FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-0
88
Chapter 3 3-149. The positioning of assets and capabilities does not determine whether they are part of the close operation. For example, some reconnaissance and target acquisition units, while located forward near the line of contact, may have a purpose that supports deep operations. 3-150. Close operations are inherently lethal because they involve direct fire engagements at relatively short ranges with enemy forces seeking to mass direct, indirect, and aerial fires against friendly forces. Deep and rear operations set conditions for the success of close operations. The measure of success of deep and rear operations is their positive impact on increasing the effectiveness and reducing the cost of close operations. 3-151. Activities are part of close operations if their purpose contributes to defeating committed enemy forces that are or will be in direct physical contact with friendly forces. The activities that comprise close operations include— (cid:122) Maneuver of subordinate formations (including counterattacks). (cid:122) Close combat (including offensive and defensive operations). (cid:122) Indirect fire support (including counterfire, close air support, electromagnetic attack, and offensive space and cyber operations against enemy forces in direct physical contact with friendly forces). (cid:122) Information collection. (cid:122) Sustainment support of committed units. Rear 3-152. Rear operations are tactical actions behind major subordinate maneuver forces that facilitate movement, Commanders establish rear operations before they can conduct deep and close extend operational reach, and maintain desired tempo. operations. This includes continuity of sustainment and C2. Rear operations support close and deep operations. At the operational level, rear operations sustain current operations and prepare for the next phase of the campaign or major operation. These operations are distributed, complex, and continuous. At the tactical level, rear operations enable the desired tempo of combat, assuring that friendly forces have the agility to exploit any opportunity. 3-153. Rear operations typically include five broad activities: positioning and moving reserves; positioning and repositioning aviation, fire support, and AMD units; conducting support area operations; securing sustainment and C2 nodes; and controlling tactical unit movement between the division or corps rear boundary and units conducting close operations. Rear operations typically include efforts that consolidate gains to make conditions created by deep and close operations more permanent. All of these activities compete for limited terrain and lines of communications. Division and corps rear command posts are generally responsible for rear operations. 3-154. There are several considerations for conducting rear operations. They include— (cid:122) C2. (cid:122) Information collection activities to detect enemy forces. (cid:122) Establishment and maintenance of routes. (cid:122) Terrain management. (cid:122) Movement control. (cid:122) Protection of critical friendly capabilities. (cid:122) Information activities. (cid:122) Infrastructure repair and improvement. (cid:122) Defeating bypassed forces and continuing to consolidate gains. (cid:122) Minimum-essential stability tasks which are— (cid:131) Establish civil security. (cid:131) Provide immediate needs (access to food, water, shelter, and medical treatment). (cid:122) Coordination with host-nation and multinational governmental organizations. (cid:122) Adjusting to shifts in the unit and subordinate rear boundaries. (cid:122) Integration of new units into the division or corps.
3-0
89
Fundamentals of Operations 3-155. Enemy deep operations often target friendly rear operations because they are often both vulnerable and essential to friendly mission success. Commanders commit combat power to protect rear operations, but they balance those requirements against those necessary for successful close and deep operations. Units involved in rear operations must protect themselves using both passive and active measures. Commanders and staffs must continuously reevaluate the possibility of more serious threats to rear operations and develop plans to meet them with minimum disruptions to ongoing close operations. Support Area Operations 3-156. Support area operations are a critical part of rear operations. Support area operations are the tactical actions securing lines of communications, bases, and base clusters that enable an echelon’s sustainment and command and control. 3-157. A support area is where units position, employ, and protect base sustainment assets and lines of communications required to sustain, enable, and control operations. Support area operations include sustainment for the echelon and relevant security operations. Support area operations enable the tempo of deep and close operations. Support area operations require detailed planning to coordinate among the various units providing sustainment, protection, and security. A maneuver enhancement brigade or BCT typically provides C2 for support area operations for a division or corps due to the level of security, planning, and integration required. Support Area Operations Planning Considerations 3-158. Support area operations require detailed planning. Their security is often an economy of force effort. Commanders must balance their need to protect rear operations and tempo with the needs of main effort units committed to close and deep operations. 3-159. Commanders consider several items when conducting support area operations. They include— (cid:122) Desired tempo. (cid:122) Enemy maneuver and fires units that threaten current and future support area operations. (cid:122) Additional forces required to protect the support area. (cid:122) C2 nodes that will occupy the support area. (cid:122) Command-support relationships between units in the support area. (cid:122) Transportation networks (road, rail, inland waterways, and air) into and out of the area. (cid:122) Protection from enemy indirect fire assets. (cid:122) Survivability. (cid:122) Dispersion, terrain management, and defensive responsibilities. (cid:122) Displacement considerations based upon the overall operation. (cid:122) Movement control into, through, and out of the support area. Command and Control of Deep, Close, and Rear Operations 3-160. C2 facilitates the freedom to operate, delegate authority, and lead from any point on the battlefield. Plans are the initial basis for action, but commanders must expect substantial changes in the course of an operation and periods of disrupted communications. Leaders allow their subordinates to react to unanticipated situations through the mission command approach to C2. 3-161. Commanders position command posts where they can best integrate capabilities and synchronize combat power without incurring too much risk from enemy interference. Commanders often position command posts and leaders in locations where they anticipate friction, and which are most vital to mission success. Specific mission requirements will dictate how commanders organize and array their command posts as well as the networks they establish to communicate during the conduct of operations. (See ATP 6-0.5 for a detailed discussion of command posts.) 3-162. Staffing, equipping, and organizational concerns vary among echelons of command. In every case, however, the purpose of C2 is to implement the commander’s will and synchronize operations in pursuit of the unit’s objectives. Army forces are equipped with a variety of command posts, including main command
3-0
90
Chapter 3 posts, tactical command posts or their equivalents, rear command posts, and mobile command groups. At the corps level and below, every echelon of command has a main command post and a tactical command post. Corps and divisions are also equipped with a rear command post, giving them the flexibility to delegate specific C2 responsibilities to nodes positioned to control deep, close, and rear areas. MAIN EFFORT, SUPPORTING EFFORT, AND RESERVE 3-163. Commanders designate a subordinate unit as a main effort when its mission at a given point in time is most critical to overall mission success. Commanders weight the main effort with additional combat power. Typically, commanders shift the main effort one or more times during execution. When commanders designate a unit as the main effort, it receives priority of support and resources to maximize combat power. Commanders establish clear priorities of support, and they shift resources and priorities to the main effort as circumstances and the commander’s intent require. The unit that directly accomplishes the mission is usually the main effort when it conducts its mission. Commanders typically designate priority for sustainment to units that they anticipate to be the main effort. This helps maximize the combat power of a unit before it becomes the main effort. Shifting a priority of sustainment to the current main effort might be too late to be effective. 3-164. A supporting effort is a designated subordinate unit with a mission that supports the success of the main effort (ADP 3-0). Commanders resource supporting efforts with the minimum assets necessary to accomplish the mission. Forces often realize success of the main effort through success of supporting efforts. A main effort in an earlier phase can be a supporting effort for a main effort in a later phase. 3-165. A reserve is that portion of a body of troops that is withheld from action at the beginning of an engagement to be available for a decisive movement (ADP 3-90). A reserve is an uncommitted force, and it does not normally have a full suite of combat multipliers available to it until it is committed. It is the echelon’s main effort once it is committed. Commanders constitute a reserve and base the size of the reserve on the level of uncertainty in the current tactical situation. Commanders consider survivability, mobility, and the most likely mission when positioning their reserve. While commanders can assign their reserve a wide variety of tasks, through planning priorities, to perform on commitment, a reserve remains prepared to accomplish other missions. The primary purposes for a reserve are to— (cid:122) Exploit success. (cid:122) Counter tactical reverses that threaten the integrity of the friendly force’s operations. (cid:122) Retain the initiative. 3-166. Once a reserve is committed, units reconstitute a new one whenever possible. When a commander assigns a unit the mission of being the reserve, the commander gives the unit a list of planning priorities. Typically a reserve has no more than three planning priorities because of the time it takes to adequately prepare for each priority.
3-0
91
Chapter 4 Operations During Competition Below Armed Conflict In all history, this is the first time that an allied headquarters has been set up in peace to preserve the peace and not to wage war. General Dwight D. Eisenhower on the formation of theNorth Atlantic Treaty Organization (NATO) This chapter begins with an overview of how the Army contributes to competition below the threshold of armed conflict as part of the joint force. It describes methods employed by adversaries and how Army forces contest adversary activities by supporting combatant command campaign plans and preparing for large-scale combat operations with unified action partners. The chapter concludes by discussing how Army forces consolidate gains and transition to crisis or armedconflict as branches to joint campaigns. OVERVIEW OF OPERATIONS DURING COMPETITION 4-1. Competition below armed conflict occurswhen anadversary’s national interests are incompatible with U.S. interests, and that adversary is willing to actively pursue them short of open armed conflict. While neither side desires, at least initially, to use military force as the primary method to achieve its goal, the adversary is willing to employ national instruments of power, including military force, below the threshold of actual armed conflict to achieve its aims. The resulting tension between the two sides creates potential for violent escalation when one side challenges the status quo. 4-2. Operations during competition are intended to deter malign Army forces are successful during adversary action, set conditions for armed conflict on favorable competition when they deter terms when deterrence fails, and shape an operational environment adversary malign action, enable the with allies and partners in ways that support U.S.strategic interests attainment of other national and policy aims. Theater armies support combatant commanders objectives, and maintain the ability (CCDRs) as they conduct operations to deter adversaries and to swiftly and effectively transition achieve national objectives. Their operations, conducted as part of to armed conflict when deterrence a combatant command campaign plan, are conducted over time fails. and across broad areas without armed conflict. This may include cooperative training, support to local institutions, construction projects, and a range of other activities. In many cases, enduring engagement is necessary, especially given the tendency of adversaries to pursue strategic objectives over long periods of time that do not comport with the shorter political-strategic cycles found in the U.S. or among many of its allies and partners. 4-3. Army forces contribute to conventional deterrence during competition by preparing for armed conflict, including large-scale combat operations. This includes assisting allies and partners to improve their military capabilities and capacity. Preparation for combat operations and demonstrating the interoperability of the U.S.joint force with allies and partners presents the strongest deterrence to adversaries. Deliberate messaging that communicates the will and capability to conduct combat operations can amplify the deterrent effect of physical actions onthe ground. Interoperability, coupled with the demonstrated capabilities and capacity of Army forces, reinforces a unified approach to defending mutual interests. Even a small contingent of forward-stationed U.S.Army forces are a challenge to defeat whenoperating with allies and partners. A force ready for large-scale combat operations contributes to the potency and integration of the other instruments of national power, provides CCDRscapabilities for graduated responses, and enables the Army to help the joint force achieve national strategic objectives through competition rather than armed conflict.
3-0
92
Chapter 4 ADVERSARY METHODS DURING COMPETITION 4-4. To effectively plan, prepare, execute, and assess operations during competition requires a broad understanding of the strategic environment and common adversary methods and objectives. Adversaries use a range of techniques to hinder the United States from achieving its objectives during competition and further their own interests. Forward-positioned Army forces may be able to detect and assess such adversary activities. By understanding and effectively countering adversary techniques, Army forces can help the joint force and interagency partners achieve their objectives. ACTIVITIES TO ACHIEVE STRATEGIC GOALS 4-5. Adversaries employ all of their instruments of national power in a combination of ways to pursue strategic interests without direct military confrontation with the United States. For example, Russia applies its elements of national power through an approach called “New-Type War” (also labeled “Russian New Generation Warfare”). This approach allows Russia to achieve many of its strategic goals below the level of armed conflict and with limited employment of military forces. If coercion through diplomatic, information, and economic instruments fails, Russia is prepared to employ its conventional military power and proxy forces as needed. China also relies on a comprehensive use of its instruments of national power. Like Russia, China seeks to achieve many of its strategic objectives with nonmilitary instruments of national power and keep military forces in a supporting role that reinforces facts established on the ground with other than overt military action. 4-6. By using all instruments of national power, an adversary is able to further its interests through a range of nonmilitary and military activities that may provide advantages over U.S. forces. Examples of nonmilitary activities include Russia and China's diplomatic efforts to establish security cooperation agreements with neighboring countries as a way to expand regional influence. Another example is China's use of infrastructure projects, as part of “The Belt and Road Initiative”, to grow its economic influence. In both examples, adversaries primarily use nonmilitary means to achieve strategic objectives while weakening U.S. influence and undermining political-military partnerships between the United States and other countries within these same regions. 4-7. Adversaries can pursue more aggressive options through military activities that safeguard their interests abroad, maintain regional stability, and exert influence regionally and globally. These activities may include controlling or reducing access to certain areas of the global commons, challenging the established borders of other nations, or using the threat of force to influence the decisions of neighboring countries. Adversaries may pursue these activities overtly with the use of conventional military forces or covertly through a combination of proxy forces, unconventional warfare, and information warfare. 4-8. Proxy forces are generally non-state actors aligned with respective state actors, and they perform activities on behalf of or in accordance with the state actor’s strategic objectives. Examples of proxies include paramilitary groups, criminal organizations, private civilian organizations, private companies, special interest groups, and religious groups. Covert methods, such as the use of proxy forces, provide adversaries with plausible deniability and cost savings in achieving strategic objectives. ACTIVITIES TO COUNTER A UNITED STATES RESPONSE 4-9. While adversaries desire to further their interests and achieve their goals without U.S. involvement, they will be prepared to counter a response from the U.S. military. To do this, an adversary may attempt to prevent or constrain the United States’ ability to project forces to the region and limit U.S. response options by using the following methods: (cid:122) Conduct information warfare activities to manipulate the acquisition, transmission, and presentation of information in such a way that legitimizes the adversary's actions and portrays the United States as the aggressor. (cid:122) Conduct preclusion activities through nonlethal means to undermine relationships, raise political stakes, manipulate public opinion, and erode resolve to constrain or eliminate basing rights, overflight corridors, logistics support, and concerted allied action.
