FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
3-01.44 | 86 | Appendix D
MAP REHEARSAL
D-15. A map rehearsal is normally the easiest technique to set up since it requires only maps and graphics
for current operations; however, it is time consuming. The map rehearsal has many variations. The most
common is to use a large scale map and operations overlay laid on a table with the participants seated around
the map.
D-16. Markers (such as cardboard cutouts, self-sticking note pads) are used to track each unit as it moves and
each event as it occurs. Participants are responsible for representing their scheme of maneuver with the
markers.
D-17. This method requires the least terrain of all rehearsals. An optimal site overlooks the terrain where the
unit will execute the operations.
SKETCH-MAP REHEARSAL
D-18. This method uses a large scale sketch-map of the operations overlay and key terrain features; the sketch
is used in the same manner as the map. A technique is to draw this sketch on the side of a tracked vehicle.
Yet another option is to move to an area overlooking the operations terrain and have the participants use their
own maps and overlays to follow the rehearsal. This technique has the added advantage of familiarizing the
participants to the terrain. The sketch map technique is one of the two most commonly used rehearsal
techniques (the other is the map rehearsal).
D-19. The procedures for this rehearsal are the same as for a terrain-model rehearsal (see paragraph D-22)
except the commander uses a sketch map in place of a terrain model. Sketch-map rehearsals take less time
than terrain-model rehearsals but more time than map rehearsals.
DIGITAL TERRAIN MODEL REHEARSAL
D-20. Digital terrain models are virtual representations of the AO. The time it takes to create the digital three-
dimension model depends on the amount of available data on the terrain being modeled. An accurately
constructed terrain model helps subordinate leaders visualize the commander's intent and concept of
operations.
D-21. This type of rehearsal is best suited to small units, such as SHORAD batteries and platoons. However,
with a suitable local area network, a wider audience can view the graphics.
TERRAIN-MODEL REHEARSAL
D-22. The terrain-model rehearsal takes less time and fewer resources than a full-dress or reduced-force
rehearsal. Like the digital terrain-model, an accurately constructed model helps subordinate leaders visualize
the commander's intent and concept of operations. When possible, place the terrain model where it overlooks
the actual terrain of the AO. However, if the situation requires more security, place the terrain model on a
reverse slope within walking distance of a point overlooking the AO. The model's orientation coincides with
that of the terrain.
D-23. Integrating air defense information into a supported unit's terrain model is critical. Ensuring the enemy
air avenues of approach, possible enemy aerial targets, potential landing zones, and weapons engagement
ranges are depicted is crucial to ensuring all participants understand the enemy air capabilities.
KEY LEADER REHEARSALS
D-24. A key leader rehearsal involves only key leaders of the organization and its subordinate units. Terrain
requirements can be the same as for a full-dress rehearsal, even though there are fewer participants. The
commander decides the level of leader involvement. The selected leaders then rehearse the plan while
traversing the actual or similar terrain. This technique is useful to rehearse fire control orders and rules of
engagement for an engagement area during defensive operations. A key leader rehearsal may be used to
prepare key leaders for a full-dress rehearsal. |
3-01.44 | 87 | Rehearsals
D-25. SHORAD battalion and batteries use this type of rehearsal rather than a full dress rehearsal as distances
between batteries, platoons, and fire units likely preclude the gathering of all Soldiers and systems other than
at home station or as the first rehearsal when time and resources are available. However, SHORAD units will
participate in their supported assets' full-dress and key leader rehearsals and need to ensure all aspects of air
defense are considered and integrated into these rehearsals.
FULL-DRESS REHEARSAL
D-26. A full-dress rehearsal produces the most detailed understanding of the operation. Every Soldier and
system is involved in a rehearsal over terrain and weather conditions at least similar to that expected in the
operation. A full-dress rehearsal helps Soldiers clearly understand what commanders expect of them.
D-27. Full-dress rehearsals consume more time than any other rehearsal method. For batteries and platoons,
full-dress rehearsals most effectively ensure all units in the operation understand their roles. However, as
noted above, SHORAD battalions generally do not conduct full-dress rehearsals given the distances between
subordinate units, though the battalion, batteries, and platoons will participate in their supported assets' full-
dress rehearsals.
OTHER REHEARSALS
D-28. Each unit should plan rehearsals for the Soldiers to practice techniques and procedures associated with
mission essential requirements. The following rehearsals apply to combat operations tasks:
* Operation center drills. Combat requirements should be anticipated and rehearsed in the form of
operation center and command post drills. The shift officer in charge is the rehearsal director.
Examples of these battle drills include the OPORD, WARNORD, and fragmentary order receipt
and dissemination; casualty evacuation; and resupply.
* Engagement drills. SHORAD fire units and sensors should rehearse their engagement drills in
their assigned position or in terrain similar to their expected position. This allows them to adapt
their operations to the existing conditions.
* Movement. SHORAD fire units and sensors should rehearse the movement techniques they expect
to use in an operation. These rehearsals will occur with supported units as well to synchronize all
the moving pieces in an operation. These rehearsals are especially useful in breaching and
obstacle-crossing operations.
REHEARSAL PLANNING
D-29. Rehearsal planning is crucial in every operation. A hasty rehearsal is less effective than a deliberately
planned and resourced rehearsal.
D-30. Rehearsal time allotment must be considered up front. The SHORAD commander or leader decides
which type of rehearsal to prepare for based on the planning and timeline work completed during the planning
process. The most effective rehearsals are those that are planned from the receipt of the first WARNORD
until rehearsal execution. Time lines are the most effective tool to aid in allocating time for events.
D-31. When considering the total amount of time available and the 1/3-2/3 rule (1/3 of the time allocated to
the higher headquarters and 2/3 to subordinate organizations), the rehearsal planner can determine the type
of rehearsal the unit can afford to perform. In order for rehearsals to be mutually beneficial, the SHORAD
leader should plan a rehearsal window that allows subordinates enough time to develop their own plans.
D-32. Figure D-2 on page D-6, illustrates the level of planning and time line development necessary to
determine when rehearsals can and should occur. This figure does not consider, however, the supported unit
time line which will significantly complicate the process. |
3-01.44 | 88 | Appendix D
Figure D-2. Rehearsal timeline
D-33. Commanders and executive officers plan rehearsals. They address rehearsal planning consideration
and identify responsibilities for ensuring effective rehearsals.
D-34. Commanders provide certain information as part of the commander's guidance during the initial
mission analysis. They may revise the following information when they select a course of action:
* Type of rehearsal and rehearsal method.
* Key events to rehearse (prioritized) and the time allocated for each event.
* Location and attendees.
* Enemy courses of action to be portrayed.
D-35. The executive officer ensures all rehearsals are included in the organization's timeline. The executive
officer's responsibilities include:
* Publishing the rehearsal time and location in the operation or WARNORD.
* Conducting any staff rehearsals.
* Determining rehearsal products, based on type, method and mission variable. |
3-01.44 | 89 | Rehearsals
REHEARSAL PREPARATION
D-36. Once the decision has been made on the type of rehearsal and when and where it will occur, preparation
begins. Everyone involved in executing or supporting the rehearsal has responsibilities during preparation.
D-37. Commanders provide the requisite guidance for the rehearsal. They identify and prioritize key events,
allocate time for each event, and review the completeness of unit's organization, readiness of personnel and
equipment, and the unit's level of preparation.
D-38. The executive officer is the rehearsal director. Through wargaming and coordination with the
commander, the executive officer—
* Coordinates and allocates time for key events requiring rehearsal.
* Establishes rehearsal time limits per the commander's guidance and mission variables.
* Verifies rehearsal site preparation, appropriate markings and associated training aids and parking
areas.
* Determines the method for controlling the rehearsal and ensuring its logical flow.
D-39. The headquarters' staff conducting the rehearsals—
* Develop an operation order with the necessary overlays.
* Deconflict all subordinate unit graphics.
* Publish composite overlays at the rehearsal.
* Nominate a recorder.
D-40. Subordinate leaders complete their planning; this planning includes—
* Complete unit operation orders.
* Identify issues derived from the higher headquarters' operation order.
* Provide a copy of their unit operation order with graphics to the higher headquarters.
* Perform personal preparation similar to that of the commander.
* Ensure they and their subordinates bring all necessary equipment.
D-41. Preparatory actions vary for each rehearsal method. The following example depicts those actions
required during a terrain-model rehearsal.
* When the commander choses the terrain model technique, the site must be prepared to replicate
the operations graphic and fire control measures and terrain features. To aid the preparation, the
operations center should maintain a terrain model and sand table kit.
* The size of the terrain model or the time available may necessitate using additional personnel for
preparation. The size of the terrain model can vary from a table-top arrangement (sandbox) to a
model where the participants actually review a scaled-down version of the terrain. A terrain model
large enough to allow the key leaders to walk over a scaled-down version of the terrain helps
participants to visualize the battlefield.
* The first step in creating an accurate terrain model is to prescribe the scale. This is easily
accomplished by walking off several steps per kilometer or using some other form of
measurement. For example, if the zone of attack is 10 kilometers by 6 kilometers, the builder of
the terrain model could assign one step per kilometer and walk off the scale of the terrain model.
* The second step is to lay down selected grid lines based on the tactical map. With the grid lines
established, the builder has a handy reference to measure the size and locations of the terrain
features. This simple step greatly increases the accuracy of the terrain model and ensures that the
terrain features are the proper scale.
* The terrain model should depict all required information shown on the operations overlay and
situation map to include key terrain features, enemy positions (known and suspected), and airspace
coordinating measures. Place an arrow on the terrain map to depict north for orientation. Label all
phase lines, numbered hills, and objectives with their appropriate names. The terrain should mirror
the operations and enemy overlays and include the air portion of the IPB. Once the terrain model
is complete, position a map and operations overlay behind or at the side of the model as a point of
reference. |
3-01.44 | 90 | Appendix D
REHEARSAL EXECUTION
D-42. During the rehearsal execution, the commander, executive officer, subordinate leaders, recorder and
staff from the conducting headquarters have specific responsibilities before, during, and after a rehearsal.
Before a rehearsal, the rehearsal director states the commander's expectations and orients the participants on
the details of the rehearsal. During the rehearsal, participants rehearse their roles to ensure that they
understand how their actions impact an operation. After a rehearsal, participants ensure that they understand
any changes to the operation order and to any coordination required.
D-43. Commanders command the rehearsal just as they command an operation. They maintain the focus and
level of intensity, allowing no potential for confusion by subordinates. An effective rehearsal validates the
synchronization (the what, when, and where) of tasks that subordinate units will perform to execute the
operation and achieve the commander's intent.
D-44. The executive officer—as the rehearsal director—ensures each unit accomplishes its tasks at the right
time and cues the commander to upcoming decisions. The executive officer's script is the execution matrix
and the decision support template. The executive officer as the rehearsal director—
* Starts the rehearsal time.
* Initiates a formal roll call.
* Ensures everyone brings the necessary equipment, including organizational graphics, and
previously issued orders.
* Validates the task organization; link-ups must be complete or on schedule, and personnel and
materiel must be on hand.
* Ensures synchronization of the operational framework being used.
* Synchronizes the timing and contribution of each participant.
* Ensures that the most important events receive the most attention.
* Keeps within time constraints.
D-45. The operations officer (S-3)—
* Portraits the friendly scheme of maneuver.
* Ensures subordinate unit actions comply with the commander's intent.
D-46. The intelligence officer (S-2) portrays the enemy forces and other variables of the operational
environment during rehearsals. The S-2 bases actions on the enemy course of action that the commander
selected during the planning process. The S-2—
* Provides participants with current intelligence assessments.
* Portrays the best possible assessment of the enemy course of action.
* Communicates the enemy's presumed concept of operation, desired effects, and end state.
* Explains other factors of the operational environment that may hinder or complicate friendly
actions.
* Communicates the key civil considerations of the operation.
D-47. The logistics officer (S-4)—
* Presents the logistics support concept.
* Identifies critical sustainment shortfalls.
* Communicates the transportation support identified for supply distribution and other sustainment
actions.
D-48. Subordinate leaders, using an established format, effectively brief their units' actions and
responsibilities as well as record changes on their copies of the graphics or operation order.
D-49. The recorder is normally a representative from the S-3. During the rehearsal, the recorder captures all
coordination made during execution and notes any unresolved problems. At the end of the rehearsal, the
recorder presents any unresolved problems for resolution, restates any changes directed by the commander,
and estimates when a fragmentary order codifying the changes will follow. |
3-01.44 | 91 | Rehearsals
D-50. The rehearsal director frees the commander to command and participate rather than run a rehearsal.
While the SHORAD battalion conducts its rehearsal, the SHORAD battery and platoons should also rehearse
with their leaders and with the supported unit. Final changes are made to the execution matrix following
rehearsals, and WARNORDs are issued to reflect any necessary changes.
D-51. The following example outlines a step-by-step process for conducting a rehearsal:
* Step 1. Start at the appointed time and conduct a formal roll call. Ensure everyone brings
binoculars, maps, and necessary equipment.
* Step 2. Ensure the rehearsal director orients the map, sketch-map, or terrain model to the actual
ground. Generally describe and point out the overall AO and explain the markers used on the
terrain model.
* Step 3. Brief the time line. Designate the rehearsal start time. For example, have the rehearsal
begin by depicting the anticipated situation one hour before leaving the line of departure. Set the
time interval to be used to start and track the rehearsal: in effect, specify a ten-minute interval to
equate to one hour of real time during operation.
* Step 4. Highlight the ground rules and incorporate ground rules into the unit SOP. Include who
controls the rehearsal, who actually walks the terrain, how the rehearsal will be controlled, and
when staff officers brief.
* Step 5. The S-3 (or executive officer at battery level) reads the mission statement, the commander
reads the commander's intent, and the S-3 or executive officer lays out the friendly situation as it
currently exists, using the map, sketch-map, or terrain model.
* Step 6. The S-2 (or executive officer at battery level) briefs the current enemy situation. The S-2
then briefs the most likely enemy course of action (the enemy situation should already be set up
on the map or terrain model). The S-2 also briefs the status of the reconnaissance and surveillance
plan, for example, citing the most recent early warning tracks.
* Step 7. The S-3 (or executive officer at battery level) briefs friendly maneuver unit dispositions at
the rehearsal start time, including sensor positions. Other staff officers brief their subordinate unit
positions at the start time, as well as any particular points of emphasis.
* Step 8. The commander gives appropriate commands. Battery commanders and or platoon leaders
tell when they occupy positions and anticipate an air attack. The executive officer talks for any
staff section not present and ensures all actions listed on the synchronization matrix or decision
support template are addressed at the proper time or event. Avoid re-wargaming except as
absolutely necessary to ensure subordinate unit commanders fully understand the plan. If the staff
has developed an order that addresses contingencies, there is little need to re-wargame the
operation at the rehearsal site.
* Step 9. The S-2 (or executive officer at the battery level) portrays the enemy. The S-2 section
describes the enemy's most likely and most dangerous courses of action (situation template),
pointing out enemy air avenues of approach, possible aerial targets, landing and drop zones in the
unit’s area, reconnaissance routes, objectives, security force composition and locations, probable
main force objectives, likely chemical, biological, radiological, and nuclear attack times and
locations, and the commitment of reserves. The S-2 must be specific by tying enemy actions to
specific terrain or friendly unit actions. The walk-through should be an accurate portrayal of an
event template.
* Step 10. Terminate the first phase of the rehearsal after the desired end state (from the
commander's intent) is achieved. In the defense, this is usually after the decisive action, such as
destruction of the air threat or withdrawal of the enemy.
* Step 11. When it becomes obvious that additional coordination is required to ensure success of the
operation, try to immediately accomplish it. This coordination is one of the key points of the
rehearsal. Make sure it is clearly understood by all participants and captured by the recorder and
all changes to the published operation order are in effect. As soon as possible, the S-3 (or executive
officer at the battery level) should collect the verbal fragmentary orders and incorporate as written
changes to the operation order.
* Step 12. After the initial review of the base order, recheck the situation at the initial decision point.
State the criteria for a decision to change the plan. |
3-01.44 | 92 | Appendix D
* Step 13. Go to the next decision point and ensure that the criteria have been met. Repeat step 12.
(Repeat step 13 for all decision points).
* Step 14. Key sustainment items need to be briefed, including the plans for casualty evacuation
(routes, ambulance exchange point locations, refuel on the move, Class IV and V resupply points,
forward logistics bases, planned locations and effective times, logistics release points,
displacement times and locations for support areas, and prisoner of war collection points). These
items should be integrated into the rehearsal at the appropriate times. Summarizing these actions
at the end of the rehearsal adds to the value of the rehearsal as a coordination tool.
* Step 15. After the rehearsal is complete, the recorder should restate any changes, coordination or
clarifications directed by the commander, and estimate the time that a written fragmentary or
operation order, to codify the changes, will be issued.
* Step 16. The commander should stress any points needing additional emphasis. The commander
should consider reiterating the commander's intent (purpose, method, and end state) to remind all
participants that the goal is to accomplish the mission. |
3-01.44 | 93 | Glossary
The glossary lists acronyms and terms with Army or joint definitions. Where Army and
joint definitions differ, (Army) precedes the definition. The proponent publication for
other terms is listed in parentheses after the definition.
SECTION I – ACRONYMS AND ABBREVIATIONS
AAA air avenue of approach
ADA air defense artillery
ADAM air defense airspace management
ADP Army doctrine publication
AMD air and missile defense
AO area of operations
ATP Army techniques publication
BCT brigade combat team
C2 command and control
COA course of action
DA Department of the Army
DOD Department of Defense
FM field manual
G-2 assistant chief of staff, intelligence
IPB intelligence preparation of the battlefield
JP joint publication
M-SHORAD maneuver short-range air defense
MDMP military decision-making process
METT-TC mission, enemy, terrain and weather, troops and support available, time
available, civil considerations
OPORD operation order
NAI named area of interest
RAM rocket, artillery, and mortar
ROE rules of engagement
S-2 battalion or brigade intelligence staff officer
S-3 battalion or brigade operations staff officer
S-4 battalion or brigade logistics staff officer
SHORAD short-range air defense
SOP standard operating procedure
TLP troop leading procedures
UAS unmanned aircraft system |
3-01.44 | 94 | Glossary
WARNORD warning order
SECTION II – TERMS
air and missile defense
Direct [active and passive] defensive actions taken to destroy, nullify, or reduce the effectiveness of
hostile air and ballistic missile threats against friendly forces and assets. Also called AMD. (JP 3-01)
air defense artillery
Weapons and equipment for actively combating air targets from the ground. Also called ADA. (JP 3-
01)
air defense warning condition
An air defense warning given in the form of a color code corresponding to the degree of air raid
probability with yellow standing for when an attack by hostile aircraft or missiles is probable; red for
when an attack by hostile aircraft or missiles is imminent or is in progress; and white for when an
attack by hostile aircraft or missiles is improbable. Also called ADWC. (JP 3-01)
alert state
A condition that prescribes the amount of resources required to achieve ready to fire and desired radar
emissions, and which specifies manning requirements and equipment configurations. (FM 3-01)
area defense
A type of defensive operations that concentrates on denying enemy forces access to designated terrain
for a specific time rather than destroying the enemy outright. (ADP 3-90)
area of interest
That area of concern to the commander, including the area of influence, areas adjacent thereto, and
extending into enemy territory. Also called AOI. (JP 3-0)
area of operations
An operational area defined by a commander for land and maritime forces that should be large enough
to accomplish their missions and protect their forces. Also called AO. (JP 3-0)
assign
To place units or personnel in an organization where such placement is relatively permanent, and/or
where such organization controls and administers the units or personnel for the primary function, or
greater portion of the functions, of the unit or personnel. (JP 3-0)
attach
The placement of units or personnel in an organization where such placement is relatively temporary.
(JP 3-0)
attack
A type of offensive operation that destroys or defeats enemy forces, seizes and secures terrain, or both.
(ADP 3-90)
command and control
The exercise of authority and direction by a properly designated commander over assigned and
attached forces in the accomplishment of the mission. Also called C2. (JP 1)
complex integrated attack
A synchronized attack of a friendly asset by a mix of air and missile threats arriving near-
simultaneously from different directions, altitudes, and ranges. (FM 3-01)
consolidate gains
Activities to make enduring any temporary operational success and to set the conditions for a
sustainable security environment, allowing for a transition of control to other legitimate authorities.
(ADP 3-0) |
3-01.44 | 95 | Glossary
decisive action
The continuous, simultaneous execution of offensive, defensive, and stability operations or defense
support of civil authorities tasks. (ADP 3-0)
defensive operation
An operation to defeat an enemy attack, gain time, economize forces, and develop conditions favorable
for offensive or stability operations. (ADP 3-0)
engage
In air and missile defense, a fire control order used to direct or authorize units and/or weapon systems
to attack a designated target. (JP 3-01)
engagement authority
An authority vested with a joint force commander that may be delegated to a subordinate commander,
that permits an engagement decision. (JP 3-01)
exploitation
A type of offensive operation that usually follows a successful attack and is designed to disorganize the
enemy in depth. (ADP 3-90)
flexibility
The employment of a versatile mix of capabilities, formations, and equipment for conducting
operations. (ADP 3-0)
homeland defense
The protection of United States sovereignty, territory, domestic population, and critical infrastructure
against external threats and aggression or other threats as directed by the President. Also called HD.
(JP 3-27)
integration
The arrangement of military forces and their actions to create a force that operates by engaging as a
whole. (JP 1)
mobile defense
A type of defensive operation that concentrates on the destruction or defeat of the enemy through a
decisive attack by a striking force. (ADP 3-90)
mobility
A quality or capability of military forces which permits them to move from place
to place while retaining the ability to fulfill their primary mission. (JP 3-36)
movement to contact
A type of offensive operation designed to develop the situation and establish or regain contact. (ADP
3-90)
offensive operation
An operation to defeat or destroy enemy forces and gain control of terrain, resources, and population
centers. (ADP 3-0)
operational control
The authority to perform those functions of command over subordinate forces involving organizing
and employing commands and forces, assigning tasks, designating objectives, and giving authoritative
direction necessary to accomplish the mission. Also called OPCON. (JP 1)
operational environment
A composite of the conditions, circumstances, and influences that affect the employment of
capabilities and bear on the decisions of the commander. Also called OE. (JP 3-0) |
3-01.44 | 96 | Glossary
organic
Assigned to and forming an essential part of a military organization as listed in its table of organization
for the Army, Air Force, and Marine Corps, and are assigned to the operating forces for the Navy. (JP
1)
planning
The art and science of understanding a situation, envisioning a desired future, and laying out effective
ways of bringing that future about. (ADP 5-0)
positive control
A method of airspace control that relies on positive identification, tracking, and direction of aircraft
within an airspace, conducted with electronic means by an agency having the authority and
responsibility therein. (JP 3-52)
positive identification
An identification derived from observation and analysis of target characteristics including visual
recognition, electronic support systems, noncooperative target recognition techniques, identification
friend or foe systems, or other physics-based identification techniques. Also called PID. (JP 3-01)
primary target line
An azimuth assigned to a weapon system or unit along which the system fire control personnel and or
gunners focus their attention. (FM 3-01)
procedural control
A method of airspace control which relies on a combination of previously agreed and promulgated
orders and procedures. (JP 3-52)
pursuit
A type of offensive operation designed to catch or cut off a hostile force attempting to escape, with the
aim of destroying it. (ADP 3-90)
resilience
The quality of the defense to maintain continuity of operations regardless of changes in or
unanticipated tactics by enemy air or losses of critical air and missile defense components. (FM 3-01)
rules of engagement
Directives issued by competent military authority that delineate the circumstances and limitations
under which United States forces will initiate and/or continue combat engagement with other forces
encountered. Also called ROE. (JP 3-84)
secondary target line
A pre-planned alternative target line used to shift the orientation of fires to assure all likely threat
avenues of ingress are adequately defended. (FM 3-01)
sector of fire
That area assigned to a unit, crew-served weapon, or an individual weapon within which it will engage
targets as they appear in accordance with established engagement priorities. (FM 3-90-1)
short-range air defense
Capabilities that provide air defense against low-altitude air threats. Also called SHORAD. (FM 3-01)
stability operation
An operation conducted outside the United States in coordination with other instruments of national
power to establish or maintain a secure environment and provide essential governmental services,
emergency infrastructure reconstruction, and humanitarian relief. (ADP 3-0)
tactical control
The authority over forces that is limited to the detailed direction and control of movements or
maneuvers within the operational area necessary to accomplish missions or tasks assigned. Also called
TACON. (JP 1) |
3-01.44 | 97 | Glossary
unmanned aircraft system
That system whose components include the necessary equipment, network, and personnel to control an
unmanned aircraft. Also called UAS. (JP 3-30)
weapons control status
An air and missile defense control measure declared for a particular area and time by an area air
defense commander, or delegated subordinate commander, based on the rules of engagement that
establish the conditions under which fighters and surface air defense weapons are permitted to engage
threats. Also call WCS. (JP 3-01) |
3-01.44 | 99 | References
All websites accessed on 01 March 2022.
REQUIRED PUBLICATIONS
These documents must be available to the intended users for this publication.
DOD Dictionary of Military and Associated Terms. May 2022.
FM 1-02.1. Operational Terms. 21 November 2019.
FM 1-02.2. Military Symbols. 18 May 2022.
RELATED PUBLICATIONS
JOINT PUBLICATIONS
Most joint publications are available online: https://www.jcs.mil/doctrine.
JP 1. Doctrine for the Armed Forces of the United States. 25 March 2013.
JP 3-0. Joint Campaigns and Operations. 18 June 2022.
JP 3-01. Countering Air and Missile Threats. 21 August 2017.
JP 3-27. Homeland Defense. 10 April 2018.
JP 3-30. Joint Air Operations. 25 July 2019.
JP 3-36. Joint Air Mobility and Sealift Operations. 4 January 2021.
JP 3-52. Joint Airspace Control. 13 November 2014.
JP 3-84. Legal Support. 2 August 2016.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online: https://armypubs.army.mil/.
ADP 3-0. Operations. 31 July 2019.
ADP 3-90. Offense and Defense. 31 July 2019.
ADP 5-0. The Operations Process. 31 July 2019.
ADP 7-0. Training. 31 July 2019.
ATP 3-01.8. Techniques for Combined Arms for Air Defense. 29 July 2016.
ATP 3-01.16. Air and Missile Defense Intelligence Preparation of the Battlefield. 31 March 2016.
ATP 3-01.18. Stinger Team Techniques. 23 August 2017.
ATP 3-01.48. Sentinel Techniques. 4 March 2016.
ATP 3-01.60. Counter-Rocket, Artillery, and Mortar Operations. 10 May 2013.
ATP 3-01.64. Avenger Battalion and Battery Techniques. 10 March 2016.
ATP 3-01.81. Counter-Unmanned Aircraft System Techniques. 13 April 2017.
FM 3-0. Operations. 6 October 2017.
FM 3-01. U.S. Army Air and Missile Defense Operations. 22 December 2020.
FM 3-90-1. Offense and Defense Volume 1. 22 March 2013.
FM 4-0. Sustainment Operations. 31 July 2019.
FM 6-0. Commander and Staff Organization and Operations. 16 May 2022. |
3-01.44 | 100 | References
FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 7 August 2019.
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate (APD)
website at https://armypubs.army.mil/.
DA Form 2028. Recommended Changes to Publications and Blank Forms. |
3-01.44 | 101 | Index
Entries are by paragraph number.
41, 6-42, 6-43, 6-47, 6-49, A-1,
A C
A-2
ADA forces,1-3, 1-4, 1-6, 1-7, 1-8, combined arms for air defense, 2-
modes of control, 1-17, 1-18
1-9, 1-10, 4-6 2, 2-16, 6-4, C-29, D-9
O
air and missile defense, 1-1, 1-6, counterair effort, 1-8
1-17, 4-7, 4-8, 5-6, A-16 operational control, 1-11, 4-10, C-
cyberspace, 3-1, 3-2, 3-3, 3-25, 3-
air threat, 1-15, 1-16, 2-1, 2-4, 2- 37 25
5, 2-8, 2-12, 2-13, 3-2, 3-6, 3- cyberspace attacks, 3-27 operational elements, 1-2
29, 3-32, 4-8, 4-12, 4-25, 5-4, operations process, 4-4, 4-13
5-17, 5-19, 6-2, 6-32, 6-43, 6- D
49, 6-51, C-7, C-10, C-13, C- decentralized control, 6-27 S
14, C-15, C-16, C-31, D-51 defensive counterair, 1-1, 1-8 sector air defense commander, 1-
alert state, 1-13 11, 1-13
digital terrain-model, D-22
AMD employment tenets, 5-18, 6- sensors, 1-4, 1-5, 1-6, 2-5, 2-11,
35 E 3-10, 4-27, 4-29, 5-2, 5-8, 5-13,
AMD principles, 1-5, 4-27 engagement authority, 1-11 5-17, 5-19, 5-20, 5-27, 5-30, 6-
35, 6-51, A-1, A-14, A-15, A-16,
area air defense commander , 1- engagement operations, A-19
C-3, C-10, C-18, C-20, D-9, D-
7, 1-11, 1-13, 1-15, 1-17, 2-20,
G 28
4-7
ground defense plan, 5-30 Stryker, 2-7, A-1, A-2
area air defense plan, 2-20, 4-7
ground forces, 2-10, 3-2, 3-18, 3- U
attack operations, 1-1
28, 3-32, 3-33, 4-27
Avenger, 1-3, 1-5, 2-3, 2-5, 2-6, 2- unified action, 2-12
8, 2-9, 2-10, 5-21, 5-28, 5-29, H unmanned aircraft systems (UAS),
6-7, 6-9, 6-16, 6-16, 6-17, 6-18, high value asset, 4-6 1-4, 1-17, 2-3, 2-4, 2-7, 3-2, 3-
6-21, 6-23, 6-26, 6-28, 6-35, 6- 6, 3-7, 3-8, 3-9, 3-10, 3-11, 3-
40, 6-41, 6-42, 6-43,6-44, 6-47, I 30, 3-31, 3-32, 3-34, 3-35, 3-36,
6-49, 6-51, A-3, A-4, A-5, A-6, identification criteria, 1-12, 1-17, 4-12, 4-24, 5-10, 5-21, 6-7, 6-
A-18 2-20, 4-7 31, 6-41, 6-45, A-1, A-7, A-9, C-
4, C-12, C-15, C-16, C-20, C-
B M 21, C-23, C-25, C-26, C-32
ballistic missile, 1-1, 1-2, 1-4, 1- Maneuver-Short Range Air
W
17, 3-2, 3-15 Defense (M-SHORAD), 1-3, 1-
battle drills, 6-20,6-21, D-4, D-10, 5, 2-3, 2-5, 2-6, 2-7, 5-21, 5-28, weapons control status, 1-12, 1-
D-28 5-29, 6-7, 6-8, 6-9, 6-15, 6-21, 17, 6-4, 6-32
6-23, 6-26, 6-28, 6-35, 6-40, 6- |
3-01.44 | 103 | FM 3-01.44
21 July 2022
By Order of the Secretary of the Army:
JAMES C. MCCONVILLE
General, United States Army
Chief of Staff
Official:
MARK F. AVERILL
Administrative Assistant
to the Secretary of the Army
2219406
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve. Distributed in |
3-0 | 1 | FM 3-0
OPERATIONS
OCTOBER 2022
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
This publication supersedes FM 3-0, dated 6 October 2017. |
3-0 | 2 | Foreword
The United States Army has always served to protect the Nation and preserve the peace. Historically, this has always meant
preparing for and, when necessary, fighting and winning our Nation’s wars. The Army must always be ready to fight and win. In
this era of great power competition, the Army must always campaign aggressively to protect our national interests.
We are living in very challenging times. There is not a time in recent history that is so potentially dangerous. Russia, our acute
threat, is conducting an unprovoked war on the sovereign country of Ukraine. Our pacing challenge, China, with an economy
nearly equal in size to ours, is building a world-class military to challenge us and threatening its neighbors, including Taiwan. As
we focus on China and Russia, we cannot take our eyes off our other persistent threats: North Korea, Iran, and violent extremists.
In addition, we are still dealing with the challenges of COVID and unprecedented natural disasters throughout the country. Despite
all these challenges and threats, we continue to advance in the Army’s greatest transformation in over 40 years, as we pivot from
decades of counterinsurgency and counterterrorism to large-scale combat operations.
Every 40 years the Army experiences a major transformation. In 1973, the Arab–Israeli War drove Army senior leaders and
General Don Starry to relook the lessons learned in that conflict to counter the Soviet Union. Those efforts resulted in whatwe
know today as Air-Land Battle. In 1991, the Army and the joint force executed that doctrine with great efficacy in OPERATION
DESERT STORM, quickly liberating Kuwait. We are at a similar inflection point with lessons learned coming in from the 2nd
Nagorno-Karabakh War and the ongoing Russo-Ukraine War. These lessons have and continue to shape our transformational war
fighting concept of multidomain operations. Multidomain operationsstarted as an operating concept, and now we are solidifying
it into doctrine. This concept is shaping the Army and transforming our people, readiness, and modernization efforts to meet
current and future challenges and define the Army of 2030.
