication are initiated.
5. Lessons Learned
The Joint Lessons Learned Program (JLLP) primary objective is to enhance joint force
readiness and effectiveness by contributing to improvements in doctrine, organization,
training, materiel, leadership and education, personnel, facilities, and policy. The Joint
Lessons Learned Information System (JLLIS) is the DOD system of record for lessons learned
and facilitates the collection, tracking, management, sharing, collaborative resolution, and
dissemination of lessons learned to improve the development and readiness of the joint force.
The JLLP integrates with joint doctrine through the joint doctrine development process by
F-1
Appendix F
providing lessons and lessons learned derived from operations, events, and exercises. As
these inputs are incorporated into joint doctrine, they become institutionalized for future use,
a major goal of the JLLP. Lessons and lessons learned are routinely sought and incorporated
into draft JPs throughout formal staffing of the development process. The JLLIS Website can
be found at https://www.jllis.mil (NIPRNET) or http://www.jllis.smil.mil (SIPRNET).
6. Distribution of Publications
a. Joint Staff J-7 will not print copies of JPs for distribution. Electronic versions are
available on JDEIS Joint Electronic Library Plus (JEL+) at
https://jdeis.js.mil/jdeis/index.jsp (NIPRNET) and http://jdeis.js.smil.mil/jdeis/index.jsp
(SIPRNET), and on the JEL at http://www.jcs.mil/Doctrine/ (NIPRNET).
b. Only approved JPs are releasable outside the combatant commands, Services, and
Joint Staff. Defense attachés may request classified JPs by sending written requests to
Defense Intelligence Agency (DIA)/IE-3, 200 MacDill Blvd., Joint Base Anacostia-
Bolling, Washington, DC 20340-5100.
F-2 JP 3-27
GLOSSARY
PART I—ABBREVIATIONS, ACRONYMS, AND INITIALISMS
AC Active Component
ADP Army doctrine publication
ADS air defense sector
AFTTP Air Force tactics, techniques, and procedures
ALCOM United States Alaskan Command
ANG Air National Guard
ANR Alaskan North American Aerospace Defense Command
Region
AO area of operations
AOR area of responsibility
AOTR aviation operational threat response
ARNG Army National Guard
ASD(HD&GS) Assistant Secretary of Defense (Homeland Defense and
Global Security)
AT antiterrorism
ATO air tasking order
ATP Army techniques publication
GL-1 JP 3-27
Glossary
GL-2 JP 3-27
Glossary
HD homeland defense
GL-3
Glossary
HQ headquarters
HS homeland security
HSC Homeland Security Council
HSPD homeland security Presidential directive
LE law enforcement
LEA law enforcement agency
LFA lead federal agency
LNO liaison officer
MA mortuary affairs
MARFORNORTH United States Marine Corps Forces, North
MCIP Marine Corps interim publication
GL-4 JP 3-27
Glossary
OA operational area
OCO offensive cyberspace operations
OCS operational contract support
OE operational environment
ONE Operation NOBLE EAGLE
OPCON operational control
OPLAN operation plan
GL-5
Glossary
PA public affairs
PCA Posse Comitatus Act
PDD Presidential decision directive
PN partner nation
PPD Presidential policy directive
PWCS port, waterways, and coastal security
RC Reserve Component
RFF request for forces
ROE rules of engagement
RRF rapid response force
RS religious support
RST religious support team
RUF rules for the use of force
UA unmanned aircraft
UAS unmanned aircraft system
UCP Unified Command Plan
USA United States Army
USAF United States Air Force
USARNORTH United States Army, North
USARPAC United States Army, Pacific Command
GL-6 JP 3-27
Glossary
GL-7
PART II—TERMS AND DEFINITIONS
air sovereignty. A nation’s inherent right to exercise absolute control and authority over
the airspace above its territory. (DOD Dictionary. Source: JP 3-27)
critical infrastructure and key resources. The infrastructure and assets vital to a nation’s
security, governance, public health and safety, economy, and public confidence. Also
called CI/KR. (DOD Dictionary. Source: JP 3-27)
defense industrial base. The Department of Defense, government, and private sector
worldwide industrial complex with capabilities to perform research and development
and design, produce, and maintain military weapon systems, subsystems, components,
or parts to meet military requirements. Also called DIB. (Approved for incorporation
into the DOD Dictionary.)
homeland security. A concerted national effort to prevent terrorist attacks within the
United States; reduce America’s vulnerability to terrorism, major disasters, and other
emergencies; and minimize the damage and recover from attacks, major disasters, and
other emergencies that occur. Also called HS. (DOD Dictionary. Source: JP 3-27)
national preparedness. Actions taken to plan, organize, equip, train, and exercise to build
and sustain the capabilities necessary to prevent, protect against, mitigate the effects
of, respond to, and recover from those threats that pose the greatest risk to the security
of the nation. (Approved for inclusion in the DOD Dictionary.)
GL-8 JP 3-27
JOINT DOCTRINE PUBLICATIONS HIERARCHY
JP 1
JOINT
DOCTRINE
All joint publications are organized into a comprehensive hierarchy as shown in the chart above. Joint
Publication (JP) 3-27 is in the Operations series of joint doctrine publications. The diagram below
illustrates an overview of the development process:
Initiation
ENHANCED
JOINT JOINT
WARFIGHTING DOCTRINE
CAPABILITY PUBLICATION
Approval Development