3-0
93
Operations During Competition Below Armed Conflict (cid:122) Isolate the United States from allies and partners by fostering instability in critical areas and among relevant actors to increase U.S. operational requirements. (cid:122) Create sanctuary from U.S. and partner forces through international law and treaty agreements, monitoring and attacking partner forces from across international borders, and using proxy forces. (cid:122) Conduct systems warfare by executing cyberspace attacks against critical force projection and sustainment infrastructure nodes to delay or disrupt the United States’ ability to deploy forces. Systems warfare approaches include nonattributable attacks on domestic infrastructure and the employment of networked military capabilities that support isolation and preclusion efforts. ACTIVITIES TO PRECLUDE UNITED STATES ACCESS TO A REGION 4-10. Adversaries seek to establish conditions that limit or prevent U.S. access to a region, typically in locations close to their borders. This includes forward positioning of layered and integrated air defenses, early warning surveillance radars, rocket artillery, electronic warfare capabilities, and counter-space capabilities. Additionally, adversaries may seek to position intermediate-range ballistic missiles, cruise missiles, fixed-wing aircraft, unmanned aircraft systems, and naval surface and subsurface forces to shape an operational environment in their favor. Positioning systems that support an antiaccess (A2) strategy allows adversaries to deny or disrupt U.S. access to a region in the event of hostilities while providing leverage against friendly partner nations with the potential use of force. Furthermore, the positioning of systems capable of delivering conventional and nuclear munitions creates additional challenges for the United States. An adversary’s ability to establish, maintain, and demonstrate robust A2 systems bolsters its domestic narratives while eroding partner nation trust and confidence. 4-11. Friendly forces must assume they are always under observation because of all the means available to a peer adversary, particularly those available in space and cyberspace. In addition to forward positioning capabilities that support A2 and area denial (AD) approaches, these adversaries seek understanding of the disposition, readiness, and activities of U.S. forces within a contested region. Adversary activities include reconnaissance of U.S. military installations, unit movements, ports of embarkation and debarkation, and staging areas to identify potential targets for ballistic missiles and long-range fires. Adversaries employ cyberspace tools to conduct reconnaissance of friendly networks to identify vulnerabilities for possible exploitation. An adversary may conduct probing actions in the air and maritime domains to test responses by U.S. and other friendly forces. The intelligence gained through these activities will prepare an adversary for hostilities in the event a situation escalates to armed conflict. (See the ATP 7-100 series for a detailed discussion on specific threat capabilities and employment strategies. See Chapters 6 and 7 for specific examples of how adversaries are likely to employ A2 and AD capabilities in the beginning of a conflict.) PREPARATION FOR LARGE-SCALE COMBAT OPERATIONS 4-12. Army forces that cannot credibly execute operations during armed conflict neither deter adversaries nor assure allies and other unified action partners. Preparation for large-scale combat operations is therefore the primary focus of Army conventional forces during competition. While there are multiple forms of armed conflict, large-scale combat among state actors is the most complex and lethal form of armed conflict, and it demands significant focus along multiple lines of effort to prepare for it. Some of the activities Army forces execute to prepare for armed conflict include— (cid:122) Setting the theater. (cid:122) Building allied and partner capabilities and capacity. (cid:122) Improving joint and multinational interoperability. (cid:122) Protecting forward-stationed forces. (cid:122) Preparing to transition and execute operation plans (OPLANs). (cid:122) Training and developing leaders for operations in specific theaters. SET THE THEATER 4-13. Setting the theater is the broad range of activities continuously conducted to establish conditions for the successful execution of operations in a theater. Setting the theater never ends. It is conducted to
3-0
94
Chapter 4 enhance an operational environment in ways favorable to friendly forces and occurs during competition, crisis, and armed conflict. While setting the theater occurs across each strategic context, its importance is greatest during competition because that is when the most time is available. Army forces must set the theater during competition to enable quick transitions during crisis and conflict, when time favors the aggressor. Army forces use military engagements, security cooperation, and other activities to assess and understand the current conditions within the theater and execute specific theater setting activities to enable joint forces and other unified action partners. 4-14. Setting the theater requires a comprehensive approach among unified action partners and bilateral or multilateral diplomatic agreements that allow U.S. forces access to ports, terminals, airfields, and bases in the area of responsibility (AOR) to support future operations. This includes but is not limited to theater opening; reception, staging, onward movement, and integration (RSOI); establishing networks; classifying routes; and other operational activities that set the conditions for operations in the AOR. Information activities are a significant part of setting the theater. They enable decision making, protect friendly information, inform domestic and international audiences, and influence foreign audiences, while helping to counter adversary information warfare. 4-15. Setting the theater is a continuous activity for all staff sections and warfighting functions. It involves significant sustainment, air and missile defense (AMD), engineering, information collection, intelligence, and communications focused on setting conditions to counter known or potential threats to U.S. interests across the AOR. All warfighting functions, functional areas, and branches that comprise staffs and commands conduct preparation of the operational environment to address unique considerations for setting the theater within their respective areas of expertise (for example, civil preparation of the environment and joint intelligence preparation of the operational environment). (For more information about the land component's roles and responsibilities for setting the theater in conflict, refer to JP 3-31 and JP 3-35. For additional information about the subordinate Army tasks and activities associated with setting the theater, refer to ATP 3-93 and FM 4-0. See paragraphs 4-61 and 4-62 of this publication for considerations unique to theater armies and Chapter 7 for theater-setting considerations in a maritime environment.) BUILD ALLIED AND PARTNER CAPABILITIES AND CAPACITY 4-16. Army forces fight as part of a joint and multinational force. The United States cannot achieve its security interests without the cooperation of treaty allies, partner nations, and other unified action partners. Helping partner nations build, rebuild, or maintain their national security institutions is a critical step in maintaining regional stability, and it is ultimately less expensive than requiring U.S. forces to do so. Additionally, by maintaining partner-nation security institutions, the Army helps add to the aggregate force that is available to potentially deter adversary forces or counter them if they choose to pursue their goals through armed conflict. Forward-stationed U.S. Army forces, by themselves, generally do not enjoy favorable combat power ratios with peer adversaries. Allies and other partners provide the bulk of forces initially able to conduct operations during armed conflict. This combined force capability enhances deterrence for both the partner nation and the United States. (See paragraphs 4-39 through 4-52 for more information on how Army forces help build allied and partner capabilities.) 4-17. Combined training and exercises with partners play a key role in building allied and partner capabilities and shaping an operational environment. Such events are the most overt and visible means of demonstrating friendly capabilities, interoperability, and will. Exercises also help set the theater. Multinational forces that maintain high levels of combat readiness provide the credibility essential to assure partners and deter adversaries. Combined exercises build relationships and mutual respect among allies and other multinational partners, identify systems and processes to employ partner capabilities effectively, and reveal shortfalls to be improved upon. Training exercises occur at all echelons of command, from tactical units to large, combined task forces. The application of lessons learned during these exercises is key to improving multinational interoperability during competition. An example of a failure to prepare for large-scale combat operations occurred in the Philippines in 1941.
3-0
95
Operations During Competition Below Armed Conflict Failure to Prepare for War: Philippines, 1941 During the summer of 1941 the United States Army took steps to prepare for potential armed conflict with Japan. The War Department created the United States Army Forces in the Far East (USAFFE) and recalled General Douglas MacArthur to active duty to serve as the commanding general. The War Department provided USAFFE with the priority for equipment and reinforcements within the Pacific Theater of Operations to support General MacArthur’s defensive plans. By December 1941, USAFFE had made significant strides, but had not done enough to effectively prepare for armed conflict. When Japan’s forces attacked the Philippines on 8 December 1941, ten hours after their attack on Pearl Harbor, Hawaii, USAFFE was short personnel, supplies, and equipment. Aside from a provisional tank group, most forces were ill equipped and possessed obsolete weapons and vehicles. The Philippine armed forces, whose readiness was also a USAFFE responsibility, were even less prepared than U.S. forces. They lacked modern weapons, effective logistics systems, and training. The War Department and USAFFE attempted to make up for these shortcomings by distributing supplies from pre-positioned stocks on the islands of Corregidor and the Bataan Peninsula to both U.S. and Philippine units stationed throughout the archipelago. The Far East Air Force was equally unprepared. It lacked early warning systems and anti-aircraft artillery. Planned survivability improvements to airfields were incomplete, leaving aircraft exposed on flight lines and parking aprons. As a result, the Far East Air Force lost over half of its aircraft by the conclusion of the first day of the war, most of which were destroyed on the ground. Although the U.S. and Philippine forces mounted a fierce resistance for nearly six months, Japan eventually isolated the defenders in the Bataan Peninsula and on the island of Corregidor with naval and air forces. In the absence of friendly air and naval support, the U.S. and Philippine forces were unable to receive reinforcements, resupply, or conduct an evacuation. As a result, the U.S. and Philippine forces in the Bataan Peninsula fell to Japan’s forces in April 1942, and the remaining forces on Corregidor and the surrounding islands surrendered in May 1942. INTEROPERABILITY 4-18. The ability of Army forces to fight as a cohesive whole, integrated with the joint force, allies, and partners, is vital to maximizing combat power and creating a deterrent effect in a theater. Interoperability is the ability to act together coherently, effectively, and efficiently to achieve tactical, operational, and strategic objectives (JP 3-0). An Army formation that is interoperable with joint and multinational partners is substantially more capable than one that is not. Interoperability with any unified action partner is essential to effective operations. Interoperability standards and procedures must be trained, tested, and refined during competition; it is too late to seek interoperability once a crisis or armed conflict begins. 4-19. Interoperability starts with mutual understanding across echelons throughout a multinational force. Effective interoperability includes understanding technical challenges and developing methods to bridge gaps, understanding the tactical capabilities of each member in the multinational force, and integrating partners into a unified operational approach. During competition, the theater army or a delegated command is responsible for building the infrastructure that enables this. Communication is primarily achieved through liaison teams, understanding staff processes, and ensuring adequate access to partner nation command and control (C2) systems (within the limits of national caveats). Understanding foundational interoperability requirements like NATO doctrine; American, British, Canadian, Australian, and New Zealand (known as ABCANZ) Armies Program interoperability standards; and Combined Forces Command (in the Republic of
3-0
96
Chapter 4 Korea) processes is critical to communicate and interoperate with allied forces. It is essential that these requirements and standards are incorporated into routine training and exercise planning at all echelons to build the required interoperable readiness needed in a time of crisis or conflict. (See FM 3-16 for more information on multinational operations and interoperability.) PROTECT FORWARD-STATIONED FORCES 4-20. Peer threats possess reconnaissance and surveillance, fires; special operations forces; and other capabilities that can range forward-stationed Army forces and place them at risk. The protection of Army forces forward, under the assumption that deterrence is not guaranteed, is essential. Army forces implement procedures and conduct necessary activities to ensure they, and the elements of the joint or partner force they protect, can endure an initial attack with little early warning. This includes preparation for threat attacks from any domain that is informed by understanding what holds friendly forces at risk and how a threat may attack. An adversary could attack using capabilities from domains other than land, either to set conditions on the ground or as a means of escalation designed to limit friendly options. Preparation by Army forces therefore includes planning and integration with other elements of the joint force. Coordination for Army and joint capabilities that are able to protect friendly forces during armed conflict and enable them to endure until they can be supported is critical to establishing deterrence. 4-21. The demonstrated ability of Army forces to withstand an adversary’s initial attack adds to the integrated deterrence effect on adversaries and may dissuade them from escalation. Host-nation capabilities may constitute a significant part of force protection and forward defense, so they must be integrated into theater protective efforts. Forward deployed forces that cannot be adequately protected or quickly repositioned during adversary escalation to armed conflict should be relocated to more defensible locations. PREPARE TO TRANSITION AND EXECUTE OPERATION PLANS 4-22. Army forces at every echelon prepare to execute OPLANs that they are expected or likely to support. The foundation for this is active, continuous information collection and intelligence analysis. Higher echelons, such as the theater army and corps, identify initial targets and the required Army and joint capabilities needed to attack those targets in the initial stages of an armed conflict. They likewise consider whether general defense plans that provide guidance for subordinate unit immediate action during the early stages of a conflict initiated with few indications or warnings are necessary or prudent. 4-23. Preparation to execute OPLANs must extend to all echelons and partners. Lower tactical echelons train tactical tasks related to the parts of an OPLAN they support or execute. Units conduct deployment rehearsals and emergency deployment readiness exercises to improve response times and validate plans. Rehearsals with unified action partners build mutual understanding and improve interoperability. Units conduct thorough reconnaissance of all lines of communications, infrastructure, avenues of approach, assembly areas, and potential firing points or battle positions. Leaders and Soldiers should walk the actual terrain that engagements and battles could be fought on and, when possible, they should use this terrain for rehearsals. A shared understanding of OPLANs, terrain, and adversaries down to the lowest tactical echelon will allow an effective transition to armed conflict. TRAIN AND DEVELOP LEADERS 4-24. Leaders prepare themselves, their subordinates, and their organizations for operations in specific combatant command AORs. When developing expertise in specific regions, units become familiar with applicable OPLANS and coordinate with the theater army, the assigned military intelligence brigade-theater (MIB-T), and other theater army-assigned units as appropriate. This regionally specific readiness augments ongoing training and leader development activities conducted across the force. (See Chapter 8 for a detailed discussion on the role of leadership during operations.) RELATIVE ADVANTAGES DURING COMPETITION 4-25. During competition, Army forces seek relative advantages at the theater strategic, operational, and tactical levels. Relative advantages are advantages that Army forces provide the joint force commander (JFC) in relation to a specific adversary, and they are always contextual. They are necessary to deter adversaries,
3-0
97