FM 3-0 demonstrates the first principles of speed, range, and convergence of the cutting-edge technologies needed to achieve
future decision dominance and overmatch against our adversaries. It reflects the vital role the Army plays as the force that joint
force commanders need to hold critical terrain, assure allies and partners, defeat the most dangerous enemies in close combat
anywhere in the world, and consolidate gains to achieve enduring strategic outcomes for the Nation. Two critical elements of
multidomain operations, space and cyberspace capabilities, have been employed by Army forces for more than two decades, but
never during conflict with opponents capable of effectively contesting the U.S. joint force in space or cyberspace. Air and maritime
capabilities have long enabled successful operations on land, but it has been decades since air-ground integration and close
cooperation between land and naval forces have been effectively challenged by a threat.
FM 3-0 remains rooted in the principles of war and reinforces the offensive mindset. It provides a simple definition of multidomain
operations that applies at all echelons. The new operational environment model helps leaders visualize the five domains and
understand their interrelationship through the physical, information, and human dimensions. FM 3-0 introduces new tenets and
imperatives and provides an operational framework that helps echelons better organize forces in terms of time, space, and purpose.
It describes operations in the context of competition, crisis, and armed conflict. It also addresses the unique considerations for
applying landpower in maritime environments and the unique demands of, and requirements for, combat leadership.
Success demands competent leaders who apply doctrine with judgment. Therefore, I challenge you all to learn and then assess
doctrine during training and operations. Engage about it in professional discourse and make it better. That is how the Army will
fight and win in the future.
People first, winning matters, and we remain Army strong!
JJAAMMEESS CC.. MMCCCCOONNVVIILLLLEE
GGEENNEERRAALL,, UUNNIITTEEDD SSTTAATTEESS AARRMY |
3-0 | 3 | *FM 3-0
Field Manual Headquarters
No. 3-0 Department of the Army
Washington, D(cid:17)C(cid:17), 01 October 2022
Operations
Contents
Page
PREFACE..................................................................................................................... v
INTRODUCTION ......................................................................................................... ix
Chapter 1 FOUNDATIONS OF OPERATIONS ......................................................................... 1-1
Army Operations........................................................................................................1-1
Multidomain Operations.............................................................................................1-2
Challenges for Army Forces......................................................................................1-3
Lethality: Overcoming Challenges.............................................................................1-5
War and Warfare.......................................................................................................1-6
Understanding an Operational Environment...........................................................1-16
Chapter 2 GENERATING AND APPLYING COMBAT POWER ............................................... 2-1
Warfighting Functions................................................................................................2-1
Combat Power...........................................................................................................2-3
Strategic Environment...............................................................................................2-6
Unified Action and Army Forces..............................................................................2-12
Chapter 3 FUNDAMENTALS OF OPERATIONS ...................................................................... 3-1
Section I – Multidomain Operations: The Army’s Operational Concept ............ 3-1
Section II – Tenets and Imperatives ...................................................................... 3-2
Tenets........................................................................................................................3-2
Imperatives................................................................................................................3-8
Section III – Operational Approach and Operational Framework ..................... 3-18
Operational Approach..............................................................................................3-18
Strategic Framework...............................................................................................3-21
Operational Framework...........................................................................................3-23
Chapter 4 OPERATIONS DURING COMPETITION BELOW ARMED CONFLICT ................. 4-1
Overview of Operations During Competition.............................................................4-1
Adversary Methods During Competition....................................................................4-2
Preparation for Large-Scale Combat Operations......................................................4-3
Relative Advantages During Competition..................................................................4-6
Interagency Coordination..........................................................................................4-8
Competition Activities................................................................................................4-9
Roles of Army Echelons during Competition...........................................................4-12
Consolidating Gains During Competition................................................................4-20
Transition to Crisis and Armed Conflict...................................................................4-21
DISTRIBUTIONRESTRICTION:Approved for public release, distribution is unlimited.
*This publicationsupersedesFM 3-0, dated 06 October 2017. |
3-0 | 4 | Contents
Chapter 5 OPERATIONS DURING CRISIS .............................................................................. 5-1
Overview of Operations During Crisis.......................................................................5-1
Adversary Methods During Crisis.............................................................................5-2
Operations Security...................................................................................................5-3
Relative Advantages.................................................................................................5-3
Army Support to the Joint Force During Crisis.........................................................5-4
Force Projection........................................................................................................5-7
Army Echelons During Crisis..................................................................................5-13
Consolidating Gains................................................................................................5-15
Transition to Competition or Armed Conflict...........................................................5-16
Chapter 6 OPERATIONS DURING ARMED CONFLICT ......................................................... 6-1
Section I – Armed Conflict and Large-Scale Combat Operations ...................... 6-1
Enemy Approaches to Armed Conflict......................................................................6-2
Relative Advantages During Armed Conflict.............................................................6-4
Operating as Part of the Joint Force.........................................................................6-6
Applying Defeat Mechanisms.................................................................................6-21
Enabling Operations................................................................................................6-26
Section II – Defensive Operations ....................................................................... 6-31
Purpose and Conditions for the Defense................................................................6-31
Characteristics of the Defense................................................................................6-32
Enemy Offense.......................................................................................................6-33
Types of Defensive Operations...............................................................................6-34
Defensive Operational Framework Considerations................................................6-35
Transition to Offense...............................................................................................6-40
Section III – Offensive Operations ....................................................................... 6-40
Purpose and Conditions for the Offense.................................................................6-40
Characteristics of the Offense.................................................................................6-41
Enemy Defense.......................................................................................................6-41
Types of Offensive Operations...............................................................................6-43
Offensive Operational Framework Considerations.................................................6-44
Transition to Defense and Stability.........................................................................6-47
Transition to Post-Conflict Competition...................................................................6-47
Chapter 7 ARMY OPERATIONS IN MARITIME ENVIRONMENTS ......................................... 7-1
Section I – Overview of the Maritime Environment ............................................. 7-1
Physical Characteristics of the Maritime Environment..............................................7-1
Considerations Unique to the Maritime Environment...............................................7-3
Section II – Maritime Environment Planning and Operational Framework ....... 7-6
Planning Considerations for a Maritime Environment...............................................7-7
Applying the Operational Framework........................................................................7-7
Section III – Operational Considerations for a Maritime Environment .............. 7-9
Establish Command and Control............................................................................7-10
Defend and Control Key Terrain.............................................................................7-10
Defeat Components of Enemy Antiaccess and Area Denial and Enable Joint
Offensive Operations..............................................................................................7-13
Sustain Large-Scale Combat Operations in Maritime Environments.....................7-15
Chapter 8 LEADERSHIP DURING OPERATIONS ................................................................... 8-1
The Art of Command and the Commander...............................................................8-1
Applying the Art of Command...................................................................................8-2
Driving the Operations Process................................................................................8-7
Adapting Formations for Missions and Transitions...................................................8-9
Appendix A THE PRINCIPLES OF WAR ..................................................................................... A-1 |
3-0 | 5 | Contents
Appendix B COMMAND AND SUPPORT RELATIONSHIPS ..................................................... B-1
Appendix C CONTESTED DEPLOYMENTS ............................................................................... C-1
SOURCE NOTES ................................................................................ Source Notes-1
GLOSSARY ................................................................................................ Glossary-1
REFERENCES ........................................................................................ References-1
INDEX ................................................................................................................ Index-1
Figures
Introductory figure. FM 3-0 logic chart .............................................................................................. x
Figure 1-1. Operational categories and the spectrum of violence ................................................. 1-2
Figure 1-2. Levels of warfare ........................................................................................................ 1-12
Figure 1-3. Army strategic contexts and operational categories .................................................. 1-14
Figure 1-4. Domains and dimensions of an operational environment.......................................... 1-17
Figure 2-1. Notional U.S. European Command preclusion example ........................................... 2-10
Figure 2-2. Notional U.S. Indo-Pacific Command preclusion example ........................................ 2-11
Figure 2-3. Examples of operations and activities ....................................................................... 2-13
Figure 3-1. Convergence ................................................................................................................ 3-4
Figure 3-2. The operational framework in the context of the strategic framework ....................... 3-23
Figure 3-3. Notional corps area of operations with noncontiguous divisions ............................... 3-26
Figure 3-4. Notional corps deep, close, and rear areas with contiguous divisions ...................... 3-28
Figure 5-1. Simultaneous flexible deterrent and response option examples ................................. 5-5
Figure 6-1. Doctrinal template of depths and frontages ................................................................. 6-8
Figure 6-2. Notional roles and responsibilities in terms of time, space, and purpose at different
echelons. ................................................................................................................... 6-11
Figure 6-3. Fires assets of a notional theater-level integrated fires command ............................ 6-16
Figure 6-4. Notional enemy offensive operation .......................................................................... 6-34
Figure 6-5. Notional operational framework during defensive operations ................................... 6-36
Figure 6-6. Notional enemy maneuver defense ........................................................................... 6-42
Figure 6-7. Notional operational framework during offensive operations .................................... 6-44
Figure 7-1. Operations in Malaya ................................................................................................... 7-6
Figure 7-2. Notional corps area of operation with maritime aspects .............................................. 7-8
Figure 8-1. The operations process ............................................................................................... 8-8
Figure B-1. Joint command relationships .......................................................................................B-3 |
3-0 | 6 | Contents
Tables
Introductory table. New and modified terms .................................................................................... xii
Table 1-1. Principles of war ........................................................................................................... 1-8
Table 5-1. Potential Army contributions to joint flexible deterrent and response options .............. 5-6
Table B-1. Joint support categories ............................................................................................... B-3
Table B-2. Army command relationships ....................................................................................... B-5
Table B-3. Army support relationships ........................................................................................... B-7
Table B-4. Other relationships ....................................................................................................... B-8
Table B-5. North Atlantic Treaty Organization command relationships ....................................... B-12
Vignettes
Systems Warfare and Sanctuary: Eastern Ukraine 2014 .............................................................. 2-9
Second Nagorno Karabakh War: September–November 2020 .................................................. 3-13
Failure to Prepare for War: Philippines, 1941 ................................................................................ 4-5
Successful Engagement: State Partnership Program ................................................................ 4-10
Liberia: OPERATION UNITED ASSISTANCE ............................................................................ 4-12
Effective Response: OPERATION PAUL BUNYAN ..................................................................... 5-7
Deployment Friction: Task Force Ironhorse in OPERATION IRAQI FREEDOM ....................... 5-10
Crisis Response: Baghdad Embassy Attack ............................................................................... 5-15
Defeat of the North Korean People’s Army, September 1950 ..................................................... 6-23
Disintegration of Egyptian Defense: 1973 Arab-Israeli War ........................................................ 6-26
Faulty Assumptions—Defeat Across Multiple Domains in Malaya ................................................ 7-5
Commanding Forward—LTG Eichelberger at Buna ...................................................................... 8-3
Initiative in the Absence of Orders – Naval Bombers at Midway ................................................... 8-7
Crosstalk in the Desert—VII Corps in the Gulf War ..................................................................... 8-10
Notional Threat Open Source and Cyberspace Collection ............................................................ C-2
Adversary Impacts on Civilian Infrastructure ................................................................................. C-5
This publication is available at the Army Publishing Directorate site
(https://armypubs.army.mil) and the Central Army Registry site
(https://atiam.train.army.mil/catalog/dashboard). |
3-0 | 7 | Preface
FM 3-0 expands on the Army’s capstone doctrine for multidomain operations described in ADP 3-0. It
describes how Army forces contribute landpower to the joint force and integrate joint capabilities into
operations on land to achieve military objectives and fulfill policy aims. FM 3-0 focuses on large-scale
combat operations and their relationship to the full range of military operations that support joint
campaigning.
FM 3-0 is applicable to all members of the profession of arms: leaders, Soldiers, and Army Civilians. The
principal audience for FM 3-0 is commanders, staffs, and leaders of theater armies, corps, divisions, and
brigades. This manual provides the foundation for training and Army education system curricula and future
capabilities development across doctrine, organization, training, materiel, leadership and education,
personnel, facilities, and policy (known as DOTMLPF-P).
To comprehend the doctrine contained in FM 3-0, readers must first understand the Army’s mission,
organization, and roles described in ADP 1. They must understand the operations process, operational art,
and warfighting functions (command and control [C2], intelligence, fires, movement and maneuver,
protection, and sustainment) described in ADP 3-0. Readers must understand the tactics described in
ADP 3-90 and stability operations covered in ADP 3-07. They should also understand irregular warfare,
described across multiple manuals, including ADP 3-05, FM 3-05, FM 3-18, and FM 3-24.
Army leaders must understand joint doctrine and use it when communicating and coordinating directly with
the joint force. JP 3-0 establishes the baseline operations doctrine for the joint force.
When conducting multinational operations, commanders use the allied or other appropriate doctrine
according to the situation. Readers must be familiar with FM 3-16 to understand multinational operations.
AJP-01 establishes the capstone doctrine for North Atlantic Treaty Organization (NATO) military operations.
Commanders, staffs, and subordinates ensure that their decisions and actions comply with all applicable
United States, international, and host-nation laws and regulations, and all applicable international treaties and
agreements. Commanders at all levels ensure that their Soldiers operate in accordance with the law of armed
conflict and applicable rules of engagement. (See FM 6-27 for more information on the law of war.) They
also adhere to the Army Ethic as described in ADP 6-22.
FM 3-0 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the
glossary and the text. Terms for which FM 3-0 is the proponent publication (the authority) are presented in
italics and bold font in the text and marked with an asterisk (*) in the glossary. When first defined in the text,
a term for which FM 3-0 is the proponent publication is boldfaced and italicized, and the definition is
boldfaced. When first defining other proponent definitions in the text, the term is italicized, and the number
of the proponent publication follows the definition.
The proponent of FM 3-0 is the United States Army Combined Arms Center. The preparing agency is the
Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send comments and
recommendations by e-mail to [email protected] on DA Form
2028 (Recommended Changes to Publications and Blank Forms) to Commander, United States Army
Combined Arms Center and Fort Leavenworth, ATZL-MCD (FM 3-0), 300 McPherson Avenue, Fort
Leavenworth, KS 66027-2337; or submit an electronic DA Form 2028. |
3-0 | 9 | Acknowledgements
The copyright owners listed here have granted permission to reproduce material from their works.
Excerpts reprinted by permission from On War by Carl von Clausewitz. Edited and translated by Peter
Paret and Michael E. Howard. Copyright © 1988 by Princeton University Press.
Quote reprinted by permission from “Generalship” by Barbara W. Tuchman. Copyright © 1972 by The
US Army War College Quarterly: Parameters, Volume 2, Number 1.
Excerpts reprinted by permission from Roots of Strategy. Edited by Thomas R. Phillips, Brigadier
General, Retired. Copyright © 1985 by Stackpole Books. All rights reserved.
Quote reprinted by permission from Guns of August by Barbara W. Tuchman. Copyright © 1962/1990
Tuchman Estate. All rights reserved.
Quote reprinted by permission from It Worked for Me: In Life and Leadership by Colin Powell.
Copyright © 2014 by HarperCollins Publishing. All rights reserved.
Quote reprinted by permission from Unofficial History by William Slim. Copyright © 1959 by
Field-Marshal Sir William Slim. Reprinted by Pen & Sword Books Limited. All rights
reserved. |
3-0 | 11 | Introduction
This version of FM 3-0 establishes multidomain operations as the Army’s operational concept. Conceptually,
multidomain operations reflect an evolutionary inflection point, building on the incremental changes in
doctrine as the operational environment has changed over the last forty years. In practice, however, these
conceptual changes will have revolutionary impacts on how the Army conducts operations in the coming
decades. The 2017 version of FM 3-0 introduced many multidomain considerations and ideas. This version
of FM 3-0 codifies the multidomain approach to operations in terms of the combined arms employment of
capabilities from multiple domains. The multidomain operations concept draws from previous Army
operational concepts, including AirLand Battle, Full Spectrum Operations, and Unified Land Operations.
General Donn A. Starry’s description of the “extended battlefield” and the associated concept of AirLand
Battle helped visualize the battlefield of the time—a battlefield now also extended into the maritime, space,
and cyberspace domains. AirLand Battle demanded the integration of air and ground capabilities to attack
enemy second echelon forces at extended ranges. Today, multidomain operations require integration of Army
and joint capabilities from all domains to defeat the enemy’s integrated fires complexes and air defense
systems so that maneuver forces can exploit the resulting freedom of action. The ability to maneuver to seize
or retain key terrain and exert control over resources and people for as long as is necessary to achieve tactical,
operational, and strategic objectives makes ground forces foundational to joint force success. During
competition and crisis, forward-stationed Army forces holding key land areas provide “stand-on” capabilities
that counter adversary standoff approaches, reduce risk to joint force projection, deter adversary aggression,
and achieve national and joint objectives. During conflict, maneuvering ground forces with the right
capabilities ultimately enable operations in the other domains.
Full Spectrum Operations accounted for the operations that Army forces conducted outside the bounds of
armed conflict. This version of FM 3-0 updates this material for the present by describing how Army forces
operate during competition below armed conflict and during crisis. It goes a step further than Full Spectrum
Operations by describing how these operations set conditions for success during armed conflict.
Unified Land Operations emphasized the integration and synchronization of Army, joint, and other unified
action partners during operations. The 2017 version of FM 3-0 updated unified land operations and shifted
the Army’s readiness focus from counterinsurgency to large-scale combat operations. It incorporated
elements of the multidomain operations concept, particularly the operational environment and its
considerations. This version of FM 3-0 retains the focus on large-scale combat operations. It also builds on
the importance of integrating joint and multinational capabilities and expands the combined arms approach
with a focus on creating complementary and reinforcing effects with capabilities from multiple domains. By
deliberately looking beyond traditional methods of integration generally focused on one or two domains,
Army forces can expand opportunities for the joint force and create more dilemmas for the enemy.
The nature of war remains unchanged. The model for understanding an operational environment, specifically
the physical, information, and human dimensions, reinforces the Clausewitzian idea that war is an act of force
to compel the enemy’s will. In other words, physical action can influence human perceptions, behavior, and
decision making. Although there are new capabilities in space and cyberspace, Army forces use them just as
they employ any other capability—to accomplish missions on land.
The logic chart for this manual is shown in the introductory figure on page x. The logic chart begins with
identifying the methods used by peer threats to contest the joint force and how the joint force and Army
forces counter those approaches through multidomain operations. Multidomain operations are the Army’s
contribution to unified action, conducted by Army echelons in an operational environment consisting of five
domains and three dimensions, and the strategic contexts of competition, crisis, and armed conflict. It
concludes with a description of multidomain operations through guiding principles of war, tenets, and
imperatives that enable Army forces to accomplish missions, defeat enemy forces, and meet objectives. |
3-0 | 12 | Introduction
Introductory figure. FM 3-0 logic chart
FM 3-0 contains eight chapters and three appendixes: |
3-0 | 13 | Introduction
Chapter 1 describes the challenges faced by Army forces and how multidomain operations help resolve
them. It describes the Army’s vision of war and warfare, the strategic contexts in which Army forces conduct
operations, and the operational environment, including the domains and dimensions.
Chapter 2 describes how the synchronization of warfighting functions generates combat power to apply
against enemy forces. It then describes threats and their methods, and how Army forces counter these threat
methods through unified action and joint capabilities.
Chapter 3 explains multidomain operations in detail, describing the tenets and imperatives of operations. It
then highlights key elements of an operational approach and the operational framework.
Chapter 4 describes how Army forces operate during competition to set conditions for armed conflict and
counter adversary malign behavior.
Chapter 5 describes how Army forces provide options during crisis to prevent armed conflict while
continuing to fulfill political aims.
Chapter 6 describes how Army forces operate during armed conflict, with a focus on how to enable the joint
force and integrate capabilities from all domains in large-scale combat operations.
Chapter 7 describes how Army forces operate in the unique conditions of maritime environments.
Chapter 8 describes the role of commanders and leaders in the demanding conditions of large-scale combat
operations.
Appendix A provides an overview of the principles of war.
Appendix B describes command and support relationships.
Appendix C describes considerations for when enemy forces contest deployment.
The introductory table on page xii outlines changes to Army terminology reflected in FM 3-0. |
3-0 | 14 | Introduction
Introductory table. New and modified terms
Term Action
agility New term and definition
close operations New term and definition
conventional warfare New term and definition
convergence New term and definition
conventional warfare New term and definition
cyberspace domain New term and definition
deep operations New term and definition
disintegrate FM 3-0 becomes proponent and modifies
term.
dislocate FM 3-0 becomes proponent and modifies
term.
domain New term and definition
endurance New term and definition
human dimension New term and definition
informational considerations New term and definition
information dimension New term and definition
irregular warfare New Army-specific definition
lethality New term and definition
multidomain operations New term and definition
national strategic level of warfare New term and definition
physical dimension New term and definition
protection warfighting function FM 3-0 becomes proponent and modifies
term.
rear operations New term and definition
relative advantage New term and definition
sector New term and definition
setting the theater New term and definition
space domain FM 3-0 becomes proponent and modifies
term.
support area operations New term and definition
theater strategic level of warfare New term and definition
zone New term and definition |
3-0 | 15 | Chapter 1
Foundations of Operations
War is thus an act of force to compel our enemy to do our will.
Carl von Clausewitz
This chapter describes the range of military operations and the Army’s focus on
readiness to conduct large-scale combat operations. It describes how Army forces meet
challenges and conduct multidomain operations as part of a joint and multinational
force. Beginning with the Army’s view of war and warfare, this chapter describes key
concepts that help leaders understand an operational environment.
ARMY OPERATIONS
1-1. The Army’s primary mission is to organize, train, and equip its forces to conduct prompt and sustained
land combat to defeat enemy ground forces and seize, occupy, and defend land areas. It supports four strategic
roles for the joint force. Army forces shape operational environments, counter aggression on land during
crisis, prevail during large-scale ground combat, and consolidate gains. The Army fulfills its strategic roles
by providing forces for joint campaigns that enable integrated deterrence of adversaries outside of conflict
and the defeat of enemies during conflict or war. The strategic roles clarify the overall purposes for which
Army forces conduct multidomain operations on behalf of joint force commanders (JFCs) in the pursuit of a
stable environment and other policy objectives. Fulfilling policy objectives requires national-level leaders to
orchestrate all instruments of national power throughout the entire government and coalition, in a manner
commensurate with national will. (See JP 3-0 for more information on joint campaigns and deterrence. See
ADP 3-0 for more information on the Army’s strategic roles.)
1-2. Military operations on land are foundational to operations in other domains because almost all
capabilities, no matter where employed, are ultimately based on or controlled from land. While any particular
domain may dominate military considerations in a specific context, conflicts are usually resolved on land
because that is where people live and make political decisions and where the basis of national power exists.
1-3. Army forces achieve objectives through the conduct of operations. An operation is a sequence of
tactical actions with a common purpose or unifying theme (JP 1, Volume 1). Operations vary in many ways.
They occur in all kinds of physical environments, including urban, subterranean, desert, jungle, mountain,
maritime, and arctic. Operations vary in scale of forces involved and duration. Operations change factors in
the physical, information, and human dimensions of an operational environment.
1-4. The complex environment in which operations occur demands leaders who understand both the science
and art of operations. Understanding the science of operations—such as combat power ratios, weapons
ranges, and movement tables—helps leaders improve synchronization and reduce risk. However, there is no
way to eliminate uncertainty, and leaders must exercise operational art to make decisions and assume risk.
Intangible factors, such as the impact of leadership on morale, using shock effect to defeat enemy forces, and
supportive populations are fundamentally human factors that can overcome physical disadvantages and often
decide the outcomes of an operation. (See ADP 3-0 for more information on the art and science of operations.)
1-5. Army forces meet a diverse array of challenges and contribute to national objectives across a wide
range of operational categories, including large-scale combat operations, limited contingency operations,
crisis response, and support to security cooperation. (See figure 1-1 on page 1-2 for a depiction of operational
categories and the spectrum of violence.) |
3-0 | 16 | Chapter 1
Figure 1-1. Operational categories and the spectrum of violence
1-6. Most operations occur on the lower end of the spectrum of violence, and their objectives do not reach
the level of vital national interests or national survival. These operations typically shape operational
environments in ways that stabilize global security and facilitate conditions that are generally favorable to
the United States. They provide valuable options to JFCs because they achieve objectives best supported by
persistent presence, often at relatively low cost.
1-7. While the overwhelming majority of operations conducted by Army forces occur either below the
threshold of armed conflict or during limited contingencies, the focus of Army readiness is on large-scale
combat operations. The United States always retains the option to employ greater levels of force when less
coercive methods are ineffective, and when a vital interest or national survival is at stake. This requires Army
forces to be prepared for the most demanding and dangerous types of operations. Army forces contribute to
conventional deterrence through their demonstrated capability, capacity, and will to wage war on land in any
environment against any opponent. Credible combat forces make the other instruments of national power
more potent, and they help deter the enemy’s escalation of violence during other types of operations.
1-8. Credible combat forces are those able to overcome the advantages peer threats generate within a
specific regional context. Enemies typically initiate their aggression under conditions optimal for their
success, requiring U.S. forces to respond at a disadvantage. U.S. combat operations typically involve force
projection over long distances, providing advantages for enemy forces operating closer to their bases of
support. Enemies typically have a degree of popular support cultivated through decades of propaganda and
isolation from the free flow of information. This increases the enemy's will to fight and can make local
populations hostile to U.S. forces and objectives. Although a combatant command and theater army may
accrue a variety of advantages as they set the theater and prepare for armed conflict during periods of
competition, Army forces are typically faced with challenges they have to overcome at the onset of hostilities
and throughout the conduct or armed conflict.
MULTIDOMAIN OPERATIONS
1-9. Multidomain operations are the combined arms employment of joint and Army capabilities to
create and exploit relative advantages that achieve objectives, defeat enemy forces, and consolidate
gains on behalf of joint force commanders. Employing Army and joint capabilities makes use of all
available combat power from each domain to accomplish missions at least cost. Multidomain operations are
the Army’s contribution to joint campaigns, spanning the competition continuum. Below the threshold of
armed conflict, multidomain operations are how Army forces accrue advantages and demonstrate readiness
for conflict, deterring adversaries while assuring allies and partners. During conflict, they are how Army
forces close with and destroy the enemy, defeat enemy formations, seize critical terrain, and control
populations and resources to deliver sustainable political outcomes.
1-10. Army forces conduct operations in support of joint campaigns which for the most part occur as part of
a larger coalition operation. Leaders must understand the interdependencies between their own assigned
forces and the forces or capabilities provided by others to generate the complementary and reinforcing effects |
3-0 | 17 | Foundations of Operations
of combined arms approaches. Army forces employ joint and other unified action partner capabilities to the
degree they are available. However, because peer threats can contest the force in all domains, Army forces
must be prepared to conduct operations when some or all joint capabilities are unavailable to support mission
accomplishment.
1-11. All operations are multidomain operations. Army forces employ organic capabilities in multiple
domains, and they continuously benefit from air and maritime strategic transportation and space and
cyberspace capabilities that they do not control, including global positioning, satellite communications, and
intelligence, surveillance, and reconnaissance (ISR). Lower echelons may not always notice the opportunities
created by higher echelons or other forces that operate primarily in other domains; however, leaders must
understand how the absence of those opportunities affects their concepts of operations, decision making, and
risk assessment.
1-12. During operations, small advantages can have
Army forces must accurately see themselves,
significant impacts on the outcome of the mission,
see the enemy or adversary, and understand
particularly when they accrue over time. Creating and
their operational environment before they can
exploiting relative advantages are therefore necessary identify or exploit relative advantages.
for all operations, and they become even more critical
when opposing sides are evenly matched. A relative
advantage is a location or condition, in any domain, relative to an adversary or enemy that provides an
opportunity to progress towards or achieve an objective. Commanders seek and create relative advantages
to exploit through action, and they continually assess the situation to identify ways to expand opportunities.
(See paragraphs 1-106 through 1-117 for more information on physical, information, and human advantages.)
1-13. Army leaders are accustomed to creating and exploiting relative advantages through the
combined-arms approach that traditionally focuses on capabilities from the land, air, and maritime domains.
The proliferation of space and cyberspace capabilities further requires leaders who understand the advantages
those capabilities create in their operational environment. The ability to integrate and synchronize space and
cyberspace capabilities at the most effective tactical echelon expands options for creating advantages to
exploit.
1-14. Multidomain operations fracture the coherence of
threat operational approaches by destroying, dislocating, Some combination of maneuver and
isolating, and disintegrating their interdependent systems and attrition is typically necessary to achieve
formations, and exploiting the opportunities these disruptions victory during armed conflict. This is
provide to defeat enemy forces in detail. Army forces reflected in the defeat mechanisms
therefore require timely, accurate, relevant, and predictive which encompass both ideas.
intelligence to understand threat characteristics, capabilities,
objectives, and courses of action. Intelligence initially drives what combinations of defeat mechanisms
commanders pursue as they employ the capabilities of their forces in space and time against enemy forces.
Army forces combine maneuver and targeting methods to defeat enemy formations and systems. Army forces
employ maneuver to close with and destroy enemy formations in close operations. Targeting generally sets
priorities for information collection, fires, and other key capabilities to disintegrate enemy networks and
systems. Leaders execute the targeting process to create advantages that enable freedom of maneuver and
exploit the positional advantages created by maneuver. Targeting is a key way for leaders to integrate the
joint capabilities required to create depth in the battlefield and protect friendly formations.
CHALLENGES FOR ARMY FORCES
We don’t maintain a strong military force to conquer or coerce others. The purpose of our
military is simple and straightforward: We want to prevent war by deterring others from
the aggression that causes war.
President Ronald Reagan
1-15. The joint force deters most adversaries from seeking to achieve strategic objectives through direct
military confrontation with the United States. As a result, adversaries pursue their objectives indirectly
through malign activities and armed conflict targeting others in ways calculated to avoid war with the United
States. These activities include subversive political and legal strategies, establishing physical presence on the |
3-0 | 18 | Chapter 1
ground to buttress resource claims, coercive economic practices, supporting proxy forces, and spreading
disinformation. However, several adversaries have both the ability and the will to conduct armed conflict
with the United States under certain conditions, which requires Army forces to be prepared at all times for
limited contingencies and large-scale combat operations.
1-16. Global and regional adversaries apply all
instruments of national power to challenge U.S. The notion of integrated deterrence goes beyond
preventing armed conflict. It includes preventing
interests and the joint force. Militarily, they have
adversaries from increasing the scope and intensity
extended the battlefield by employing
of their malign activities conducted below the
network-enabled sensors and long-range fires to
threshold of armed conflict
deny access during conflict and challenge friendly
forces’ freedom of action during competition.
These standoff approaches seek to—
(cid:122) Counter U.S. space, air, and naval advantages to make the introduction of land forces difficult and
exploit the overall joint force’s mutual dependencies.
(cid:122) Increase the cost to the joint force and its partners in the event of armed conflict.
(cid:122) Hold the joint force at risk both in the U.S. and at its overseas bases and contest Army forces’
deployment from home station to forward tactical assembly areas overseas.
1-17. Adversaries increase risk to the U.S. joint force in order to raise the threshold at which the United
States might respond to a provocation with military force. By diluting the joint force’s conventional
deterrence, adversaries believe they have greater freedom of action to conduct malign activities both within
and outside the U.S. homeland. Adversaries exploit this freedom of action through offensive cyberspace
operations, disinformation, influence operations, and the aggressive positioning of ground, air, and naval
forces to support territorial claims. Adversaries employ different types of forces and capabilities to attack
private and government organizations, threaten critical economic infrastructure, and disrupt political
processes, often with a degree of plausible deniability that reduces the likelihood of a friendly military
response. Conducting these activities in support of policy goals threatens allied cohesion, weakens responses,
and creates additional opportunities. (See paragraphs 2-40 through 2-44 for description of enemy information
warfare.)
1-18. Threat standoff approaches intensify other friendly challenges. These challenges include—
(cid:122) Gaining and maintaining support of allies and partners.
(cid:122) Maintaining the continuous information collection needed to determine composition, disposition,
strength, and activities of enemy forces.
(cid:122) Integrating and synchronizing intelligence at all echelons, distributed across large operational
areas with diverse requirements.
(cid:122) Preparing forward-stationed forces to fight and win while outnumbered and isolated.
(cid:122) Protecting forward-positioned forces and those moving into a theater.
(cid:122) Minimizing vulnerability to weapons of mass destruction.
