Army describes Patriot missile friendly fire problems

While the U.S. Army continues to withhold details on the causes of three friendly fire incidents involving Patriot missile batteries during the war in Iraq, an Army organization has produced a "lessons learned" briefing that points to known weaknesses in the Army's ability to distinguish friendly aircraft from enemy aircraft and missiles.

Addressing two of the Patriot incidents, the briefing document-a PowerPoint presentation of "insights" drawn from fratricide incidents during Operations Iraqi Freedom and Enduring Freedom produced by the Army Center for Lessons Learned-says positive electronic means of identifying airborne objects have been demonstrated to have "low reliability."

Jammed communications, aircraft transponders that cannot communicate with air-defense crews and some "atrophied" air-defense skills are identified as problems by the briefing, which urges using "procedural methods" of identification.

"Positive" methods of identification generally use electronic means, including radar, friend-or-foe identification transponders, computers and communications equipment, while "procedural" methods rely on tactics, techniques and procedures such as predesignating safe areas for friendly aircraft.

The briefing also urges strict adherence to procedures for identifying and targeting suspected enemy activity, as well as having "robust communications" and standardized battlefield identification systems.

The document further recommends the systems be operated manually and not put on automatic.

"Every effort must be made to avoid autonomous fire units," it said.

The low reliability of the Patriot's identification capability already was known, according to the briefing.

"Past exercises and tests run in SWA [Southwest Asia] indicate the percentage of aircraft that [are positively identified] remains too low. There are too many points of failure," it says.

Philip Coyle, the former Defense Department director of operational test and evaluation, said joint-service testing as far back as the early 1990s identified communications problems associated with air-defense systems when attempting to identify a friend or foe.

"This clearly was not a priority in the development of this equipment and should have been," he said.

The Patriot system currently is the Army's only operational ground-based theater air-defense system.

Designed originally for defense against enemy aircraft, the Pentagon has invested $3 billion since the 1991 Persian Gulf War to improve the Patriot's ability to track and destroy ballistic missiles, according to a recent congressional study.

The briefing document was prepared by the Army center following Operation Iraqi Freedom to help quickly disseminate lessons learned from various friendly fire incidents.

It does not say explicitly what the causes were for the three incidents, which led to the deaths of two airmen. The Army and the U.S. Central Command have been conducting investigations, and so far no reports have been released.

During the conflict, two coalition aircraft were believed shot down by the Patriot-a British Tornado fighter aircraft on March 24, killing two pilots, and a U.S. Navy F/A-18C Hornet fighter on April 2, killing the pilot.

The Tornado reportedly failed to re-enter Kuwaiti airspace from Iraq in a predetermined zone cleared for friendly aircraft and reportedly carried an identification beacon that could not communicate with the air-defense system.

The third incident involved a U.S. F-16 which was targeted by a Patriot system left by its crew to operate automatically so they could take cover, and the radar mistakenly identified the aircraft as a foe.

Many of the briefing's recommendations identify problems not necessarily specific to the Patriot, but more generally to difficulties created by the U.S. military's increasing emphasis on consolidating multiple pieces of surveillance data to provide a more complete picture of the airspace, said Coyle.

"Basically, the problems stem from a lack of interoperability and from fusing together data from many different sensors in a complex battle space. It's a tough problem requiring interoperable equipment and sophisticated computer routines that can sort through what's happening," he said.

In an official report in 1995, Coyle wrote that problems in then-recent tests stemmed in part from different services and weapons systems using various message formats, standards, terminology and algorithms for correlating target-tracking information.

The briefing document says the previous tests and exercises showed identification transponders on aircraft became jammed because they were overloaded by electronic requests for their signal.

"Communications continue to be a choke point, and not all elements on the battlefield have continuous access to the datalink air picture," the briefing says.

The briefing says better capabilities are needed to allow air-defense controllers to directly communicate with aircraft.

"More emphasis must be placed on designing the theater voice and data communication architecture," it says.

The briefing also cites a weakness with Patriot operators.

"Over the past 12 years, Patriot Tactical Control Officers have been trained to focus primarily on TBMs [theater ballistic missiles], and some skills necessary to maintain situational awareness have atrophied. Maintaining friendly and enemy SA [situational awareness] for all air tracks is critical," it says.

The Army is reportedly stepping up development of a new identification system called Blue Force Tracking, as a result of the war, Federal Computer Week reported recently.

The Senate Armed Services Committee in a report earlier this year expressed concern that "longstanding" combat identification and friendly force tracking needs have not been pursued "in the most expeditious manner."

"Recent military operations have further demonstrated the high risk of fratricide on the modern battlefield and re-emphasized the need for comprehensive, interoperable combat identification and blue force tracking architectures," it said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.