Operations During Competition Below Armed Conflict assist the joint force in promoting U.S. interests, and set conditions to conduct operations during crisis and armed conflict. These advantages augment unified action partner activities, and they address Service-specific issues identified during combatant command campaign development. Identifying, achieving, and maintaining these advantages helps the Army employ combat power effectively during crisis and armed conflict. A relative advantage is temporary. Adversaries quickly adapt to counter advantages (especially technological ones) once they are created or employed, and they seek to reduce or eliminate their effectiveness. 4-26. Understanding advantage relative to an adversary requires understanding the adversary’s capabilities and will, friendly capabilities and will, and the operational environment within the theater. It further requires understanding of the interrelated influences of each dimension in an operational environment, including how physical, human, and information factors affect each other in a specific context. Changes in one dimension often have outcomes in the other two and in more than one physical domain. PHYSICAL ADVANTAGES DURING COMPETITION 4-27. Due to the expected tempo of operations, a sufficient number of Army forces comprised of the right capabilities must be forward stationed to provide CCDRs with a credible deterrent force and the ability to respond, when necessary, to adversary actions. Physical advantage encompasses combat power and the correlation of forces: the ability to deliver effects, superior range, and the ability to concentrate superior capabilities at the right places and times. Examples of activities that create physical advantages during competition include— (cid:122) Working with allies to conduct a deployment exercise of a theater-tailored unit to improve its OPLAN integration and interoperability. (cid:122) Surveying a potential assembly area with a forward engineer support team to determine if the area is of sufficient size to accommodate a properly dispersed Army formation. (cid:122) Hardening facilities against attack and rehearsing drills in response to potential adversary courses of action. (cid:122) Maintaining stocks of key supplies and equipment (Army pre-positioned stocks [APS]) in or near areas of concern to accelerate deployment of forces during crises or armed conflict. INFORMATION ADVANTAGES DURING COMPETITION 4-28. Information activities play a key role during competition. They include Army support to the combatant command and unified action partner strategic messaging. Coordinating with interagency and other unified action partners helps to develop and deliver coherent messages that counter adversary disinformation. Army forces reinforce strategic messaging by maintaining and demonstrating U.S. Army readiness for operations. Examples of relative information advantages are— (cid:122) Identifying targets and conducting target development on threat capabilities. (cid:122) Setting the conditions for convergence by developing methods to penetrate adversary computer networks. (cid:122) Discrediting adversary disinformation by helping the JFC inform domestic and international audiences through Army and joint information activities. (cid:122) Promoting the purpose and outcomes of multinational exercises and training events. (cid:122) Continuously monitoring the operational environment to detect changes to adversary methods or narratives. HUMAN ADVANTAGES DURING COMPETITION 4-29. The institutional depth and professionalism of U.S. Army personnel contribute to the morale and will of partner security forces as Army forces interact across all ranks and echelons. Army formations serve as a professional force operating under the rule of law as guests in a specific region to facilitate the accomplishment of mutual military training goals. This can be a powerful advantage over adversaries who seek to extract concessions, including financial and informational gains, from other countries or groups. This bond of trust forms the foundation of the U.S. alliance system, and it is the primary means to ensure the
3-0
98
Chapter 4 security of the United States and its partners. Examples of activities that help achieve human advantages include— (cid:122) Training U.S. and partner nation forces in multinational exercises at combat training centers. (cid:122) Routine interaction with allies and other unified action partners that builds and maintains human, technical, and procedural interoperability through agreed-to standards. (cid:122) Hosting international officers at U.S. professional military education programs and sending U.S. officers to international military schools. (cid:122) Sustained presence by theater-aligned advisor teams that builds relationships and promotes interoperability over time. INTERAGENCY COORDINATION 4-30. Military engagement, security cooperation, and deterrence activities usually involve a combination of military forces and capabilities separate from, but integrated with, the efforts of interagency participants. These actions are coordinated by diplomatic chiefs of mission and country teams. Understanding their roles and relationships is critically important. The Department of State is responsible for the diplomatic instrument of national power. Chiefs of mission are the final approval authorities for all U.S. military activities that occur in the nation they are responsible for, and they have the authority to modify the execution of planned activities during competition. (See JP 5-0 for more information on country-specific plans.) 4-31. Activities that occur during competition encompass a wide range of actions where the military instrument of national power supports and is subordinate to the other instruments of national power. Competition overseas generally requires cooperation with international organizations (for example, the United Nations) and government entities in other countries to protect and enhance mutual national security interests, deter conflict, and set conditions for future contingency operations. UNITED STATES DIPLOMATIC MISSION 4-32. U.S. diplomatic missions include representatives of all U.S. departments and agencies physically present in the country. Chiefs of missions are the principal officers in charge of diplomatic missions. They are often, but not always, ambassadors. They oversee all U.S. government programs and interactions with and in a host nation. The chief of mission is the personal representative of the President and reports through the Secretary of State, ensuring all in-country activities serve U.S. interests and regional and international objectives. 4-33. The United States maintains different types of diplomatic missions in different countries. Some countries have only a consulate, many have only an embassy, and others have an embassy and a number of consulates. Typically, Army elements conducting security cooperation activities coordinate with diplomatic mission officials, even in nations with only a consulate. Relationships with consular offices are determined on a case-by-case basis. The same entities and offices existing in an embassy are present or liaised at consulates. (See FM 3-22 for a detailed explanation of this role in relation to Army operations.) COUNTRY TEAM 4-34. The country team is the point of coordination within the host country for the diplomatic mission. The members of the country team vary depending on the levels of coordination needed and the conditions within that country. The country team is made up of the senior member of each represented U.S. department or agency, as directed by the chief of mission. The team may include the senior defense official or defense attaché, the political and economic officers, and any other embassy personnel desired by the ambassador. 4-35. The country team informs various organizations of operations, coordinates elements, and ensures unity of effort. Military engagement with a host country is coordinated through the Defense Attaché Office or Office of Security Cooperation at the embassy or consulate. However, several other attachés and offices may also be integral to security cooperation activities, programs, and missions. The country team provides the foundation of local knowledge and interaction with the host-country government and population. As permanently established interagency organizations, country teams represent the single point of coordination, integration, and synchronization of security cooperation activities supported by combatant commands and
3-0
99
Operations During Competition Below Armed Conflict the theater army. It is incumbent upon the theater army, with the approval of the combatant command, to work with and inform the country team of recommendations for military engagement, security cooperation, and deterrence activities that involve Army forces across all domains. COMPETITION ACTIVITIES There is only one thing worse than fighting with allies, and that is fighting without them. Attributed to Winston Churchill 4-36. Competition involves activities conducted under numerous programs within a combatant command. The CCDR uses these activities to improve security within partner nations, enhance international legitimacy, gain multinational cooperation, and influence adversary decision making. Competition activities include obtaining access for U.S. forces, maintaining sufficient forward-based presence within a theater to influence conditions in the strategic environment, and mitigating conditions that could lead to a crisis or armed conflict. At any time during competition, but especially during times of heightened tension, leaders must take great care to ensure Army forces avoid activities that accidently provoke crisis or armed conflict. Army forces, as directed by the theater army, must stay within an activity level that meets the CCDR’s intent for readiness without unintentionally increasing tensions. 4-37. Activities that occur during competition are directly tied to authorities provided in various titles of the United States Code and approved programs, and they are integrated and synchronized with the Department of State, other government agencies, country teams, and ambassadors’ plans and objectives. The Department of State and the United States Agency for International Development (USAID) help produce the joint regional strategy to address regional goals, management, and operational considerations. Each country team develops both an integrated country strategy and a country development cooperation strategy to address joint mission goals and coordinated strategies for development, cooperation, security, and diplomatic activities. Working with the Department of State and various country teams, the CCDR develops country-specific security cooperation plans, which are codified in the country-specific security cooperation section of the combatant command campaign plan (CCP). Some CCPs include regional country plans, posture plans, and theater distribution plans that facilitate synchronization of resources, authorities, processes, and timelines to favorably affect conditions within the CCDRs’ AORs. 4-38. Army forces execute activities during competition that support joint force campaigning goals, satisfy interagency requirements, and set the necessary conditions to employ Army combat power during crisis and armed conflict. The theater army works with the CCDR to develop objectives for the employment of Army forces in theater and develops support plans to address Army-specific activities. Army forces provide security cooperation capabilities across any given theater of operations by conducting military engagement, security cooperation, nuclear deterrence, counter-weapons of mass destruction activities, and humanitarian assistance. MILITARY ENGAGEMENT 4-39. Military engagement is contact and interaction between individuals or elements of the Armed Forces of the United States and those of another nation’s armed forces, or foreign and domestic civilian authorities or agencies, to build trust and confidence, share information, coordinate mutual activities, and maintain influence (JP 3-0). Military engagement occurs as part of security cooperation, but it also extends to interaction with domestic civilian authorities. Army forces will also routinely communicate with nongovernmental organizations, either directly or indirectly, to ensure expectations and roles are understood. 4-40. CCDRs and Army senior leaders seek out partners and communicate with adversaries to discover areas of common interest and tension. This increases the knowledge base for subsequent decisions and resource allocation. Such military engagements can reduce tensions and may prevent conflict, or, if conflict is unavoidable, they may allow the United States to enter into conflict with greater access and stronger alliances or coalitions. Army forces support military engagement through deliberate interactions with unified action partners at the junior Soldier through senior leader levels. The State Partnership Program provides a good example of how powerful military engagement can be.
3-0
100
Chapter 4 Successful Engagement: State Partnership Program The State Partnership Program supports the security cooperation objectives of CCDRs by developing enduring relationships with partner countries and carrying out activities to build partner capacity, improve interoperability, and enhance U.S. access and influence while increasing the readiness of U.S. and partner forces to meet emerging challenges. The program links a state’s National Guard with the partner nation’s military, security forces, and disaster response organizations in a cooperative relationship. Since the program’s inception in 1993 with the three Baltic Republics, it has expanded to encompass partnerships with 89 nations. Most of the earliest State Partnership Program partner countries in Europe have gone on to become U.S. allies in NATO, and many of them credit the State Partnership Program and their National Guard partners with helping make that possible. By building enduring relationships based on mutual trust and support, the State Partnership Program has expanded the pool of aligned global security providers and improved the capabilities of both U.S. Army units and partner nation militaries across the world. SECURITY COOPERATION 4-41. Security cooperation is all Department of Defense interactions with foreign security establishments to build security relationships that promote specific United States security interests, develop allied and partner nation military and security capabilities for self-defense and multinational operations, and provide United States forces with peacetime and contingency access to allied and partner nations (JP 3-20). These efforts may include Army forces participating in joint and multinational exercises and employing regionally aligned forces. Conducting security cooperation is one of the Army’s primary stability tasks. 4-42. Security cooperation is governed by the Foreign Assistance Act (22 United States Code [USC], 2151) and the Arms Export Control Act (22 USC, 2751) addressing DOD interactions with other nations. The Department of State is the lead agency for security sector assistance. All DOD security cooperation programs must nest with Department of State security sector guidance. (See JP 3-20 for more information on joint security cooperation and FM 3-22 for additional details on Army support to security cooperation.) 4-43. Commanders and staffs conduct security cooperation to develop allied and other friendly military capabilities for self-defense and multinational operations, to improve information exchange and intelligence sharing, to provide U.S. forces with peacetime and contingency access, and to mitigate conditions that could lead to a crisis. Multiple types of security cooperation activities can often occur simultaneously with overlapping purposes. These activities include security assistance, security force assistance (SFA), foreign internal defense (FID), and support to security sector reform efforts. Security Assistance 4-44. Security assistance is a group of programs the U.S. Government uses to provide defense articles, military training, and other defense-related services by grant, lease, loan, credit, or cash sales. Security assistance programs are typically focused on the transfer of defense articles and services to eligible foreign governments, the provision of training and education to foreign military personnel, and the sale of construction services in support of partner nations’ military establishments. Military education and training exchanges are invaluable for building interoperability and fostering trust over time between U.S. Army and partner personnel. Security Force Assistance 4-45. Security force assistance is the Department of Defense activities that support the development of the capacity and capability of foreign security forces and their supporting institutions (JP 3-20). Security forces
3-0
101
Operations During Competition Below Armed Conflict are duly constituted military, paramilitary, police, and constabulary forces of a state (JP 3-22). Consistent with Department of Defense (DOD) policy for SFA, the Army develops, maintains, and institutionalizes the capabilities of its personnel to support efforts to organize, train, equip, rebuild or build, and advise foreign security forces and relevant supporting institutions. SFA activities are conducted primarily to assist partner nations to build their capacity to defend against external and transnational threat actors. Security force assistance brigades (SFABs) are Army organizations focused specifically on this mission. (See paragraphs 4-88 through 4-89 and ATP 3-96.1 for information on SFABs.) 4-46. SFA and security assistance are different. Security assistance is a broader set of programs that includes training, but also includes equipment transfers, sales, and other programs. SFA works in conjunction with security assistance programs while focusing specifically on building the capacity and capability of foreign security forces and their supporting institutions. Foreign Internal Defense 4-47. Foreign internal defense is participation by civilian agencies and military forces of a government or international organizations in any of the programs and activities undertaken by a host nation government to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security (JP 3-22). FID includes the actions of both nonmilitary organizations and military forces. 4-48. FID is a comprehensive approach that supports partner development towards democratic governance and military deference to civilian rule. These activities may employ the indirect use of military forces along with diplomatic, informational, and economic means. FID involves the support of a standing host-nation government and its military or paramilitary forces. The focus of all U.S. FID efforts is to support the host-nation’s internal defense and development program to build the capability and capacity of the host nation to achieve self-sufficiency. FID is an Army special operations forces core activity. (See JP 3-22 and ATP 3-05.2 for a detailed discussion of foreign internal defense.) 4-49. SFA and FID have much in common because both enable friendly partners’ capacity to provide for their own defense. While there can be overlap, FID activities are aimed at strengthening a wide range of functions including both military and civilian governmental institutions against internal threats. SFA activities improve military and other security forces against both internal and external threats, and they do not include activities that primarily support other government institutions. Support to Security Sector Reform 4-50. Security sector reform is a comprehensive set of programs and activities undertaken by a host nation to improve the way it provides safety, security, and justice (JP 3-07). The overall objective is to provide these services in a way that promotes an effective and legitimate public service that is transparent, accountable to civilian authority, and responsive to the needs of the public. 4-51. Security sector reform is an umbrella term that includes integrated activities in support of defense and armed forces reform; civilian management and oversight; justice, police, corrections, and intelligence reform; national security planning and strategy support; border management; disarmament; demobilizations and reintegration; and reduction of armed violence. The Army’s primary role is supporting the reform, restructuring or re-establishing the armed forces and the defense sector across the competition continuum. 4-52. U.S. and partner military forces collaborate with interagency representatives and other civilian organizations to design and implement security sector reform strategies, plans, programs, and activities. The Department of State leads and provides oversight for these efforts through the integrated country strategy. The desired outcome of security sector reform programs is an effective and legitimate security sector firmly rooted within the rule of law. NUCLEAR DETERRENCE AND COUNTERING WEAPONS OF MASS DESTRUCTION 4-53. U.S. nuclear capabilities are foundational to the deterrence of adversary weapons of mass destruction use. To ensure the credibility of this deterrent, joint and Army forces must integrate the planning and operations of nuclear and conventional forces. Further, Army forces must plan, train, and exercise to conduct operations under the adversary threat or use of weapons of mass destruction in order to deny the adversary