(cid:122) Maintain C2 and sustainment of units distributed across vast distances in noncontiguous areas and
outside supporting ranges and distances.
(cid:122) Maintaining a desirable tempo while defeating fixed and bypassed enemy forces.
(cid:122) Defeating threat information and irregular warfare attacks against the United States and strategic
lines of communications.
1-19. Army forces prepare to conduct operations in contested theaters prior to and during armed conflict,
including in the United States. Army forces must account for being under constant observation and the
threat’s ability to gain and maintain contact in all domains, wherever they are located. Army forces must be
ready to deploy on short notice to austere locations and be capable of immediately conducting combat
operations. During the initial phases of an operation, Army units may find themselves facing superior threats
in terms of both numbers and capabilities. The first deploying units require the capability to defend
themselves and continuously collect information on threat activities, as they provide reaction time and
freedom of maneuver for follow-on forces. Army units with limited joint support may have to defend while
at risk from enemy long-range fires. Forward-stationed forces may defend critical terrain with other coalition
forces to delay enemy offensive operations. Some forward-stationed forces may defend joint bases to mitigate |
3-0 | 19 | Foundations of Operations
the impact of enemy attacks against strategic and operational lines of communications. In both cases,
forward-stationed Army forces must be prepared to fight while relatively isolated in the early stages of an
enemy attack.
1-20. The likelihood of the enemy force’s use of massed long-range fires and weapons of mass destruction
increases during large-scale combat operations—particularly against command and control (C2) and
sustainment nodes, assembly areas, and critical infrastructure. To survive and operate against massed long-
range fires and in contaminated environments, commanders ensure as much dispersion as tactically prudent.
Army forces seek every possible advantage using dispersion, deception, counterreconnaissance, terrain,
cover, concealment, masking, and other procedures to avoid detection and mitigate the impact of enemy fires.
In the offense, Army forces maneuver quickly along multiple axes, concentrating only to the degree required
to mass effects, and then dispersing to avoid becoming lucrative targets for weapons of mass destruction and
enemy conventional fires. Although dispersion disrupts enemy targeting efforts, it increases the difficulty of
both C2 and sustainment for friendly forces. Success demands agile units that are able to adjust dispositions
rapidly, assume risk, and exploit opportunities when they are available.
1-21. The high tempo of large-scale combat operations creates gaps and seams, generating both opportunities
and risks as enemy formations disintegrate, disperse, or displace. After generating sufficient combat power
for offensive operations, friendly forces may intermingle with or fix and bypass enemy formations. This
requires follow-on and supporting units to protect themselves and to defeat enemy remnants in detail within
the rear area as part of consolidating gains.
1-22. Army forces deploying from the United States and elsewhere face a wide range of threats that are
difficult to counter without joint support. The disruptive effects of enemy action may occur at unit home
stations, ports of embarkation, while in transit to the theater, and upon arrival at ports of debarkation. Army
forces may not have the capability, or the authority, to preempt these attacks, although counterintelligence
may aid in early identification of threats. The threat’s ability to contest the deployment of forces may degrade
combat power available to forward forces and cause unit personnel and equipment to arrive in piecemeal
fashion at ports of debarkation. (See Appendix C for more information on deployments contested by threat
forces.)
LETHALITY: OVERCOMING CHALLENGES
1-23. Army forces overcome challenges posed by threats and the environment with credible formations able
to employ lethal capabilities. Lethality is the capability and capacity to destroy. Employing and threatening
the employment of lethal force lies at the core of how Army forces achieve objectives and enable the rest of
the instruments of national power to achieve objectives.
1-24. Lethality is enabled by formations maneuvering into positions of relative advantage where they can
employ weapon systems and mass effects to destroy enemy forces or place them at risk of destruction. The
speed, range, and accuracy of weapon systems employed by a formation enhance its lethality. The demands
of large-scale combat rapidly deplete available stockpiles and require forces to retain large reserves of
ammunition, weapons, and other warfighting capabilities. Leaders multiply the effects of lethal force by
employing combinations of capabilities through multiple domains to create, accrue, and exploit relative
advantages—imposing multiple dilemmas on enemy forces and overwhelming their ability to respond
effectively. Overcoming challenges in the operational environment further requires lethal Army forces that
employ all available capabilities to—
(cid:122) Continuously cultivate landpower networks with allies and partners to facilitate interoperability.
(cid:122) Be demonstrably prepared for large-scale combat operations to deter conflict on land.
(cid:122) Employ capabilities in a combined arms manner to create exploitable opportunities.
(cid:122) Maneuver, mass effects, and preserve combat power to defeat threats to other Service components
of the joint force.
(cid:122) Defend forward-positioned critical joint infrastructure and key terrain.
(cid:122) Conduct offensive operations to create and exploit opportunities and achieve objectives.
(cid:122) Consolidate gains during competition, crisis, and armed conflict to enable sustainable political
outcomes. |
3-0 | 20 | Chapter 1
1-25. The effective employment of Army forces depends on leaders who understand war, warfare, and the
environment within which military forces fight. Gaps in understanding are often causes of failures to achieve
sustainable political outcomes with military means.
WAR AND WARFARE
[W]e now need another voice of wisdom to tell us, “Technology is not enough.” War is not
one big engineering project. There are people on the other side—with strengths and will
that we never bothered to measure. As a result of that omission we have been drawn into
a greater, and certainly more ruinous, belligerent action than we intended. To fight without
understanding the opponent ultimately serves neither the repute of the military nor the
repute of the nation.
Barbara W. Tuchman
1-26. War is a state of armed conflict between different nations, state-like entities, or armed groups to achieve
policy objectives. Wars are fought between nations locally, regionally, or on a global scale. Wars are fought
within a nation by a central government against insurgent, separatist, or resistance groups. Armed groups in
semiautonomous regions also fight wars to achieve their objectives. Wars range from intense clashes between
large military forces—sometimes backed by an official declaration of war—to more subtle hostilities that
intermittingly breach the threshold of violence.
1-27. The object of war is to impose a nation’s or group’s will on its enemy in pursuit of policy objectives.
Regardless of the specific objectives, the decision to wage war represents a major policy decision and changes
how Army forces use military capabilities. The nature of war, its principles, and its elements remain
consistent over time. However, warfare, the conduct and characteristics of war, reflects changing means and
contexts.
1-28. The Army’s multidomain operations concept accounts for the constant nature of war and the changing
character of warfare. Its balanced approach guides how Army forces operate across the competition
continuum given the prevailing characteristics of anticipated operational environments now and in the near
future. Doctrine for the conduct of operations begins with a view of war and warfare that includes the—
(cid:122) Nature of war.
(cid:122) Principles of war.
(cid:122) Characteristics of warfare.
(cid:122) Methods of warfare.
(cid:122) Offense, defense, and stability.
(cid:122) Large-scale combat operations.
(cid:122) Combined arms.
(cid:122) Levels of warfare.
(cid:122) Army strategic contexts.
(cid:122) Consolidating gains.
(See Chapter 3 for more information on the multidomain operations concept.)
THE NATURE OF WAR
1-29. While the term war has multiple uses depending on the context (for example, the war on drugs or the
war on poverty), it is the threat or use of violence to achieve political purposes that distinguishes war in the
military context from other human activities. This distinction accounts for three elements of the Army’s view
of war. War is—
(cid:122) Fought to achieve a political purpose.
(cid:122) A human endeavor.
(cid:122) Inherently chaotic and uncertain. |
3-0 | 21 | Foundations of Operations
Note. War, by definition, includes at least two opposing sides. However, not all violence for
political gain causes a war. For example, in the current security environment China imposes low
levels of violence and new types of violence (including space and cyberspace attacks against
government, economic institutions, private industry, and infrastructure) that do not trigger
significant military responses. In these cases, China sees itself in a state of war with its adversaries,
but its adversaries do not. Such a disparity in perspective is dangerous for those nations opposing
China that may endure low levels of violence for long periods, while slowly ceding interests until
it is too late to respond effectively. Responding to such situations requires a comprehensive
government approach supported by joint and Army forces.
Political Purpose
1-30. All U.S. military operations share a common purpose—to
achieve or contribute to national policy objectives. As a principle Objective—to direct every military
of war, objective reinforces the proper relationship between operation toward a clearly defined,
military operations and policy. War must always be subordinate decisive, and attainable goal—is a
principle of war.
to policy and serve a political end. In conjunction with political
leaders, military leaders develop strategies to achieve the desired
policy outcomes. Policy outcomes often relate to the nation’s ability to influence, control, or secure
populations, civil infrastructure, natural resources, and access to global commons in all domains. (See
Appendix A for a discussion of the principles of war.)
Human Endeavor
1-31. War is shaped by human nature and the complex interrelationships of cognition, emotion, and
uncertainty. National sentiments are often targets to be affected or manipulated by one or both sides. Values
and ethics are some of the cognitive factors that motivate both the cause for going to war and restrictions in
the conduct of war. Fear, passion, camaraderie, grief, and many more emotions affect the resolve of a war’s
participants. They affect the behavior of combatants, including how and when leaders decide to persevere
and when to give up. Individuals react differently to the stress of war; an act that may break the will of one
enemy may only serve to stiffen the resolve of another. Human will, instilled through commitment to a cause
and leadership, is the driving force of all action in war. The human dimension infuses war with its intangible
moral factors. (See paragraphs 1-115 through 1-117 for more information on the human dimension.)
Inherently Chaotic and Uncertain
1-32. War is inherently chaotic and uncertain due to the clash of wills and intense interaction of innumerable
factors. Orders are misunderstood, enemy forces do the unexpected, units make wrong turns, unforeseen
obstacles appear, the weather changes, and units consume supplies at unexpected rates. This friction affects
all military operations, and it must be anticipated by leaders. The chaotic nature of war makes discerning the
precise cause and effect of actions difficult, impossible, or delayed. The unintended effects of operations are
difficult to anticipate and identify. Such chaos imposes a great deal of uncertainty on all operations and drives
the importance of leaders who are skilled at assuming risk.
PRINCIPLES OF WAR
1-33. From a U.S. military perspective, war involves nine principles, collectively and classically known as
the principles of war. The nine principles of war represent the most important factors that affect the conduct
of operations, and they are derived from the study of history and experience in battle. (See table 1-1 on page
1-8 for a concise listing of the principles of war.)
1-34. The principles of war capture broad and enduring fundamentals for the employment of forces in
combat. They are not a checklist that guarantees success. Rather, they summarize considerations commanders
and their staffs account for during successful operations, applied with judgment in specific contexts. While
applicable to all operations, they do not apply equally or in the same way to every situation. (For more
information on the principles of war, see Appendix A.) |
3-0 | 22 | Chapter 1
Table 1-1. Principles of war
Maneuver: Place the enemy in a position of disadvantage through the flexible application of combat power.
Objective: Direct every military operation toward a clearly defined, decisive, and attainable goal.
Offensive: Seize, retain, and exploit the initiative.
Surprise: Strike at a time and place or in a manner for which the enemy is unprepared.
Economy of force: Expend minimum-essential combat power on secondary efforts to allocate the maximum
possible combat power on the main effort.
Mass: Concentrate the effects of combat power at the most advantageous place and time to produce decisive
results.
Unity of command: Ensure unity of effort under one responsible commander for every objective.
Security: Prevent the enemy from achieving surprise or acquiring unexpected advantage.
Simplicity: Increase the probability that plans can be executed as intended by preparing clear, uncomplicated
plans and orders.
CHARACTERISTICS OF WARFARE
1-35. Warfare, the conduct and characteristics of war, is affected by changes in technology, national policy,
operational concepts, public opinion, and many other factors. Warfare may retain similarities over time, but
it inevitably also has great variations. Rapid advances in, and the proliferation of, air, space, and cyberspace
capabilities with military applications are changing warfare. Space technology enables persistent overhead
surveillance and global communications, navigation, timing, missile warning, and environmental monitoring.
Cyberspace technology is integrated into most military capabilities, and it enables near-instantaneous
communications and information sharing, creating both opportunities and vulnerabilities that can be
exploited by both sides during competition, crisis, and conflict.
METHODS OF WARFARE
1-36. Although the nature and principles of war reflect the continuity of war, the conduct of warfare, like
dynamic operational environments, reflects wide variation. Therefore, depending on the situation, strategic
actors pursue their objectives in war through different methods of warfare. There are many different methods,
but they generally fall into two broad categories: conventional and irregular. Each method of warfare serves
the same strategic purpose—to defeat an enemy—but they take fundamentally different approaches to
achieving their purpose. Both methods share one characteristic, which is that they involve the use of lethal
force to achieve a political end. Warfare rarely fits neatly into any of these subjective categories, and it almost
always entails a blend of both methods over the course of a conflict.
Note. These broad categories describe the overall approaches to warfare. Other categories attempt
to describe the dominant means used in a particular application, for example “information
warfare,” “cyber warfare,” or “anti-submarine warfare,” In these cases, the terms “warfare,”
“operations,” and “activities” are often used interchangeably. |
3-0 | 23 | Foundations of Operations
Conventional Warfare
1-37. Conventional warfare is a violent struggle for domination between nation-states or coalitions of
nation-states. Conventional warfare is generally carried out by two or more military forces through armed
conflict. It is commonly known as conventional warfare because it means to fight enemy forces directly, with
comparable military systems and organizations. A nation-state’s strategic purpose for conducting
conventional warfare is to impose its will on an enemy government and avoid imposition of the enemy
government’s will on it and its citizens. Joint doctrine refers to conventional warfare as “traditional” because
it has been understood that way in the West since the Peace of Westphalia (1648), which reserved, for the
nation-state alone, a monopoly on the legitimate use of force. However, irregular warfare has a longer history,
and it has been just as common as the “traditional” method of warfare in some societies.
1-38. Conventional warfare normally focuses on defeating enemy armed forces, enemy warfighting
capabilities, and controlling key terrain and populations to decisively influence an enemy government’s
behavior in favorable ways. During conventional warfare, enemies engage in combat openly against each
other and generally employ similar capabilities. Conventional war may escalate to include nation-state use
of weapons of mass destruction. Like the other branches of the armed forces, the Army is organized, trained,
and equipped primarily to conduct or deter conventional warfare, especially its most lethal manifestation—
large-scale combat operations.
1-39. Conventional deterrence creates the paradox that although combat-ready forces reduce the probability
of large-scale combat, they increase the frequency of adversaries pursuing irregular warfare and malign
activity short of armed conflict to achieve objectives. The tradeoff is acceptable because conducting irregular
warfare with forces prepared for large-scale ground combat incurs less risk than conducting large-scale
ground combat with forces unprepared to do so.
Irregular Warfare
1-40. Irregular warfare is the overt, clandestine, and covert employment of military and non-military
capabilities across multiple domains by state and non-state actors through methods other than military
domination of an adversary, either as the primary approach or in concert with conventional warfare.
Irregular warfare may include the use of indirect military activities to enable partners, proxies, or surrogates
to achieve shared or complementary objectives. The main objective of irregular warfare varies with the
political context, and it can be successful without being combined with conventional warfare (for example,
the Cuban Revolution). While it often focuses on establishing influence over a population, irregular warfare
has also historically been an economy of force effort to fix enemy forces in secondary theaters of conflict or
to cause enemy leaders to commit significant forces to less critical lines of effort. Two characteristics
distinguish irregular warfare from conventional warfare:
(cid:122) The intent is to erode a political authority’s legitimacy and influence or to exhaust its resources
and will—not to defeat its armed forces—while supporting the legitimacy, influence, and will of
friendly entities engaged in the struggle.
(cid:122) The nonmilitary instruments of power are more prominent because the military instrument of
power alone is insufficient to achieve desired objectives.
1-41. JFCs can employ most Army forces and capabilities during irregular warfare. Certain forces and
capabilities are irregular warfare focused (for example Army special operations forces), in that they are
specifically designed and organized for irregular warfare, but they can also be employed effectively in
conventional warfare (for example as combat advisors to host-nation forces). Other forces are irregular
warfare capable, in that they are primarily designed and organized for conventional warfare, but they can
also be employed effectively in irregular warfare. Historically, the overwhelming majority of Army forces
employed to conduct irregular warfare have been conventional forces.
OFFENSE, DEFENSE, AND STABILITY
1-42. Offense, defense, and stability are inherent elements of conventional and irregular warfare. Divisions
and higher echelons typically perform some combination of all three elements in their operations
simultaneously. However, the lower the echelon, the more likely it is for that formation to be focused on one
element at a time. |
3-0 | 24 | Chapter 1
1-43. An offensive operation is an operation to defeat or destroy enemy forces and gain control of terrain,
resources, and population centers (ADP 3-0). Offensive operations are how commanders impose their will
on an enemy. The offense is the most direct means of seizing, retaining, and exploiting the initiative to gain
a physical and psychological advantage. Offensive operations typically include a sudden action directed
toward enemy weaknesses, capitalizing on speed, surprise, and shock. The offense compels an enemy force
to react, creating new or larger weaknesses the attacking force can exploit. (See ADP 3-90 for a detailed
discussion of the offense.)
1-44. A defensive operation is an operation to defeat an enemy attack, retain key terrain, gain time, and
develop conditions favorable for offensive or stability operations (ADP 3-0). Normally the defense cannot
achieve a decisive victory. However, it sets conditions for a counteroffensive or a counterattack that enables
forces to regain the initiative. Defensive operations are a counter to an enemy offensive action, and they seek
to destroy as many of the enemy forces as possible. Defensive operations preserve control over land,
resources, and populations, and they protect lines of communications and critical capabilities against attack.
Commanders can conduct defensive operations in one area to free forces for offensive operations elsewhere.
(See ADP 3-90 for a detailed discussion of the defense.)
1-45. A stability operation is an operation conducted outside the United States in coordination with other
instruments of national power to establish or maintain a secure environment and provide essential
governmental services, emergency infrastructure reconstruction, and humanitarian relief (ADP 3-0). These
operations support governance by a host nation, an interim government, or a military government. Stability
involves coercive and constructive action. (See ADP 3-07 for more information on stability operations.)
LARGE-SCALE COMBAT OPERATIONS
1-46. The focus of Army readiness is on large-scale
combat operations. Large-scale combat operations are The Army is manned, equipped, and trained to
extensive joint combat operations in terms of scope and operate in all operational scenarios or
size of forces committed, conducted as a campaign categories, starting with the most lethal
conditions first—large-scale combat against a
aimed at achieving operational and strategic objectives
peer threat.
(ADP 3-0). During ground combat, they typically
involve operations by multiple corps and divisions, and
they typically include substantial forces from the joint and multinational team. Large-scale combat operations
often include both conventional and irregular forces on both sides.
1-47. Conflicts encompassing large-scale combat operations are more intense and destructive than limited
contingencies, often rapidly amassing heavy casualties. Peer threats employ networks of sensors and long-
range massed fires that exploit electromagnetic signatures and other detection methods to create high risk for
ground forces, particularly when they are static. Army forces must account for constant enemy observation,
including the threat from unmanned systems that saturate the operational environment. Army forces take
measures to defeat the enemy’s ability to effectively mass effects while creating exploitable advantages to
mass effects against enemy capabilities and formations.
1-48. Urban areas are high risk areas that are a factor in many operational environments. Avoiding urban
areas during large-scale combat through deception or other means is ideal, but generally not possible.
Commanders may conduct urban operations because they provide a tactical, political, or economic advantage,
or when not doing so threatens the joint campaign. Army forces conduct large-scale combat operations in
urban areas either as specific, unique operations, or more typically, as one of a larger series of operations in
a joint campaign. Urban operations focus on the threat to or within the urban area and allow other forces to
conduct operations elsewhere. Conducting operations in dense urban terrain is complex and resource
intensive. Combined arms operations that integrate joint capabilities, allies and partners, and conventional
and irregular forces are essential to success. Commanders voice concern to higher headquarters when they
do not have sufficient forces for the task issued, and they must arrange their forces and operations according
to purpose, time, and space to accomplish the mission. Success in defeating enemy forces in large urban areas
typically requires the ability to isolate them from physical, information, and human support. (See ATP 3-06
for more information on urban operations.) During large-scale combat operations, Army forces focus on the
defeat and destruction of enemy ground forces as part of the joint team, and they contribute to the defeat of
forces in other domains. Army forces close with and destroy enemy forces in all types of terrain, exploit |
3-0 | 25 | Foundations of Operations
success, and break the enemy’s will to resist. Army forces attack, defend, perform stability tasks, and
continuously consolidate gains to accomplish objectives that support a desirable political outcome. Corps
and divisions are the formations central to the conduct of large-scale combat. The ability to prevail in ground
combat is a decisive factor in breaking an enemy’s capability and will to continue a conventional conflict.
Conflict resolution requires Army forces to consolidate gains with unified action partners as long as necessary
to accomplish national objectives.
1-49. Planning for large-scale combat operations must account for possible enemy use of chemical,
biological, radiological, and nuclear (CBRN) weapons and allied retaliatory response options. Planning must
also account for toxic industrial hazards caused by combat operations. Enemy employment of CBRN
weapons and the allied response would affect all domains, but they present disproportionate effects in the
land domain. Some adversaries plan for the employment of nuclear and chemical weapons by incorporating
them into their doctrine and training, and they maintain delivery systems for their employment on the
battlefield. Furthermore, the use of these weapons does not terminate a conflict and may cause it to escalate.
Units must be prepared to operate in, around, and through contaminated environments. This is fundamental
to deterring adversaries from employing weapons of mass destruction. CBRN considerations should inform
both operational planning and force readiness. (See FM 3-11 for doctrine on operating in a CBRN
environment, and see ATP 3-72 for more information operations in a nuclear environment.)
COMBINED ARMS
1-50. Combined arms is the synchronized and simultaneous application of arms to achieve an effect greater
than if each element was used separately or sequentially (ADP 3-0). Leaders combine arms in complementary
and reinforcing ways to protect capabilities and amplify their effects. Confronted with a constantly changing
situation, leaders create new combinations of capabilities, methods, and effects to pose new dilemmas for
adversaries. The combined arms approach to operations during competition, crisis, and armed conflict is
foundational to exploiting capabilities from all domains and their dimensions.
1-51. Complementary capabilities compensate for the vulnerabilities of one system or organization with the
capabilities of a different one. Infantry protects tanks from enemy infantry and antitank systems, while tanks
provide mobile protected firepower for the infantry. Ground maneuver can make enemy forces displace and
become vulnerable to joint fires, while joint fires can disrupt enemy reserves and C2 to enable operations on
the ground. Cyberspace and space capabilities and electromagnetic warfare can prevent enemy forces from
detecting and communicating the location of friendly land-based fires capabilities, and Army fires
capabilities can destroy enemy ground-based cyberspace nodes and electromagnetic warfare platforms to
protect friendly communications.
1-52. Reinforcing capabilities combine similar systems or capabilities to amplify the overall effects a
formation brings to bear in a particular context. During urban operations, for example, infantry, aviation, and
armor units working in close coordination reinforce the protection, maneuver, and direct fire capabilities of
each unit type while creating cascading dilemmas for enemy forces. Army artillery can be reinforced by close
air support, air interdiction, and naval surface fire support, greatly increasing both the mass and range of fires
available to a commander. Space and cyberspace capabilities used to disrupt enemy communications can
reinforce a brigade combat team’s (BCT’s) ground-based jamming effort to increase the disruption to enemy
C2. Military information support operations can amplify the effects of physical isolation on an enemy
echelon, making it more vulnerable to friendly force exploitation.
1-53. The organic composition, training, and task organization of Army units set conditions for effective
combined arms. Throughout operations, commanders assess the operational environment and adjust
priorities, change task organization, and request capabilities to create exploitable advantages, extend
operational reach, preserve combat power, and accomplish missions.
LEVELS OF WARFARE
1-54. The levels of warfare are a framework for defining and clarifying the relationship among national
objectives, the operational approach, and tactical tasks (ADP 1-01). While the various methods of warfare
are ultimately expressed in concrete military action, the four levels of warfare—national strategic, theater |
3-0 | 26 | Chapter 1
strategic, operational, and tactical—link tactical actions to achievement of national objectives as shown in
figure 1-2.
Figure 1-2. Levels of warfare
1-55. The levels of warfare distinguish four broad overlapping activities—providing national direction and
creating national strategy (national strategic), conducting continuous theater campaigning (theater strategic);
planning and conducting campaigns and major operations (operational); or planning and executing
operations, battles, engagements, and actions (tactical). Some commanders act at more than one level of war.
For example, a combatant commander (CCDR) formulates theater strategy and designs the campaign plan.
A land component commander assists a CCDR in campaign design and may lead a field army during major
operations. The levels of warfare are conceptual, without finite limits or boundaries. They do, however,
correlate to specific activities and responsibilities. They help commanders visualize the relationships and
actions required to link strategic objectives, military operations at various echelons, and tactical actions.
Among the levels of warfare, planning horizons, methods, and products differ greatly. Without this context,
tactical operations become disconnected from operational end states and strategic objectives. There are skills
and practices related to strategic, theater strategic, operational, and tactical level that differ from each other
and are enhanced by specific training and education.
National Strategic Level of Warfare
1-56. The national strategic level of warfare is the level of warfare at which the U.S. government
formulates policy goals and ways to achieve them by synchronizing action across government and
unified action partners and employing the instruments of national power. The instruments of national
power are all of the means available to the government in its pursuit of national objectives, expressed as
diplomatic, economic, informational, and military. The national strategic level of warfare focuses on
developing global strategy and providing global strategic direction. Strategic direction provides context,
tasks, and purpose for the employment of the instruments of national power. The specifics of strategic |
3-0 | 27 | Foundations of Operations
direction address long-term, emerging, and anticipatory issues or concerns that may quickly evolve due to
rapidly changing circumstances. Strategic direction is always evolving and adapting.
1-57. The theater strategic level of warfare is the level of warfare at which combatant commanders
synchronize with unified action partners and employ all elements of national power to fulfill policy
aims within the assigned theater in support of the national strategy. Based on strategic guidance, CCDRs
with assigned areas of responsibility and staffs—with input from subordinate commands, including theater
armies and supporting commands and agencies—update their strategic estimates and develop theater
strategies. A theater strategy is an overarching construct outlining a combatant commander’s vision for
integrating and synchronizing military activities and operations with the other instruments of national power
to achieve national strategic objectives. The theater strategy prioritizes the ends, ways, and means within the
limitations established by the budget, global force management processes, and strategic guidance. The theater
strategy serves as the basis for development of the combatant command campaign plan (CCP).
Operational Level of Warfare
1-58. The operational level of warfare is the level of warfare in which campaigns and operations are planned,
conducted, and sustained to achieve operational objectives to support achievement of strategic objectives
(JP 3-0). The operational level links the employment of tactical forces to the achievement of strategic
objectives.
1-59. The operational level of warfare generally is the realm of combatant commands and their Service or
functional components and subordinate joint task force (JTF) headquarters and their Service or functional
components. This includes the theater army headquarters as the Army Service component to a combatant
command and any other echelon operating as an ARFOR, JTF headquarters, or land component command.
The focus at this level is on operational art—the design of campaigns and operations by integrating ends,
ways, and means, while accounting for risk. (See ADP 3-0 for more information on operational art.)
1-60. Actions at the operational level of warfare usually involve broader aspects of time and space than
tactical actions. The theater army’s activities continuously support the CCDR in shaping the operational and
strategic situation. Operational-level commanders need to understand the complexities of the operational
environment and look beyond the immediate situation. Operational-level commanders seek to create the most
favorable conditions possible for subordinate commanders by preparing for future events.
1-61. The operational level of warfare demands leaders with a unique set of skills. Because the operational
level is fundamentally about linking tactical action to strategic objectives, leaders must understand both
strategy and tactics. They must have some expertise in the capabilities and operations of all Services and
components and those of allies and partners. Leaders at the operational level must be able to assess large,
complex operational environments and be expert planners. They must understand the application of
warfighting functions on a large scale and how this application differs from application at the tactical level.
The elements of operational art help operational leaders understand, visualize, and describe their campaigns
and major operations. (See ADP 3-0 for details on the elements of operational art.)
Tactical Level of Warfare
1-62. The tactical level of warfare is the level of warfare at which forces plan and execute battles and
engagements to achieve military objectives (JP 3-0). Activities at this level focus on tactics—the
employment, ordered arrangement, and directed actions of forces in relation to each other (ADP 3-90).
Operational-level headquarters determine objectives and provide resources for tactical operations.
Tactical-level commanders plan and execute operations to include battles, engagements, and small-unit
actions.
1-63. Tactical-level combat operations rise to the level of battles or engagements. A battle is a set of related
engagements that lasts longer and involves larger forces than an engagement (ADP 3-90). Battles can affect
the course of a campaign or major operation, and they are typically conducted by corps and divisions over
the course of days or months. An engagement is a tactical conflict, usually between opposing lower echelon
maneuver forces (JP 3-0). Engagements are typically conducted at brigade echelons and below. They are
usually short, executed in minutes or hours. |
3-0 | 28 | Chapter 1
1-64. The strategic and operational levels of warfare provide the context for tactical operations. Without this
context, tactical operations devolve into a series of disconnected and unfocused actions. Likewise, tactical
operations inform strategic and operational objectives, ensuring that those objectives remain tethered to
reality and adjust, when necessary, according to the situation. Strategic and operational success is a measure
of how the achievement of objectives in one or more battles contributes to winning a major operation or
campaign. (See ADP 3-90 for more information on tactics.)
ARMY STRATEGIC CONTEXTS
1-65. Joint doctrine describes the strategic environment in terms of a competition continuum. Rather than a
world either at peace or at war, the competition continuum describes three broad categories of strategic
relationships—cooperation, competition below armed conflict, and armed conflict. Each relationship is
defined as between the United States and another strategic actor relative to a specific set of policy aims.
Cooperation, competition, and even armed conflict commonly go on simultaneously in different parts of the
world. Because of this, the needs of CCDRs and Army component commanders in one area are affected by
the strategic needs of others. (See JP 3-0 for more information about the joint competition continuum.)
Note. This manual uses “competition” to mean “competition below armed conflict.”
1-66. Although combatant commands and theater armies campaign across the competition continuum, Army
tactical formations typically conduct operations within a context dominated by one strategic relationship at a
time. Therefore, Army doctrine describes the strategic situation through three contexts in which Army forces
conduct operations:
(cid:122) Competition below armed conflict.
(cid:122) Crisis.
(cid:122) Armed conflict.
1-67. The Army strategic contexts generally correspond to the joint competition continuum and the
requirements of joint campaigns. Because cooperation is generally conducted with an ally or partner to
counter an adversary or enemy, Army doctrine considers it part of competition. Army doctrine adds crisis to
account for the unique challenges facing ground forces that often characterize transition between competition
and armed conflict. (See figure 1-3 for an illustration of Army strategic contexts.)
Figure 1-3. Army strategic contexts and operational categories
Competition Below Armed Conflict
1-68. Competition below armed conflict exists when two or more state or non-state adversaries have
incompatible interests, but neither seeks armed conflict. Nation-states compete with each other using all
instruments of national power to gain and maintain advantages that help them achieve their goals. Low levels |
3-0 | 29 | Foundations of Operations
of lethal force can be a part of competition below armed conflict. Adversaries often employ cyberspace
capabilities and information warfare to destroy or disrupt infrastructure, interfere with government processes,
and conduct activities in a way that does not cause the United States and its allies to respond with force.
Competition provides military forces time to prepare for armed conflict, opportunities to assure allies and
partners of resolve and commitment, and time and space to set the necessary conditions to prevent crisis or
conflict. Examples of competition include return of forces to Europe (known as REFORGER) exercises
conducted during the Cold War, security assistance provided to Ukraine since 2014, and Pacific Pathways
activities to improve readiness in the Indo-pacific region. (See Chapter 4 for a detailed discussion of Army
forces during competition.)
Crisis
1-69. A crisis is an emerging incident or situation involving a possible threat to the United States, its citizens,
military forces, or vital interests that develops rapidly and creates a condition of such diplomatic, economic,
or military importance that commitment of military forces and resources is contemplated to achieve national
and/or strategic objectives (JP 3-0). Commanders have to consider the possibility that overt military action
may escalate a crisis towards armed conflict. The use of space and cyberspace capabilities provides other
options that are less likely to cause escalation. The context of crisis is relative to an adversary, which is
different from crisis response, which can result from a natural or human disaster. During crisis, armed conflict
has not yet occurred, but it is either imminent or a distinct possibility that requires rapid response by forces
prepared to fight if deterrence fails.
Note. A crisis can be long in duration, but it can also reflect a near-simultaneous transition to
armed conflict. Leaders do not assume that a crisis provides additional time for a transition to
armed conflict.