3-0
102
Chapter 4 any perceived advantage that might result from employing weapons of mass destruction. To do so, commanders and staffs must continuously assess, protect, and mitigate the effects of adversary chemical, biological, radiological, and nuclear (CBRN) weapons use and contamination hazards. They must train under simulated weapons of mass destruction conditions. When under threat of nuclear attack, commanders must balance the risk of dispersing forces to mitigate the impact of nuclear effects across their AO against the ability to concentrate sufficient combat power to achieve objectives. In a chemically contaminated environment, a commander’s decision-making ability is complicated by the effects on Soldier stamina, reaction times, and sustainment. Each of these environments requires unique actions to ensure a formation’s ability to maneuver, fight, and sustain operations. (See ATP 3-90.40 for more information on countering weapons of mass destruction.) HUMANITARIAN ASSISTANCE 4-54. USAID is the lead U.S. government agency, responsible to the Secretary of State, for administering civilian foreign aid and providing humanitarian assistance and disaster relief. USAID often works in concert with Army forces when Soldiers are tasked to provide assistance. It can supplement forces conducting civil affairs operations that the DOD conducts to build relationships and win the trust, confidence, and support of local populations. One example of a successful humanitarian assistance operation occurred during an Ebola outbreak in Liberia in 2014. Liberia: OPERATION UNITED ASSISTANCE In October 2014, a joint force comprised of 3,000 Soldiers, Sailors, Airmen, and Marines deployed to Liberia to help contain and eradicate the Ebola virus. The 101st Airborne Division (Air Assault) served as the joint task force (JTF) headquarters during this operation. The 101st worked with the government of Liberia, the U.S. Embassy, United States Army Africa, USAID, the U.S. Centers for Disease Control and Prevention, and the U.S. Public Health Service. USAID was the lead federal agency. Army units helped build and supported 17 Ebola treatment centers across Liberia. Army forces trained 1,500 health care workers, and a logistic system was established that provided medical supplies and building materials. As a result of the rapid response and achieving unity of effort, Liberia went from 80 new cases of Ebola a day to being declared Ebola-free within seven months. ROLES OF ARMY ECHELONS DURING COMPETITION 4-55. Theater armies, including their assigned theater-echelon commands and brigades, perform essential functions during competition to achieve national objectives while deterring adversary malign action. Corps, divisions, and brigade combat teams (BCTs) are crucial to the execution of operations, activities, and tasks during competition. These forces may support SFA or FID by participating in multinational exercises and conducting humanitarian and other civil-military operations, development assistance, and training exchanges. Army forces at corps and lower echelons directly engage with partner forces, governmental and nongovernmental organizations, and civilian populations to accomplish missions, build rapport, and improve conditions that promote stability. Note. The organizations listed in paragraphs 4-56 through 4-96 have critical roles during competition. Numerous other organizations also provide important contributions. THEATER ARMY ROLES DURING COMPETITION 4-56. The theater army is the primary Army organization that plans, prepares, and oversees the execution of activities conducted by Army forces during competition and assesses the results of these activities. It supports and enables the CCDR’s pursuit and maintenance of operational access critical to achieving advantages
3-0
103
Operations During Competition Below Armed Conflict throughout an AOR while improving the security capabilities of partner nations. Gaining relative advantages during competition requires intelligence about the adversary’s capabilities and intent relative to friendly forces. While adversary intent is more difficult to ascertain, both factors are equally important since capability plus malign intent represent a larger immediate threat than either factor on its own. This understanding allows theater army commanders to recommend actions to the CCDR that impede adversary goals or convince adversaries to seek alternative courses of action more favorable to U.S. interests. 4-57. The theater army integrates Army forces and capabilities with the other instruments of national power on behalf of the CCDR. It fulfills CCDR requirements while simultaneously fulfilling Service-specific requirements for Army forces to prepare for large-scale combat operations. It achieves its support to both the joint force and Army by concentrating on seven functions and by providing oversight or C2 to subordinate Army organizations during competition. Within each theater army function, there are multiple tasks the theater army might fulfill to achieve its mission. (See FM 3-94 and ATP 3-93 for an expanded discussion of each function listed in paragraph 4-58 and the subordinate tasks within each function.) 4-58. During competition, the theater army focuses on enabling the United States, its allies, and other unified action partners to compete effectively below the threshold of armed conflict in ways directed by the CCDR. These persistent and regular activities provide assurance to partner nations and deter adversaries. The theater army does this by focusing on the following functions: (cid:122) Execute the CCDR’s daily operational requirements. (cid:122) Provide administrative control (ADCON) of Army forces. (cid:122) Set and maintain the theater. (cid:122) Set and support operational areas. (cid:122) Exercise C2 over Army forces in the theater. (cid:122) Perform joint roles limited in scope, scale, and duration. (cid:122) Conduct contingency planning for crisis and armed conflict. Combatant Commander Daily Operational Requirements 4-59. The theater army translates the CCDR’s plans and requirements into concrete actions by Army forces. This includes, but is not limited to, the following activities and tasks: (cid:122) Provide Army support to other Services (ASOS). (cid:122) Conduct theater security cooperation. (cid:122) Assess and develop infrastructure. (cid:122) Develop concept plans and OPLANS. (cid:122) Maintain threat models and provide intelligence on significant changes in the operational environment. Provide Administrative Control 4-60. Administrative control is the direction or exercise of authority over subordinate or other organizations in respect to administration and support. The exercise of ADCON fulfills a military department’s statutory responsibilities. ADCON is synonymous with administration and support responsibilities identified in Title 10, USC. ADCON includes organization of Service forces, control of resources and equipment, personnel management, unit logistics, individual and unit training, readiness, mobilization, demobilization, discipline, and other matters not included in the operational missions. The theater army headquarters is responsible for ADCON of all Army forces in the AOR in both peacetime and wartime. (See AR 10-87 for more information on ADCON.) Set and Maintain the Theater 4-61. In addition to the broad requirements in setting a theater, including contributions from all warfighting functions (outlined in paragraphs 4-13 through 4-15), theater armies have unique requirements for theater setting met by conducting sustainment preparation of the operational environment. Sustainment preparation of the operational environment is a continuous shaping activity involving analysis to determine infrastructure, environmental, or resource factors in the operational environment that impact the Army’s ability to sustain a
3-0
104
Chapter 4 commander’s OPLAN. Analysis products cover such topics as host-nation support, selection of lines of communications, determination of operational stock assets, replacement operations, and design of a distribution network and information technology infrastructure for the theater. In most cases these resources (including host-nation labor and services) will be shared with partners of other nations in accordance with negotiated agreements. (See FM 4-0 for more information on sustainment preparation of an operational environment.) 4-62. The theater army continually analyzes, evaluates, and, when directed, expands APS to rapidly provide JFCs with needed Army capabilities. APS augment allocated Army rotational forces already serving in a theater and theater-assigned forces. The tempo and intensity of operations during crisis or armed conflict may not allow for the timely deployment of all of an apportioned force’s equipment sets from the United States via strategic airlift or sealift. Depending on the theater, this may require a large and dispersed equipment force posture based at multiple hardened sites. If needed, a high operational readiness rate will be maintained for APS that allows Army forces to fall in on the equipment and employ it within a few days of arriving in theater. The theater army coordinates with Army Materiel Command to maintain and optimize APS. (For additional information on APS, refer to ATP 3-35.1.) Set and Support Operational Areas 4-63. Setting and supporting operational areas for the joint force occurs at operational and tactical echelons. During competition, the theater army helps identify likely joint operations areas (JOAs) for ground forces. The theater army ensures that the JOA includes bases and base camps needed by forces that primarily operate in the land domain. (See ATP 3-37.10 for a discussion on base and base camp planning.) Planners must take a holistic approach to understand the needs of the other Services and address Army requirements. Due to the large amount of information needed at the tactical echelon to properly set and support JOAs, the theater army usually needs to develop a multi-year plan that examines potential areas of operations (AOs). The theater army relies on a large number of low density and high demand units to conduct this tactical level of analysis. Many of these capabilities reside in the United States Army National Guard or the United States Army Reserve. Exercise Command and Control Over Army Forces in the Theater 4-64. The theater army is the Army Service component command (ASCC), and it has the responsibility to control attached and assigned Army forces within the AOR through ADCON and operational control (OPCON) or tactical control (TACON). As the Army component of the combatant command, the ASCC is the ARFOR for the theater. When a subordinate JTF is established containing Army forces, the senior Army headquarters in that JTF is normally designated as its ARFOR. (See Appendix B for details on command and support relationships.) 4-65. The theater army initially maintains control of all Army forces assigned to an AOR until control is passed to a subordinate JTF in a JOA. This control is usually passed from the theater army to the JTF when the Army force is ready for onward movement and integration into the JTF. As part of controlling Army forces, the theater army (or other headquarters designated as the ARFOR) maintains ADCON of Army forces and addresses Service responsibilities such as coordinating ASOS. Perform Joint Roles of Limited Scope and Duration 4-66. While serving as the ASCC, the theater army has the capability to perform three joint roles for the CCDR. With augmentation, the theater army can be the theater joint force land component command, a JTF, or the joint force land component command to a JTF in a JOA. However, these roles can only be performed in limited scope, scale, and duration, unless the JFC provides significant augmentation. Contingency Planning for Crisis and Conflict 4-67. A key aspect of combatant command and Service component planning during competition or crisis is the development of contingency plans. A contingency plan is a branch of a campaign plan that is planned based on hypothetical situations for designated threats, catastrophic events, and contingent missions outside of crisis conditions (JP 5-0). Contingency plans are branches to global, regional, functional, and combatant
3-0
105
Operations During Competition Below Armed Conflict campaign plans that address potential threats that put one or more national interests at risk in ways that warrant military operations. Contingency plans anticipate the possibility that campaign activities during competition could fail to prevent aggression, a need to respond to instability in a key state or region, or response to natural disasters. (See JP 5-0 for more information on contingency planning.) 4-68. The theater army commander and staff assist the combatant command in developing contingency Theater commanders may direct the development plans, including developing subordinate plans for of a general defense plan to ensure focused Army forces as required. Theater army planners preparation for conflict, particularly with regard to routinely review and update contingency plans to actions friendly forces take when conflict is ensure they remain feasible. This includes a review imminent, so Army forces understand their requirements during the opening phase of an of Army force structure and its relation to joint enemy attack. time-phased force and deployment data (TPFDD). This relationship is covered in detail under force tailoring in paragraph 4-71. Army corps and divisions that are regionally aligned to a specific combatant command may develop subordinate plans as directed. Army corps and divisions train for and rehearse these plans in Joint Chiefs of Staff-directed exercises, Army Mission Command Training Program exercises, and other training events. (See ADP 5-0 for doctrine on Army planning.) 4-69. Theater army and select subordinate organizations prepare for operations that could occur in the rear areas identified during OPLAN development. Planning and preparing for rear area operations facilitates consolidation of gains during armed conflict. Where possible, the theater army should involve the rear area command posts of regionally aligned corps and divisions in the development and refinement of plans dealing with rear areas likely to be part of those units’ AOs. Regionally aligned units that primarily operate in the rear area must be included in planning and exercises whenever possible. 4-70. Army formations coordinate, rehearse, and support host-nation execution of stability and security missions. These efforts help minimize the diversion of combat power from other priorities. Civil affairs units have expertise for analyzing potential civil networks to execute these missions. They identify potential civil networks through civil preparation of the environment and the civil network development and engagement process. Civil preparation of the environment is the continuous development of civil knowledge within an area of operations to help commanders identify capabilities within civil society that can be integrated with operations for stability and security activities (FM 3-57). This minimizes the requirement for Army forces in the rear area and facilitates the maintenance or restoration of host-nation governance and legitimacy. Force Tailoring 4-71. Force tailoring is the process of determining the right mix of forces and the sequence of their deployment in support of a joint force commander (ADP 3-0). It involves selecting the right force structure for a joint operation from available units within a combatant command and from the Army force pool. Commanders then sequence forces into an AO as part of force projection. JFCs request and receive forces for each campaign phase, adjusting the quantity of Service component forces to match the effort required. TPFDD documents contain both force composition and force flow requirements, and they are the primary method by which JFCs tailor their inbound forces. Theater armies tailor forces to meet land force requirements as determined by JFCs, and they recommend a deployment sequence to meet those requirements. Force tailoring is continuous. (See JP 3-35 for more information on force tailoring and TPFDD development.) THEATER ARMY ASSIGNED FORCES 4-72. Each theater army has assigned or allocated theater-level forces that provide additional support across the CCDR’s AOR and help the theater army achieve its objectives. Different theaters have different subordinate forces with distinct command and support relationships based on theater requirements and force availability. The units listed in paragraphs 4-73 through 4-87 are common theater-level formations that facilitate operations during competition.
3-0
106
Chapter 4 Theater Sustainment Command 4-73. The Theater Sustainment Command (TSC) is the Army’s organization for the integration and synchronization of sustainment in a theater. The TSC connects strategic enablers to tactical formations. It is a theater-committed asset to each theater army, and it focuses on Title 10, USC support of Army forces for theater security cooperation and the CCDR’s daily operational requirements. 4-74. TSCs execute sustainment operations through their assigned and attached units while integrating and synchronizing sustainment operations across an AOR. They have four operational responsibilities to forces in theater: theater opening, theater distribution, sustainment, and theater closing. The task-organized TSC is tailored to provide operational-level sustainment support within an assigned AOR. It integrates and synchronizes sustainment operations for the theater army, including all Army forces forward stationed, transiting, or operating within an AOR. The TSC coordinates Title 10, USC; ASOS; DOD executive agency; and lead Service responsibilities across the entire theater. (See ATP 4-94 for more information on the TSC.) Military Intelligence Brigade-Theater 4-75. The MIB-T is usually assigned to the combatant command with OPCON delegated to the theater army. It provides mission command for the theater army’s information collection and intelligence analysis capabilities across all intelligence disciplines, integrating theater and national architectures and data to support the theater army’s daily operations requirements and preparation for contingency operations. The theater army headquarters specifically relies on the MIB-T for threat characteristics, intelligence estimates, threat and civil considerations, data services, intelligence architecture development and maintenance, and all-source intelligence products. These efforts support theater army planning requirements, including development of Army plans supporting the CCP and maintenance of OPLANs and contingency plans. 4-76. The MIB-T serves as the intelligence anchor point for deploying forces, providing theater-specific expertise and support. It maintains a regional intelligence architecture that deploying and theater-aligned units can access. This allows units to tailor mission planning and training and effectively leverage the broader intelligence enterprise. The MIB-T’s regional focus provides continuity and cultural context to its analytic intelligence products. The brigade can collect, analyze, and track the threat characteristics and doctrine of theater state and non-state actors over many years, providing indications and warnings of changes in an operational environment. This allows it to create and maintain a valuable database of intelligence regarding persons of interest and the evolving doctrine and capabilities of regional military forces. (See FM 2-0 for more information on the MIB-T.) Theater Aviation Elements 4-77. Theater aviation support is executed by theater aviation brigades, theater airfield operations groups, and theater aviation sustainment maintenance groups. Each theater aviation brigade can conduct assault or general support aviation tasks in support of the theater and its subordinate commands, but it requires augmentation with attack aviation or unmanned aircraft system (UAS) units to conduct attack, reconnaissance, and security operations. Combat aviation brigades may also support theater aviation operations with lift, attack, and UAS capabilities. Theater airfield operations groups provide air traffic services, conduct airfield management operations, and support RSOI requirements for aviation assets. The theater aviation sustainment group is resourced to provide aviation sustainment maintenance and limited depot sustainment support throughout the theater AO. (See FM 3-04 for more information on aviation brigades and groups.) Army Air and Missile Defense Command 4-78. The Army air and missile defense command (AAMDC) is the highest echelon for air defense artillery units. It is usually under OPCON of the theater army, or land component command if designated, with the AAMDC commander serving as the theater Army AMD coordinator. The AAMDC is also usually in direct support of the theater air force, or air component command if designated, with the AAMDC commander serving as the theater deputy area air defense commander. The AAMDC participates in theater exercises and integrates with joint and multinational partners in all aspects of AMD operations. It provides assets and coordinates coverage to protect forward-positioned joint and Army forces, and critical infrastructure, from
3-0
107
Operations During Competition Below Armed Conflict air, missile, and rocket attack. This protection includes early warning, surveillance, tracking, and defense against tactical short-range targets through intermediate-range ballistic missiles. (See FM 3-01 and ATP 3-01.94 for more information on AAMDC planning and execution.) Signal Command (Theater) or Strategic Signal Brigade 4-79. The theater army is the designated DOD executive agent for setting and supporting the theater communications and network infrastructure in all AORs. The theater army executes these responsibilities either through a signal command (theater) or strategic signal brigade assigned to support the AOR. Either unit provides connectivity to Defense Information Systems Network services up to secret classification. This connectivity includes establishing and operating the theater network architecture to support all joint and Army forces operating in an AOR. 4-80. The signal command (theater) or strategic signal brigade provides oversight, leadership, and technical direction over the theater network and spectrum management support for all Army units across the theater. It also provides— (cid:122) Centralized management of data, voice, and video networks, including interfaces with joint, interorganizational, and multinational systems in the theater. (cid:122) Enforcement of global cybersecurity policies to support the CCDR and theater army commander. (cid:122) Oversight of units installing, operating, maintaining, and securing signal support systems and network interfaces to joint and multinational partner systems in theater. (cid:122) Establishment of mission priorities to ensure network capabilities are available to meet commanders’ information requirements. Theater Engineer Command 4-81. The theater engineer command (TEC) supports the theater army by organizing and directing Army combat, general, and geospatial engineer assets to improve mobility, enhance survivability, enable force projection and logistics, build partner capacity, and develop infrastructure. The primary focus of the TEC during competition is to determine and build the needed infrastructure to facilitate deployment of U.S. forces, protect forward-stationed U.S. forces, and, where possible, build up the capabilities of allied and partner nations to withstand an initial assault by a peer threat. Examples of engineer activities the TEC directs are conducting route analysis and terrain analysis of potential assembly areas for large Army units like BCTs and identifying needed assets to construct dispersed base clusters in the rear areas to support logistics operations in the close area. When directed, the TEC also provides C2 for engineers from other Services and multinational organizations and provides technical oversight (quality assurance and surveillance) assistance for contracted construction engineers according to the relationships established by the JFC. (See FM 3-34 for more information on theater engineer commands.) Battlefield Coordination Detachment 4-82. A battlefield coordination detachment (BCD) is a specialized, regionally focused Army element that serves as the senior Army operational commander's liaison with the air component. A BCD is co-located with the joint air operations center (JAOC), combined air operations center, or the Air Force air operations center. 4-83. The BCD is the Army's interface for systems connectivity to the JAOC and for personnel integration with their JAOC counterparts. The BCD supports the land component command during large-scale combat operations. Army corps relay requirements and requests to the land component, who, in turn, relays land component requirements and requests for joint force air component support through the BCD. The BCD represents the joint force land component commander throughout the joint air tasking cycle in the JAOC. (See ATP 3-09.13 for doctrine on the BCD.) Theater Fires Command or Element 4-84. An Army theater fires command or theater fires element provides C2 of assigned fires capabilities, serves as the senior organization assigned to a theater army to integrate allocated or assigned fires capabilities, and executes critical fire support functions. It develops and nominates joint targets across the theater. This
3-0
108
Chapter 4 support to joint targeting supports the continuous setting of the theater and coalition forces land component commander (CFLCC), field army (when constituted), and corps operations. The theater fires command or element ensures the Army’s contribution to the joint targeting process is effectively planned and executed during competition and crisis and can quickly transition to large-scale combat operations in accordance with the ground force commander's priorities. (See FM 3-09 for additional information on theater fires commands and elements.) Army Field Support Brigade 4-85. The Army field support brigade links strategic resources to tactical units, and it can be assigned in support of a theater army or a corps. It provides APS readiness, ensuring stocks are maintained for use by arriving forces during crisis or armed conflict. The execution of APS equipment configuration and handoff operations are exercised as individual events and also as part of larger exercises, including the DEFENDER exercise series. Army field support brigades also run logistics civil augmentation programs. These can be used to provide resources to emerging needs, including theater-wide contract and other support to theater setting and opening requirements. The relationships developed during competition with potential contract support organizations can be leveraged to meet sustainment requirements using organizations already in theater. These and other functions are integral to building and maintaining combat power for large-scale combat operations by enabling the rapid and effective arrival and employment of Army forces. (See ATP 4-98 for additional details on the Army field support brigade.) Multi-Domain Task Force 4-86. The multi-domain task force (MDTF) provides the joint force with a formation capable of employing long-range precision fires and other effects from multiple domains in support of the commander’s objectives. It is designed to defeat complex enemy systems through the collection of information and different forms of lethal and non-lethal fires. When required, it can be task-organized to provide capabilities to the JTF or component commander. During competition, the MDTF may be forward stationed in a CCDR’s AOR to employ joint and Army capabilities in support of target development. The MDTF headquarters coordinates and synchronizes the information collection operations of its assigned formations with other theater and national assets. 4-87. The MDTF is capable of coordinating and integrating cyberspace electromagnetic activities and space capabilities with long-range surface fires to deceive, neutralize, or disrupt enemy formations, C2 nodes, and cyberspace electromagnetic activities. It does so to enable Army and joint forces to penetrate and disintegrate enemy A2 and AD enabling C2 systems and exploit the resulting freedom of maneuver. The MDTF is designed to operate in a distributed fashion while retaining the ability to deliver effects that create opportunities for joint force exploitation. Based upon specific mission variables, the MDTF may be augmented with capabilities from across the warfighting functions. Security Force Assistance Brigades 4-88. Security force assistance brigades (SFABs) provide advisors to conduct worldwide SFA operations to develop the capacity and capability of foreign security forces and their supporting institutions in support of theater security cooperation objectives. Advisors shape an operational environment by strengthening allies and building lasting partnerships. Advisors increase host-nation capability through joint exercises, and they remain ready to support the partnered force’s operations and modernization in conjunction with other instruments of national power. An SFAB improves interoperability by providing teams to advise partner- nation forces across all warfighting functions. It advises at the battalion, brigade, division, and corps levels. When the SFAB is consistently employed with a partner nation, it can improve a partner-nation security force. 4-89. SFABs are regionally aligned to a specified geographic area to cultivate an in-depth knowledge and experience base capable of addressing the unique concerns of a given theater. The advisors in SFABs, in conjunction with civil affairs and theater information collection assets, enhance the common intelligence picture for a CCDR since they have direct knowledge of a partner’s force capabilities and have experience with their population. When directed, they conduct liaison and support activities to enable multinational operations during armed conflict. SFABs are uniquely manned and equipped to provide enduring presence
3-0
109
Operations During Competition Below Armed Conflict in regions of strategic competition to promote interoperability, build partner conventional warfighting capacity, and set conditions for contingency operations. (See ATP 3-96.1 for additional details on the SFAB.) CORPS ROLES DURING COMPETITION 4-90. When a corps is present in a CCDR’s AOR, it provides the C2 linkage between subordinate tactical echelons and theater strategic echelons. For example, V Corps oversees theater-assigned units such as the 2nd Cavalry Regiment, 12th Combat Aviation Brigade, and the 41st Field Artillery Brigade, and it oversees the employment of the MDTF assigned to U.S. European Command. During competition, it is also normal for the corps to have an expeditionary sustainment command, operational fires command, expeditionary military intelligence brigade, and a medical brigade in general support. 4-91. During exercises to prepare for large-scale combat operations, the corps fills one of three roles. The corps can be designated as tactical land headquarters employing multiple divisions. It may also assume the role of a joint task force headquarters or land component command headquarters during a contingency operation or training event, after it undergoes the necessary training and joint augmentation. When the corps is the land component command headquarters, it also serves as the ARFOR. (See FM 3-94 and ATP 3-92 for more information on the corps.) DIVISION ROLES DURING COMPETITION 4-92. Divisions are often the primary interface with various unified action partners during competition. When regionally aligned, a division with a tailored package of subordinate brigades and other enablers—both Regular Army and Reserve Component—is allocated to a CCDR to help execute the CCP. Examples of additional enablers include maneuver enhancement brigades and civil affairs, military intelligence, military police, CBRN, psychological operations, explosive ordnance disposal, and engineer units. 4-93. A regionally aligned division normally works with multinational partners to conduct security cooperation over extended periods. By establishing habitual relationships, divisions help assure allies, build trust with partner nations, and build interoperability with them and other unified action partners. Divisions help partners build shared situational understanding and partner capacity. They also deter conflict through the conduct of various activities such as exercises, training, equipping, education, conferences, and military staff talks. Division support to security cooperation helps shape regional stability by— (cid:122) Building defense relationships that promote U.S. security interests. (cid:122) Developing friendly military capabilities for self-defense and multinational operations. (cid:122) Providing the division and other U.S. forces with peacetime and contingency access to host nations to prevent and deter conflict. (cid:122) Improving readiness to incorporate allied or partner formations. 4-94. Division headquarters provide direct C2 of the brigades tasked to conduct specific operations supporting security cooperation and interoperability development with partners. They provide training resources and oversight to brigades at home station. Division headquarters are responsible for leader development down to the battalion level. They continuously improve the readiness of Army forces over which they have influence, protecting their time and ensuring that demanding, realistic training is the first priority. 4-95. Division headquarters provide subject matter expertise to assist brigades as they prepare for missions or capstone training exercises, to include awareness of NATO or American, British, Canadian, Australian, and New Zealand (known as ABCANZ) interoperability standards when forces from those nations are involved. Low density military occupation specialties or specialized units may benefit from the division consolidation of training events. Divisions have subject matter experts in low density specialties who develop, implement, execute, and evaluate training programs across several echelons. (See FM 3-94 and ATP 3-91 for a further discussion of division roles and responsibilities.) BRIGADE COMBAT TEAMS DURING COMPETITION 4-96. BCTs provide CCDRs with a combined-arms, close combat force that can operate as part of a division or a joint task force. During competition, they focus on perfecting tactical tasks in preparation to execute
3-0
110
Chapter 4 OPLANs for large-scale combat operations. Forward deployed BCTs assess and improve protection measures against adversary capabilities and promote interoperability with host-nation tactical units. While most of a rotational brigade’s training occurs in the continental United States and does not involve partner- nation forces, brigades anticipate and plan how to integrate with host-nation forces. Familiarity with agreed- to coalition or bilateral interoperability standards helps increase alliance or coalition capability and minimizes the time necessary for learning during execution. (See FM 3-96 for information on BCTs and FM 3-16 for information about multinational operations.) CONSOLIDATING GAINS DURING COMPETITION 4-97. Army forces continuously consolidate gains to maintain an operational environment that is advantageous to U.S. strategic interests. Experience proves that what Army forces do during competition helps ensure stability and reduces the potential for manmade crises or armed conflict throughout a region, even in locations where no previous combat has occurred. Examples of consolidating gains during competition range from transportation system improvements (including port, airfield, and rail lines of communications), increasing theater supply stocks, intelligence cooperation, and providing Army medical personnel to support a combatant command’s humanitarian and civic assistance activities. Army forces contributing to humanitarian relief efforts with allies and partners help cement existing international relationships or set conditions for new ones in other places. 4-98. Army forces consolidate gains most effectively by maintaining a persistent or permanent presence in a theater of operations. This presence enables the cultivation of relationships on a predictable and reliable basis and provides Army forces a high degree of regular access to allies and partners. The enduring results of these activities help ambassadors, country teams, and JFCs gain a greater degree of influence with allies and partners as they pursue mutually beneficial objectives. In addition to this increased influence, Army consolidating gains activities contribute to joint efforts to support deterrence. 4-99. Consolidation of gains during competition following armed conflict or crisis is significantly different than during steady-state competition. In areas that have not seen recent armed conflict or a disruptive crisis, Army forces consolidate gains by reinforcing the success of steady-state competition activities. They do this by following through on what was begun earlier in consistent ways that provide predictability to allies and partners. In most cases, these activities will be indistinguishable from other competition activities designed to build partner capabilities and improve other advantages relative to threat forces. 4-100. Consolidating gains following armed conflict requires significant operations that, if not properly conducted, could result in a return to crisis or conflict. These efforts include information collection and intelligence analysis to understand threats, their support from the population, and what options are available to defeat them. Consolidating gains also includes stability tasks related to providing security, food, water, shelter, and medical treatment to the population. When appropriate, Army forces then work to restore or rebuild civil institutions and to transition security and stability tasks to those institutions. (See FM 3-07 and FM 3-57 for additional details on stability operations and governance.) 4-101. When immediate concerns are addressed after a crisis or armed conflict, the theater army and supporting forces focus most of their efforts on theater strategic consolidation of gains. They work with the theater’s other components, the combatant command, interagency partners (primarily the Department of State), partner nations, and other unified action partners to develop and achieve long-term objectives. In general, these consolidation of gains activities are less intense and occur over longer periods of time. Army forces build on the success of past conflicts by conducting targeted engagements with unified action partners. Examples of this include routine engagements with Republic of Korea, Japanese, and NATO forces by forward-positioned and rotational units. (See ATP 3-93 for a detailed overview of routine theater army activities to consolidate gains during competition.) 4-102. Peace operations are a means of consolidating gains. Peace operations are multiagency and multinational crisis response and limited contingency operations involving all instruments of national power with military missions to contain conflict, redress the peace, and shape the environment to support reconciliation and rebuilding and facilitate the transition to legitimate governance (JP 3-07.3). They usually occur under agreements brokered through organizations like the United Nations or through regional bodies like the African Union. (See JP 3-07.3 and ATP 3-07.31 for additional details on peace operations.)
3-0
111
Operations During Competition Below Armed Conflict TRANSITION TO CRISIS AND ARMED CONFLICT 4-103. Transitions are inherently complex and unpredictable because anticipated environmental conditions can quickly change and alter the perception of strategic leaders who do not have all the information necessary for clear understanding. A response by one side can result in the perception of escalation by the other, leading to increased tensions. A crisis requiring a response can also occur because of unforeseen environmental changes. Transition from competition to crisis or armed conflict is often based on four types of decisions, resulting actions, and the follow-on associated effects from the initial action. Examples include— (cid:122) A decision by national command authorities to escalate or initiate armed conflict. Examples include the 2003 invasion of Iraq, the 2011 Libya strike, and the 2020 strike against Iranian General Qasem Soleimani. (cid:122) A decision by adversaries to escalate or initiate armed conflict. Examples include Hezbollah’s rocket strikes against Israel in 2006, the Russo-Georgia War in 2008, and the Russian invasions of Ukraine in 2014 and 2022. (cid:122) A decision by allied nations to escalate or initiate an armed conflict. An example of this is the 1967 Six-Day War that occurred between Egypt, Syria, Jordan, Iraq, and Israel. (cid:122) Decisions made in response to a rapid environmental change that neither side planned for but causes tensions to rise. An example is the change brought to the strategic environment by the 2020 pandemic. 4-104. Army forces and leaders anticipate the potential for conflict in their operational environment. This is informed by input from the intelligence community and direction from strategic-level leaders. SFABs and other regionally aligned units have access to sensitive areas and ally and partner leaders. Their access and robust communications enable them to gain insight on actual conditions on the ground and provide real-time updates to decision makers during fluid situations. Decisions made before and during the initial stages of a crisis or armed conflict have significant impact on the decisions made by adversaries and the ultimate outcome of a particular situation. 4-105. Once a crisis or armed conflict starts, adversaries use all capabilities at their disposal to disrupt the deployment of Army forces. They will attempt to prevent the Army and the joint force from obtaining the needed time to deploy and build combat power. This chaos, with its resultant frictions, is the environment into which Army forces will respond. CONFLICT TYPE DETERMINATION 4-106. Army forces and leaders need to anticipate the type of conflict the Nation will fight. This is informed by input from the intelligence community and direction from strategic-level leaders. Decisions made before and during the initial stages of a crisis or armed conflict have significant impact on the decisions made by adversaries and the ultimate outcome of a particular situation. The initial decisions or recommendations by Army strategic leaders impact the ability of the Army to project force in a timely manner. FORCE PROTECTION 4-107. Indications and warnings in a theater may prompt a decision to mobilize and deploy Army forces in anticipation of a crisis or armed conflict. Army forces anticipate and react to adversary actions targeting them where they are located during the initial stages of an operation, whether in the United States or forward deployed. Adversaries seek to degrade and disrupt the ability of Army forces to deploy. Adversaries may employ cyberspace attacks to inflict power outages at home station, target transportation networks to delay shipment of unit equipment, conduct social media attacks on Service or family members, and instigate protests that lower popular support for Army forces. Insider threats and proxies can conduct acts of terror, sabotage, subterfuge, and other activities against U.S. forces stationed in the United States and abroad. Adversaries may immediately employ lethal capabilities against Army forces using their air-, sea-, cyber-, and space-based capabilities to exploit surprise. Forward stationed forces should be prepared to deploy from garrison to dispersed locations to prepare a defense against an enemy attack. Force protection during transition will include physical security measures, operations security, and active information efforts to counter adversary efforts to misinform and otherwise influence Soldiers, Family members, and supporting organizations and communities.