1-70. Army forces contribute to joint operations, seeking to deter further provocation and compel an
adversary to de-escalate aggression and return to competition under conditions acceptable for the United
States and its allies or partners. Through rapid movement and integration with the joint force, Army forces
help signal the readiness and willingness to prevail in combat operations. When authorized, Army forces can
inform or influence perceptions about an operation’s goals and progress to amplify effects on the ground
during a crisis; however, commanders ensure their message aligns with reality and that their narratives are
truthful and credible.
1-71. Army forces help the joint force maintain freedom of action and associated positions of relative
advantage through the activities they conduct and their presence on the ground. They operate in a way that
disrupts adversary risk calculations about the cost of acting contrary to U.S. national interests, compels de-
escalation, and fosters a return to competition conditions favorable to the United States. If deterrence fails to
end a crisis, Army forces are better postured for operations during armed conflict. Examples of crisis include
the Cuban missile crisis of 1962, Iraq’s invasion of Kuwait in 1990, North Korean missile and rocket
provocations in 2017-2018, and the Russian attacks into Ukraine in 2014 and 2022. (See Chapter 5 for a
detailed discussion of Army forces during crisis.)
Armed Conflict
1-72. Armed conflict occurs when a state or non-state actor uses lethal force as the primary means to satisfy
its interests. Armed conflict can range from irregular warfare to conventional warfare and combinations of
both. Entering into and terminating armed conflict is a political decision. Army forces may enter conflict
with some advanced warning during a prolonged crisis or with little warning during competition. How well
Army forces are prepared to enter into an armed conflict ultimately depends upon decisions and preparations
made during competition and crisis.
1-73. At the onset of armed conflict, forward-positioned Army forces may defend key terrain or
infrastructure while seeking opportunities to gain the initiative or reposition to more favorable locations with
partner forces. Army forces help JFCs gain and maintain the initiative, defeat enemy forces on the ground,
control territory and populations, and consolidate gains to establish conditions for a political settlement
favorable to U.S. interests. Army forces provide landpower to the joint force and conduct limited contingency |
3-0 | 30 | Chapter 1
or large-scale combat operations to ensure enduring political outcomes favorable to U.S. interests. Examples
of armed conflict include the Vietnam War, OPERATION DESERT STORM, and OPERATION
INHERENT RESOLVE. (See Chapter 6 for a detailed discussion of Army forces conducting operations
during armed conflict. See Chapter 7 for a discussion of Army forces in large-scale combat in maritime
environments.)
CONSOLIDATING GAINS
1-74. Army commanders must exploit successful operations by continuously consolidating gains during
competition, crisis, and armed conflict. Consolidate gains are activities to make enduring any initial
operational success and to set the conditions for a sustainable security environment, allowing for a transition
of control to other legitimate authorities (ADP 3-0). Consolidation of gains is an integral and continuous part
of competition, and it is necessary for achieving success across the range of military operations. Successful
consolidation of gains requires a realistic and pragmatic assessment of strategic conditions, ally and partner
legitimacy, friendly and adversary relative advantages, and the viability of a sustainable political outcome.
Operations to inform and influence foreign audiences also play a key role in achieving lasting outcomes.
1-75. During competition, Army forces may consolidate gains from previous conflicts for many years as
JFCs seek to maintain relative advantages against a specific adversary and sustain enduring political
outcomes. U.S. forces in Europe, Japan, the Republic of Korea, and the Middle East remained in place for
decades to consolidate gains made in earlier conflicts. Army forces also consolidate gains by continuously
developing multinational interoperability and readiness for large-scale combat operations.
1-76. During armed conflict, Army forces deliberately plan to consolidate gains throughout an operation as
part of defeating the enemy in detail to accomplish overall policy and strategic objectives. Early and effective
consolidation activities are a form of exploitation performed while other operations are ongoing, and they
enable the achievement of lasting favorable outcomes in the shortest time span. Tactical units consolidating
on an objective can be the first step in consolidating gains. In some instances, Army forces will be the lead
for integrating forces and synchronizing activities to consolidate gains. In other situations, Army forces will
be in support of allies and partners. Army forces may consolidate gains for a sustained period over large land
areas. Military governments in occupied territories stabilize civilian populations. Military authorities may
temporarily govern areas until populations are stable enough for transition to legitimate civilian authorities.
This transition of control to civil authorities reduces demands on combat power.
1-77. While Army forces must continuously consolidate gains throughout an operation, consolidating gains
becomes the overall focus of Army forces when large-scale combat operations have concluded. During
competition, Army forces may consolidate gains from previous conflicts for many years as JFCs seek to
maintain relative advantages against a specific adversary. During crisis, Army forces seek to consolidate
whatever gains are made relative to a specific adversary so that the crisis does not occur again.
UNDERSTANDING AN OPERATIONAL ENVIRONMENT
Since men live upon the land and not upon the sea, great issues between nations at war
have always been decided—except in the rarest of cases—either by what your army can do
against your enemy’s territory and national life, or else by fear of what the fleet makes it
possible for your army to do.
Sir Julian Corbett
1-78. An operational environment is the aggregate of the conditions, circumstances, and influences that
affect the employment of capabilities and bear on the decisions of the commander (JP 3-0). For Army forces,
an operational environment includes portions of the land, maritime, air, space, and cyberspace domains
understood through three dimensions (human, physical, and information). The land, maritime, air, and space
domains are defined by their physical characteristics. Cyberspace, a manmade network of networks, transits
and connects the other domains as represented by the dots shown in figure 1-4. |
3-0 | 31 | Foundations of Operations
Figure 1-4. Domains and dimensions of an operational environment
Note. Joint doctrine describes the components of an operational environment as the physical areas
of the land, maritime, air, and space domains; the information environment (which includes
cyberspace); the electromagnetic spectrum; and other factors. (See JP 2-0 and JP 5-0 for more
information on describing and analyzing an operational environment from a joint perspective.)
1-79. The operational environment model aids in accounting for the totality of factors, specific
circumstances, and conditions that impact the conduct of operations. This understanding enables leaders to
better identify problems; anticipate potential outcomes; and understand the results of various friendly, enemy,
adversary, and neutral actions and the effects these actions have on achieving the military end state. A
description of an operational environment includes all the factors that the commander and staff need to
capture and understand to inform the conduct of operations.
1-80. Knowledge of the operational environment is the precursor to effective action. Obtaining knowledge
about an operational environment requires aggressive and continuous intelligence, surveillance,
reconnaissance, and security operations to acquire information. Information collected from multiple sources
and analyzed becomes intelligence that answers commanders’ intelligence requirements. Using all available
relevant information to determine how the operational environment affects operations is essential to
understanding which courses of action are the most feasible, suitable, and acceptable. Throughout the course
of operations, commanders and staffs rely on an integrated information collection effort to develop an
accurate picture of their operational environment. Information collection is an activity that synchronizes and
integrates the planning and employment of sensors and assets and as well as the processing, exploitation, and
dissemination systems in direct support of current and future operations (FM 3-55).
1-81. An operational environment is the totality of factors that affect what occurs in an assigned area. These
factors include actors, events, or actions that occur outside the assigned area. How the many entities behave
and interact with each other is difficult to discern. No two operational environments are the same, and all of
them continually change. Changes result, in part, from opposing forces and actors interacting, learning, and
adapting. The complex and dynamic nature of an operational environment makes determining the relationship |
3-0 | 32 | Chapter 1
between cause and effect challenging, and it contributes to the uncertain nature of war and human
competition. This requires that commanders, supported by their staffs, develop and maintain the best possible
understanding of their operational environment. Several tools and processes assist commanders and staffs in
understanding their operational environment. They include—
(cid:122) Domains.
(cid:122) Dimensions.
(cid:122) Operational and mission variables (detailed in FM 6-0).
(cid:122) Running estimates (described in ADP 5-0).
(cid:122) Army design methodology (described in ATP 5-0.1).
(cid:122) The military decision-making process (described in ADP 5-0).
(cid:122) Building intelligence knowledge (described in FM 2-0).
(cid:122) Intelligence preparation of the battlefield (described in ATP 2-01.3).
(cid:122) Sustainment preparation of the operational environment (described in FM 4-0).
DOMAINS
1-82. Within the context of an operational environment, a domain is a physically defined portion of an
operational environment requiring a unique set of warfighting capabilities and skills. Each military
Service and branch trains and educates its leaders to be experts about operations in a primary domain,
although each Service has some capability in each of the domains, and each develops shared understanding
of how to integrate capabilities from different domains. Land operations require mastery of terrain and ground
maneuver. Cyberspace operations require mastery of digital information systems and computer code. Space,
air, and maritime operations likewise require specific capabilities and skills, which manifest themselves in
separate Services within the joint force. Although most domains align with the skills developed in a particular
Service, no Service focuses entirely upon or exerts total control of that single domain during operations. Joint
commanders assign responsibilities and task-organize based on mission requirements. However, the domains
present very different conditions of warfare and require the specialized warfighting skills developed by the
different Services and subcomponents within each of the
Services. Army leaders do not need to understand all the Understanding the strengths and
technical components of what the joint force does in other dependencies of joint capabilities in
each domain is fundamental to a
domains, but they do need to understand the complementary
multidomain, combined arms approach
and reinforcing ways in which they can request and employ
to operations.
those capabilities and methods in support of operations on
land. (See Chapter 3 for a discussion of convergence.)
Land Domain
1-83. The land domain is the area of the Earth’s surface ending at the high water mark and overlapping with
the maritime domain in the landward segment of the littorals (JP 3-31). Variations in climate, terrain, and the
diversity of populations have a far greater impact on operations in the land domain than in any other domain.
The most distinguishing characteristic of the land domain is the human dimension. Humans transit the
maritime, air, and space domains, but they ultimately live, make political decisions, and seek conflict
resolution on land.
1-84. The nature of combat on land is unique due to the impacts of terrain on all warfighting functions and
the application of combat power. For example, terrain provides forces opportunities for evading detection
and increasing survivability. It also provides enemy forces the same opportunities. Although technology
increases the range of capabilities, complex terrain causes opposing forces to fight at close ranges. Land
combatants routinely come face-to-face with one another in large numbers in a wide variety of operational
environments containing all types of terrain and potentially nuclear, biological, and chemically degraded
environments. When other means fail to drive enemy forces from their positions, Army forces close with and
destroy or capture them through close combat. Close combat is warfare carried out on land in a direct-fire
fight, supported by direct and indirect fires and other assets (ADP 3-0). The outcome of battles and
engagements depends on the ability of Army forces to close with enemy forces and prevail in close combat. |
3-0 | 33 | Foundations of Operations
1-85. Land-based domain capabilities are able to use or alter the terrain, operate in all forms of weather, and
operate among populations. Land capabilities extend operational reach and provide options for enabling joint
operations. Long-range artillery provides the joint force with a fires capability that is more survivable in some
circumstances than air and maritime fires. Land-based electromagnetic capabilities are capable of jamming
enemy communications and C2 systems. Land-based air and missile defense (AMD) capabilities, enabled by
space and cyberspace capabilities, provide protection for Army and joint forces.
1-86. The other four domains depend, in some way, on land. Airfields, ports, servers, ground control stations
and land-based radars support or enable operations in other domains. Most cyberspace capabilities and all
the electricity that powers them depend on land-based networks. The energy that fuels air, space, and most
maritime platforms comes from locations on land.
1-87. Operations on land depend on capabilities from other domains. Air lift, sea lift, cyberspace networks,
and all non-land based examples of ISR and fires enable operations on land. (See JP 3-31 for information on
joint land operations.)
Maritime Domain
1-88. The maritime domain is the oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above
these, including the littorals (JP 3-32). It overlaps with the land domain in the seaward segment of the littoral.
Maritime capability may be viewed as global, regional, territorial, coastal, and self-defense forces. Only a
few navies are capable of sustained employment far from their countries’ shores. However, whether or not
their navies are capable of global power projection, most maritime nations also maintain air forces capable
of conducting operations over the adjacent maritime domain. This air capability, combined with land-based
long-range fires, greatly impacts operations in the maritime domain.
1-89. The Navy and its partners employ five functions in a combined arms approach to provide a unique
relative advantage for the joint force. These functions are deterrence, operational access, sea control, power
projection, and maritime security.
1-90. Maritime forces move strategic fires capabilities globally, conceal strategic capabilities below the
surface of the ocean, transport personnel and equipment over vast distances, and sustain maritime operations
for long periods. Maritime forces depend on or require support from the joint force to—
(cid:122) Protect maritime capabilities from enemy interdiction.
(cid:122) Protect ports.
(cid:122) Secure geographic choke points.
(cid:122) Influence populations.
(cid:122) Mitigate long timelines associated with maritime movement.
(cid:122) Compensate for the limited number of available maritime platforms.
(cid:122) Mitigate the inability to replace ships lost during a conflict.
1-91. Army forces rely on maritime capabilities for deployment and sustainment. Additionally, maritime
fires and AMD complement and reinforce land-based systems. Army forces assist maritime forces with sea
control, projecting power ashore to neutralize threats or control terrain in the landward portion of the littorals.
Army long-range fires, attack aviation, AMD, and cyberspace capabilities contribute to local and regional
maritime superiority.
1-92. For intratheater operations, Army watercraft provide a capability to move maneuver formations and
sustain operations in a maritime environment. Army watercraft systems support joint and combined seabasing
and joint logistics over-the-shore (JLOTS). In some circumstances, Army watercraft capabilities can mitigate
enemy antiaccess (A2) or area denial (AD) approaches by providing access to shallow coastal waters, rivers,
and narrow inland waterways where mature ports or road networks are unavailable. (See JP 3-32 for
information on joint maritime operations.)
Air Domain
1-93. The air domain is the atmosphere, beginning at the Earth’s surface, extending to the altitude where its
effects upon operations become negligible (JP 3-30). The speed, range, and payload of aircraft, rockets, |
3-0 | 34 | Chapter 1
missiles, and hypersonic glide vehicles operating in the air domain directly and significantly affect operations
on land and sea. Likewise, advances in AMD, electromagnetic warfare, directed energy, and cyberspace
capabilities increasingly contest freedom of maneuver in the air.
1-94. Control of the air and control of the land are often interdependent requirements for successful
campaigns and operations. Control of the air provides a significant advantage when attacking strategically
valuable targets at long ranges. However, control of the land is necessary for operating secure airfields and
protecting other key terrain that enables air operations. The desired degree of control of the air may vary
geographically and over time from no control, to parity, to local air superiority, to air supremacy, all
depending upon the situation and the JFC’s approved concept of operations.
1-95. Army forces rely on the Air Force and other joint and multinational air capabilities for ISR, strategic
attack, close air support, interdiction, personnel recovery, communications, sustainment, and mobility. Air
platforms are unencumbered by terrain, but they are vulnerable to detection and interdiction. Effectiveness
of air platforms can be contingent upon weather conditions. Aerial reconnaissance and surveillance cannot
always detect enemy capabilities concealed by vegetation or terrain. The number of sorties air platforms can
conduct depends on having control of airfields and their proximity to targets.
1-96. Army aviation provides ground commanders and the joint force with land-focused air capabilities.
Joint force commanders and land component commanders establish control measures to enable Army forces
to operate unimpeded in the air domain, coordinated when necessary with air capabilities from the other
Services. Army aviation (including fixed-wing, rotary-wing, and unmanned aircraft) provides reconnaissance
and surveillance, fires, intelligence, communications, and movement capabilities to Army, joint, and
multinational forces. Army rotary-wing aviation uses terrain to protect it from enemy detection. Army forces
also have aerial ISR capabilities that support security operations, targeting, delivering precision fires, and
information collection. Army land-based AMD capabilities provide protection against enemy air and missile
attack. (See JP 3 30 for more information on joint air operations.)
Space Domain
1-97. The space domain is the area above the altitude where atmospheric effects on airborne objects
become negligible. Like the air, land, and maritime domains, space is a physical domain in which military,
civil, and commercial activities are conducted. The U.S. Space Command (known as USSPACECOM) has
an area of responsibility that surrounds the earth at altitudes equal to, or greater than, 100 kilometers (54
nautical miles) above mean sea level. It has responsibility for planning and execution of global space
operations, activities, and missions.
1-98. Proliferation of advanced space technology provides access to space-enabled technologies to a global
audience. Some adversaries have their own space capabilities, while commercially available systems allow
almost universal access to some level of space-enabled capability with military applications.
1-99. Space capabilities provide information collection; early warning; target acquisition; electromagnetic
warfare; environmental monitoring; satellite-based communications; and positioning, navigation, and timing
information for ground forces. Activities in the space domain enable freedom of action for operations in all
other domains, and operations in the other domains can create effects in and through the space domain.
1-100. Army forces rely on space-based capabilities to enable each warfighting function and effectively
conduct operations. Commanders and staffs require an understanding of space capabilities and their effects
and the ability to coordinate activities between involved agencies and organizations. Commanders cannot
assume that U.S. forces will have unconstrained use of space-based capabilities, including data
communications. Therefore, Army forces must be prepared to operate under the conditions of a denied,
degraded, and disrupted space domain. (See FM 3-14 for doctrine on Army space operations.)
Cyberspace Domain
1-101. For Army forces, the cyberspace domain is the interdependent networks of information
technology infrastructures and resident data, including the Internet, telecommunication networks,
computer systems, embedded processors and controllers, and relevant portions of the electromagnetic
spectrum. Cyberspace is an extensive and complex global network of wired and wireless links connecting |
3-0 | 35 | Foundations of Operations
nodes that permeate every domain. Cyberspace networks cross geographic and political boundaries to
connect individuals, organizations, and systems around the world. Cyberspace allows interactivity among
individuals, groups, organizations, and nation-states. Friendly, enemy, adversary, and host-nation networks,
communications systems, computers, cellular phone systems, social media, and technical infrastructures are
all part of cyberspace. Cyberspace is congested, contested, and critical to successful operations.
1-102. Cyberspace is dependent on the land, maritime, air, and space domains. Cyberspace operations use
links and nodes located in these domains and perform functions to gain access and create effects first in
cyberspace and then, as needed, in the other domains. Virtually all space operations depend on cyberspace,
and a critical portion of cyberspace bandwidth can only be provided via space operations. These
interrelationships are important considerations during planning.
1-103. Army forces conduct cyberspace operations and supporting activities as part of both Army and joint
operations. Because cyberspace is a global communications and data-sharing medium, it is inherently joint,
interorganizational, multinational, and often a shared resource, with signal and intelligence organizations
maintaining significant equities.
1-104. Commanders can use cyberspace and electromagnetic warfare capabilities to gain situational
awareness and understanding of the enemy through reconnaissance and sensing activities. These
reconnaissance and sensing activities augment and enhance the understanding a commander gains from other
forms of information collection and intelligence processes. Cyberspace and electromagnetic warfare
capabilities enable decision making and protect friendly information. They are a significant means for
informing and influencing audiences.
1-105. Leaders maintain situational understanding of friendly electromagnetic signatures to assess
vulnerabilities. By protecting friendly information systems and signals from disruption or exploitation by an
adversary or enemy, a commander can ensure C2 and maintain operations security. Conversely, a commander
might use cyberspace and electromagnetic warfare capabilities to slow or degrade an enemy’s
decision-making processes by disrupting enemy sensors, communications, or data processing. To achieve an
information advantage, a commander must plan early to integrate cyberspace operations and electromagnetic
warfare activities into the overall scheme of maneuver. (See FM 3-12 for more details on cyberspace.)
DIMENSIONS
1-106. Understanding the physical, information, and human dimensions of each domain helps commanders
and staffs assess and anticipate the impacts of their operations. Operations reflect the reality that war is an
act of force (in the physical dimension) to compel (in the information dimension) the decision making and
behavior of enemy forces (in the human dimension). Actions in one dimension influence factors in the other
dimensions. Understanding the interrelationship enables decision making about how to create and exploit
advantages in one dimension and achieve objectives in the others without causing undesirable consequences.
Physical Dimension
1-107. The physical dimension is the material characteristics and capabilities, both natural and
manufactured, within an operational environment. While war is a human endeavor, it occurs in a material
environment, and it is conducted with physical things. Each of the domains is inherently physical. Terrain,
weather, military formations, electromagnetic radiation, weapons systems and their ranges, and many of the
things that support or sustain forces are part of the physical dimension. Activities or conditions in the physical
dimension create effects in the human and information dimensions.
1-108. The electromagnetic spectrum is one of the material characteristics that crosses all the domains. It
consists of a range of frequencies of electromagnetic radiation from zero to infinity divided into 26
alphabetically designated bands. The electromagnetic spectrum is relevant in the land, maritime, and air
domains because capabilities in those domains depend on electromagnetic spectrum-enabled
communications and weapon systems. The electromagnetic spectrum plays a key role in the ability to detect
enemy forces that can be identified by their electromagnetic signatures. Conversely, friendly forces must take
efforts to mask their electromagnetic signatures to degrade enemy surveillance and reconnaissance efforts. |
3-0 | 36 | Chapter 1
1-109. A physical advantage occurs when a force holds the initiative in terms of a combination of
quantitative capabilities, qualitative capabilities, or geographical positioning. Physical advantages are most
familiar to tactical forces, and they are typically the immediate goal of most tactical operations. Finding
enemy forces, defeating enemy forces, and seizing land areas typically requires the creation and exploitation
of multiple physical advantages, including occupation of key terrain, the physical isolation of enemy forces,
and the destruction of enemy units. While this dominates tactical operations, leaders understand that physical
advantages both complement and are complemented by human and information advantages.
1-110. Examples of physical advantage include favorable geography, superior equipment, quantity of
resources, and favorable combat power ratios. Superior equipment and favorable geography provide options
for seizing the initiative. Superior combat power allows friendly forces to engage enemy forces on favorable
terms. The exploitation of physical advantages reduces an enemy force’s capacity to fight, creating
information and human advantages. Physical advantages implicitly communicate a message that can
influence enemy forces’ will to fight, sway popular support, and influence enemy risk calculus.
Information Dimension
1-111. The information dimension is the content, data, and processes that individuals, groups, and
information systems use to communicate. Information systems include the technical processes and
analytics used to exchange information. The information dimension contains the information itself, including
text and images. It also includes the flow or communication pathways of information. Information exchange
may be in the form of electromagnetic transmission, print, or speech. The information dimension connects
humans to the physical world.
1-112. Information transits through all domains in some way or another, whether in electromagnetic
transmissions through cyberspace, radar data collected by a destroyer, leaflets dropped from aircraft, social
media messaging, books, or satellite photography collected in and transmitted from space. Information,
whether true, false, or somewhere in between, is used by friendly, enemy, adversary, and neutral actors to
influence the perceptions, decision making, and behavior of individuals and groups. Effective employment
of information depends on the audience, message, and method of delivery.
1-113. Information is available globally in near-real time. The ability to access information—from
anywhere, at any time—broadens and accelerates human interaction, including person to person, person to
organization, person to government, and government to government. Social media enables the swift
mobilization of people and resources around ideas and causes, even before they are fully understood.
Disinformation creates malign narratives that can disseminate quickly and instill an array of emotions and
behaviors among groups, ranging from disinterest to violence. From a military standpoint, information
enables decision making, leadership, and combat power; it is also a key component of combat power
necessary for seizing, retaining, and exploiting the initiative and consolidating gains.
1-114. An information advantage is the operational benefit derived when friendly forces understand and
exploit the informational considerations of the operational environment to achieve information objectives
while denying the threat’s ability to do the same. Army forces employ human and physical aspects of the
operational environment to gain information advantages. Most types of information advantage result from
physical and human factors or activities intrinsic to the operations Army forces conduct. The side possessing
better information and using that information more effectively to understand and make decisions has an
information advantage. A force that effectively communicates and protects its information while preventing
the enemy from doing the same has an advantage. A force that uses information to deceive and confuse an
opponent has an advantage. Using information to influence relevant actor behavior more effectively than an
adversary or enemy is another information advantage.
Human Dimension
1-115. The human dimension encompasses people and the interaction between individuals and
groups, how they understand information and events, make decisions, generate will, and act within an
operational environment. The will to act and fight emerges from the complex interrelationship of culture,
emotion, and behavior. Influencing these factors—by affecting attitudes, beliefs, motivations, and
perceptions—underpins the achievement of military objectives. |
3-0 | 37 | Foundations of Operations
1-116. Commanders and staffs identify relevant actors and anticipate their behavior. Actors are individuals,
groups, networks, and populations. Relevant actors are actors who, through their behavior, could substantially
impact campaigns, operations, or tactical actions. From this understanding, commanders develop ways to
influence relevant actor behavior, decision making, and will through physical and informational means.
1-117. A human advantage occurs when a force holds the initiative in terms of training, morale, perception,
and will. Human advantages enable friendly morale and will, degrade enemy morale and will, and influence
popular support. Examples of human advantages include leader and Soldier competence, morale of troops,
and the health and physical fitness of the force. Forces with a cultural affinity to the population in which they
operate are also a form of a human advantage. For Army forces, the mission command approach to C2 is a
significant human advantage that enhances the friendly decision cycle. (See ADP 6-0 for more information
on mission command.)
OPERATIONAL AND MISSION VARIABLES
1-118. The operational and mission variables are tools to assist commanders and staffs in refining their
understanding of the domains and dimensions of an operational environment. Commanders and staffs analyze
and describe an operational environment in terms of eight interrelated operational variables: political,
military, economic, social, information, infrastructure, physical environment, and time (known as
PMESII-PT). The operational variables help leaders understand the land domain and its interrelationships
with information, relevant actors, and capabilities in the other domains.
1-119. Commanders analyze information categorized by the operational variables in the context of the
missions they are assigned. They use the mission variables, in combination with the operational variables, to
refine their understanding of the situation and to visualize, describe, and direct operations. The mission
variables are mission, enemy, terrain and weather, troops and support available, time available, and civil
considerations, each of which have informational considerations. The mission variables are represented as
METT-TC (I). (See FM 5-0 for more information on operational and mission variables.) Informational
considerations are those aspects of the human, information, and physical dimensions that affect how
humans and automated systems derive meaning from, use, act upon, and are impacted by information.
(See FM 5-0 for more details about informational considerations.)
Note. METT-TC (I) represents the mission variables leaders use to analyze and understand a
situation in relationship to the unit’s mission. The first six variables are not new. However, the
pervasiveness of information and its applicability in different military contexts requires leaders to
continuously assess its various aspects during operations. Because of this, “I” has been added to
the METT-TC mnemonic. Information considerations are expressed as a parenthetical variable
because they are not an independent consideration, but an important component of each variable
of METT-TC that leaders must understand when developing understanding of a situation. |
3-0 | 39 | Chapter 2
Generating and Applying Combat Power
If you know the enemy and know yourself, your victory will not stand in doubt; if you know
Heaven and know Earth, you may make your victory complete.
Sun Tzu
Army forces integrate capabilities and synchronize warfighting functions to generate
combat power and apply it against enemy forces. Successful application of combat
power requires leaders to understand the enemy and understand friendly capabilities.
A broad understanding of the strategicenvironment and threat methods provides a basis
for understanding specific enemy situations. Leaders must understand how Army
forces enable joint operations through multiple domains and the basic roles of Army
echelons. They must also understand how the joint force enables the Army to integrate
capabilities through all domains to generate more effective landpower.
WARFIGHTING FUNCTIONS
A warfighting functionis a group of tasks and systems united by a common purpose that commanders
use to accomplish missions and training objectives (ADP 3-0). The warfighting functions are—
(cid:122) Command and control(C2).
(cid:122) Movement and maneuver.
(cid:122) Intelligence.
(cid:122) Fires.
(cid:122) Sustainment.
(cid:122) Protection.
The purpose of warfighting functions is to provide an intellectual organization for common critical
capabilities available to commanders and staffs at all echelons and levels of war. Warfighting functions are
not confined to single domain, and they typically include capabilities from multiple domains. Warfighting
functions are not branch specific. Although some branches, staff sections, and types of units have a role or
purpose that mainly aligns with a warfighting function, each warfighting function is relevant to all types of
units.
THE COMMAND AND CONTROLWARFIGHTING FUNCTION
The command and control warfighting function is the related tasks and a system that enable
commanders to synchronize and converge all elements of combat power (ADP 3-0).The primary purpose of
the C2warfighting function is to assist commanders in integrating the other warfighting functions (movement
and maneuver, intelligence, fires, sustainment, and protection) effectively at each echelon, and to apply
combat power to achieve objectives and accomplish missions.
The C2 system includespeople, processes, networks, and command posts. All elements of the system
are critical in supporting effective decision making and the tempo required to defeat enemy forces. C2
supports the creation and exploitation of information advantages through the activities of developing
situational understanding, decision making, and operating networks.
C2synchronizes the systems and capabilities that comprise the other warfighting functions. Strategy,
operational art, planning, operational approaches, operational frameworks, risk assessment, and decision |
3-0 | 40 | Chapter2
making are all part of C2. C2reflects leader action and how Army forces achieve unity of effort and unity of
purpose during operations. (See ADP 6-0for more information on C2.)
THE MOVEMENT AND MANEUVERWARFIGHTING FUNCTION
The movement and maneuver warfighting function is the related tasks and systems that move and
employ forces to achieve a position of relative advantage over the enemy and other threats (ADP 3-0). Direct
fire and close combat are inherent in maneuver. The movement and maneuver warfighting function includes
tasks associated with force projection. Movement is necessary to position and disperse the force as a whole
or in part when maneuvering. Maneuver directly gains or exploits positions of relative advantage.
Commanders use maneuver for massing effects to achieve surprise, shock, and momentum.
Effective maneuver requires some combination of reconnaissance, surveillance, and security
operations to provide early warning and protect the main body of the formation. Every Soldier on the
battlefield is a potential sensor that makes key contributions to information collection and the development
of intelligence. Effective maneuver requires close coordination of fires and movement. Movement and
maneuver contribute to the development of information advantages through the positioning of units able to
employ capabilities in close proximity to the enemy, as well as by physically establishing the facts on the
ground that an enemy or adversary cannot refute.
Maneuver requires sustainment. The movement and maneuver warfighting function does not include
routine transportation of personnel and materiel that support operations, which falls under the sustainment
warfighting function.
THE INTELLIGENCEWARFIGHTING FUNCTION
The intelligence warfighting functionis the related tasks and systems thatfacilitate understanding the
enemy, terrain, weather, civil considerations, and other significant aspects of the operational environment
(ADP3-0). Intelligence involves analyzing information from all sources, which includes the other
warfighting functions, and conducting operations to collect information. The integration of intelligence into
operations facilitates understanding of an operational environment and assists in determining when and where
to employ capabilities against adversaries and enemies. Intelligence likewise facilitates responses by Army
forces to other situations, such as public health crises and events precipitating noncombatant evacuation. The
intelligence warfighting function provides support to force generation, situational understanding, targeting
and information operations, and information collection. The intelligence warfighting function fuses the
information collected through reconnaissance, surveillance, security operations, and intelligence operations.
Commanders drive intelligence and intelligence drives operations. Army forces execute intelligence,
surveillance, and reconnaissance (ISR) through the operations and intelligence processes, with an emphasis
on intelligence analysis and information collection.
Timely, accurate, relevant, and predictive intelligence enables decision making, tempo, and agility
during operations. Due to the fog and friction of warfare, commanders must fight for intelligence and share
it with adjacent units and across echelons. (See ADP 2-0 for additional information on the intelligence
warfighting function.)
THE FIRESWARFIGHTING FUNCTION
The fires warfighting function is the related tasks and systems that create and converge effects in all
domains against the adversary or enemy to enable operations across the range of military operations
(ADP3-0). These tasks and systems create lethal and nonlethal effects delivered from both Army and joint
forces and other unified action partners. The fires warfighting function does not entirely encompass, nor is it
wholly encompassed by, any particular branch or function. Many of the capabilities that contribute to fires
also contribute to other warfighting functions, often simultaneously. For example, an aviation unit may
simultaneously execute missions that contribute to the movement and maneuver, fires, intelligence,
sustainment, protection, and C2 warfighting functions. Space and cyberspace capabilities can provide
commanders with options to defeat, destroy, disrupt, deny, or manipulate enemy networks, information, and
decision making. (See ADP 3-19for additional information on the fires warfighting function.) |
3-0 | 41 | Generating and Applying Combat Power
THE SUSTAINMENTWARFIGHTING FUNCTION
The sustainment warfighting functionis the related tasks and system that provide support and services
to ensure freedom of action, extended operational reach, and prolong endurance (ADP 3-0). Sustainment
employs capabilities from all domains and enables operations through each domain. Sustainment determines
the limits of depth and endurance during operations. Sustainment demands joint and strategic integration,
and it should be meticulously coordinated across echelons to ensure continuity of operations and that
resources reach the point of employment.
Sustainment employs an integrated network of information systems linking sustainment to operations.
As a result, commanders at all levels see an operational environment, anticipate requirements in time and
space, understand what is needed, track anddeliver what is requested, and make timely decisions to ensure
responsive sustainment. Because the situation is always changing, sustainment requires leaders capable of
improvisation. Because sustainment operations are often vulnerable to enemy attacks, sustainment
survivability depends on active and passive measures and maneuver forces for protection. (See ADP 4-0and
FM 4-0for more information on sustainment.)