3-0
112
Chapter 4 NONCOMBATANT EVACUATION OPERATIONS 4-108. A transition to crisis or armed conflict may require a noncombatant evacuation operation (NEO). Army forces conduct NEOs under a wide range of conditions. They may be conducted under relatively stable conditions or under unstable conditions that involve enemy combatants. Ideally, leaders anticipate a NEO requirement and are able to execute it prior to crisis or armed conflict. Uncertain adversary intentions and the threat of violence often create desperation amongst evacuees and local populations and increase the complexity and risk for forces conducting NEOs. 4-109. Once a NEO is requested, approved, and directed, the CCDR directs forces to conduct evacuation operations in support of the Department of State and Chief of Mission. NEOs, especially those of significant scale, will require Army forces that would otherwise be dedicated to other missions. (See JP 3-68 for more information on NEOs.) INITIAL EMPLOYMENT OF FORWARD-STATIONED FORCES 4-110. A key strategic decision during competition or crisis is whether forward-stationed units will defend forward to hold terrain or displace to more advantageous positions. This decision should occur during competition unless a crisis unfolds in unanticipated ways and forces a decision point. During transition, forward-stationed Army forces have three courses of action. The JFC can integrate Army forces with host-nation land component forces as part of a mobile or area defense, assign U.S. Army forces a theater reserve role, or implement a plan that combines both courses of action. A theater reserve role allows the JFC to preserve Army combat power for future offensive operations. Army forces may be required to defend key terrain and infrastructure to allow for receiving deploying forces. Army leaders advise the JFC on the best ways to use forward-stationed forces based on current conditions in the AO.
3-0
113
Chapter 5 Operations During Crisis The 1930’s taught us a clear lesson: aggressive conduct, if allowed to go unchecked and unchallenged ultimately leads to war. President John F. Kennedy This chapter begins with a discussion of the broad trends that occur in the strategic environment and adversary actions during crisis. It discusses how Army forces provide options to joint force commanders (JFCs) seeking to obtain relative advantages during crisis, and how the Army projects forces. It then describes the roles of theater armies, corps, divisions, and brigades. The chapter concludes with a discussion of consolidating gains and transitioning back to competition or to armed conflict. OVERVIEW OF OPERATIONS DURING CRISIS 5-1. A crisis is an incident or situation involving a threat to the United States, its citizens, military forces, or vital interests that develops rapidly and creates a condition of such diplomatic, economic, or military importance that commitment of military forces and resources is contemplated to achieve national objectives (JP 3-0). A crisis may be the result of adversary actions or indicators of imminent action, or it may be the result of natural or human disasters. During a crisis, opponents are not yet using lethal force as the primary means for achieving their objectives, but the situation potentially requires a rapid response by forces prepared to fight to deter further aggression. When directed, the Army provides a JFC with capabilities to help deter further provocation and sufficient combat power to maintain or reestablish conventional deterrence. The introduction of significant land forces demonstrates the will to impose costs, provides options to joint force and national leaders, and signals a high level of national commitment. The effects of a persistent presence on the ground among allied or partner forces cannot be easily replicated with air or maritime power alone. 5-2. Crisis response operations are characterized by high degrees of volatility and uncertainty. A crisis may erupt with Success during a crisis is a return to a no warning, or it may be well anticipated. Its duration is state of competition in which the United States, its allies, and its unpredictable. Additionally, adversaries may perceive partners are in positions of increased themselves in a different context or state of conflict than U.S., advantage relative to the adversary. allied, and partner forces. What is seen by one side as a crisis Should deterrence fail, Army forces might be perceived by the other as armed conflict or are better positioned to defeat enemy competition. Army leaders must demonstrate flexibility, forces during conflict. anticipate changes in an operational environment, and provide JFCs with credible, effective options. This requires trained forces agile enough to adapt quickly to new situations and commanders and staffs adept at linking tactical actions to attaining policy objectives. 5-3. Regardless of the capabilities employed, there are generally two broad outcomes from a crisis. Either deterrence is maintained, and de-escalation occurs, or armed conflict begins. While this requires that Army forces be prepared for either type of transition, forces deploying during crisis always assume they are deploying to fight. While Army forces prepare for armed conflict, they avoid sending signals that armed conflict is inevitable, regardless of what the adversary does, to avoid inadvertent escalation. Generally, senior leaders at the corps and higher echelons influence those perceptions through public communications in support of the JFC and national leaders.
3-0
114
Chapter 5 Note. Army forces also respond to crises related to disaster response, humanitarian assistance, and defense support to civil authorities when tasked. These crisis contexts and response options are covered in separate doctrinal publications. See JP 3-28, JP 3-29, ADP 3-07, ADP 3-28, FM 3-07, and ATP 3-57.20 for more information on these types of crises and associated response options. ADVERSARY METHODS DURING CRISIS 5-4. A crisis is frequently caused by an adversary acting aggressively to coerce and intimidate its opponents with the threat of force. Once an adversary crosses a U.S., allied, or partner crisis threshold, it attempts to shape and control the crisis to limit or prevent a U.S. military response. An adversary’s attempts to control the situation involves escalating or de-escalating its activities based on an assessment of the situation, which includes a calculation of risk. Adversary forces conduct a detailed analysis of their available capabilities, capacity, and operational reach within a theater relative to friendly forces; their overall desired end state; and their willingness to achieve that end state before deciding to escalate. Even after careful analysis, the way a situation develops can be unpredictable. Some peer adversaries view conflict as a continuous condition in which heightened or reduced periods of violence occur and recur. Changing the intensity of their actions, even when that reduces tension, does not end their campaign to oppose U.S. interests. ADVERSARY ACTIVITIES TO SHAPE A CRISIS 5-5. As a crisis develops, peer adversaries will attempt to shape the situation to their benefit through information warfare and preclusion focused on the U.S. joint force. They may use diplomatic, economic, and information means to divide an opponent’s political leadership from its civilian population. They create separation by introducing or exacerbating distrust and division between different groups to weaken an opponent’s political leadership and to create dissatisfaction among an opponent’s civilian population. Adversaries position military forces in ways to increase uncertainty for opponents and to complicate their decision making. These activities create conditions for the adversary to exploit situations with minimal interference from the U.S., allied, or partner military forces. 5-6. Adversaries may use proxy forces to conduct information warfare, unconventional warfare, and criminal activities, although the balance and utility of these forces in crisis differs from their use during competition. Proxy forces, whether they are a militant separatist group, private military company, or criminal network, bring different capabilities to a situation, and the employment of their capabilities shifts as the strategic context changes. For example, while criminal networks can still accomplish useful tasks in environments marked by increased levels of violence, they do not have the same level of utility that they did during competition. Similarly, separatist groups cannot typically operate without significant support from their sponsor’s military or security services, and that support is likely to be focused elsewhere at the beginning of a crisis. Despite their limitations, proxy forces provide adversaries with another tool to shape a crisis situation. ACTIVITIES TO CONTROL ESCALATION 5-7. Peer adversaries may attempt to control the escalation of a crisis to avoid armed conflict with the United States by initiating actions to prevent or counter a U.S. response. These actions may focus on allies or partners using diplomatic, information, military, and economic instruments. Adversary measures include setting fait accompli conditions on the ground designed to make military responses either too expensive to employ or too late to affect the political situation. An adversary also has other options to control escalation, which include accelerating its operational timelines, employing information warfare, increasing support to proxy forces, and increasing the number of forward deployed units in the region. Adversary forces may also initiate crises in other theaters to distract U.S. forces and diffuse their response in the area of greatest interest. In extreme cases, an adversary may conduct a limited attack in response to U.S. reactions to the activities that precipitated the original crisis.
3-0
115
Operations During Crisis ACTIVITIES TO MITIGATE UNITED STATES DETERRENCE 5-8. As adversary forces plan for operations during a crisis, they consider several key actions to mitigate U.S. deterrence efforts and to ensure these operations do not interfere significantly with their interests. These actions may include— (cid:122) Conducting limited attacks to expose friendly force vulnerabilities. These attacks may also degrade the deterrence value of deployed forces and destroy credibility among current and potential partners. (cid:122) Disrupting or delaying the deployment of Army and joint forces through cyberspace attacks and denial of space capabilities. (cid:122) Exploiting gaps in national interests among the United States, partner nations, and potential partners by attacking weaker countries with whom the United States has no treaty obligations to defend. (cid:122) Conducting deception operations to conceal their real intent. (cid:122) Increasing the use of proxy forces to coopt, coerce, or influence the local population, organizations, and governments within a crisis region. (cid:122) Creating multiple dilemmas for the United States by attacking or threatening the use of force against potential partner nations in regions outside of the crisis region. (cid:122) Impacting the will of the public through information warfare, including cyberspace attacks. (cid:122) Threatening the use of nuclear weapons to prevent intervention by the United States, allies, and partners. OPERATIONS SECURITY 5-9. Operations security is vital to the success of operations The protection of friendly forces during crisis. Continuously employing the operations security requires an understanding of threat process generates measures and countermeasures to limit an reconnaissance and surveillance, adversary’s ability to discern friendly intent, knowing that capabilities in an operational friendly forces are always under observation and at risk of environment. Protection is an outcome detection. Operations security is a function of how tasks and based in large part on how operations activities are conducted and how individual Soldiers and units are conducted at the individual and are successful in meeting the directed standards. Army units in unit level. No single system or capability can protect a formation on a joint operations area (JOA) exercise strict operations security its own. to protect friendly information and protect the network against cyberspace attacks. They do this by ensuring no use of personal electronic devices, minimizing electromagnetic emissions, and limiting communications on command and control (C2) information systems to the maximum possible extent. This protects Soldiers from social media and other information-related attacks and limits the information available to adversaries that can be used to target family members. It also makes it more difficult for adversaries to identify units and their locations and reduces the incentive for adversary forces to strike targets they view as lucrative enough to risk conflict to destroy. Stress caused by adversary social media attacks during crisis is potentially circumvented by avoiding social media altogether, since the combined effects of a disinformation campaign could degrade Soldier performance and morale far more than not having access to personal devices and media accounts. Operations security is a continuous activity at every echelon down to the individual Soldier level. RELATIVE ADVANTAGES 5-10. During crisis, Army forces capitalize on the knowledge and experiences gained and use the systems, processes, and infrastructure developed while setting the theater to respond to adversary aggressions or threats. While this preparation and experience provide Army forces, allies, and other coalition forces with a good starting point in mature theaters, the transition into crisis will most likely be chaotic, and it will present Army leaders with unforeseen challenges that require rapid response. Army forces therefore build upon the information, human, and physical advantages gained during competition to mitigate friction, deter adversaries, and when necessary, transition into armed conflict.
3-0
116
Chapter 5 PHYSICAL ADVANTAGES DURING CRISIS 5-11. Achieving physical advantage during crisis consists of working with host-nation forces to form a credible defense and ensuring the survivability of allied forces in theater. If there is key or decisive terrain, Army forces and host-nation partners may seek to deter adversaries by setting a defense of that ground early in a crisis. Army forces in theater assume conflict is imminent and take all available measures to protect against attack in every domain where an attack could occur. 5-12. During crisis, Army combat power will likely be limited initially to a small number of forward- stationed forces, those forces that can draw Army pre-positioned stocks (APS) rapidly, and forces used to threaten adversary forces with forcible entry into their area of operations (AO). This combat power will most likely be used in a defensive posture until the JFC receives enough land forces to make offensive operations feasible. The intent should be to increase the combat power of Army forces to a point where they can credibly threaten adversary forces with offensive operations. Ideally, this will deter further enemy action. If, however, deterrence fails, this force facilitates armed conflict that will terminate on terms favorable to U.S. interests. In well-developed theaters, Army combat power will likely be forward stationed and integrated with partner forces as a key part of their defensive plans. This credible land force, capable of disrupting or significantly degrading an adversary’s initial attack, maximizes the deterrent potential of Army forces. INFORMATION ADVANTAGES DURING CRISIS 5-13. Two key information activities are protecting friendly information and degrading the threat’s ability to communicate, sense, make effective decisions, and maintain influence with relevant actors and populations. An example is the use of strategic messaging to undermine the credibility of an adversary by exposing violations of international law and showing that adversary narratives are false. Achieving information advantages is a commander-driven, combined arms activity that employs capabilities from every warfighting function. During crisis, commanders lead their staffs to refine information activities based upon plans and processes developed during competition. Examples include commanders and staffs focusing on the challenges and tasks of establishing a mission-partner environment, building or modifying an intelligence architecture, and creating or refining common operating procedures with allies and other partners. HUMAN ADVANTAGES DURING CRISIS 5-14. While enduring relationships with alliance and coalition partners may be in place at the theater strategic level as a crisis develops, at the operational and tactical levels it is likely that units have less experience operating with one another. Forces deploying into a theater may have experience working with the security forces of partner nations if they were regionally aligned or worked together in a professional military education or training setting, but most will not have such experience. This requires leaders who have worked with joint and multinational partners to focus their staffs on the most critical interoperability tasks necessary for effective coalition operations. It also requires awareness of the difficulty in fully understanding situations when dealing with other cultures. Employing the liaison networks built by the theater army during competition will enable simultaneous in-theater training exercises with the deployment of Army forces. This facilitates early shared understanding, helping leaders and subordinate units integrate with allied and partner forces in the most expeditious and efficient manner possible while also signaling determination to adversaries. Demonstrated readiness for combat operations and interoperability among U.S., allied, and partner forces helps to upset adversary risk calculations and deter further aggression. ARMY SUPPORT TO THE JOINT FORCE DURING CRISIS 5-15. The military supports unified action partners during crisis by providing flexible deterrent and response options. A flexible deterrent option (FDO) is a planning construct intended to facilitate early decision making by developing a wide range of interrelated responses that begin with deterrent-oriented actions carefully tailored to create a desired effect. A flexible response option (FRO) is a military capability specifically task- organized for effective reaction to an enemy threat or attack and adaptable to the existing circumstances of a crisis. FDOs and FROs occur across the diplomatic, informational, military, and economic (known as DIME) instruments of national power, and they are not just confined to the military. They are most effective when integrated and implemented in a nearly simultaneous manner. Examples of simultaneous FDO and FRO
3-0
117
Operations During Crisis actions are shown in figure 5-1. (See JP 5-0 for additional examples of diplomatic, economic, information, and joint force FDOs and FROs.) Figure 5-1. Simultaneous flexible deterrent and response option examples 5-16. Determining what threat and enemy forces perceive as important will inform U.S. understanding of their desired end state, associated courses of action, and employment of forces. This allows strategic leaders to determine the appropriate amount of military force to apply in concert with diplomatic, information, and economic activities to prevent adversaries from achieving their objectives. Examples of Army contributions that can deploy rapidly to support joint flexible deterrent and response options are contained in table 5-1 on page 5-6.
3-0
118
Chapter 5 Table 5-1. Potential Army contributions to joint flexible deterrent and response options Army contribution examples to joint flexible deterrent options Command and control headquarters—establishment of a field army or deployment of a corps or division. Air defense to protect key infrastructure and population centers from theater ballistic missiles. Additional personnel to expand the capability of theater-assigned headquarters. Intelligence assets to support situational understanding, targeting, and information activities. Deploying a security force assistance brigade to establish liaison capability or conduct security force assistance. Building or expanding infrastructure and increasing sustainment capacity to facilitate reception, staging, onward movement, and integration. Army contribution examples to joint flexible response options Airborne or air assault units positioned to conduct joint forcible entry. A brigade combat team drawing Army pre-positioned stocks. Port opening to receive the joint force. Multi-domain task force to respond to adversary antiaccess and area denial activities. Special operations forces to conduct foreign internal defense, direct action, or special reconnaissance. Civil affairs to enable civil-military operations and interorganizational cooperation. Chemical, biological, radiological, and nuclear units for response to weapons of mass destruction employment. 5-17. While FDOs are primarily intended to prevent a crisis from developing or worsening, FROs are designed to preempt or respond to attacks against U.S. interests. FDOs are preplanned, deterrence-oriented actions carefully tailored to bring an issue to early resolution without armed conflict, and they can be initiated before or after unambiguous warning of threat action. In comparison, FROs can be employed in response to aggression by adversaries, and they are intended to facilitate early decision making by developing a wide range of actions carefully tailored to produce desired effects. FDOs and FROs must be deliberately tailored in terms of timing, efficiency, and effectiveness to avoid undesired effects, such as eliciting an armed response should adversary leaders perceive that friendly FDOs or FROs are being used as preparation for a preemptive attack. 5-18. FDOs and FROs serve three basic purposes. First, they provide a visible and credible message to adversaries about U.S. will and capability to resist aggression. Second, they position U.S. forces in a manner that facilitates implementation of the operations or contingency plan should armed conflict occur. Third, they provide options for joint and national senior leaders. They allow for measured increases in pressure to avoid unintentionally provoking combat operations, and they enable decision makers to develop the situation to gain a better understanding of adversary capabilities and intentions. FDOs and FROs are elements of contingency plans executed to increase deterrence in addition to, but outside the scope of, the ongoing joint operations. The key goals of FDOs and FROs are— (cid:122) Communicate the strength of U.S. commitment to treaty obligations and regional peace and stability. (cid:122) Confront adversaries with unacceptable costs for their possible aggression. (cid:122) Isolate adversaries from regional neighbors and attempt to split adversary coalitions. (cid:122) Rapidly improve the military balance of power in the theater of operations without precipitating an armed response from adversaries. (cid:122) Develop the situation and better understand adversary capabilities and intentions. 5-19. Leaders exercise restraint and carefully calculate risk before recommending an increase in Army forces to address a crisis. Peer adversaries have global capabilities, and they can create multiple dilemmas for U.S. forces by escalating a crisis horizontally in a different theater. Surging forces in one region may address a crisis, but it potentially creates opportunities for adversaries or enemies in another region. Leaders must anticipate second- and third-order effects on other combatant commands and the risk to the homeland when
3-0
119
Operations During Crisis forces are committed to address a specific crisis. An example of an effective response operation occurred in Korea in 1976. Effective Response: OPERATION PAUL BUNYAN On 18 August 1976, a North Korean platoon-sized force attacked a small element of U.S. and South Korean Army forces conducting a routine tree trimming detail in the Joint Security Area, a location set aside for military talks and jointly secured by forces from both the U.S.-led United Nations Command and North Korea. The North Koreans murdered two U.S. officers and wounded five South Korean soldiers, escalating the already tense security arrangement. Leaders assessed that the act was an attempt to dissuade American support for the U.S. military presence in South Korea. U.S. leaders considered multiple response options. Although some advocated for a swift and lethal response, the U.S.-led alliance implemented a course of action designed to avoid escalation but demonstrate allied cohesion and resolve. Three days after the attack, dozens of U.S. and South Korean forces reoccupied the same site where the unprovoked attack occurred and cut down the tree. As a show of force and coalition readiness, hundreds of U.S. and South Korean soldiers provided overwatch for the work detail. Army forces also deployed attack helicopters and prepared artillery for use if necessary. This show of force was part of a larger joint response option. President Ford ordered U.S. forces to Defense Condition Three, deployed strategic bombers, and deployed a U.S. aircraft carrier. The operation de-escalated the situation while bringing attention to North Korea’s malign activity, further isolating North Korea from the international community. The operation compelled the North Koreans to admit they regretted the incident, and they agreed to separate forces in the joint security area. The response resolved the incident with stronger international support for the United Nations’ mission and a stronger bond between U.S. and South Korean forces. FORCE PROJECTION 5-20. The demonstrated ability to project Army forces into an operational area is an essential element of conventional deterrence. Army forces depend almost entirely upon joint lift capabilities for deployment. Force projection is the ability to project the military instrument of national power from the United States, or another theater in response to requirements for military operations (JP 3-0). 5-21. During a crisis, ground forces provide a JFC with more enduring options than forces primarily concentrated in or transiting other domains. Army forces are capable of occupying ground indefinitely. They must be sustained just like other Services, but the Army’s ability to maintain persistent presence is far greater because of the nature of operations on land. The potentially close physical proximity of ground forces to adversary forces provides the JFC with greater understanding and can help the JFC dictate the tempo of operations. 5-22. Army forces achieve persistent presence by deploying forces into a theater to support forward-stationed U.S. forces, or those of allies or partners. These forces are likely already executing operations directed in response to provocations, indications, or warnings that hostile activities may commence. At the direction of the JFC, Army forces execute tasks, activities, and operations designed to deter further malign activity and set conditions for success should deterrence fail. The forward presence or projection of Army formations into a theater provides capabilities that create tactical and operational dilemmas for threat forces, enabling the JFC to seize and retain the initiative. Prompt deployment of land forces in the initial phase of a crisis can
3-0
120
Chapter 5 preclude the need to deploy larger forces later, and it assures allies and other partners. Effective early intervention can also deny adversaries the time necessary for them to set conditions in their favor. 5-23. Deployment alone does not guarantee success. Achieving successful deterrence involves convincing adversaries that the deployed force is able to markedly reduce the adversary force’s chance of success during armed conflict. Adversaries measure the ability of Army forces to conduct operations during armed conflict through careful observation of how well those forces are prepared to conduct large-scale combat operations and the capabilities those forces introduce into a specific context as part of the overall joint response. 5-24. As Army forces prepare to respond to a crisis, the JFC conducts a final review of deploying forces, ensuring they are deployed in the proper sequence and are able to be task-organized effectively for the anticipated mission. Threat forces are likely to detect force projection activities using space and cyberspace capabilities, human intelligence, and open-source collection efforts. Planners should anticipate adversary forces using all available means to contest the deployment of forces, beginning from home station, during transit, and upon arrival in theater. Therefore, operations security, dispersion of forces, deception operations, and physical security are critical planning considerations. Senior commanders and planners must understand the risks and shape deployments to satisfy both speed and operational readiness. (See Chapter 3 for more information on force tailoring and Appendix C for further discussion on contested deployments.) 5-25. Force projection is particularly important during crisis, as Army forces have an unknown amount of time to shape a developing situation. It can occur, however, in any context. Forces projected forward during competition to conduct exercises, bolster allies and partners, and conduct other activities are under observation. Adversaries assess the speed and efficiency of these routine deployments, which can have a deterrent effect. Given the fluid nature of a crisis, force projection may continue well after a crisis has transitioned to armed conflict. Sound force projection planning encompasses— (cid:122) Opening the theater. (cid:122) Mobilization. (cid:122) Deployment. (cid:122) Protection during transit. (cid:122) Reception, staging, onward movement, and integration (RSOI). (cid:122) Initial employment of forces. (cid:122) Sustainment. (cid:122) Redeployment. OPENING THE THEATER 5-26. During the transition to crisis or armed conflict, Army forces open the theater to receive deploying forces. Army forces execute existing plans to establish and open air, sea, and rail terminals. Distribution systems and intermediate staging bases may be established where required. Higher echelon (including theater, corps, and division enablers) and rapidly deployable C2 elements begin to integrate with host-nation forces as quickly as possible to set the conditions for RSOI of follow-on tactical forces. This includes coordination with the forces of other supporting nations to assure effective distribution of services, facilities, and supplies to all deploying units across the alliance or coalition. During theater opening, designated arriving forces draw available APS. This provides the JFC with increased capacity and capability during the initial stages of a crisis or armed conflict. Army forces must be prepared for combat while conducting theater opening operations. The first deploying units require the capability to defend themselves while they provide reaction time and maneuver space for follow-on forces. MOBILIZATION 5-27. Mobilization is the process by which the Armed Forces of the United States, or part of them, are brought to a state of readiness for war or other national emergency (JP 4-05). During mobilization, the Army focuses its efforts on filling joint manning documents to augment combined and joint task force (JTF) headquarters, land component headquarters, and Army units designated for deployment. During crisis, strategic leaders may decide to mobilize select portions of the U.S. Army National Guard and U.S. Army Reserve to provide key capabilities to JFCs. During armed conflict, it is likely that strategic leaders will
3-0
121
Operations During Crisis remove some or all mobilization limitations, enhancing the Army’s ability to respond to an aggressive act by an enemy with the necessary capabilities. An example of a limitation that is lifted for armed conflict would be ordering a full mobilization of the Army National Guard or Army Reserve in lieu of a selected reserve call up or partial mobilization. 5-28. Despite the rapid response and expeditionary capabilities of the joint force, no amount of expeditionary capability can overcome the challenges posed by physical distance. Most Army forces tasked to respond to a crisis have a delay between notification and the time they assemble at the location from which to deploy. For active-duty formations this time period is generally days or weeks, and for Army National Guard or Army Reserve forces this time period is generally weeks to months. The mobilization process takes longer for units with large amounts of equipment and personnel. 5-29. Some units are directed to maintain higher levels of readiness or maintain a prepared-to-deploy status. This higher state of readiness primarily includes units in the immediate response force. The immediate response force provides the Army with the ability to provide combatant commanders (CCDRs) with land capabilities of limited capacity to rapidly respond to a crisis. 5-30. For most Army forces, mobilization operations begin at home station. As a general rule, once mobilized, it takes at least 30 to 45 days for most Army forces stationed within the United States to deploy to a theater when their equipment is shipped via strategic sealift. This planning timeline is the same whether the United States is involved in a crisis or armed conflict due to the fixed speed of moving Army equipment over civilian transportation infrastructure. However, if a threat force inflicts significant damage across the strategic support area during armed conflict, these timelines may be further extended. This timeframe does not include RSOI upon arrival overseas. Additional time may also be required if the joint force is not able to provide sufficient capacity to protect land, sea, and air lines of communications or sufficient sea and airlift is not available for simultaneous movement of multiple large units. (See Appendix C for more information on deployments contested by threat forces.) DEPLOYMENT 5-31. Deployment is the movement of forces into and out of an operational area (JP 3-35). Proper planning establishes what, where, and when forces are needed to achieve objectives. How the JFC intends to employ forces is the foundation of the deployment structure and timing. For example, a JFC may deploy a combat- ready brigade combat team (BCT) or division early in a crisis to stabilize a situation or secure ports for follow-on forces, accepting risks to the movement efficiency of follow-on forces. Corps and division staffs examine all deployment possibilities and conduct parallel planning. 5-32. Most Army equipment travels via strategic sealift. It will take weeks or months for the equipment to arrive in theater. Commanders and planners must not underestimate the joint deployment challenges of operating against peer adversary forces with robust air, maritime, space, and cyberspace capabilities. Commanders and planners must envision what they want the force to look like upon arrival in theater and then backwards plan with the assumption that some of it may not arrive as planned or even at all. The objective of deployment planning is to synchronize deployment activities to facilitate effective execution of operations in an operational area. Successful deployment planning requires knowledge of a unit’s deployment responsibilities, an understanding of deployment, and an appreciation of the link between deployment and employment. (See ATP 3-35 for a discussion of these deployment phases and planning in detail.) The steps used in deployment planning are— (cid:122) Analyze the mission. (cid:122) Structure forces. (cid:122) Refine deployment data. (cid:122) Prepare the force. (cid:122) Schedule movement. An example of deployment friction and unit actions to overcome it occurred in 2003.