THE PROTECTIONWARFIGHTING FUNCTION
The protection warfighting function is the related tasks, systems, and methods that prevent or
mitigate detection, threat effects, and hazards to preserve combat power and enable freedom of action.
Protection encompasses everything that makes Army forces hard to detect and destroy. Protection requires
commanders and staffs to understand threats and hazards throughout the operational environment, prioritize
their requirements, and commit capabilities and resources according totheir priorities. Commanders balance
their protection efforts with the need for tempo and resourcing the main effort. They may assume risk in
operations or areas that may be vulnerable, but that are considered low enemy priorities for targeting or
attack. Commanders account for threats from space, cyberspace, and outsidetheir assigned area of operations
(AO) as they develop protection measures. Protection results from many factors, including operations
security, dispersion, deception, survivability measures, and the way forces conduct operations. Planning,
preparing, executing, and assessing protection is a continuous and enduring activity. Defending networks,
data, and systems; implementing operations security; and conducting security operations contribute to
information advantages by protecting friendly information. Prioritization of protection capabilities is
situationally dependent and resourceinformed. (See ADP 3-37for additional information on protection.)
COMBAT POWER
Combat poweris the total means of destructive and disruptive force that a military unit/formation can
apply against an enemy at a given time (JP 3-0). It is the ability to fight. The complementary and reinforcing
effects that result from synchronized operations yield a powerful blow that overwhelms enemy forces and
creates friendly momentum. Army forces deliver that blow through a combination of five dynamics. The
dynamics of combat power are—
(cid:122) Leadership.
(cid:122) Firepower.
(cid:122) Information.
(cid:122) Mobility.
(cid:122) Survivability.
All warfighting functions contribute to generating and applying combat power. Well sustained units
able to move and maneuver bring combat power to bear against the opponent. Joint and Army indirect fires
complement and reinforce organic firepower in maneuver units. Survivability is a function of protection
tasks, the protection inherent to Army platforms, and schemes of maneuver that focus friendly strengths
against enemy weaknesses. Intelligence determines how and where to best apply combat power against
enemy weaknesses. C2enables leadership, the most important qualitative aspect of combat power. |
3-0 | 42 | Chapter2
LEADERSHIP
Leadership is the most essential dynamic of combat power. Leadership is the activity of influencing
people by providing purpose, direction, and motivation to accomplish the mission and improve the
organization (ADP 6-22). It is the multiplying andunifying dynamic of combat power, and it represents the
qualitative difference between units. Leadership drives C2 butis also dependent upon it. The collaboration
and shared understanding inherent in the operations process prepare leaders for operations, expand shared
understanding, hone leader judgment, and improve the flexibility that leaders apply to the other dynamics of
combat power against enemy forces.
Commanders communicate their will to their formations through leadership. Sound leadership
manifests as an unrelenting will to accomplish the mission, the ability to understand and adapt to changing
conditions, and the motivation to persevere through hardship. Leadership inspires individuals to push past
their perceived breaking point, and to fight for their unit and fellow Soldiers under the most difficult
circumstances. It provides the intangible qualitative difference in how much combat power a formation can
generate against enemy forces. (See ADP 6-22for information on leadership.)
FIREPOWER
Firepower is the primary source of lethality, and it is essential to defeating an enemy force’s ability
and will to fight. Leaders generate firepower through direct and indirect fires, using mass, precision, or,
typically, a combination of the two. Intelligence enables the identification and selection of targets and
objectives for the application of lethal force. Movement and maneuver enable the positioning of fires
capabilities where they can be most lethal.
Firepower facilitates maneuver by suppressing enemy fires and disrupting or preventing the movement
of enemy forces. Firepower exploits maneuver by neutralizing enemy forces when they react, destroying
equipment and people, and degrading the will of enemy forces to fight.
Leaders increase firepower by using capabilities
from all domains in combinations that overwhelm an enemy Large-scale combat operations can
force's ability to effectively respond. This is ammunition consume corps and division ammunition
intensive. Discretion may require leaders to reserve limited stocks in 72to 96 hours, particularly those
numbers of precision munitions for specific, important required for cannons, rockets, and
targets, while they rely on conventional unguided munitions mortars.
against enemy units and area targets. Large-scale combat
requireslarge reserves of both precision and unguided munitions and the sustainment capacity to move them
to forward locations. Air, maritime, space, and cyberspace-based fires enhance the firepower of ground
forces. Similarly, ground-based firepower complements firepower from other domains. A multidomain
approach to firepower requires understanding the techniques for controlling and integrating joint fires. This
includes requesting and integrating space and cyberspace capabilities, electromagnetic attack capabilities,
and air capabilities.
INFORMATION
Information contributes to the disruption and destruction of enemy forces. It is central to the application
and amplification of combat power. It enables decision making and influences enemy perceptions, decision
making, and behavior. Information, like leadership, provides a qualitative advantage to friendly combat
power when it can be acted upon more quickly and effectively than the enemy.
Army forces collect data and information for analysis and process it to understand situations, make
decisions, and direct actions that apply combat power against enemy forces. Army forces must fight for
information about enemy forces while protecting their own information. Friendly counterintelligence,
counterreconnaissance, and security operations prevent enemy access to friendly information. Offensively,
commanders fight for information about enemy forces and terrain through continuous reconnaissance and
surveillance and offensive tasks such as movement to contact or reconnaissancein force.
Army forces also use information to enhance the effects of destructive or disruptive physical force to
create psychological effects that disrupt morale, cause human error, and increase uncertainty. Using |
3-0 | 43 | Generating and Applying Combat Power
information to manipulate shock and confusion amplifies the psychological effects of lethality and other
dynamics of combat power.
Employing information to confuse, manipulate, or deceive can induce threats to act in ways that make
them more vulnerable to destruction by Army forces. Employing information creatively can enable Army
forces to achieve surprise, cause enemy forces to misallocate or expend combat power, or mislead them as
to the strength, readiness, locations, and intended missions of friendly forces.
MOBILITY
Mobility is a quality or capability of military forces which permits them to move from place to place
while retaining the ability to fulfill their primary mission (JP 3-36). Mobility encompasses the capability of
a formation to move and apply capabilities in specific terrain under specific conditions relative to enemy
forces. Exploiting mobility requires intelligence of an enemy force’s disposition, composition, strength, and
course of action. This understanding allows leaders to assess their mobility in relation to adversary or enemy
forces. Maneuver and fires increase relative mobility by fixing enemy units, reducing obstacles, and
providing obscuration.
The environment impacts mobility and the level of combat power a unit can produce. For example, an
armored brigade combat team’s (BCT’s) mobility is limited in dense jungle or urban terrain, but it increases
in steppes, in deserts, and on modern roads. Weather affects mobility when it degrades route conditions, or
when it increases risks to fixed-and rotary-wing aviation operations. Space-based environmental monitoring
provides real-time understanding of the impacts of weather on terrain and mobility. Enemy forces also
influence conditions that affect mobility. For example, enemy standoff approaches can isolate land forces
operating on islands in maritime environments by destroying maritime transportation capabilities and
denying friendly air support.
Mobility is a function of how quickly units can move in specific terrain under specific conditions. At
the tactical level, Army forces exploit mobility to conduct information collection, posture forces in
advantageous locations, position fires to range enemy forces, and move classes of supply around an AO.
During offensive operations, mobility enables forces to concentrate and then disperse rapidly, achieve
surprise, attack enemy forces in unexpected locations, exploit opportunity, and evade enemy fires. During
defensive operations, mobility enables counterattacks and the ability to rapidly shift resources between fixed
positions. The ability to conduct gap crossings and passage of lines are other operations that can facilitate
mobility.
SURVIVABILITY
Survivability is a quality or capability of military forces which permits them to avoid or withstand
hostile actions or environmental conditions while retaining the ability to fulfill their primary mission
(ATP3-37.34). It represents the degree to which a formation is hard to kill. Survivability is relative to a unit’s
capabilities and the type of enemy effects it must withstand, its ability to avoid detection, and how well it can
deceive enemy forces. Survivability is also a function of how a formation conducts itself during operations.
For example, an infantry BCT’s survivability against indirect fire is contingent on it not being detected, being
dispersed, digging in, and adding overhead cover when stationary. An armor BCT’s survivability is a function
of logistics, security,and avoiding situations that constrain its mobility or freedom of action.
Leaders assess survivability as the ability of a friendly force to withstand enemy effects while
remaining mission capable. Armor protection, mobility, tactical skill, avoiding predictability, and situational
awareness contribute to survivability. Enforcement of operations security techniques and avoiding detection
while initiating direct fire contact on favorable terms also increases survivability. Situational awareness
regarding the nine forms of contact and minimizing friendly signatures contributes to survivability.
To increase survivability, units employ air defense systems, reconnaissance and security operations,
modify tempo, take evasive action, maneuver to gain positional advantages, decrease electromagnetic
signatures, and disperse forces. Dispersed formations improve survivability by complicating targeting and
making it more difficult for enemy forces to identify lucrative targets. Tactical units integrate procedures for
the use of camouflage, cover, concealment, and conducting electromagnetic protection—including noise and
light discipline. During large-scale combat operations, survivability measures may include radio silence, |
3-0 | 44 | Chapter2
communication through couriers, or alternate forms of communication. Space-based missile warning systems
provide early warning of adversary artillery and missile attacks, allowing friendly forces to seek cover.
Application of chemical, biological, radiological, and nuclear (CBRN) defense measures increase
survivability in CBRN environments. (See ATP 3-37.34for more information on survivability.)
STRATEGIC ENVIRONMENT
The central challenge to U.S. security is the reemergence of long-term, greatpower competition with
China and Russia as individual actors and as actors working together to achieve common goals. China uses
its rapidly modernizing military, information warfare, and predatory economics to coerce neighboring
countries to reorder the Indo-Pacific region to its advantage. Concurrently, Russia seeks veto authority over
nations on its periphery in terms of its governmental, economic, and diplomatic decisions, to subvert the
North Atlantic Treaty Organization (NATO), and to change European and Middle East security and economic
structures to its favor.
In addition to China and Russia, several other states threaten U.S. security. North Korea seeks to
guarantee survival of its regime and increase its leverage. It is pursuing a mixture of CBRN, conventional,
and unconventional weapons and a growing ballistic missile capability to gain coercive influence over South
Korea, Japan, and the United States. Similarly, Iran seeks dominance over its neighbors by asserting an arc
of influence and instability while vying for regional hegemony. Iran uses state-sponsored terrorist activities,
a network of proxies, and its missile capabilities to achieve its objectives.
While states are the principal actors on the global stage, non-state actors also threaten the strategic
environment with increasingly sophisticated capabilities. Terrorists, transnational criminal organizations,
threat cyber actors, and other malicious non-state actors have transformed global affairs with increased
capabilities of mass disruption. Terrorism remains a persistent tactic driven by ideology and enabled by
political and economic structures.
THREATS
A threat is any combination of actors, entities, or forces that have the capability and intent to harm
United States forces, United States national interests, or the homeland (ADP 3-0). Threats faced by Army
forces are,by nature,hybrid. They include individuals, groups of individuals, paramilitary or military forces,
criminal elements, nation-states, or national alliances. In general, a threat can be categorized as an enemy or
an adversary:
(cid:122) An enemyisa party identified as hostile against which the use of force is authorized (ADP 3-0).
An enemyis also a combatant under the law of war.
(cid:122) An adversaryis a party acknowledged as potentially hostile to a friendly party and against which
the use of force may be envisaged (JP 3-0). Adversaries pursue interests that compete with those
of the United States and are often called competitors.
Army forces are organized, trained, and equipped
primarily for large-scale combat operations against peer Peer threats generate tactical, operational,
threats. Army units supporting combatant commanders and strategic challenges that may constitute
(CCDRs) where no peer threat exists focus on other an existential threat to the United States and
missions, but they can alter their priorities to support its allies.
large-scale combat operations when necessary. Peer
threats are adversaries or enemies with capabilities and capacity to oppose U.S. forces across multiple
domains worldwide or in a specific region where they enjoy a position of relative advantage. Peer threats
possess roughly equal combat power to U.S. forces in geographic proximity to a conflict area. Peer threats
may also have a cultural affinity with specific regions, providing them relative advantages in the human and
information dimensions.
Peer threats employ strategies that capitalize on their advantages to achieve objectives. When these
objectives are at odds with the interests of the United States and its allies, conflict becomes more likely. Peer
threats prefer to achieve their goals without directly engaging U.S. forces in combat. They often employ
information warfare in combination with conventional and irregular military capabilities to achieve their
goals. They exploit friendly sensitivity to world opinion and attempt to exploit American domestic opinion |
3-0 | 45 | Generating and Applying Combat Power
and sensitivity to friendly casualties. Peer threats believe they have a comparative advantage because of their
willingness to endure greater hardships, casualties, and negative public opinion. They also believe their
ability to pursuelong-term goals is greater than that of the United States.
Peer threats employ capabilities from and across multiple domains against Army forces, and they seek
to exploit vulnerabilities in all strategic contexts. During conflict, peer threats seek to inflict significant
damage across multiple domains in a short amount of time. They seek to delay friendly forces long enough
to achieve their goals and end hostilities before friendly forces can decisively respond.
THREAT METHODS
Peer threats use various methods to render U.S. military power irrelevant whenever possible. Five
broad peer threat methods, often used in combination during conventional or irregular conflicts, and below
the threshold of conflict, include—
(cid:122) Information warfare.
(cid:122) Systems warfare.
(cid:122) Preclusion.
(cid:122) Isolation.
(cid:122) Sanctuary.
Information Warfare
In the context of the threat, information warfare refers to a threat’s orchestrated use of information
activities (such as cyberspace operations, electronic warfare, and psychological operations) to achieve
objectives. Operating under a different set of ethics and lawsthan the United States, and under the cloak of
anonymity, peer threats conduct information warfare aggressively and continuously to influence populations
and decision makers. They can also use information warfare to create destructive effects during competition
and crisis. During armed conflict, peer threats use information warfare in conjunction with other methods to
achieve strategic and operational objectives.
Note. Threat forces use the term electronic warfare, which differs from U.S. doctrine’s use of
electromagnetic warfare. Electronic warfare consists of the measures threats conduct to control or
deny friendly use of the electromagnetic spectrum, while ensuring its use by the threat. For U.S.
forces, electromagnetic warfare is military action involving the use of electromagnetic and
directed energy to control the electromagnetic spectrum or to attack the enemy (JP 3-85).
Threats seek to employ information warfare to attack or disrupt in depth, including within the
continental United States, viewing it as a low-cost and low-risk activity. A cyberspace attack may disrupt
U.S. infrastructure that impedes deployment of forces, or a disinformation campaign can reduce morale and
the will to fight. In some situations, threats use proxies for information warfare to achieve policy aims without
having to incur the risks associated with employing military forces or official government entities.
Peer threats typically have fewer policy and legal restrictions than U.S. forces on how they employ
information warfare, giving them an initial advantage. They exploit the nature of open societies while
restricting their population’s access to information. They often obscure their activities to prevent detection
or attribution.
Peer threats are free to sow disinformation among U.S. and allied populations while at the same time
strictly limiting access to and manipulating the information their own populations receive. They employ all
available means to influence a wide range of audiences, including both civilian and military and domestic
and international, in support of their goals. Information warfare is a means to exploit shared cultural norms,
historical grievances, and a self-serving interpretation of international law to limit U.S. military options and
degrade U.S. political will. Peer threats use diverse means to conduct information warfare, and these means
may include—
(cid:122) Cyberspace operations.
(cid:122) Perception management. |
3-0 | 46 | Chapter2
(cid:122) Deception.
(cid:122) Electronic warfare.
(cid:122) Physical destruction.
(cid:122) Political warfare.
(cid:122) Legal warfare.
(cid:122) Proxies and non-state actors.
Peer threats systematically and continuously combine all of these means to create specific effects
within the human, information, and physical dimensions of an operational environment. Peer threats use
misinformation, disinformation, propaganda, and information for effect to create doubt, confuse, deceive,
and influence U.S. and partner decision makers, forces, and target audiences. They also use information
warfare to destroy essential network-based capabilities, such as economic infrastructure, private and
government communications, and electrical grids. This use of information warfare is not merely disruptive.
It can result in the loss of immense resources and human life, depending on the scale and duration of the
attack. (See FM 3-53for a discussion of threat information categories.)
Systems Warfare
Systems warfare is the identification and isolation or destruction of critical subsystems or components
to degradeor destroy an opponent’s overall system. Peer threats view the battlefield, their own instruments
of power, and an opponent’s instruments of power as a collection of complex, dynamic, and integrated
systems composed of subsystems and components. They use systems warfare to attack critical components
of a friendly system while protecting their own system. Simple examples of attacking critical components
are adversary use of electronic warfare to disable the links between unmanned aircraft system (UAS)
controllers and the aircraft in a specific area, and the emplacement of layered integrated air defense systems
from a position of sanctuary to prevent the integration of opposing airpower with ground operations.
Peer threats believe that a qualitatively or quantitatively weaker force can defeat a superior force, if
the weaker force can dictate the terms of combat. Peer threats believe that the systems warfare approach
allows them to move away from the conventional approach to combat. Systems warfare makes it unnecessary
to match an opponent system-for-system or capability-for-capability. Peer threats seek to locate the critical
components of the opposing combat system, determine patterns of interaction and dependencies among
components, and identify opportunities to exploit this connectivity.
Systems warfare approaches work in concert with other approaches, and they manifest themselves at
the tactical level in terms of integrated fires complexes characterized by surface-to-surface and surface-to-
air systems enabled by long-range ISRcapabilities. They generally represent one means by which adversaries
achieve preclusion at the strategic and operational levels, and they are adversaries’ preferred means for
destroying friendly forces at the tactical level. An example of systems warfare occurred in Ukraine in 2014. |
3-0 | 47 | Generating and Applying Combat Power
Systems Warfare and Sanctuary: Eastern Ukraine, 2014
During the Russia-Ukraine conflict, an attack on Ukrainian forces demonstrated the
lethality of the modern battlefield and the impact created by the threat’s use of
sanctuary and systems warfare. In July 2014, the Armed Forces of Ukraine moved
several mechanized brigades into a position near the Russian border to prevent the
illegal movement of military equipment across the frontier to rebels in eastern Ukraine.
Early on the morning of 11 July, soldiers at the position noticed a drone orbiting above
them for some time. Not long after the drone disappeared, rockets fired from 9A52-4
Tornado multiple launch rocket systems located in Russian territory began landing on
one of the brigades. Reporting indicated that the UAS was cued by other systems that
located civilian cell phones in the assembly area.
The barrage lasted four minutes. Rockets carrying a mixture of high explosive, cluster,
and thermobaric munitions impacted the unit’s position. Cannon rounds followed the
rockets with devastating effect. The Ukrainian units took heavy losses. One battalion
was virtually destroyed, and others were rendered combat ineffective due to heavy
losses in vehicles and personnel. Casualties quickly overwhelmed army and local
medical facilities. In the days that followed, rocket and cannon strikes continued,
disrupting the Ukrainian army’s ability to defend that region of eastern Ukraine.
The lethality of the attacks was enabled by a sophisticated real-time targeting system
that used inexpensive unmanned aircraft systems for ISR, target acquisition, and fire
control. Rockets were likely fired from within a town in Russian territory, hampering
potential Ukrainian military responses due to the sanctuary provided by both an
international border and proximity to civilian noncombatants. Additionally, Russia
extended its integrated air defense system, located within Russian territory, over the
conflict zone in Ukraine. This action denied Ukraine’s ability to use its air power, which
separated Ukraine’s air capability from its ground forces. Without air power for close
air support and counter-UAS operations, the Ukrainian ground forces were left
vulnerable to the sophisticated targeting systems used by Russian and pro-Russian
forces.
Over the following months and years, Ukraine military forces adapted. In 2022, Russia
began an unprovoked conventional attack along multiple axes throughout Ukraine.
Ukrainian forces responded effectively. They exercised a more disciplined and efficient
use of the electromagnetic spectrum, complicating Russian detection efforts. Ukrainian
forces also defended in more mobile, dispersed formations, providing fewer lucrative
targets for Russian fires.
Preclusion
To preclude is to keep something from happening by taking action in advance. Peer threats use a wide
variety of actions, activities, and capabilities to preclude a friendly force’s ability to shape an operational
environment and mass and sustain combat power. Antiaccess (A2) and area denial (AD) are two strategic
and operational approaches to preclusion. Antiaccessis an action, activity, or capability, usually long-range,
designed to prevent an enemy force from entering an operational area (JP 3-0). For example, A2 activities
prevent or deny forces the ability to project and sustain forces into a desired area. The employment of A2
capabilities against Army forces begins in the continental United States and extends throughout the strategic
support area into a theater. Peer threats have the means to disrupt the United States’ force projection capability
at home station. These means include ballistic missiles; cruise missiles; and space, cyberspace, and
information warfare capabilities. |
3-0 | 48 | Chapter2
Area denialis anaction, activity, or capability, usually short-range, designed to limit an enemy force’s
freedom of action within an operational area (JP 3-0). Usually adversaries do not design area denial to keep
friendly forces out, but rather to limit their freedom of action and ability to accomplish their mission within
an operational area. Threat forces pursue AD using long-range fires, integrated air defense systems, electronic
warfare, CBRN, manmade obstacles, and conventional ground maneuver forces. Figure 2-1 and figure 2-2
depict employment of A2 and AD approaches in different types of theaters. For illustration purposes, A2 and
AD reach are tied to specific capabilities. However, adversary forces can use different actions, activities, or
capabilities in an A2 or AD approach.
Figure 2-1. Notional U.S. European Command preclusion example |
3-0 | 49 | Generating and Applying Combat Power
Figure 2-2. Notional U.S. Indo-Pacific Command preclusion example
Isolation
Isolation is the containment of a force so that it cannot accomplish its mission. Peer threats will attempt
to isolate U.S. forces in several ways. Some examples include—
(cid:122) Attacking political bonds with allies and partners.
(cid:122) Preventing or limiting communications to and in an AO.
(cid:122) Interdicting or severing lines of communication to block support or reinforcement of
forward-positioned units.
(cid:122) Deceiving friendly forces about the current situation and their role in the operational environment.
(cid:122) Deceiving the public about the current situation to reduce its support of friendly operations that
counter threat goals.
(cid:122) Exploiting inadequate friendly understanding of an operational environment or cultural affinity in
an area or region.
(cid:122) Blocking support or reinforcement of forward-positioned units through direct and indirect fires.
(cid:122) Using economic coercion.
(cid:122) Preventing friendly access and overflight. |
3-0 | 50 | Chapter2
During competition, peer threats may attempt to isolate friendly forces using disinformation campaigns
and the threat of aggression. During crisis, peer threats seek to isolate U.S. forward-positioned forces and
prevent their support from the United States or elsewhere in theater. During armed conflict, enemy forces
identify isolated friendly forces using a variety of capabilities and rapidly attempt to destroy them through
long-range, massed, and precision fires.
Sanctuary
Sanctuary is the positioning of threat forces beyond the reach of friendly forces. It is a form of
protection derived by some combination of political, legal, and physical boundaries that restricts freedom of
action by a friendly force commander. Peer threats will use any means necessary, including sanctuary, to
protect key capabilities from destruction, particularly by air and missile capabilities. Peer threats will also
protect their key interests, whether these interests reside in their homeland or in another country. To create a
sanctuary that protects key interests, adversaries employ combinations of both physical and nonphysical
means toprotect key interests, including—
(cid:122) International borders.
(cid:122) Complex terrain.
(cid:122) Hiding among noncombatants and culturally sensitive structures.
(cid:122) Counterprecision techniques, including camouflage, concealment, and deception.
(cid:122) Countermeasures, including decoys, hardened and buried facilities, integrated air defense systems,
and long-range fires.
(cid:122) Information warfare.
(cid:122) Threatening attacks against the U.S. homeland, possibly using including weapons of mass
destruction.
(cid:122) International law, treaties, and treaty agreements.
(cid:122) Internal population information control (by denying the internet or jamming external radio and
television).
Most means of sanctuary cannot protect an entire enemy force for an extended time. Therefore, a threat
will seek to protect selected elements of its forces for enough time to gain the freedom of action necessary to
pursue its strategic or diplomatic goals. Threat forces seek to protect their conventional forces, advanced
aircraft, and extended-range fires systems. Many peer threats invest in long-range rocket and missile systems,
such as the Russian Smerch 9A52 and Chinese PHL-03, capable of counterfire at extreme ranges to allow
sanctuary behind international borders. Improved air defense systems, including counter ballistic missile
systems, often provide protection for these advanced fires capabilities.
UNIFIED ACTION AND ARMY FORCES
[S]eparate ground, sea, and air warfare is gone forever. If ever again we should be
involved in war, we will fight it in all elements, with all services, as one single concentrated
effort.
President Dwight D. Eisenhower
To counter threats and protect national interests worldwide, the Armed Forces of the United States
operate as a joint force in unified action. Unified action is the synchronization, coordination, and/or
integration of the activities of governmental and nongovernmental entities with military operations to achieve
unity of effort (JP 1, Volume 1).Unity of effortis coordination and cooperation toward common objectives,
even if the participants are not necessarily part of the same command or organization, which is the product
of successful unified action (JP 1, Volume 2). Army forces, as part of unified action, conduct operations in
support of the joint force, with multinational allies and partners, and in coordination with other agencies and
organizations. The Army’s contribution to unified action is multidomain operationswhich seek to employ all
available capabilities in unexpected combinations that create and exploit relative advantages.Leaders must
be capable of employing all unified action partners to the greatest extent possible, including conventional
forces, special operations forces, allies, partner-nation forces, territorial defense forces, and any other
organization or individual whose efforts can legally be harnessed to help achieve objectives. |
3-0 | 51 | Generating and Applying Combat Power
JOINT OPERATIONS AND ACTIVITIES
Single Services may perform tasks and missions to support Department of Defense (DOD) objectives.
However, the DOD primarily employs two or more Services (from two military departments) in a single
operation from, in, and across multiple domains, particularly in combat, through joint operations. Joint
operations are military actions conducted by joint forces and those Service forces employed in specified
command relationships with each other, which, of themselves, do not establish joint forces (JP 3-0). A joint
forceis a force composed of elements, assigned or attached, of two or more military departments operating
under a single joint force commander (JP 3-0). Joint operations exploit the advantages of interdependent
Service capabilities in multiple domains through unified action. Joint planning integrates military power with
other instruments of national power (including diplomatic, economic, and informational) to achieve a desired
military end state. The end stateis the set of requiredconditions that defines achievement of the commander’s
objectives (JP 3-0). Joint planning connects the strategic end state to the joint force commander’s (JFC’s)
campaign design and ultimately to tactical missions. JFCs use campaigns and major operations to translate
their operational-level actions into strategic results.
The joint force is organized, trained, and equipped for sustained large-scale combat anywhere in the
world. The capabilities to conduct large-scale combat operations enable a wide variety of other operations
and activities. In particular, opportunities exist prior to large-scale combat to shape an operational
environment to prevent, or at least mitigate, the effects of war. Characterizing the employment of military
capabilities (including people, organizations, and equipment) as one or another type of military operation has
several benefits. For example, the Army can develop publications that describe the nature, tasks, and tactics
associated with specific types of diverse operations, such as counterinsurgency and peace operations.
Doctrine categorizes joint operations and activities by their focus, as shown in figure 2-3. In some
cases, the title covers a variety of missions, tasks, and activities. Many activities are accomplished by Army
forces and do not constitute joint operations, such as tasks associatedwith security cooperation. Nonetheless,
most of these occur under a joint “umbrella,”because they contribute to achievement of CCDRs’ campaign
objectives.
Figure 2-3. Examples of operations and activities
MULTINATIONAL OPERATIONS
Multinational operationsisa collective term to describe military actions conducted by forces of two
or more nations, usually undertaken within the structure of a coalition or alliance (JP 3-16). While each nation
has its own interests and often participates within the limitations of national caveats, all nations bring value
to an operation. Each nation’s force has unique capabilities, and each usually contributes to an operation’s
legitimacy in terms of international or local acceptability. Army forces should anticipate that most operations
will be multinational and plan accordingly. (See FM 3-16for more information on multinational operations.) |
3-0 | 52 | Chapter2
Multinational operations present challenges and demands. These include culture and language issues,
unresolved policy issues, technical and procedural interoperability challenges, national caveats on the use of
respective forces, the authorities required for sharing of information and intelligence, and rules of
engagement. Commanders analyze the particular requirements of a mission in the context of friendly force
capabilities to exploit the multinational force’s advantages and compensate for its limitations. Establishing
effective liaison with multinational partners through embedded teams, collaborative systems, and leader
contact is critical to establishing a common operational picture (COP) and maintaining situational
understanding.
Multinational operations also present many opportunities. Having multinational forces as part of an
operation provides internationallegitimacy that helps isolate adversary or enemy forces. They may provide
cultural awareness, foreign language skills, and affinities with populations that help with understanding the
environment, conducting stability tasks, and transitioning to legitimate authorities. Allies and partners often
operate with different authorities to employ key capabilities in space, cyberspace, and the information
dimension of an operational environment. Lastly, multinational allies and partners bring additional forces to
an operation, and they often possess capabilities U.S. Army forces may lack.
INTERAGENCY COORDINATION AND INTERORGANIZATIONAL COOPERATION
Interagency coordination is a key part of unified action. Interagency coordinationis the planning and
synchronization of efforts that occur between elements of Department of Defense and participating United
States Government departments and agencies (JP 3-0). Army forces conduct and participate in interagency
coordination using established liaison, personal engagement, and planning processes.
Unified action may require interorganizational cooperation to build the capacity of unified action
partners. Interorganizational cooperationis the interactionthat occurs among elements of the Department of
Defense; participating United States Government departments and agencies; state, territorial, local, and tribal
agencies; foreign military forces and government agencies; international organizations; nongovernmental
organizations; and the private sector (JP 3-08). Interorganizational cooperation includes civil-military
integration. (See FM 3-57for more information on civil-military integration.)
CONVENTIONAL AND SPECIAL OPERATIONS FORCES INTEGRATION
Army forces integrate conventional and special operations forces to create complementary and
reinforcing effects during operations. The mission and operational environment drive the command and
support relationships between conventional and special operations forces during an operation. Regardless of
C2 and support arrangements, both types of forces integrate and synchronize operations to increase
effectiveness, promote interdependence, provide mutual support, limit the redundant use of resources, and
reduce the risk of fratricide.
During large-scale combat, conventional forces contribute mass across all warfighting functions
required to defeat enemy forces. Special operations forces complement conventional forces by performing
their core activities:
(cid:122) Civil affairs operations.
(cid:122) Countering weapons of mass destruction.
(cid:122) Counterinsurgency.
(cid:122) Counterterrorism.
(cid:122) Direct action.
(cid:122) Foreign humanitarian assistance.
(cid:122) Foreign internal defense.
(cid:122) Hostage rescue and recovery.
(cid:122) Military information support operations.
(cid:122) Security force assistance
(cid:122) Special reconnaissance.
(cid:122) Unconventional warfare. |
3-0 | 53 | Generating and Applying Combat Power
(cid:122) SOF contributions during deep and extended deep operations are often critical to setting conditions
for conventional close and rear operations.
(cid:122) SOF contributions during deep and extended deep operations are often critical to setting conditions
for conventional close and rear operations.
Because operations often include conventional and irregular forces from multinational partners,
commanders must consider how they will maintain unity of effortwithout direct command authority. Security
force assistance brigades (SFABs) provide the ability to partner with conventional allies and partners. Special
operations forces enhance unity of effort by integrating irregular forces through security force assistance,
foreign internal defense, and unconventional warfare. (See ATP 3-96.1 for more information on security
force assistance brigades. See FM 6-05 for more information on integrating conventional forces and special
operations forces.)
JOINT INTERDEPENDENCE
Joint interdependence is the purposeful reliance by one Service on another Service’s capabilities to
maximize complementary and reinforcing effects of both. The degree of interdependence varies with specific
circumstances.
The Army depends on the other Services for strategic and operational mobility, joint fires, and other
key enabling capabilities. The Army supports the other Services, combatant commands, and unified action
partners with ground-based indirect fires and air and missile defense (AMD), defensive cyberspace
operations, electromagnetic warfare, communications, intelligence, rotary-wing aircraft, logistics, and
engineering. The Army’s ability to set and sustain a theater of operations is essential to allowing the joint
force freedom of action. The Army establishes, maintains, and defends vital infrastructure. It also provides
the JFC with unique capabilities, such as port and airfield opening, logistics, CBRN defense, and reception,
staging, onward movement, and integration of forces (RSOI).
DOMAIN INTERDEPENDENCE
The Army provides forces and capabilities from all domains to the joint force. Army forces employ
joint capabilities from all domains to complement and reinforce their own capabilities. Understanding domain
interdependences helps leaders better mitigate friendly vulnerabilities while creating and exploiting relative
advantages. Successful operations in an environment where the enemy can contest every domain requires
continuous joint integration down to the lowest tactical echelons.
Air
Land capabilitiesenable air operations in multiple ways. Some of these ways include—
(cid:122) Fixing enemy ground forces for destruction from the air.
(cid:122) Providing air-delivered fires through rotary-wing and UAS platforms.
(cid:122) Controlling, securing, and defending airports and airfields.
(cid:122) Securing land-based C2 nodesfor air operations.
(cid:122) Destroying enemy surface-to-air systems.
(cid:122) Employing surface-to-air fires.
(cid:122) Integrating all-source intelligence to identify threats to friendly air capabilities.
(cid:122) Providing logistics supportto other Service components.
Air capabilities enable land operations in multiple ways. Some of these ways include—
(cid:122) Providing air-to-ground fires.
(cid:122) Providing offensive and defensive depth through air interdiction and strategic attack.
(cid:122) Protecting ground forces from air attack.
(cid:122) Employing airborne platforms for information collection.
(cid:122) Providing aerial movement of personnel, equipment, and supplies.
(cid:122) Employing airborne electromagnetic warfare platforms. |
3-0 | 54 | Chapter2
Space
Land capabilitiesenable space operations in multiple ways. Some of these ways include—
(cid:122) Destroying enemy space ground stations, ground links, and launch sites with surface-to-surface
fires.
(cid:122) Securing ground links and launch sites.
(cid:122) Securing bases and C2 nodes for units controllingspace capabilities.
(cid:122) Securing bases and C2 nodes from which to launch attacks against enemy space capabilities.
Space capabilities enable land operations in multiple ways. Some of these ways include—
(cid:122) Enabling geolocation and timing-dependent technology, including global positioning systems and
precise and accurate fires.
(cid:122) Enabling a global C2 network through satellite communications.
(cid:122) Enhancing situational understanding by providing meteorological, oceanographic, and space
environmental factors and detailed imagery of land areas and enemy dispositions on land.
(cid:122) Deceiving, disrupting, degrading, denying, or destroying enemy space systems.
(cid:122) Conducting navigation warfare to disrupt enemy use of positioning, navigation, and
timing-enabled devices.
(cid:122) Enabling theater missile warning and other warning intelligence.
Cyberspace
Land capabilitiesenable cyberspace operations in multiple ways. These include—
(cid:122) Securing critical cyberspace infrastructure including data storage facilities, wired network
transport, ground-based repeaters, and terminals.
(cid:122) Conducting information activities that protect and defend joint communications networks and
data.
(cid:122) Conducting physical attacks against enemy cyberspace-based capabilities and infrastructure on
land.
(cid:122) Defeating enemy forces collecting information through cyberspace.
Cyberspace capabilities enable land operations in multiple ways. Some of these ways include—
(cid:122) Enabling secure global communications and a shared COP.
(cid:122) Supporting decision making and logistics.
(cid:122) Facilitatinghigh-volume data storage and knowledge management.
(cid:122) Networking sensors and fires platforms.
(cid:122) Attacking enemy networks including C2, integrated air defense systems, and integrated long-range
fires systems.
(cid:122) Enabling rapid communicationto audiences through social media and other applications.
(cid:122) Enablingtargeted influence operations.
Maritime
Land capabilitiesenable maritime operations in multiple ways. Some of these ways include—
(cid:122) Attacking land-based threats to maritime capabilities, including enemy air bases,
surface-to-surface fires, and sensors.
(cid:122) Protecting ports and defending land areas that control maritime choke points.
(cid:122) Denying maritime areas with surface-to-surface fires and surface-to-air fires.
(cid:122) Integrating joint all-source intelligenceto identify threats to maritime capabilities.
(cid:122) Providing directed logistics support to maritime oriented forces operating from land.
Maritime capabilities enable land operations in multiple ways. Some of these ways include— |
3-0 | 55 | Generating and Applying Combat Power
(cid:122) Increasing operational reach and lethality through long-range fires systems and information
collection.
(cid:122) Providing access to otherwise inaccessible land areas.
(cid:122) Providing and protecting transportation of units, equipment, and supplies on a large scale, over
strategic distances.
(cid:122) Integrating with all-source intelligence.
(cid:122) Preventing enemy forces from using sea lines of communications and supply routes.
(cid:122) Attacking enemy maritime threats to landforces.
ARMY FORCE POSTURE
The Army postures forces in a way that
balances the need for sustainable readiness with the Although U.S. Army forces have the ability to
need for responsiveness. Forward-stationed and respond rapidly to regional and global crisis, the
rotational forces provide CCDRs with support to ability to build and project large-scale combat
operations during competition and rapid response power can take months.
during crisis. These forces are usually small in
number and may be vulnerable if the situation rapidly escalates to armed conflict. Forces based in strategic
support areas allow for unit training and a sustainable readiness cycle. These forces are part of the Army’s
global response capability, or they are in support of regional contingency plans that typically have
deployment timelines that occur over months.
Army Reserve Components support a wide variety of domestic and global Army operations. Although
they constitute about half of the Army’s organized units, they provide about 80 percent of the Army’s
sustainment units, over 70 percent of maneuver support units, a fourth of the Army’s mobilization base
expansion capability, and most of its civil affairs capacity. The Army Reserve Components are also the
Army’s major source of trained individual Soldiers for strengthening headquarters and filling vacancies in
the Regular Army during a crisis. Reserve Components provide a key resource for reconstitution operations
during armed conflict. It is critical for planners to understand that Reserve Components forces have
mobilization requirements that take time and typically have deployment time limits that must factor into force
management and contingency plans. (See ADP 1for more information on Army reserve forces. See Chapter
6 for more information on reconstitution. See Chapter 5 for information on reserve mobilization.)
ARMY ECHELONS
The Army operates through the use of echelons to ensure manageable spans of control for leaders.
Echelons generally correspond to a particular level of warfare, but they may contribute to two or more levels
depending on the situation.
Generally, higher echelons (for example, divisions and higher) have greater experience in their
command teams and staffs. They have the expertise and perspective to coordinate large-scale operations and
complex or politically sensitive tasks. They retain control of scarce resources so that they can employ them
at the right time and place. This often includes joint air, space, maritime, and cyberspace capabilities. Higher
echelons generally employ these critical capabilities to set conditions for lower echelon success and to weight
the main effort appropriately. Higher echelons maneuver subordinate formations and use capabilities from
all domains to shape the environment and create and exploit relative advantages. Generally speaking, the
joint force commanddegrades enemy strategic capabilities to enable forcible entry and sustained operations.
The land component command sets the theater, defeats enemy long- and mid-range fires, provides
operational-level sustainment, and apportions joint capabilities to corps. Corps, operating as tactical
formations, defeat enemy mid-range fires, employ joint capabilities to set conditions for divisions to
maneuver, and maintain the tempo of operations through sustainment and other rear operations. Divisions
defeat enemy short-range fires, mass effects on enemy forward echelons, and synchronize BCT maneuver in
close combat with enemy forces. BCTs conduct close operations to defeat and destroy enemy forces during
battles and engagements.
Generally, subordinate echelons (for example, brigades and lower) contribute to the overall mission
by executing tasks and fulfilling the purpose assigned to their unit. They provide awareness to the higher |
3-0 | 56 | Chapter2
echelon with their proximity to the current situation at the point of execution. While higher echelons provide
broad perspective, subordinate echelons provide tactical fidelity. Combining the higher echelon perspective
with the perspectives of subordinates creates the shared situational understanding that fosters disciplined
initiative. Shared situational understanding does not require all leaders to agree. Instead, leaders use
differences of opinion to frame the problem, assess operations, understand risk, and guide information
collection.
The focus of echelons changes across strategic contexts as do their responsibilities for integrating
multidomain capabilities into operations. Their broad roles are listed in paragraphs 2-79through 2-94. (See
Chapters 4, 5, and 6for descriptions of each strategic context and more detailed information on echelon roles
and responsibilities.)
Theater Army
The theater army’s mission is the most diverse and complex of any Army echelon. The theater army
headquarters is tailored to a specific CCDR with the ability to conduct both operational and administrative
C2 over Army forces theater wide. It provides enabling capabilities appropriate to theater conditions, such as
theater intelligence, theater sustainment, theater signal, theater fires, theater information activities, civil
affairs, engineer, and theater medical. In theaters without assigned field armies, corps, or divisions, the theater
army assumes directresponsibility across warfighting functions for its tactical commands. The theater army
is the Army Service component command to a geographic combatant command. The seven functions
performed as the Army Service component command are—
(cid:122) Execute the CCDR’s daily operational requirements.
(cid:122) Provide administrative control (ADCON) of Army forces.
(cid:122) Set and maintain the theater.
(cid:122) Set and support operational areas.
(cid:122) Exercise C2 of Army forces in the theater.
(cid:122) Perform joint roles of limited scope, scale, and duration.
(cid:122) Plan and coordinate for the consolidation of gains in support of joint operations.
(See FM 3-94 and ATP 3-93 for additional information on theater army administrative and operational
requirements.)
Field Army
A field army is constituted to meet specific requirements. A field army may consist of a headquarters
battalion with subordinate companies and special troops, a variable number of attached corps, an attached
expeditionary sustainment command, a variable number of divisions normally attached to corps, and other
attached functional and multifunctional brigades.
When required, a field army is an operational headquarters that provides C2 over multiple corps.
During operations, forces are assigned or attached to the field army. Although it may employ subordinate
units during operations, these units are provided by external Army, joint, and multinational sources based on
the situation and the field army’s role and mission. When constituted, a field army is tailored to mission
requirements and designed to perform operational ARFOR tasks; it is the Army component to the JFC to
which it is assigned.
The field army provides additional operational capacity to a CCDR facing peer adversaries in its AOR.
The field army is tailored based on the capabilities of the peer adversary. As the adversary’s capabilities
change, so do those of the field army. When constituted, the field army provides Army, joint, and
multinational forces with a headquarters capable of performing in a variety of ways across the range of
military operations. Field armies are most likely to be employed in theaters where peer adversaries have the
capability of conducting large-scale combat. These regions include the U.S. European Command and U.S.
Indo-Pacific Command. |
3-0 | 57 | Generating and Applying Combat Power
Corps
The corps is the most versatile echelon above brigade due to its ability to operate at both the tactical
and operational levels. While it is organized, staffed, trained, and equipped to fight as a tactical formation,
the corps may be called upon to become a joint and multinational headquarters for conducting operations.
When operating as the senior Army headquarters under a joint task force (JTF), the corps will serve as the
ARFOR. The corps can also serve as the coalition forces land component commander (CFLCC) when
properly augmented with joint and multinational personnel. If the corps is uncommitted to specific CCDR
requirements, it focuses on building and sustaining readiness to prevail in large-scale combat operations. The
roles of the corps include acting as the—
(cid:122) Senior Army tactical formation in large-scale combat, commanding two to five Army divisions
together with supporting brigades and commands.
(cid:122) ARFOR (with augmentation) within a joint force for campaigns and major operations when a field
army isnot present.
(cid:122) JTF headquarters (with significant augmentation) for crisis response and limited contingency
operations.
(cid:122) CFLCC (with significant augmentation) commanding Army, Marine Corps, and multinational
divisions together with supporting brigades and commands when a field army is not present.
During large-scale combat operations, a corps headquarters normally functions as a tactical
headquarters under a joint or multinational land component. The corps is the echelon best positioned and
resourced to achieve convergence with Army and joint capabilities. (See FM 3-94 and ATP 3-92 for more
information about Army corps.)
Division
The division is the Army’s principal tactical warfighting formation during large-scale combat
operations. Its primary role is to serve as a tactical headquarters commanding brigades. A division conducts
operations in an AO assigned by its higher headquarters—normally a corps. It task-organizes its subordinate
forces according to the mission variables to accomplish its mission. A division typically commands between
two and five BCTs, a mix of functional and multifunctional brigades, and a variety of smaller enablingunits.
The division is typically the lowest tactical echelon that employs capabilities from multiple domains to
achieve convergence during large-scale combat operations. Winning battles and engagements remains the
division’s primary purpose. During limited contingencies, it can organize itself to serve in multiple roles. The
roles of the division include acting as a—
(cid:122) Tactical headquarters.
(cid:122) ARFOR headquarters (with significant augmentation).
(cid:122) CFLCC (with significant augmentation).
(cid:122) JTF headquarters (with significant augmentation).
(See FM 3-94and ATP 3-91for more information about Army divisions.)
Brigade Combat Teams
A BCT is the Army’s primary combined arms, close-combat maneuver force. BCTs maneuver against,
close with, and destroy enemy forces. BCTs seize and retain key terrain, exert constant pressure, and break
the enemy’s will to fight. They are the principal ground maneuver units of a division or a JTF. Divisions seek
to employ BCTs in mutually supporting ways to the greatest extent possible. However, BCTs must be capable
of fighting isolated from higher echelon headquarters and adjacent units during periods of degraded
communication and when operations are widely distributed.
There are three types of BCT: the infantry BCT, the armored BCT, and the Stryker BCT. Depending
on the tactical situation, these three types of organizations are augmented with additional Army and joint
capabilities to help them accomplish their missions. (See FM3-96for more information on Army BCTs.) |
3-0 | 58 | Chapter2
Multifunctional and Functional Brigades
Theater armies, corps, and divisions are task-organized with an assortment of multifunctional and
functional brigades to support their operations. These brigades add capabilities such as intelligence, attack
and reconnaissance aviation, fires, protection, contracting support, or sustainment. The theater army may
tailor subordinate corps and divisions with combinations of multifunctional brigades.
Multifunctional brigades provide a variety of functions in support of operations. Normally, they are
attached to a corps or division, but they may be under the command of a joint or multinational headquarters.
Multifunctional brigades include combat aviation brigades, field artillery brigades, sustainment brigades, and
maneuver enhancement brigades.
A functional brigade provides a single function or capability. These brigades can provide support to a
theater, corps, or division, depending on how each is tailored. Functional brigade organization varies
extensively. Examples of functional brigades include SFABs, air defense artillery (ADA) brigades, civil
affairs brigades, expeditionary military intelligence brigades, and engineer brigades. |
3-0 | 59 | Chapter 3
Fundamentals of Operations
There are not more than five musical notes, yet the combinations of these five give rise to
more melodies than can ever be heard.
There are not more than five primary colors, yet in combination they produce more hues
than can ever been seen.
There are not more than five cardinal tastes, yet combinations of them yield more flavors
than can ever be tasted.
Sun Tzu
This chapter describes the Army’s operational concept, multidomain operations. It
provides an overview of multidomain operations and describes it in terms of tenets,
imperatives, an operational approach, a strategic framework, and an operational
framework.
SECTION I – MULTIDOMAIN OPERATIONS: THE ARMY’S OPERATIONAL
CONCEPT
3-1. The Army’s operational concept is
multidomain operations. Multidomain operations Multidomain operations are the combined arms
are how Army forces contribute to and operate as employment of all joint and Army capabilities to
create and exploit relative advantages that
part of the joint force. Army forces, enabled by joint
achieve objectives, defeat enemy forces, and
capabilities provide the lethal and resilient
consolidate gains on behalf of joint force
landpower necessary to defeat threat standoff
commanders.
approaches and achieve joint force objectives.
3-2. The employment of joint and Army
capabilities, integrated across echelons and synchronized in a combined arms approach, is essential to
defeating threats able to contest the joint force in all domains. Army forces integrate land, maritime, air,
space, and cyberspace capabilities that facilitate maneuver to create physical, information, and human
advantages joint force commanders exploit across the competition continuum. Commanders and staffs
require the knowledge, skills, and attributes to integrate capabilities rapidly and at the necessary scale
appropriate to each echelon.
3-3. During competition, theater armies strengthen landpower networks, set the theater, and demonstrate
readiness for armed conflict through the command and control (C2) of Army forces supporting the CCP.
During crisis, theater armies provide options to combatant commanders (CCDRs) as they facilitate the flow
and organization of land forces moving into theater. During armed conflict, theater armies enable and support
joint force land component commander (JFLCC) employment of land forces. The JFLCC provides C2 of
land forces and allocates joint capabilities to its corps and other subordinate tactical formations. Corps
integrate joint and Army capabilities at the right tactical echelons and employ divisions to achieve JFLCC
objectives. Divisions, enabled and supported by the corps, defeat enemy forces, control land areas, and
consolidate gains for the joint force. Defeating or destroying enemy capabilities that facilitate the enemy’s
preferred layered stand-off approaches are central to success. Ultimately, operations by Army forces both
enable and are enabled by the joint force. |
3-0 | 60 | Chapter 3
3-4. Because uncertainty, degraded communications, and fleeting windows of opportunity characterize
operational environments during combat, multidomain operations require disciplined initiative cultivated
through a mission command culture. Leaders must have a bias for action and accept that some level of
uncertainty is always present. Commanders who empower leaders to make rapid decisions and to accept risk
within the commander’s intent enable formations at echelon to adapt rapidly while maintaining unity of
effort. (See ADP 6-0 for a detailed description of mission command.)
SECTION II – TENETS AND IMPERATIVES
3-5. There are no absolute rules for warfare. However, given analysis of the current strategic environment
and assessments of the best ways to employ Army forces, doctrine emphasizes tenets and imperatives for
operations that improve their prospects of success without dictating how exactly to solve a tactical or
operational problem.
TENETS
The art of war has no traffic with rules, for the infinitely varied circumstances and
conditions of combat never produce exactly the same situation twice. Mission, terrain,
weather, dispositions, armament, morale, supply, and comparative strength are variables
whose mutations always combine to form a new tactical pattern. Thus, in battle, each
situation is unique and must be solved on its own merits.
From Infantry in Battle
3-6. The tenets of operations are desirable attributes that should be built into all plans and operations, and
they are directly related to how the Army’s operational concept should be employed. Commanders use the
tenets of operations to inform and assess courses of action throughout the operations process. The degree to
which an operation exhibits the tenets provides insight into the probability for success. The tenets of
operations are—
(cid:122) Agility.
(cid:122) Convergence.
(cid:122) Endurance.
(cid:122) Depth.
3-7. The Army provides forces capable of transitioning to combat operations, fighting for information,
producing intelligence, adapting to unforeseen circumstances, and defeating enemy forces. Army forces
employ capabilities from multiple domains in a combined arms approach that creates complementary and
reinforcing effects through multiple domains, while preserving combat power to maintain options for the
joint force commander (JFC). Creating and exploiting relative advantages require Army forces to operate
with endurance and in depth. Endurance enables the ability to absorb the enemy’s attacks and press the fight
over the time and space necessary to accomplish the mission. Depth applies combat power throughout the
enemy’s formations and the operational environment, securing successive operational objectives and
consolidating gains for the joint force. |
3-0 | 61 | Fundamentals of Operations
AGILITY
3-8. The ability to act faster than the enemy is critical for
success. Agility is the ability to move forces and adjust Leaders seek to understand, decide,
their dispositions and activities more rapidly than the and act or react faster than the enemy
enemy. Agility requires sound judgment and rapid decision to gain a relative advantage and control
making, often gained through the creation and exploitation of the terms and tempo of the battle. They
information advantages. Agility requires leaders to anticipate ensure formations are flexible enough to
needs or opportunities, and it requires trained formations able adapt to changing conditions and can
move more quickly than the enemy.
to change direction, tasks, or focus as quickly as the situation
During competition, Army forces provide
requires. Change may come in the form of a transition
senior leaders flexibility and options
between phases of an operation or the requirement to adapt to
through their presence, access, and
a new opportunity or hazard.
influence.
3-9. The time available to create and exploit opportunities
against adaptive threats is usually limited. Agile units rapidly recognize an opportunity and take action to
exploit it. Speed of recognition, decision making, movement, and battle drills enable agility. During armed
conflict, this often requires units to change their location and disposition rapidly. Units must be able to
employ capabilities and then rapidly task-organize them again for movement or new tasks while remaining
dispersed for survivability. C2 and sustainment nodes must maintain a level of functionality on the move and
be able to rapidly emplace and displace in order to reduce the probability of enemy detection. Nodes that are
critical to success and susceptible to enemy detection and destruction are most vulnerable, and they must be
the most agile.
3-10. Below the threshold of armed conflict, security force assistance teams and forward-stationed and
rotational forces provide agility to the CCDR because they are able to perform a wide variety of missions
and create options for the combatant command. These forces expand situational awareness through their
presence and access to key land areas and populations. Their influence assures allies and partners, and they
improve interoperability and agility of the multinational force.
3-11. Agility helps leaders influence tempo. Tempo is the relative speed and rhythm of military operations
over time with respect to the enemy (ADP 3-0). It implies the ability to understand, decide, act, assess, and
adapt. During competition, commanders act quickly to control events and deny enemy forces relative
advantages. By acting faster than the situation deteriorates, commanders can change the dynamics of a crisis
and restore favorable conditions. During armed conflict, commanders normally seek to maintain a higher
tempo than enemy forces do. A rapid tempo can overwhelm an enemy force’s ability to counter friendly
actions, and it can enable friendly forces to exploit a short window of opportunity.
CONVERGENCE
3-12. Convergence is an outcome created by the concerted employment of capabilities from multiple
domains and echelons against combinations of decisive points in any domain to create effects against
a system, formation, decision maker, or in a specific geographic area. Its utility derives from
understanding the interdependent relationships among capabilities from different domains and combining
those capabilities in surprising, effective tactics that accrue advantages over time. When combined, the
complementary and reinforcing nature of each friendly capability presents multiple dilemmas for enemy
forces and produces an overall effect that is greater than the sum of each individual effect. The greater degree
to which forces achieve convergence and sustain it over time the more favorable the outcome.
3-13. Convergence occurs when a higher echelon and its
subordinate echelons create effects from and in multiple Convergence creates exploitable
domains in ways that defeat or disrupt enemy forces long opportunities that enable freedom of
enough for friendly forces to effectively exploit the action and mission accomplishment.
opportunity. Convergence broadens the scope of mass,
synchronization, and combined arms, by applying combat power to combinations of decisive points, instead
of just one, across time, space, and domains. Convergence is a way to balance the principles of mass,
objective, and economy of force, massing combat power on some parts of the enemy force while employing
different techniques against other decisive points to create cumulative effects the enemy cannot overcome. |
3-0 | 62 | Chapter 3
3-14. Convergence requires the synchronization of specific targets and broad objectives by the senior tactical
echelon below the land component command. The degree to which a formation achieves convergence in an
operation depends on how well leaders are able to—
(cid:122) Develop an understanding of the enemy system, its capabilities, requirements, decision processes,
and vulnerabilities through effective surveillance that provides mixed, redundant, and overlapping
coverage.
(cid:122) Determine the desired overall effect or opportunity and the individual effects and objectives that
precipitate the opportunity.
(cid:122) Integrate Army and joint capabilities at the echelons where they are most effective.
(cid:122) Consider all domains and redundant methods of attack to increase the probability of success.
(cid:122) Synchronize the employment of each capability and echelon to generate simultaneous, sequential,
and enduring effects against the enemy system.
(cid:122) Assess the individual effects and the probability that the desired overall effect has been achieved.
Commanders prepare to re-attack or adapt a course of action if the desired effect is not achieved,
or if other opportunities emerge.
(cid:122) Assume risk and rapidly exploit the opportunities convergence provides.
(See figure 3-1 for a simplified illustration of convergence. See JP 3-60 for more information about targeting.)
Figure 3-1. Convergence
Integration
3-15. Convergence requires the integration of the capabilities at the echelons where their employment is
most effective. Integration is the arrangement of military forces and their actions to create a force that
operates by engaging as a whole (JP 1, Volume 1). Commanders generally integrate Army capabilities |
3-0 | 63 | Fundamentals of Operations
through task organization and support relationships. Commanders allocate the employment of joint
capabilities to subordinate echelons; integrating these capabilities requires an understanding of joint
processes. The degree to which commanders effectively integrate joint and Army capabilities at all echelons
directly influences success during operations.
3-16. Military forces comprise a wide variety of components that leaders must arrange into a coherent and
effective whole. Army leaders integrate—
(cid:122) Joint capabilities.
(cid:122) Multinational, interagency, and interorganizational capabilities.
(cid:122) Echelons and staffs.
(cid:122) Different types of units to achieve a combined arms approach.
3-17. Almost every leader activity, in some way, orients on integrating parts of the force to achieve unity of
purpose and unity of effort. There are many intellectual tools leaders use to facilitate integration. Common
ones include—
(cid:122) The joint and Army targeting processes (which includes working groups, boards, and other
activities to help integrate joint intelligence, surveillance, and reconnaissance [ISR] and fires).
(cid:122) Mission analysis to integrate the activities of multiple staff proponents.
(cid:122) The nesting concept advocated for in the mission command approach to C2 that helps lower
echelons integrate their purpose with higher echelons.
(cid:122) Reception, staging, onward movement, and integration (RSOI) for new forces entering an
operation.
(cid:122) Engagement area development to integrate all weapons systems into a defense.
Synchronization
3-18. Once leaders have integrated the right capabilities, they must synchronize their employment and
effects. Synchronization is the arrangement of military actions in time, space, and purpose to produce
maximum relative combat power at a decisive place and time (JP 2-0).
3-19. Understanding the following factors enables leaders to determine when to initiate employment of a
capability and how to adapt to changes in the operational environment during execution:
(cid:122) The desired overall effect over time.
(cid:122) How the individual effects complement each other over time.
(cid:122) The time it takes each capability or formation to generate its individual effects from the start of
employment.
(cid:122) Whether each individual effect is enduring, simultaneous, or sequenced with the other effects.
(cid:122) The consequences of an individual effect not occurring at the planned time.
3-20. Individual effects can be enduring, simultaneous, or sequential. Enduring effects provide a continuous
impact on the threat until they are no longer necessary. Enduring effects can have a debilitating effect on
enemy forces, but they may require significant resources to sustain. Simultaneity is the execution of related
and mutually supporting tasks at the same time across multiple locations and domains (ADP 3-0).
Simultaneous effects, the result of attacking enemy forces in multiple domains at the same time and across
the depth of the enemy’s echelons, can have a paralyzing effect on enemy decision making and the
effectiveness of the enemy’s most critical systems for a limited period of time. They can degrade enemy
reactions and facilitate the path to eventual culmination and defeat. Sequencing effects against a threat can
create successive dilemmas and opportunities for deception when enemy forces begin to expect a pattern.
3-21. Leaders synchronize actions and effects through C2 and the operations process. The mission,
commander’s intent, and concept of operations form the basis for detailed synchronization. Commanders
determine the degree of control necessary to synchronize operations. They balance synchronization with
agility and initiative, but they never surrender the initiative for the sake of synchronization. Excessive
synchronization can lead to too much control, which limits the initiative of subordinates and undermines
mission command. |
3-0 | 64 | Chapter 3
Achieving Convergence
3-22. Achieving convergence requires detailed, centralized planning and mission orders that enable
decentralized execution. Redundant and resilient communications enable synchronized action. However,
leaders must anticipate degraded communications and be prepared to rely on mission orders, accept risk, and
make decisions to accomplish the mission. During execution, leaders seek to maintain the conditions of
convergence through rapid transitions, adjusting priorities, shifting the main effort, or adapting to maintain
momentum. Longer periods of convergence allow for greater opportunities to expand advantages and achieve
objectives.
3-23. Leaders must understand the various processes for requesting joint capabilities and integrating them
with ground maneuver. Air, space, and cyberspace tasking cycles operate on different time horizons and have
different requirements for requesting effects. These cycles may vary depending on the theater and the
situation. Whenever possible, leaders anticipate requirements for these effects during planning and provide
ample time for the joint force to generate them. Leaders may request effects on shorter timelines, but they
should not make them essential to mission success.
3-24. During competition, the theater army establishes conditions for convergence that enable deterrence,
provide options during crisis, and enable success at the outset of armed conflict. Intelligence, sustainment,
positioning of forces, and other activities to set the theater facilitate situational understanding, decision
making, integration, and synchronization during armed conflict. The theater army requests cyberspace and
space effects through the combatant command to ensure there is enough time to integrate and synchronize
these capabilities. The theater army balances the use of these capabilities during competition with the need
to preserve them for use by Army formations during crisis or armed conflict. When armed conflict occurs in
a theater, the theater army continues to facilitate convergence by providing capabilities to the land component
command and shaping the operational environment outside the joint operational area.
3-25. During armed conflict, the land component command apportions joint capabilities to subordinate
echelons. Corps integrate joint capabilities with ground maneuver at the appropriate echelon where forces
employ them to achieve convergence and achieve objectives. The advantages provided by maritime, air,
space, and cyberspace capabilities will not be available all the time, so tactical echelons must be ready to
exploit their effects when generated. (See FM 3-14 for more information on space effects. See FM 3-12 for
more information on cyberspace effects.)
3-26. Convergence is most effective when its effects accrue and create a cycle of expanding opportunity.
Employing multiple and redundant methods of attack increases the probability of success by avoiding
dependence on a single method of detecting, tracking, and attacking. Success causes enemy forces to react
and activate more of their capabilities, creating another opportunity in one or more domains. The corps and
its subordinate echelons align their operations on land with the opportunities created by the effects generated
by the other components of the joint force, preserving combat power to maximize their ability to exploit the
opportunities convergence presents.
ENDURANCE
3-27. Endurance is the ability to persevere over time throughout the depth of an operational
environment. Endurance enhances the ability to project combat power and extends operational reach.
Endurance is about resilience and preserving combat power while continuing operations for as long as is
necessary to achieve the desired outcome. During competition, Army forces improve endurance by setting
the theater across all warfighting functions and improving interoperability with allies and other unified action
partners.
3-28. Endurance reflects the ability to employ combat power
anywhere for protracted periods in all conditions, including Leaders account for the requirement to
environments with degraded communications, chemical, preserve combat power while sustaining
biological, radiological, and nuclear (CBRN) contamination, people, systems, and formations over the
and high casualties. Endurance stems from the ability to time and distance necessary throughout
organize, protect, and sustain a force, regardless of the the depth of an area of operations.
distance from its support area and the austerity of the |
3-0 | 65 | Fundamentals of Operations
environment. Endurance involves anticipating requirements and making the most effective and efficient use
of resources.
3-29. As forces fight through successive engagements, maintaining mutual support among units helps
prevent them becoming isolated, being defeated in detail, and culminating early. Protection prevents or
mitigates enemy effects and preserves combat power, postponing culmination and prolonging effective
operations. One way Army forces preserve combat power is by maintaining dispersion to the greatest degree
possible. Leaders can mass combat power from dispersed positions and generate the desired effects without
concentrating forces any more than is necessary. During operations, commanders and staffs integrate,
synchronize, and simultaneously apply protection capabilities.
3-30. Leadership and tactics contribute to endurance. Plans that allow for different units to be the main effort
using follow and support or follow and assume techniques prevent early culmination in the units first
committed to close combat. Realistically determining what tempo friendly forces can maintain given enemy
resistance, weather, and physical distances and the impact they have on Soldiers, leaders, and equipment
increases endurance over time. Schemes of maneuver that avoid enemy strengths and preserve combat power
are less likely to negatively affect morale.
3-31. Sustainment operations are essential to endurance. Using all methods for continuously delivering
sustainment through land, maritime, and air capabilities improves endurance. When possible, sustainment
units employ a space- and cyberspace-enabled communications network to transmit sustainment
requirements and coordinate the delivery of materiel or services. However, leaders must anticipate degraded
communications and combine analog systems for communication with predictive analysis and disciplined
initiative to ensure commanders can maintain acceptable tempo for as long as necessary.
DEPTH
3-32. Depth is the extension of operations in time, space, or purpose to achieve definitive results (ADP 3-0).
While the focus of endurance is on friendly combat power, the focus of depth is on enemy locations and
dispositions across all domains. Commanders achieve depth by understanding the strengths and
vulnerabilities of the enemy’s echeloned capabilities, then attacking them throughout their dispositions in
simultaneous and sequential fashion. Although simultaneous attacks through all domains in depth are not
possible in every situation, leaders seek to expand their advantages and limit enemy opportunities for
sanctuary and regeneration. Leaders describe the depth they can achieve in terms of operational reach.
3-33. Operational reach is the distance and duration across which a force can successfully employ military
capabilities (JP 3-0). Staffs assess operational reach based on available sustainment, the range of capabilities
and formations, and courses of action compared with the intelligence estimates of enemy capabilities and
courses of action. This analysis helps the commander understand the limits on friendly operations, the risks
inherent in the mission, and likely points in time and space for transitions.
3-34. Below the threshold of armed conflict, the theater army creates depth by improving the infrastructure
for force projection and by improving interoperability with multinational forces to the degree required by
operation plans (OPLANs) and contingency operations. It also adds depth to its operations by expanding
influence with allies and partners, populations, and other relevant actors through joint exercises, sustained
forward positioning of advisor teams, and forward basing of combat formations.
3-35. During armed conflict, the JFLCC creates depth by facilitating access to Army and other joint
capabilities, especially space and cyberspace capabilities that improve the protection of tactical formations
and degrade enemy integrated air defense systems. The JFLCC also requests that the JFC influence the
extended deep area in support of land operations. The corps directs fires into its deep area to defeat enemy
long-range fires, disrupt enemy sustainment and C2, separate maneuver echelons, and shape the success of
future close operations. Special operations forces operating in the extended deep area can detect targets and
enable the employment of joint fires to support conventional operations.
3-36. Leaders enhance the depth of their operations by orchestrating effects in one dimension to amplify
effects in the others. For example, a commander might decide to destroy an elite enemy formation first
because it undermines the confidence of the enemy’s other units. Commanders exploit this through
information activities to reduce the will of other enemy forces to fight. |
3-0 | 66 | Chapter 3
IMPERATIVES
3-37. Imperatives are actions Army forces must take to defeat enemy forces and achieve objectives at
acceptable cost. They are informed by the operational environment and the characteristics of the most capable
threats Army forces can encounter. Imperatives include—
(cid:122) See yourself, see the enemy, and understand the operational environment.
(cid:122) Account for being under constant observation and all forms of enemy contact.
(cid:122) Create and exploit relative physical, information, and human advantages in pursuit of decision
dominance.
(cid:122) Make initial contact with the smallest element possible.
(cid:122) Impose multiple dilemmas on the enemy.
(cid:122) Anticipate, plan, and execute transitions.
(cid:122) Designate, weight, and sustain the main effort.
(cid:122) Consolidate gains continuously.
(cid:122) Understand and manage the effects of operations on units and Soldiers.
SEE YOURSELF, SEE THE ENEMY, AND UNDERSTAND THE OPERATIONAL ENVIRONMENT
3-38. Commanders visualize operational environments in terms of the factors that are relevant to decision
making. Operational environments are dynamic and contain vast amounts of information that can overload
C2 systems and impede decision making. Commanders simplify information collection, analysis, and
decision making by focusing on how they see themselves, see the enemy, and understand the operational
environment. These three categories of factors are interrelated, and leaders must understand how each one
relates to the others in the current context.
3-39. As part of the operations process, Army leaders use different methodologies to understand and weigh
options. These methodologies include the Army design methodology, the military decision-making process,
and the rapid decision-making and synchronization process. Each methodology provides a process that allows
commanders and staffs to see themselves, see the enemy, and understand the operational environment. (See
ADP 5-0 and FM 5-0 for more information on Army planning methodologies.)
See Yourself
3-40. Commanders develop an understanding of their forces relative to mission requirements, enemy
capabilities, and impacts from the operational environment. This understanding helps to inform current and
potential future advantages relative to enemy forces, allowing staffs to develop and adapt courses of action
that exploit advantages and mitigate disadvantages. Commanders and staffs maintain this understanding of
their forces through running estimates, subordinate commander updates, and friendly forces information
requirements (known as FFIRs): A friendly force information requirement is information the commander and
staff need to understand the status of friendly force and supporting capabilities (JP 3-0). Friendly force
information requirements identify the information the commander considers most important to make critical
decisions during the execution of operations. The operations officer manages friendly force information
requirements for the commander.
3-41. Leaders attempt to see themselves from the enemy perspective, in part by understanding essential
elements of friendly information. An essential element of friendly information is a critical aspect of a friendly
operation that, if known by a threat would subsequently compromise, lead to failure, or limit success of the
operation and therefore should be protected from enemy detection (ADP 6-0).
3-42. Leaders see their formation in relation to their mission and in the broader context of the higher
command, adjacent unit, and all domains. Part of “seeing yourself” is understanding how land-based
operations enable operations in the other domains, and how capabilities from all domains can enable
operations on land. (See paragraphs 2-66 through 2-67 for a discussion of joint interdependence.) |
3-0 | 67 | Fundamentals of Operations
See the Enemy
3-43. Commanders see the enemy in terms of its combat power, advantages, and intentions within the
operational environment and broader strategic context. Commanders develop their understanding of enemy
forces from their individual knowledge, experience, and judgment honed through self-study, training, and
education. From this base of knowledge commanders and staffs build shared understanding of enemy forces
and environment through intelligence preparation of the battlefield. Intelligence preparation of the battlefield
is the systematic process of analyzing the mission variables of enemy, terrain, weather, and civil
considerations in an area of interest to determine their effect on operations (ATP 2-01.3).
3-44. Intelligence preparation of the battlefield provides commanders with awareness of information gaps
about enemy forces and the operational environment. Staffs translate these gaps into information
requirements and assist the commander in determining priority intelligence requirements. A priority
intelligence requirement is the intelligence component of commander’s critical information requirements
used to focus the employment of limited intelligence assets and resources against competing demands for
intelligence support (JP 2-0). More importantly, priority intelligence requirements (known as PIRs) identify
information about the threat and operational environment that a commander considers most important to
making decisions in a specific context. Intelligence about civil considerations may be as critical as
intelligence about enemy forces in some cases. The intelligence officer, in coordination with the rest of the
staff, manages priority intelligence requirements for the commander.
3-45. Enemy forces attempt to hide from, deceive, disrupt, and deny friendly collection efforts to prevent
friendly forces from perceiving the enemy’s true intentions. This requires commanders plan to develop the
situation through action and fight for information. Information collection operations may require the
commander to assume significant risk to determine enemy dispositions and anticipate enemy intentions.
3-46. Leaders do not limit their understanding of the enemy to those forces in their assigned area. Enemy
forces are capable of employing capabilities from great distances and multiple domains. Leaders must be
aware of those capabilities so they can take appropriate action. (See paragraphs 3-75 through 3-79 for more
information on making enemy contact.)
Understand the Operational Environment
3-47. Leaders view the operational environment in terms of domains, dimensions, operational variables, and
mission variables that are relevant to their decisions. The most difficult aspect of an operational environment
to understand is how the different factors interact to affect operations.
3-48. Understanding is, in the context of decision making, knowledge that has been synthesized and had
judgment applied to comprehend the situation’s inner relationships, enable decision making, and drive action
(ADP 6-0). Understanding is judgment applied to knowledge in the context of a particular situation.
Understanding is knowing enough about a situation to make an informed decision. Judgment is based on
experience, expertise, and intuition—and it informs what decision to make.
Situational Understanding
3-49. Successful operations demand timely and effective decisions based on the information available. As
such, commanders and staffs seek to build and maintain situational understanding throughout an operation.
Situational understanding is the product of applying analysis and judgment to relevant information to
determine the relationships among the operational and mission variables (ADP 6-0). Situational
understanding allows commanders to make effective decisions and enables commanders and staffs to assess
operations accurately. Commanders and staffs continually strive to maintain their situational understanding
and work through periods of uncertainty, accepting that they cannot eliminate them. They train their staffs
and subordinates to function in uncertain environments.
Shared Understanding
3-50. A critical challenge for commanders, staffs, and unified action partners is creating common
understanding of an operational environment, an operation’s purpose, its challenges, and the approaches to |
3-0 | 68 | Chapter 3
solving those problems. Shared understanding of the situation, which requires effective flow of information
between echelons, forms the basis for unity of effort and subordinate initiative.
3-51. Effective decentralized execution depends on shared understanding. Shared understanding starts with
Army doctrine and leader development that instill a common approach to the conduct of operations, a
common professional language, and a common understanding of the principles of mission command. It is
this shared understanding that allows even hastily task-organized units to operate effectively. Commanders
and staffs actively create shared understanding throughout the operations process (of planning, preparation,
execution, and assessment). They collaboratively frame an operational environment and its problems, and
then they visualize approaches to solving those problems. (See ADP 6-0 for a more detailed description of
shared understanding.)
Common Operational Picture
3-52. A common operational picture (COP) is key to achieving and maintaining shared situational
understanding in all domains and making effective decisions faster than the threat. The common operational
picture is a display of relevant information within a commander’s area of interest tailored to the user’s
requirements and based on common data and information shared by more than one command (ADP 6-0).
Although the COP is ideally a single display, it may include more than one display and information in other
forms, such as graphic representations or written reports.
3-53. The COP facilitates collaborative planning and helps commanders at all echelons achieve shared
situational understanding. The COP must account for relevant factors in domains affecting the operation, and
it provides and enables a common understanding of the interrelationships between actions and effects through
the physical, information, and human dimensions. Shared situational understanding allows commanders to
visualize the effects of their decisions on other elements of the force and the overall operation.
3-54. Command posts draw on a common set of shared and relevant information to create a digital COP.
Units always maintain an analog COP in the event that the digital COP is compromised. During large-scale
combat operations, communications are likely to be degraded or denied during the course of operations.
Army forces maintain shared situational understanding by updating physical maps and graphics, and using
rehearsed and reliable primary, alternate, contingency, and emergency (known as PACE) communication
plans. Command posts are typically responsible for maintaining the digital and analog COP. Units develop
standard operating procedures (known as SOPs), reporting timelines, and battle rhythm events to ensure the
COP is accurate, relevant, and current.
3-55. The difficulty of maintaining a COP in a multinational environment varies based on training level,
language differences, level of data sharing, technical compatibility of systems, restrictions based on
classification, and other national caveats. Unified action partners may not have the technical capability or
compatible systems to create and share a digital COP. Commanders must recognize and plan for this
possibility by using alternate methods, such as liaison officers, messengers, and voice communication.
ACCOUNT FOR BEING UNDER CONSTANT OBSERVATION AND ALL FORMS OF ENEMY
CONTACT
3-56. Air, space, and cyberspace capabilities increase the
likelihood that threat forces can gain and maintain That which can be detected can be
targeted for attack and killed.
continuous visual and electromagnetic contact with Army
forces. Enemy forces possess a wide range of space-, air-,
maritime-, and land-based ISR capabilities that can detect U.S. forces. Leaders must assume they are under
constant observation from one or more domains and continuously ensure they are not providing lucrative
targets for the enemy to attack.
3-57. Leaders consider nine forms of contact in multiple domains. They are—
(cid:122) Direct: interactions from line-of-sight weapon systems (including small arms, heavy machine
guns, and antitank missiles).
(cid:122) Indirect: interactions from non-line-of-sight weapons systems (including cannon artillery, mortars,
and rockets). |
3-0 | 69 | Fundamentals of Operations
(cid:122) Non-hostile: neutral interactions that may degrade or compromise military operations (including
civilians on the battlefield).
(cid:122) Obstacle: interactions from friendly, enemy, and natural obstacles (including minefields and
rivers).
(cid:122) CBRN: interactions from friendly, enemy, and civilian CBRN effects (including chemical attacks,
nuclear attacks, industrial accidents, and toxic or hazardous industrial materials).
(cid:122) Aerial: interactions from air-based combat platforms (including attack helicopters, armed
unmanned aircraft systems [UASs], air interdiction, and close air support).
(cid:122) Visual: interactions from acquisition via the human eye, optical, or electro-optical systems
(including ground reconnaissance, telescopic, thermal, and infrared sights on weapons and sensor
platforms such as unmanned aircraft systems and satellites).
(cid:122) Electromagnetic: interactions via systems used to acquire, degrade, or destroy using select portions
of the electromagnetic spectrum (including radar, jamming, cyberspace, space, and
electromagnetic systems).
(cid:122) Influence: interactions through the information dimension intended to shape the perceptions,
behaviors, and decision making of people relative to a policy or military objective (including
through social media, telecommunications, human interaction, and other forms of
communication).
3-58. In all contexts, direct, indirect, non-hostile, CBRN, and aerial contacts are sporadic. However, Army
forces are typically in continuous visual, electromagnetic, and influence contact with adversaries. Army
forces are under persistent visual surveillance by space and other capabilities. Army forces and individuals
are in constant electromagnetic contact with adversaries who persistently probe and disrupt individual, group,
and Army capabilities dependent on space and cyberspace. Army forces are subject to adversary influence
through disinformation campaigns targeting Soldiers and their family and friends through social media and
other platforms.
3-59. During competition, adversary forces employ multiple methods of collecting on friendly forces to
develop an understanding of U.S. capabilities, readiness status, and intentions. They do this in and outside
the continental United States. They co-opt civilians and employ space-based surveillance platforms to
observe unit training and deployment activities. They also penetrate networks and gain access to individual
and group cyberspace personas to create options for future intimidation, coercion, and attack. Soldiers and
their families should use telecommunications, the internet, and social media in ways that do not make them
or their units vulnerable to adversary surveillance.
3-60. During armed conflict, enemy networked land-, maritime-, air-, and space-based capabilities enable
threats to detect and rapidly target friendly forces with fires. Forces that are concentrated and static are easy
for enemy forces to detect and destroy. Dispersing forces has multiple survivability benefits. It increases
opportunities to use cover and concealment to reduce probability of detection. In the event the enemy detects
elements of the friendly force, dispersion acts as a form of deception, helping to conceal the intentions of the
friendly force. Leaders only concentrate forces when necessary and balance the survivability benefits of
dispersion with the negative impacts dispersion has on mission effectiveness. In addition to dispersion,
leaders integrate and synchronize deception, operations security, and other actions to thwart enemy detection
efforts. (See JP 3-13.3 and ATP 3-13.3 for detailed information on operations security. See FM 3-13.4 for
more information on deception.)
3-61. Command posts are extremely vulnerable to detection from air and space, as well as in the
electromagnetic spectrum. Army forces must ensure their command posts are difficult to detect, dispersed to
prevent a single strike from destroying more than one node, and rapidly displaceable. Once a command post
is detected it has only a few minutes to displace far enough to avoid enemy indirect fire effects. Leaders
should focus command posts on the minimum functions necessary to retain their mobility and do everything
possible to avoid detection. When the risk of enemy fires is high, commanders consider making their
operations more decentralized, dispersing command post nodes into smaller component nodes, and greater
dispersion of electromagnetic signatures. Use of existing hardened structures and restrictive terrain to conceal
headquarters equipment and vehicles, instead of tents organized in standard configurations, are options
commanders have to improve command post survivability. |
3-0 | 70 | Chapter 3
Account for Constant Enemy Observation
3-62. Enemy forces possess a wide range of space-, air-, maritime-, and land-based reconnaissance and
surveillance capabilities that can detect U.S. forces. To counter these robust and persistent capabilities
requires counterintelligence efforts and the disciplined application of operations security.
3-63. Enemy forces employ UASs in large numbers and with a diverse array of capabilities. Leaders account
for enemy capabilities and likely reconnaissance objectives as they develop their counter-UAS plan. Leaders
implement techniques and procedures for countering enemy UASs based on their organic capabilities,
attached capabilities, and the mission variables.
3-64. Leaders combine multiple measures, including deception, to make it more difficult for enemy forces
to detect friendly forces. These measures include—
(cid:122) Counterreconnaissance, including counter-UAS operations.
(cid:122) Cover and concealment, both natural and manmade.
(cid:122) False battle positions and deception obstacles.
(cid:122) Obscuration.
(cid:122) Dispersion.
(cid:122) Noise and light discipline.
(cid:122) Limited visibility operations, particularly for sustainment functions and large unit movements.
(cid:122) Electromagnetic emission control and masking, to include social media and personal
communication discipline.
3-65. Because Army forces employ an increasing number of capabilities that emit electromagnetic radiation
that enemies can target, leaders must apply emission control measures, balancing the risks to the force with
the risks to the mission. As risk to the force increases, leaders increase their emission control measures. There
may be times that the risk of friendly emissions being detected and targeted is assessed as too high, causing
Army forces to use methods of communications with no electromagnetic signature. Understanding threat
systems, their capabilities, and their disposition supports effective planning and the execution of emission
control measures including—
(cid:122) Minimizing length and frequency of radio transmissions.
(cid:122) Dispersing formations and command posts.
(cid:122) Using lowest effective power settings.
(cid:122) Establishing and enforcing the primary, alternate, contingency, and emergency communication
plan.
(cid:122) Using remote antennas.
(cid:122) Using brevity codes, pro-word execution matrices, and communications windows.
(cid:122) Using secure landlines.
(cid:122) Using directional antennas.
(cid:122) Using data-burst transmissions.
(cid:122) Using proper encryption and equipment configuration.
(cid:122) Moving command posts and formations.
(cid:122) Masking emissions using terrain and manmade structures.
(cid:122) Recognizing and reporting jamming of Global Positioning System, radar, and satellite
communications.
(cid:122) Employing deceptive emitters.
Implementing Dispersion
3-66. Leader efforts to preempt and mitigate enemy detection are essential, but they cannot eliminate the risk
of enemy massed and precision fires, including CBRN and weapons of mass destruction. To improve
survivability from enemy indirect fires, Army forces maintain dispersion and remain as mobile as possible
to avoid presenting themselves as lucrative targets to the enemy’s most capable systems. When mission |
3-0 | 71 | Fundamentals of Operations
demands require units to remain static for more than short periods of time, those units must dig in to increase
survivability. (See ATP 3-37.34 for information on survivability positions.)
3-67. Commanders have options for achieving dispersion. At the operational level, commanders maintain
dispersion by employing multiple staging areas and multiple lines of communications. At the tactical level,
commanders maintain dispersion by increasing the distance between subordinate formations and among the
elements in those formations. In the attack, they use multiple routes and longer march intervals between
formations to the objective and only concentrate forces enough to mass effects or generate favorable force
ratios during close combat. In the defense, forces occupy areas away from prepared defensive positions until
contact is imminent to prevent their detection and destruction by enemy deep fires. Defending forces also
maximize dispersion by using terrain and employing the maximum supporting ranges and distances within
acceptable risk criteria.
3-68. When concentrating forces is unavoidable or necessary, units remain concentrated at the lowest level
and for the shortest time possible and then rapidly disperse. When the desired level of dispersion is not
achievable, commanders place greater emphasis on imposing multiple, simultaneous dilemmas on enemy
forces as they move within range of enemy weapons systems. This can reduce the risk of enemy forces
efficiently massing their effects. Commanders also use speed and violence of action when dispersion is not
possible to minimize exposure in high-risk areas.
Second Nagorno Karabakh War: September–November 2020
During the six-week war, Azerbaijan exploited its technological advantage with lethal
efficiency against Armenian forces. Azerbaijan used its UASs, in conjunction with
Israeli loiter munitions and modified old Soviet AN-2 planes, to defeat Armenia’s older
air defense systems. Azerbaijani forces flew the remotely piloted AN-2s to trigger
engagements from Armenia’s air defense systems, while Azerbaijan’s UASs and loiter
munitions remained at higher altitudes undetected or out of range. When the air
defense systems engaged targets, Azerbaijan pinpointed the air defense systems
locations and destroyed those systems with UASs, loiter munitions, or indirect fires.
Azerbaijan’s tactics caused Armenia’s air defense network to collapse, and Azerbaijan
gained local air superiority over the battlefield.
With air superiority, Azerbaijan placed Armenian forces under continuous surveillance
with its UASs. In addition, Azerbaijani forces had infiltrated special operations forces
to conduct surveillance of Armenian positions. Armenian forces were unable to remain
hidden, and Azerbaijan began destroying Armenian tanks, artillery, and vehicles at a
significant rate. Although battle damage assessments vary, multiple sources reported
that Azerbaijan destroyed hundreds of Armenian tanks, armored fighting vehicles,
artillery systems, multiple launch rocket systems, and air defense systems. The
inability to hide and fear of destruction had a demoralizing effect on Armenian soldiers.
CREATE AND EXPLOIT RELATIVE PHYSICAL, INFORMATION, AND HUMAN ADVANTAGES IN
PURSUIT OF DECISION DOMINANCE
3-69. The employment of lethal force is based on the premise that destruction and other physical
consequences compels enemy forces to change their decision making and behavior, ultimately accepting
defeat. The type, amount, and ways in which lethal force compels enemy forces varies, and this depends
heavily on enemy forces, their capabilities, goals, and the will of relevant populations. Understanding the
relationship between physical, information, and human factors enables leaders to take advantage of every
opportunity and limit the negative effects of undesirable and unintended consequences.
3-70. Actions taken focused on one dimension can create advantages in the other dimensions. The physical
dimension dominates tactical actions and the employment of destructive force to compel an outcome.
Physical actions, particularly the employment of violence, usually generate cognitive effects in the human |
3-0 | 72 | Chapter 3
dimension. Information dimension factors inform and reflect the interaction between human and physical
factors. The information dimension deals with how relevant actors and populations communicate what is
happening in the physical and human dimensions. The human dimension is where perceptions, decision
making, and behavior is determined, and is therefore the dimension that ultimately determines human will.
Commanders combine, reinforce, and exploit advantages through all the dimensions, expanding them as they
accrue over time. (See Chapter 1 for more information about physical, information, and human advantages.)
3-71. During competition and crisis, Army forces set conditions for armed conflict and physically exhibit
combat readiness through training and exercises which is communicated by various means to create a
deterrent effect in the human dimension. During armed conflict, tactical leaders typically focus on generating
physical advantages and the immediate physical and cognitive effects they produce. However, leaders
maintain awareness of the overall purpose of physical effects, ensuring they commit combat power to
necessary objectives that produce advantageous results in all dimensions. At the strategic level, leaders focus
more heavily on the information and human impacts of physical effects and how to convert them into
desirable policy outcomes.
3-72. Successful military operations often depend on a commander's ability to gain and maintain the
operational initiative by achieving decision dominance—a desired state in which a force generates decisions,
counters threat information warfare capabilities, strengthens friendly morale and will, and affects threat
decision making more effectively than the opponent. Decision dominance requires developing a variety of
information advantages relative to that of the threat and then exploiting those advantages to achieve
objectives. Commanders employ relevant military capabilities from all warfighting functions to create and
exploit decision dominance.
3-73. Decision dominance is aspirational, situationally dependent, and always relative to an opponent. The
goal is to understand, decide, and act faster and more effectively than the threat. It is not absolute speed that
matters, but speed relative to the threat. Commanders can achieve this by interfering with an enemy force's
C2 while enhancing, protecting, and sustaining their own C2. An advantage need not be large. A small
advantage exploited repeatedly can contribute decisively to the success of Army forces. The ability and desire
to generate a higher tempo does not mean commanders should act when the situation calls for waiting. The
aim is meaningful—not merely rapid—action. A decision to act is meaningful only if the resulting actions
by friendly forces create an advantage relative to the threat.
3-74. Adversaries and enemies pursue their own relative advantages, typically in asymmetric ways, while
continually attempting to achieve decision dominance over friendly forces. Because threat forces adapt, and
situations evolve, decision dominance is relative and transitory. Commanders therefore continuously make
assessments to determine which forms of relative advantage are most important to pursue over time.
MAKE INITIAL CONTACT WITH THE SMALLEST ELEMENT POSSIBLE
3-75. Army forces are extremely vulnerable when they do not sufficiently understand the disposition of
enemy forces and become decisively engaged on terms favorable to enemy forces. To avoid being surprised
and incurring heavy losses, leaders must set conditions for making enemy contact on terms favorable to the
friendly force. They anticipate when and where to make enemy contact, the probability and impact of making
enemy contact, and actions to take on contact. Quickly applying multiple capabilities against enemy forces
while preventing the bulk of the friendly force from being engaged itself requires an understanding of the
forms of contact.
3-76. During armed conflict at the tactical level,
commanders seek to gain and maintain contact with the Units seek to make contact using sensors
enemy using the smallest element possible, enabling rapid or unmanned systems first to minimize
development of situational understanding, and using risk to Soldiers and key capabilities.
maneuver and fires to attack enemy forces in the most
advantageous way. Judicious employment of all available reconnaissance and security capabilities is the most
effective way to make direct contact with the smallest possible friendly force. Friendly forces should attempt
to make contact with sensors and unmanned systems first, incorporating them into their movement
techniques. Employment of UAS and other platforms activates enemy systems and enables their detection
without creating risks to manned friendly reconnaissance and maneuver forces. After detecting an enemy |
3-0 | 73 | Fundamentals of Operations
capability, Army forces cue intelligence platforms from other domains to improve their understanding of
enemy force dispositions and engage those forces on advantageous terms.
3-77. Identifying enemy locations may not provide enough information for Army forces to discern enemy
intentions. Commanders develop the situation through action when they deliberately place forces in contact.
Small maneuver forces are often the most effective way to compel enemy forces to react and show their
intentions. Leaders exercise tactical patience and set conditions for success. They synchronize maneuver with
complementary and reinforcing capabilities through the depth of an operational environment to generate
situational awareness and detect opportunities to exploit. By combining friendly speed with multiple
dilemmas, it is possible to rapidly disintegrate the coherence of an enemy formation before it can effectively
respond.
3-78. Using capabilities from multiple domains, such as air and ground, commanders cause threat systems
to activate or emit electromagnetic signals that reveal their capabilities and the locations of their critical
nodes, such as sensors, shooters, and command posts. During competition, commanders and staffs use this
information to improve understanding, update target lists, and refine plans for attacking threat vulnerabilities.
By doing this, commanders and staffs set conditions for success during armed conflict.
3-79. There are situations in which it is not advisable to make contact with the smallest possible element.
When commanders are confident they have superior forces, have the element of surprise, and know the
enemy’s disposition and course of action, they make contact with as much combat power as possible to
maximize surprise and shock effect against enemy forces.
IMPOSE MULTIPLE DILEMMAS ON THE ENEMY
3-80. Imposing multiple dilemmas on enemy forces complicates their decision making and forces them to
prioritize among competing options. It is a way of seizing the initiative and making enemy forces react to
friendly operations. Simultaneous operations encompassing multiple domains—conducted in depth and
supported by deception—present enemy forces with multiple dilemmas. Employing capabilities from
multiple domains degrades enemy freedom of action, reduces enemy flexibility and endurance, and disrupts
enemy plans and coordination. The application of capabilities in complementary and reinforcing ways creates
more problems than an enemy commander can solve, which erodes both enemy effectiveness and the will to
fight.
3-81. Deception contributes to creating multiple dilemmas, achieving operational surprise, and maintaining
the initiative. Deception efforts by tactical formations seek to delay enemy decision making until it is too late
to matter, or to cause an enemy commander to make the wrong decision. Deception requires an understanding
of how to surprise enemy forces; time to plan, prepare, execute, and assess a deception operation; and the
ability to properly resource the deception effort.
3-82. Deception inhibits effective enemy action by increasing the time, space, and resources necessary to
understand friendly courses of action. Well-executed deception begins a cumulative effect on enemy
decision-making cycles, and it can cause inaction, delay, misallocation of forces, and surprise as enemy forces
react to multiple real and false dilemmas. Attempts to mislead enemy forces are fundamental to all courses
of action development wherever possible. While commanders and staffs integrate deception as part of course
of action development, they take operations security measures to obscure friendly intentions, make enemy
forces account for multiple friendly courses of action for as long as possible, and ensure that enemy forces
do not become aware of the deception effort. (See JP 3-13.4 and FM 3-13.4 for more information on military
deception.)
3-83. Forcible entry operations and envelopments into locations offset from how enemy defenses are
oriented can create multiple dilemmas by dislocating enemy forces’ prepared operational approach or
exceeding their capability to respond. The capability to project power across operational distances presents
enemy forces with difficult decisions about how to array their forces in time and space. Rapid tactical
maneuver to exploit a penetration or envelopment defeats enemy attempts to reposition integrated fires
networks or integrated air defense systems, which in turn are typically less effective when moving.
3-84. Creating multiple dilemmas requires recognizing exploitable opportunities. Understanding enemy
dispositions, systems, and vulnerabilities, and the characteristics of the terrain and population, informs |
3-0 | 74 | Chapter 3
situational understanding and course of action development. Employing mutually supporting forces along
different axes to strike from unexpected directions creates dilemmas, particularly when Army and joint forces
simultaneously create effects against enemy forces in multiple domains. Commanders seek every opportunity
to make enemy forces operate in different directions at the time and locations of their choosing. Commanders
are not limited to destructive means for imposing multiple dilemmas on the enemy. For example, they can
employ psychological operations and civil affairs capabilities to influence and garner the support of civilian
populations. This creates a dilemma for enemy forces who must react and divert resources to counter passive
or active resistance.
ANTICIPATE, PLAN, AND EXECUTE TRANSITIONS
3-85. Transitions mark a change of focus in an operation. Leaders plan transitions as part of the initial plan
or parts of a branch or sequel. They can be unplanned and cause the force to react to unforeseen
circumstances. Transitions can be part of progress towards mission accomplishment, or they can reflect a
temporary setback. Common transitions are—
(cid:122) Between competition, crisis, and armed conflict.
(cid:122) Between operations dominated by offense, defense, and stability.
(cid:122) Between types of offense or defense.
(cid:122) Between phases of an operation.
(cid:122) Between branches and sequels of a campaign or major operation.
(cid:122) Between command posts during emplacement, movement, and displacement of one or more nodes.
(cid:122) Shifts of the main effort, supporting effort, and reserve between units.
(cid:122) Task organization changes.
(cid:122) Passing responsibility for enemy units crossing unit or echelon boundaries.
(cid:122) Passing terrain responsibility between units.
(cid:122) Transferring responsibility for security and governance to legitimate authorities.
(cid:122) Change in mission from combat operations to reconstitution.
(cid:122) Moving forces in and out of theater.
(cid:122) Changes in the environment that cause a reframe of the mission or change in the purpose of the
operation.
3-86. Transitions are critical planning responsibilities for commanders. They anticipate key transitions and
issue planning guidance to their staffs. Staffs in turn suggest to their commanders when transitions may be
necessary. Staffs monitor current operations and track conditions that require transition. Transitions are
typically points of friction or opportunities, and leaders assign subordinate leaders specific responsibilities
wherever transitions occur, for example, during passage of lines, at wet gap crossings, at contact points, and
along unit boundaries.
3-87. Effective transitions require planning and preparation well before their execution, so the force can
maintain the momentum and tempo of operations. Risks increase during transitions, so commanders establish
clear conditions for their execution. Commanders establish decision points to support successful transitions
during operations. The ability of echelons below brigade to execute battle drills mitigates some of the risks
higher echelons face during transitions.
3-88. A transition occurs for several reasons. An unexpected change in conditions may require commanders
to direct an abrupt transition. In such cases, the overall composition of the force remains unchanged despite
sudden changes in mission, task organization, and rules of engagement. Typically, task organization evolves
to meet changing conditions; however, transition planning must also account for changes in mission.
Commanders continuously assess the situation, re-task, re-organize, and cycle their forces in and out of close
combat to retain operational initiative. Commanders seek to shift priorities or the main effort without
necessitating operational pauses that make friendly forces more vulnerable to enemy action.
3-89. Commanders identify potential transitions during planning and account for them throughout execution.
Transition planning and preparation should include— |
3-0 | 75 | Fundamentals of Operations
(cid:122) Forecasting when and how to transition.
(cid:122) Arranging tasks to facilitate transitions.
(cid:122) Creating a task organization that anticipates transitions.
(cid:122) Rehearsing critical transitions, such as the transition from defense to offense.
(cid:122) Ensuring the force understands changes to rules of engagement during mission transitions.
(cid:122) Understanding potential unintended consequences and the risk they pose to successful transition.
3-90. Commanders and staffs account for the time required to plan, prepare, execute, and assess transitions,
accounting for likely friction due to the environment, degraded communications, and enemy action.
Assessment ensures that commanders measure progress toward such transitions and take appropriate actions
to prepare for and execute them.
DESIGNATE, WEIGHT, AND SUSTAIN THE MAIN EFFORT
3-91. Commanders frequently face competing demands for limited resources. They resolve these competing
demands by establishing priorities. One way in which commanders establish priorities is by designating,
weighting, and sustaining the main effort. The main effort is a designated subordinate unit whose mission at
a given point in time is most critical to overall mission success (ADP 3-0). Commanders provide the main
effort with the appropriate resources and support necessary for its success. When designating a main effort,
commanders consider augmenting a unit’s task organization and giving it priority of resources and support.
The commander designates various priorities of support, such as for air and missile defense (AMD), close
air support and other fires, information collection, mobility and countermobility, and sustainment.
Commanders and staffs anticipate sustainment requirements of the main effort as it shifts throughout the
operation, and they position supplies and capabilities according to the situation. Commanders must balance
forward positioning of sustainment assets with the need for freedom of action and operational reach when
weighting the main effort.
3-92. Commanders shift resources and priorities as circumstances require. While there can be only one main
effort at any given time, commanders may shift the main effort several times during an operation to increase
the endurance of the overall force. They should allow time for the shift of support priorities prior to
designating a unit as the main effort, since shifting the main effort may require movement of resources and
the positioning of supporting capabilities.
CONSOLIDATE GAINS CONTINUOUSLY
3-93. Leaders add depth to their operations in terms of time and purpose when they consolidate gains.
Commanders consolidate gains at the operational and tactical levels as a strategically informed approach to
current operations with the desired political outcome of the conflict in mind. During competition and crisis,
commanders expand opportunities created from previous conflicts and activities to sustain enduring U.S.
interests, while improving the credibility, readiness, and deterrent effect of Army forces. During large-scale
combat operations, commanders consolidate gains continuously or as soon as possible, deciding whether to
accept risk with a more moderate tempo during the present mission or in the future as large-scale combat
operations conclude. (See paragraphs 6-98 through 6-105 for more information on consolidating gains during
armed conflict.)
3-94. The multidomain aspects of an operational environment place increased strain on the ability of military
forces to create enduring change, particularly in the human and information dimensions. The size, scale, and
scope of an assigned area of operations (AO) may reduce the duration of effects, just as they dilute the potency
of combat power. The speed and pervasiveness of enemy disinformation campaigns is a constant challenge
that contests Army forces’ ability to change human will and behavior. The need to fix and bypass some
enemy forces during operations designed to penetrate or envelop enemy echelons may leave significant
enemy threats in rear areas and jeopardize gains made during offensive operations. Commanders therefore
continuously assess when and how they will consolidate gains as they develop the situation.
3-95. Consolidating gains at every echelon leads to better transitions out of armed conflict and into
post-conflict competition. It serves as a preventative against the rise of an insurgency by those wishing to
prolong the conflict. |
3-0 | 76 | Chapter 3
UNDERSTAND AND MANAGE THE EFFECTS OF OPERATIONS ON UNITS AND SOLDIERS
3-96. Continuous operations rapidly degrade the performance of people and the equipment they employ,
particularly during combat. In battle, Soldiers and units are more likely to fail catastrophically than gradually.
Commanders and staffs must be alert to small indicators of fatigue, fear, indiscipline, and reduced morale,
and they must take measures to deal with these before their cumulative effects drive a unit to the threshold
of collapse. Staffs and commanders at higher echelons must take into account the impact of prolonged combat
on subordinate units, which causes efficiency to drop, even when physical losses are not great. Leaders
consider the isolation Soldiers experience when not being able to remain connected with family and friends
via social media and other platforms for extended periods. Well-trained, physically fit Soldiers in cohesive
units retain the qualities of tenacity and aggressiveness longer than those who are not.
3-97. Although all units experience peaks and valleys in combat effectiveness, well-trained, cohesive units
under effective leaders have increased endurance and higher effectiveness than units that lack training and
effective leaders. Leaders develop resilient subordinates. Staffs and commanders need to take this variance
in performance into account in their planning by matching units to missions, rotating units through difficult
tasks to permit recuperation, and by basing their expectations of a unit’s performance on accurate awareness
of its current capabilities. Historically, during conflicts where tactical units are in contact with enemy forces
on a continuous basis for weeks or more at a time, commanders and staffs at echelons above brigade rotated
subordinate units out of enemy contact to reorganize, rest, and train on a regular basis. Continuously assessing
the combat effectiveness of subordinate formations is necessary to inform such decisions in the future.
SECTION III – OPERATIONAL APPROACH AND OPERATIONAL
FRAMEWORK
3-98. The operational approach provides the logic for how tactical tasks ultimately achieve the desired end
state. It provides a unifying purpose and focus to all operations. Sound operational approaches balance risk
and uncertainty with friction and chance. The operational approach provides the basis for detailed planning,
allows leaders to establish a logical operational framework, and helps produce an executable order. (See ADP
3-0 for more information on operational art. See ADP 5-0 for more information on planning.)
3-99. An operational framework organizes an area of geographic and operational responsibility for the
commander and provides a way to describe the employment of forces. The framework illustrates the
relationship between close operations, operations in depth, and other operations in time and space across
domains. As a visualization tool, the operational framework bridges the gap between a unit’s conceptual
understanding of the environment and its need to generate detailed orders that direct operations.
OPERATIONAL APPROACH
3-100. Through operational art, commanders develop their operational approach—a broad description of
the mission, operational concepts, tasks, and actions required to accomplish the mission (JP 5-0). An
operational approach is the result of the commander’s visualization of what needs to be done in broad terms
to solve identified problems. It is the main idea that informs detailed planning. When describing an
operational approach, commanders—
(cid:122) Consider ways to defeat enemy forces in detail and potential decisive points.
(cid:122) Employ combinations of defeat mechanisms to isolate and defeat enemy forces, functions, and
capabilities.
(cid:122) Assess options for assuming risk.
DEFEATING ENEMY FORCES IN DETAIL
3-101. Armed conflict implies the need to defeat enemy forces. Defeat is to render a force incapable of
achieving its objectives (ADP 3-0). When used as a task or effect in operations, defeat provides maximum
flexibility to the commander in how to accomplish the mission. Senior leaders assign defeat as a task when
the situation is still developing, or when the commander on the ground, by virtue of experience and proximity
to the problem, is uniquely capable of deciding how to employ lethal force to accomplish objectives. As a
task, defeat is appropriate for theater strategic and operational-level echelons, but it is often too vague for |
3-0 | 77 | Fundamentals of Operations
tactical echelons below corps level, where more specific outcomes or a higher level of destruction might be
necessary to ensure the overall defeat of enemy forces. As a purpose or an effect, defeat is often used to
describe the ultimate outcome of an operation.
3-102. Defeat inevitably leads to transition. Strategic defeat occurs when an enemy’s political leadership
and national will acquiesce to the friendly political will, and the situation transitions to a more desirable form
of competition below armed conflict. Operational defeat occurs when enemy forces no longer have the will
or ability to pursue military objectives, and the friendly force has achieved most or all of its objectives. At
the tactical level, an attacking force defeats an enemy defense when it causes enemy forces to transition to a
retrograde and cease defending friendly objectives. A defending force defeats an enemy attack when it causes
enemy forces to culminate and transition to the defense before achieving their objectives.
3-103. When U.S. forces possess overwhelming advantages across all domains, the JFC is able to attack all
elements of the enemy force with a high degree of simultaneity. Simultaneity disrupts the enemy’s C2 system
and rapidly disintegrates each component of the threat warfighting system at the same time. However, peer
threats, by definition, possess a scale and quality of warfighting capability that is too extensive to attack at
once. When fighting a peer threat, commanders identify weaknesses between enemy units or in enemy
formations and warfighting systems that provide opportunities to defeat them in detail.
3-104. Defeat in detail is concentrating overwhelming combat power against separate parts of a force rather
than defeating the entire force at once (ADP 3-90). Traditionally, commanders of a smaller force use this
technique to achieve success against a larger enemy force. However, defeat in detail also applies to operations
that focus effort on a specific enemy function, capability, echelon, domain, or dimension.
3-105. Defeat in detail requires leaders to evaluate enemy forces in the context of all the relevant domains
and dimensions of an operational environment. Commanders must understand the various parts of an enemy
force and its vulnerabilities, and then discern the best ways to project combat power against those
vulnerabilities. By comparing enemy weaknesses to friendly advantages, leaders begin to see opportunities
and formulate options. Sometimes enemy vulnerabilities and friendly advantages intersect at a single place
and time in a way that is decisive to mission accomplishment. That single place and time is a decisive point—
key terrain, key event, critical factor, or function that, when acted upon, enables commanders to gain a marked
advantage over an enemy or contribute materially to achieving success (JP 5-0). Decisive points help
commanders select clear, conclusive, attainable objectives that directly contribute to achieving an end state
through convergence or other means.
DEFEAT AND STABILITY MECHANISMS
3-106. A defeat mechanism is a method through which friendly forces accomplish their mission against
enemy opposition (ADP 3-0). Army forces at all echelons commonly use combinations of four defeat
mechanisms: destroy, dislocate, disintegrate, and isolate. Applying more than one defeat mechanism
simultaneously creates multiple dilemmas for enemy forces and complementary and reinforcing effects not
attainable with a single mechanism. Commanders may have an overarching defeat mechanism or
combination of mechanisms that accomplish the mission, with supporting defeat mechanisms for components
of an enemy formation or warfighting system. Defeat mechanisms can guide subordinate development of
tactical tasks, purposes, and effects in their operations, facilitating control and initiative.
3-107. During competition, commanders take actions that set conditions for the future application of defeat
mechanisms and demonstrate the capability to impose the defeat mechanisms on enemy forces. These
activities include posturing forces, penetrating enemy networks, and conducting exercises with allies and
partners.
3-108. Commanders determine the speed and degree to which a defeat mechanism must impact an enemy
force or warfighting system. Although rapid defeat is typically desirable, it may be more feasible or
acceptable to take a gradual approach to completing a defeat. Rendering an enemy incapable of achieving its
objectives does not usually require total annihilation. To determine the degree of impact on the enemy force,
commanders consider causing only minor degradation to a threat warfighting system or unit when it is
sufficient to prevent the enemy from achieving its objective. This preserves friendly combat power and
applies the economy of force principle. In other cases, especially main efforts against determined peer threat
forces, commanders typically require a significant portion of an enemy’s force be destroyed. |
3-0 | 78 | Chapter 3
3-109. When commanders destroy, they apply lethal force against an enemy capability so that it can no
longer perform its function. Destroy is a tactical mission task that physically renders an enemy force combat-
ineffective until it is reconstituted. Alternatively, to destroy a combat system is to damage it so badly that it
cannot perform any function or be restored to a usable condition without being entirely rebuilt (FM 3-90-1).
Destruction and the threat of destruction lie at the core of all the defeat mechanisms and make them more
compelling. The other mechanisms work when friendly action has caused enemy forces to face a grim reality:
their ability to fight and relative advantages are degraded, and their options are to surrender, withdraw, or be
destroyed.
3-110. Dislocate is to employ forces to obtain significant positional advantage in one or more domains,
rendering the enemy’s dispositions less valuable, perhaps even irrelevant. Typically, the impact of
dislocation increases when the friendly force exploits advantages in multiple domains. Commanders often
achieve dislocation through deception and by placing forces in locations where enemy forces do not expect
them. Achieving dislocation requires an understanding how enemy forces are oriented and how quickly they
can shift. Envelopments and turning movements enable physical dislocation. Deception can create and
enhance psychological effects of dislocation.
3-111. Isolate means to separate a force from its sources of support in order to reduce its effectiveness and
increase its vulnerability to defeat (ADP 3-0). Isolation can encompass multiple domains and can have both
physical and psychological effects detrimental to accomplishing a mission. Isolating an enemy force from
the electromagnetic spectrum increases the effects of physical isolation by reducing its ability to
communicate and degrading its situational awareness. The ability of an isolated unit to perform its intended
mission generally degrades over time, decreasing its ability to interfere with an opposing force’s course of
action. When commanders isolate, they deny enemy forces access to capabilities that enable them to
maneuver at will in time and space.
3-112. Disintegrate means to disrupt the enemy’s command and control, degrading the
synchronization and cohesion of its operations. Disintegration prevents enemy unity of effort and leads to
a degradation of the enemy’s capabilities or will to fight. It attacks the cohesion of enemy formations and
their ability to employ combined arms approaches and work effectively together. Commanders can achieve
disintegration by targeting enemy functions essential to the threat’s ability to act as a whole. They often
achieve disintegration by specifically targeting an enemy’s command structure, communications systems,
the linkages between them, and the capabilities they control. Disintegration can be achieved through the
employment of the other three defeat mechanisms in combination, particularly when directed toward systems
like integrated fires commands and integrated air defense systems heavily dependent upon C2 and sensor
nodes.
3-113. Cyberspace, space, and electromagnetic warfare capabilities can help disintegrate enemy formations
by degrading communications and disrupting the quality of enemy information and decisions. Separating
enemy reserves and follow-on echelons from the main body with maneuver forces or fires is a physical way
to isolate echelons, achieve favorable force ratios, and destroy those echelons. This in turn disintegrates the
coherence of an enemy’s attack or defense. Destroying enemy sustainment capability separates enemy fires
and maneuver from fuel and ammunition and delays resupply operations.
3-114. A stability mechanism is the primary method through which friendly forces affect civilians in order
to attain conditions that support establishing a lasting, stable peace (ADP 3-0). As with defeat mechanisms,
combinations of stability mechanisms produce complementary and reinforcing effects that accomplish the
mission more effectively and efficiently than single mechanisms do alone. The four stability mechanisms are
compel, control, influence, and support:
(cid:122) Compel means to use, or threaten to use, lethal force to establish control and dominance, affect
behavioral change, or enforce compliance with mandates, agreements, or civil authority.
(cid:122) Control involves imposing civil order.
(cid:122) Influence means to alter the opinions, attitudes, and ultimately the behavior of foreign, friendly,
neutral, and threat audiences through messages, presence, and actions.
(cid:122) Support establishes, reinforces, or sets conditions necessary for the instruments of national power
to function effectively. |
3-0 | 79 | Fundamentals of Operations
RISK
3-115. Commanders accept risk on their own terms to create opportunities and apply judgment to manage
those hazards they do not control. Risk is an inherent part of every operation and cannot be avoided.
Commanders analyze risk in collaboration with subordinates to help determine what level and type of risk
exists and how to mitigate it. When considering how much risk to accept with a course of action, commanders
consider risk to the force against the probability of mission success during current and future operations.
They assess options in terms of weighting the main effort, economy of force, and physical loss in the context
of what they have been tasked to do.
3-116. Leaders consider risk across all domains. Accepting risk in one domain may create opportunities in
other domains. For example, the risk of seizing an airfield puts ground forces at risk, but it creates an
opportunity to receive reinforcements and supplies that extend operational reach. During combat against an
enemy with capabilities comparable to that of the United States, the greatest opportunity may come from the
course of action with the most risk. An example of this is committing significant forces to a potentially costly
frontal attack that fixes the bulk of enemy forces in place to set the conditions for their envelopment by other
forces. Another is taking a difficult but unexpected route to achieve surprise. Accepting significant risk is
necessary when seeking to create an advantage where none exists otherwise.
3-117. The unrealistic expectation of avoiding all risk is detrimental to mission accomplishment. While
each situation is different, commanders avoid undue caution or commitment of resources to guard against
every perceived threat. Waiting for perfect intelligence and synchronization may increase risk or close a
window of opportunity. Mission command requires that commanders and subordinates accept risk, exercise
initiative, and act decisively, particularly when the outcome is uncertain.
3-118. Commanders determine how to impose risk on enemy forces. Viewing the situation through the
enemy’s perspective, commanders seek to create multiple dilemmas and increase the number and severity of
hazards with which enemy forces must contend. Leaders consider the human and information factors that
govern the manner in which enemy forces assess costs and benefits and calculate risk. Commanders disrupt
this risk calculation when they increase perceived costs to enemy forces and reduce the perception of potential
benefits. Commanders do this by imposing dilemmas on enemy forces, not based on what a U.S. or allied
leader views as a problem, but on what an enemy commander views as detrimental. Some dilemmas are
universally accepted as costly, but others are cultural or personal. Commanders rely on military intelligence
and experience to develop this level of situational understanding.
STRATEGIC FRAMEWORK
3-119. The strategic framework accounts for factors in the strategic environment and the connection of
strategic capabilities to operational- and tactical-level operations. The strategic framework includes four
areas:
(cid:122) Strategic support area.
(cid:122) Joint security area.
(cid:122) Extended deep area.
(cid:122) Assigned operational area.
(See figure 3-2 on page 3-23 for a depiction of the operational framework in the context of the strategic
framework.)
STRATEGIC SUPPORT AREA
3-120. The strategic support area describes the area extending from a theater of operations to a base in the
United States or another CCDR’s area of responsibility. It contains those organizations, lines of
communications, and other agencies required to support deployed forces. It also includes the airports and
seaports supporting the flow of forces and sustainment into a theater. Finally, a strategic support area may
contain key operational capabilities, such as cyberspace assets, that are employed from outside an operational
area but create effects inside it. Most friendly nuclear, space, and cyberspace capabilities and important
network infrastructure are controlled and located in the strategic support area. |
3-0 | 80 | Chapter 3
JOINT SECURITY AREA
3-121. A joint security area is a specific area to facilitate protection of joint bases and their connecting lines
of communications that support joint operations (JP 3-10). The joint security area (JSA) is inside, or
immediately adjacent to, an operational area where significant forces and sustainment from two or more
services are positioned to conduct or support operations. Joint security on land includes bases,
mission-essential assets, lines of communications, and convoy security. A senior Army commander is often
designated with responsibility for joint security operations on land.
3-122. The size of a JSA varies considerably and is highly dependent on the size of the operational area,
mission-essential assets, logistics support requirements, threats, or scope of the joint operation. The JSA may
be included in, be separate from, or be adjacent to the rear areas of the joint force land component commander.
During large-scale combat operations JSAs typically are separate from land component or field army rear
areas and associated support areas. (See JP 3-10 for more information on JSAs.)
EXTENDED DEEP AREA
3-123. The extended deep area is comprised of operational and strategic deep areas. These areas typically
do not fall within the land component command’s AO, but they are part of its area of interest because enemy
capabilities and vulnerabilities in the extended deep area can have significant impacts on the outcomes of
operations. Extended deep areas are typically the purview of the joint force headquarters or another
combatant command. Typically, the joint force air component command (known as the JFACC) is the
supported command in extended deep areas. Army forces may be tasked to support it with long-range
precision fires.
3-124. Operational deep areas are generally inside the area of interest and immediately beyond the land
component’s initially assigned AO. These areas may or may not be within the boundaries of a joint operations
area (JOA) or a theater of operations. Operational deep areas are often beyond the feasible movement of
conventional forces without significant support from the joint force.
3-125. Operational deep areas contain enemy supporting formations and capabilities for their main forces.
Enemy forces can generate significant combat power from these areas, and the capabilities that reside there
are often vital to their conduct of operations. In most campaign designs, operational objectives for friendly
forces reside initially in the operational deep area.
3-126. Strategic deep areas are beyond the feasible range of movement for conventional ground forces or
policy prohibits their operations. These areas are where the CCDR, other combatant commands, and national
agencies can employ strategic intelligence capabilities, joint fires, special operations forces, and space and
cyberspace capabilities. Many enemy space, cyberspace, and information warfare capabilities reside in
strategic deep areas across international boundaries and outside the JOA, and they often comprise multiple
areas of influence. (See figure 3-2 for a depiction of the operational framework.) |
3-0 | 81 | Fundamentals of Operations
Figure 3-2. The operational framework in the context of the strategic framework
OPERATIONAL FRAMEWORK
3-127. The operational framework is a cognitive tool used to assist commanders and staffs in clearly
visualizing and describing the application of combat power in time, space, purpose, and resources in the
concept of operations (ADP 1-01). Commanders build their operational framework on their assessment of
the operational environment, including all domains and dimensions. They may create new models to fit the
circumstances, but they generally apply a combination of common models according to doctrine. The three
models commonly used to build an operational framework are—
(cid:122) Assigned areas.
(cid:122) Deep, close, and rear operations.
(cid:122) Main effort, supporting effort, and reserve.
Note. Commanders may use any operational framework models they find useful, but they must
remain synchronized with their higher echelon headquarters’ operational framework.
ASSIGNED AREAS
3-128. The JFC assigns land forces an operational area within a joint organizational construct. The land
component or ARFOR commander subdivides their AO into subordinate assigned areas to best support the
desired scheme of maneuver. Commanders assign areas to subordinates based on a range of factors, including
the mission, friendly forces available, enemy situation, and terrain. An assigned area that is too large for a
unit to effectively control or exceeds a unit’s area of influence increases risk, allows sanctuaries for enemy
forces, and limits joint flexibility. An assigned area that is too small constrains maneuver, limits opportunities
for dispersion, and creates congested lines of communication. Most operations involve a combination of
contiguous and noncontiguous assigned areas. Large areas with small forces typically conduct noncontiguous
operations which place greater demands on C2 and sustainment. Commanders retain responsibility for any
area not assigned to a subordinate unit. Within their assigned area, units use control measures to assign |
3-0 | 82 | Chapter 3
responsibilities, prevent fratricide, facilitate C2, coordinate fires, control maneuver, and organize operations.
To facilitate this integration and synchronization, commanders designate targeting priorities, effects, and
timing within their assigned areas. There are three types of assigned areas that a land component or ARFOR
commander uses:
(cid:122) Area of operations.
(cid:122) Zone.
(cid:122) Sector.
3-129. An area of operations is an operational area defined by a commander for the land or maritime force
commander to accomplish their missions and protect their forces (JP 3-0). An area of operations is defined
by its boundaries. Within their AO, units integrate assigned and supporting capabilities, synchronize
warfighting functions, and generate combat power against enemy forces to accomplish the mission.
Responsibilities for an AO include—
(cid:122) Terrain management.
(cid:122) Information collection, integration, and synchronization.
(cid:122) Civil affairs operations.
(cid:122) Movement control.
(cid:122) Clearance of fires.
(cid:122) Security.
(cid:122) Personnel recovery.
(cid:122) Airspace management.
(cid:122) Minimum-essential stability operations tasks which are—
(cid:131) Establish civil security.
(cid:131) Provide immediate needs (access to food, water, shelter, and medical treatment).
Commanders can add, remove, or adjust AO responsibilities based on the situation and mission variables.
Note. A land AO by definition does not include a volume of airspace to control. Airspace control
authorities delegate airspace control to Army commanders based on the situation. All commanders
must be prepared to enable or coordinate airspace management. (See JP 3-52 and FM 3-52 for
more information on airspace control.)
3-130. A zone is an operational area assigned to a unit in the offense that only has rear and lateral
boundaries. The non-bounded side of a zone is open towards enemy forces. A higher echelon headquarters
uses fire support coordination and maneuver control measures such as a limit of advance and a coordinated
fire line to synchronize its deep operations with those of a subordinate unit. Zones allow higher headquarters
to adjust deep operations without having to change unit boundaries. This gives greater flexibility to the higher
headquarters for controlling deep operations, allowing subordinate units to focus on close and rear operations.
Units treat everything behind the forward line of troops as an AO with its associated responsibilities. Units
can subdivide a zone into subordinate AOs, zones, or sectors.
3-131. A sector is an operational area assigned to a unit in the defense that has rear and lateral
boundaries and interlocking fires. The non-bounded side of a sector is open towards the enemy. A higher
echelon headquarters uses fire support coordination and maneuver control measures such as battle positions
and trigger lines to synchronize subordinate units. Higher headquarters are responsible to synchronize
employment of combat power forward of the main battle and security areas or coordinated fire line. Higher
headquarters use sectors to synchronize and coordinate subordinate force engagement areas and allow for
mutually supporting fields of fire, which do not require deconfliction between adjacent units. Units treat
everything behind the forward line of troops as an AO with its associated responsibilities. Units can subdivide
a sector into subordinate areas of operations, zones, or sectors.
3-132. While there are many other control measures that enable terrain management (for example, position
areas for artillery or tactical assembly areas) only AOs, zones, and sectors are part of the assigned area model.
Commanders and staffs use AOs when the operation requires a higher level of control. Zones are best for
front line units conducting high tempo offensive operations characterized by direct fire contact with the |
3-0 | 83 | Fundamentals of Operations
enemy and a fluid forward line of troops. Sectors are best for front line units conducting a defense, making
it easier for a higher headquarters to conduct deep operations and for subordinate units to have mutually
supporting fires.
Mutual Support
3-133. Commanders and staffs consider mutual support when considering how large an area to assign
subordinates. Mutual Support is that support which units render each other against an enemy, because of their
assigned tasks, their position relative to each other and to the enemy, and their inherent capabilities (JP 3-31).
In Army doctrine, mutual support is a planning consideration related to force disposition, not a command
relationship. Mutual support has two aspects: supporting range and supporting distance.
3-134. When two units are mutually supporting, their assigned areas are generally contiguous with each
other. Units with non-contiguous areas are generally not mutually supporting. Supporting range is the
distance one unit may be geographically separated from a second unit yet remain within the maximum range
of the second unit’s weapons systems (ADP 3-0). Supporting range depends on available weapons systems,
and it is normally the maximum range of the supporting unit’s indirect fire weapons, although certain
capabilities employed via space and cyberspace can be used at much longer ranges. Terrain, visibility, and
weather may limit the supporting range. If one unit cannot effectively or safely fire in support of another, the
first may not be in supporting range even though its weapons have the required range. At higher echelons,
communications are also a consideration. If two units cannot effectively coordinate the use of indirect fire,
then they may not be considered in supporting range of each other. Figure 3-3 on page 3-26 illustrates a
notional corps assigned area with noncontiguous AOs.
3-135. Supporting distance is the distance between two units that can be traveled in time for one to come
to the aid of the other and prevent its defeat by an enemy or ensure it regains control of a civil situation
(ADP 3-0). These factors affect supporting distance:
(cid:122) Terrain and mobility.
(cid:122) Distance.
(cid:122) Enemy capabilities, including those employed from the space, cyberspace, air, and maritime
domains.
(cid:122) Friendly capabilities, including those employed from the space, cyberspace, air, and maritime
domains. (See Chapter 6 for a greater discussion of mutual support.)
Note. Contiguous boundaries do not imply units are capable of mutual support or that their
subordinate units have contiguous assigned areas. Therefore, mutual support between adjacent
units and subordinate units must be part of commander dialogue to ensure the formation is
assuming risk deliberately and at the right echelon. |
3-0 | 84 | Chapter 3
Figure 3-3. Notional corps area of operations with noncontiguous divisions
Area of Influence and Area of Interest
3-136. Operational environments are larger than the associated assigned area. They influence and are
influenced by factors outside unit boundaries. To account for these factors commanders typically consider
areas of influence and areas of interest relative through all domains and dimensions.
3-137. An area of influence is an area inclusive of and extending beyond an operational area wherein a
commander is capable of direct influence by maneuver, fire support, and information normally under the
commander’s command or control (JP 3-0). The ranges of a unit’s maneuver and fires capabilities typically
define its area of influence; however, commanders consider all forms of contact they can make with enemy
forces when visualizing their area of influence. A unit’s area of influence contracts or expands based on the
capabilities allocated by the higher headquarters and adjusts as the unit repositions its capabilities on the
battlefield. An area of influence is normally larger than its associated assigned area, but it is smaller than its
area of interest. Units typically have areas of influence that overlap with adjacent unit assigned areas. A unit
might desire to collect information on or strike enemy forces traversing through an adjacent unit assigned
area. This situation requires control measures to enable friendly forces to maintain pressure on enemy forces
while mitigating the risk of fratricide. Understanding an area of influence helps commanders and staffs plan
branches and sequels to the current operation in preparation for operations outside of the current assigned
area.
3-138. An area of interest is that area of concern to the commander, including the area of influence, areas
adjacent to it, and extending into enemy territory (JP 3-0). This visualization tool enables commanders and
staffs to understand the impact of threats outside their assigned area and how their operation is progressing
along with their adjacent and higher units. An area of interest includes those aspects of the domains from
which enemy forces can employ capabilities that jeopardize the accomplishment of the mission. The area of
interest can shift according to the situation. For example, Army forces track the location of enemy AMD, |
3-0 | 85 | Fundamentals of Operations
artillery, and armored formations outside the assigned area whose movement or employment may impact
current and future operations. The area of interest also includes adjacent and other friendly forces whose
actions or inactions of friendly forces could affect operations.
3-139. Commanders consider all forms of contact possible with enemy forces and update their area of
interest as the situation develops, including the effects of enemy influence and disinformation. An area of
interest surrounds an assigned area, extending forward and to the flanks of the assigned area, and overlapping
with adjacent unit assigned areas. Depending on the operation, it may also extend rearwards, especially when
enemy forces contest operational and strategic lines of communications. A unit’s area of interest is especially
important for helping leaders assess risks and maintain situational awareness of factors that will become
important as operations progress. It is particularly important that the area of interest account for human,
information, and physical dimension factors across all domains.
DEEP, CLOSE, AND REAR OPERATIONS
3-140. Within assigned areas, commanders organize their
operations in terms of time, space, and purpose by Commanders balance combat power
synchronizing deep, close, and rear operations. An echelon’s between requirements for deep, close,
focus in time, space, and purpose—not necessarily their and rear operations while weighting the
physical location—determines whether they are deep, close, main effort to accomplish the mission.
or rear operations. This model assists commanders and staffs
in synchronizing capabilities that reside outside of their unit’s assigned area, (for example, from air, space,
and cyberspace) with operations inside their assigned areas. The degree of convergence that a corps can
achieve to set conditions for its subordinate divisions depends on its ability to synchronize close, deep, and
rear operations among its subordinate echelons and with the joint force.
3-141. Divisions and higher echelons typically align their deep, close, and rear operations to corresponding
areas, due to the scale of forces and physical considerations involved. This facilitates their C2 of forces spread
over wide distances whose physical locations do not correspond to the location and purpose of their effects.
Typically, divisions and corps assign command posts to enable control of these areas. For example, a division
may position an artillery battery in a position area for artillery located in the rear area but employ its fires in
support of close operations. In this case, the rear command post might control the battery’s sustainment and
protection, but the division main command post will control its priorities for providing indirect fire support.
At brigade echelons and below, differentiating between close, deep, and rear may have less utility during
large-scale combat operations because of the high tempo, narrow focus, and short planning horizons. At every
echelon, however, commanders must understand the relationship among these operations and their combined
impact on mission accomplishment. (See FM 3-94 for more information about deep, close, and rear areas.)
Figure 3-4 on page 3-28 illustrates notional corps deep, close, and rear areas for a corps AO with contiguous
divisions.
Note. The symmetry of figure 3-4 on page 3-28 provides the simplest way for understanding the
operational framework which is a mental model. Applying the model to real situations results in
significant variations. |
3-0 | 86 | Chapter 3
Figure 3-4. Notional corps deep, close, and rear areas with contiguous divisions |
3-0 | 87 | Fundamentals of Operations
Deep
3-142. Deep operations are tactical actions against
Successful deep operations disintegrate
enemy forces, typically out of direct contact with friendly
the structures and systems that enable
forces, intended to shape future close operations and
enemy operational approaches, isolate
protect rear operations. At the operational level, deep
enemy close operations from sources of
operations influence the timing, location, and enemy forces support, and make enemy forces
involved in future battles. At the tactical level, deep vulnerable to defeat in detail.
operations set conditions for success during close operations
and subsequent engagements.
3-143. At both the operational and tactical levels, the principal effects of deep operations focus on an enemy
force’s freedom of action and the coherence and tempo of their operations. Deep operations strike enemy
forces throughout their depth and prevent the effective employment of reserves, C2 nodes, logistics, and
long-range fires. Deep operations are inherently joint, since many of the capabilities employed by or in
support of Army formations are provided by a joint headquarters or Service component.
3-144. Several activities are typically conducted as part of deep operations. They include—
(cid:122) Deception.
(cid:122) ISR and target acquisition.
(cid:122) Interdiction (by ground or air fires, ground or aerial maneuver, cyberspace forces, special
operations forces, or any combination of these).
(cid:122) Long-range fires against enemy integrated air defense systems, sustainment nodes, fires
capabilities, and echeloned follow-on maneuver formations.
(cid:122) Electromagnetic warfare.
(cid:122) Offensive cyberspace operations and space operations.
(cid:122) Military information support operations.
3-145. Not all activities focused forward of the line of contact are deep operations. Counterfire, for example,
primarily supports close operations, even though the targets attacked may be located at great distances from
the forward line of troops.
3-146. Deep operations require detailed planning. Because of the relative scarcity of resources with which
to perform these activities, deep operations focus on the enemy vulnerabilities and capabilities most
dangerous to the next close operation. Attacks must employ enough combat power to achieve the desired
result. This is critical when—as is frequently the case—maintaining momentum in close operations depends
on successful prosecution of deep operations.
Close
3-147. Close operations are tactical actions of
subordinate maneuver forces and the forces providing Seizing and defending contested land
areas require close operations.
immediate support to them, whose purpose is to employ
maneuver and fires to close with and destroy enemy
forces. Until enemy forces are defeated or destroyed in close operations, they retain the ability to fight and
hold ground. At the operational level, close operations comprise the efforts of large tactical units—corps and
divisions—to win current battles by closing with and defeating enemy forces after setting favorable terms to
do so. At the tactical level, close operations comprise the efforts of smaller tactical units to win current
engagements through movement combined with direct and indirect fires while physically in contact with the
enemy forces they intend to destroy and defeat. Close operations concentrate overwhelming combat power
at the right time and place to create and then exploit windows of opportunity to achieve assigned objectives.
3-148. Close operations include the deep, close, and rear operations of their subordinate maneuver
formations. For example, divisions and separate brigades conduct corps close operations. Brigade combat
teams (BCTs) are the primary forces conducting division close operations. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.