3-0
122
Chapter 5 Deployment Friction: Task Force Ironhorse in OPERATION IRAQI FREEDOM In 2003, Task Force Ironhorse initially shipped its unit equipment sets to Turkey as called for in the initial invasion operations order. However, the equipment sets had to be rerouted through the Suez Canal and Kuwait after Turkey did not allow the use of its territory for the invasion of Iraq. The task force concept of operations called for tailored force packages that would allow rapid employment upon arrival in Turkey. However, tailoring the force packages precluded the ability of U.S. Transportation Command to maximize the available square footage of strategic sealift ships. This degraded the ability of the JFC to receive additional assets. Additionally, the refusal of Turkey forced the task force commander, Major General Odierno, to rapidly develop new courses of action for forces tailored for an operation that was no longer feasible. Though friction occurred due to the extreme change in conditions, the unit adapted. It did this while constantly interfacing with organizations at the strategic and theater strategic levels. Major General Odierno also ensured that all leaders of his task force were integrated into the plan as it changed. As a result of these efforts, Task Force Ironhorse had personnel staged in Kuwait, prepared for the new conditions facing them when their equipment finally arrived in Kuwait. PROTECTION DURING TRANSIT 5-33. The U.S. Army Installation Management Command is a critical protection enabler during unit predeployment activities through the fort-to-port movement of Army forces. This command manages most Army installations, and garrison commanders ensure the protection of forces as they deploy. Installation provost marshals protect deploying unit assets as they prepare to deploy with police and security guards. In addition, installation safety, medical, and information management personnel protect the force during deployment preparation and execution. Corps and division staffs coordinate closely with installation staffs to identify information and assets that need protection, and they apply appropriate protection and security measures consistent with their collective threat analysis. 5-34. Threats may attempt to impede or prevent unit deployments. This creates a requirement for coordination of the physical security of deploying unit personnel and equipment as they move to ports of embarkation. Physical security is required for personnel and equipment while awaiting transport at ports of embarkation, during movement, and after arrival at ports of debarkation. Planning for physical security remains a focus in unit staging areas, along routes upon which units and supplies move, and for tactical assembly areas prior to onward movement into AOs. 5-35. U.S. Transportation Command and the Military Surface Deployment and Distribution Command administer a defense transportation security program to provide standardized transportation security measures and procedures, constant oversight, and central direction in coordination with other Department of Defense (DOD) activities and port authorities. Commanders plan for protection measures for their units and equipment from home station to the port of embarkation, while Military Surface Deployment and Distribution Command coordinates for security within the port. 5-36. Corps and division staffs ensure that all contract processes for transportation movements meet DOD security requirements. They coordinate with the installation transportation officer in the continental United States at home station or the movement control team outside the continental United States and authorized railroad or commercial truck carriers on guard and escort matters. Some government and commercial carriers provide limited security measures to protect in-transit equipment and supplies. These measures include the use of contract security personnel and secure transfer facilities to safeguard unit assets. 5-37. If the corps or division staff determines that carrier security measures are insufficient given the threat, corps and division headquarters have a number of options for increasing the protection and security of deploying units and their associated equipment and supplies. These options include directing subordinate
3-0
123
Operations During Crisis units to provide Soldiers to guard equipment and supplies throughout the deployment process. Commanders can also direct units to have Soldiers carry certain sensitive items as part of their individual loads throughout the deployment process. 5-38. Corps and division commanders submit protection plans before their arrival overseas through the respective ARFOR or the theater army headquarters to the CCDR responsible for all military forces in the AOR within which deploying forces will operate. These plans should align with the guidance developed by the CCDR, who coordinates and approves various deploying unit protection plans. RECEPTION, STAGING, ONWARD MOVEMENT, AND INTEGRATION 5-39. RSOI is the process that delivers combat power to the JFC in a theater of operations or a JOA. RSOI is the responsibility of the theater army and its associated theater sustainment command (TSC). During crises involving a peer adversary, RSOI must occur rapidly in as many dispersed locations as possible to complicate adversary targeting. It is a theater-level process, with careful coordination required between units, theater sustainment personnel, host-nation support, and commercial entities. Effective RSOI matches personnel with their equipment, minimizes staging and sustainment requirements while transiting these ports of debarkation, and begins onward movement as quickly as possible. Deploying units need to understand and implement previously developed plans to accomplish integration and maintain combat readiness upon their arrival. (See JP 3-35 and ATP 3-35 for a discussion of factors and considerations associated with the conduct of RSOI.) Reception 5-40. Reception is the process of receiving, offloading, marshalling, accounting for, and transporting of personnel, equipment, and materiel from the strategic and/or intratheater deployment phase to a sea, air, or surface transportation point of debarkation to the marshalling area (JP 3-35). As the initial step of introducing combat power on the ground, reception determines success or failure of the RSOI operation. Efficiency imparts speed, which requires well-understood plans flexible enough to overcome friction. 5-41. The theater army or a designated sustainment unit (typically the assigned TSC) implements reception from strategic lift activities at or near designated air and seaports of debarkation. While the reception plan for each theater varies, reception capacity should at least equal planned strategic lift delivery capability. At a minimum, the theater army considers the impact of joint C2, movement control, and port operations while planning. Additionally, commanders and their staffs consider dispersion, air and missile defense (AMD), and other security measures when planning and conducting reception operations based on the vulnerability to enemy special-purpose forces and long-range fires. Staging 5-42. Staging is assembling, holding, and organizing arriving personnel, equipment, and sustaining materiel in preparation for onward movement (JP 3-35). Staging is the part of the RSOI operation that unites unit personnel with their equipment and prepares them for onward movement and employment by the JFC. During staging, deploying forces have limited mission capability and are generally not self-sustainable. Most units require extensive maintenance, supply, protection, and life support while staging. In some cases, their equipment must be reconfigured following transport on ships or aircraft. Onward Movement 5-43. Onward movement is the process of moving forces and sustainment from reception facilities and marshalling or staging areas to tactical assembly areas or other operating areas. Many external factors influence onward movement. They include the availability of transportation assets and the requirements of their future higher echelon headquarters. These factors determine the sequence in which units move from their staging areas onward to their respective AOs. Plans for the movement of a corps or division headquarters and its attached and supporting divisions or brigades into an AO maintain a balance between security and flexibility. 5-44. Corps and division commanders rely heavily on their staffs and integrating cells to finish coordinating their movement plans to their projected AOs with all necessary military and civilian agencies. The logistics distribution network may be operated by the U.S. military, the host nation, or by a combination of military
3-0
124
Chapter 5 and civilian agencies. The appropriate staff cells and elements consider the number of suitable routes and lift assets available to meet the movement requirements of subordinate units. Other considerations include— (cid:122) Construction of routes. (cid:122) Road and route improvement and maintenance. (cid:122) Repair of bridges and culverts. (cid:122) Clearance of obstacles, including explosive hazards. (cid:122) Bridging rivers or dry gaps. (cid:122) Establishment of security along routes. (cid:122) Placement of convoy support centers. (cid:122) Traffic control to permit freedom of or restriction of civilian movement along routes. (cid:122) Communications architecture. (cid:122) Requirements of allies and other partners moving at the same time as U.S. forces. Integration of Forces 5-45. In the context of RSOI, integration is the coordinated transfer of units into an operational commander’s force prior to mission execution. It can start as soon as the JFC and the new unit are aware of the mission. The JFC may provide initial and periodic situational updates to the inbound unit throughout the force projection process. The JFC may have training requirements for the deploying unit that it must accomplish before and upon arrival in the theater. Integration occurs across all warfighting functions. Generally, the more time a unit has to integrate before conducting operations, the better the unit will perform. However, the situation may require rapid integration. Therefore, commanders balance the risks to mission and force when determining the tempo of unit integration. 5-46. When a deploying unit replaces another unit, a relief in place occurs during integration. During crisis integration of deploying forces will probably involve augmentation of U.S. and host-nation forces already in position, and not require a relief in place, although establishing liaison with units on the flanks is required. Regardless of the circumstance, the command of combat-ready units is transferred to the receiving commander during integration. Integration is complete when the CCDR, other JFC, or land component commander establishes positive control over arriving units. This usually occurs in forward assembly areas when those units are capable of performing missions. 5-47. If the deploying division or brigade is the first U.S. force into a JOA, there may be a need to deploy an advance party task-organized with security, protection, logistics, and engineering support capabilities. As part of the unit movement preparations, the advance party is resourced from the division, brigade, attached assets, or it is provided by outside units. This is particularly true if the predeployment site survey determines that the AO does not have sufficient infrastructure to support division or brigade operations. Changes in the number of available forces as deployment proceeds will also increase the number of units present and change disposition of units and the dimensions of AOs. In circumstances demanding more experienced leadership, it may be necessary for the deputy commander and a select staff to lead this advance party. They set the groundwork for the rest of the unit by performing face-to-face coordination with local military or civilian leaders. 5-48. Unit deployment operations end when all deploying elements complete their RSOI within the assigned JOA. The specifics of RSOI reflect the specific circumstances of the operational and mission variables prevailing in that JOA. (See JP 3-35 for information on joint RSOI requirements.) INITIAL EMPLOYMENT OF FORCES 5-49. The initial employment of Army forces during a crisis will most likely be as part of FDOs or FROs. This employment may represent the opening stages of a joint operation or a show of force demonstration. The objective of this early employment is to deter an adversary from further aggression, expand the theater to receive follow-on Army and joint forces, and form a credible defense with host-nation forces to prevent adversary gains. Without a robust theater infrastructure, a large number of forward-stationed forces, or a robust APS inventory that enables rapid deployment, Army forces can only provide limited support to partner
3-0
125
Operations During Crisis forces. While immediate support may be limited, even limited support could prove decisive when it is obvious that additional capabilities are quickly moving into the theater to address initial shortfalls. SUSTAINMENT 5-50. Sustainment is central to force projection, and sustainment preparation of an operational environment is the basis for sustainment planning. Corps, division, and brigade planners focus on identifying the resources available in an operational area for use by friendly forces and ensuring access to them. The theater army is a key partner in providing this information to deploying units. A detailed estimate of requirements allows planners to advise the commander of the most effective method of providing adequate and responsive support, while minimizing the vulnerable sustainment footprint. There is no fundamental difference in sustainment preparation of an operational environment during competition, crisis, or armed conflict, except that sustainment activities intensify as Army forces respond to crisis and prepare for armed conflict, since time available decreases and requirements from risks to units on the ground increase exponentially. Proper sustainment permits the Army to project force over time and through the necessary depth of an AO. (See FM 4-0 for more information on sustainment.) REDEPLOYMENT 5-51. Redeployment is the transfer or rotation of forces and materiel to support another commander’s operational requirements, or to return personnel, equipment, and materiel to the home and/or demobilization stations for reintegration and/or out-processing (JP 3-35). National strategic leaders determine the appropriate time for the redeployment of Army forces. Usually, redeployment of Army forces does not occur until tensions reduce and conditions permit the transition of security and stability responsibilities to other legitimate authorities. ARMY ECHELONS DURING CRISIS 5-52. All Army echelons have considerable responsibilities when responding to a crisis. Each conducts reconnaissance, liaison, and troop preparation. As units deploy, they may send leaders and staffs to other headquarters and to ports and airfields to refine their understanding of requirements and the situation on the ground. Deploying units can expect their leaders to be called to outside planning meetings early in the process and for special training needs to emerge even as units are busy with other preparations for movement. Units can expect to receive individual replacements or augmentees and a number of attachments based on task organization. THEATER ARMY ROLES DURING CRISIS 5-53. The theater army commands all Army forces in the AOR until the CCDR attaches selected Army forces to a subordinate JTF. Until another organization can assume the role, the theater army initially divides its responsibilities between the Army component (the ARFOR) in the JOA or theater of operations and Army forces operating in other parts of the AOR. This may require force tailoring by the theater army to develop the initial request for forces, followed by additional task organization as forces arrive in the AOR. The theater army is able to perform as a JTF or combined forces land component command headquarters for limited contingency operations and during the initial period of a crisis. It requires rapid augmentation to conduct continuous operations in either case. 5-54. As the Service component command, the theater army remains responsible to Headquarters, Department of the Army for service-specific requirements within the AOR during a crisis. This falls under the ADCON chain of authority. This authority establishes a hierarchy for Army support to deployed forces without modifying the operational chain of command that runs from the CCDR through subordinate JFCs. For example, theater army commanders may— (cid:122) Lead RSOI operations for arriving forces. (cid:122) Complete collective training, theater orientation, and theater acclimation. (cid:122) Manage force modernization of Army forces before their employment in the JOA.
3-0
126
Chapter 5 5-55. During joint operations sustainment is a Service responsibility except as specified by executive agency requirements, DOD directives, CCDRs’ lead Service designations, or inter-Service support agreements. CCDRs direct theater army commanders to provide Army support to other Services (ASOS) to agencies or multinational forces when required. However, shared sustainment responsibility or common-user logistics is more effective, especially for joint operations. Directive authority for logistics is the additional authority available to CCDRs to eliminate duplicative or overlapping sustainment responsibilities. The theater army coordinates with the combatant command staff to determine joint sustainment requirements, identify responsibilities, and enable commanders to exercise sustainment C2. (See ATP 3-93 for additional details on the theater army.) CORPS ROLES DURING CRISIS 5-56. During crisis, the corps headquarters may deploy into an operational area as a tactical headquarters with subordinate divisions and brigades. Corps typically deploy an early entry command post, comprising selected personnel from within the headquarters, to provide C2 of arriving forces. Should crisis become armed conflict, large-scale combat operations may require the corps headquarters to function under the command of a multinational force land component or become subordinate to a field army equivalent established as part of a multinational coalition. 5-57. Corps headquarters plan for all phases of an operation from mobilization to redeployment. Corps operations require planners to consider all functions and capabilities required to gain and maintain positions of relative advantage and the capabilities threat forces can use against friendly forces. Understanding the planning and execution timelines of various capabilities is critical when considering the integration of those capabilities into the overall plan. The corps headquarters is responsible for— (cid:122) Understanding the threat. (cid:122) Integrating information collection and intelligence analysis into the next higher echelon’s processes and systems. (cid:122) Establishing liaison with its higher headquarters and planning reconnaissance of its initial assembly areas, routes, and forward assembly areas. (cid:122) Assigning subordinate units areas of operations. (cid:122) Identifying multiple routes from the points of debarkation through assembly areas to staging areas. (cid:122) Establishing an initial concept of operations. (cid:122) Planning to consolidate gains. (cid:122) Coordinating cyberspace attack mitigation, including distributed denial of service, malicious software, or system intrusion. (cid:122) Planning and preparing for communication denial and degradation. (cid:122) Planning for dispersion of subordinate units along routes and within assembly areas. 5-58. Per the deployment order and operation plan (OPLAN) or operation order, the corps staff plans task organization and employment of subordinate units, integration and synchronization of operations, massing of effects, allocation of resources, and determination of priorities. The corps staff provides the primary Army interface to manage the time-phased force and deployment list for all its assigned forces. The corps determines when its command posts will arrive at a port of debarkation in relation to the arrival of protection, sustainment, and maneuver units. 5-59. A corps commander can influence, but not dictate, the tailoring of subordinate units. The CCDR, theater army, supporting combatant commands, U.S. Transportation Command, and U.S. Army Forces Command all make decisions concerning the composition and deployment sequence of the corps. A corps commander can, however, organize and prepare the corps command posts for efficient and effective movement throughout a deployment. By selecting personnel with the right skill sets and providing them the right mix of equipment, the commander, chief of staff, and assistant chief of staff, operations, match corps C2 capabilities with mission requirements. 5-60. Assigning initial staging areas, movement routes, and subsequent assembly areas in uncertain threat conditions requires a calculated balance between force protection and building combat power. Staging areas for subordinate division and separate brigade elements should be large enough for divisions and separate
3-0
127
Operations During Crisis brigades to disperse elements into company-sized tactical formations while they are performing maintenance checks, loading munitions, ensuring crew readiness, and preparing to move to forward positions. These plans may change frequently as new forces arrive, and they will need to be modified for every stage of deployment. (See ATP 3-92 for additional details on corps operations.) DIVISION 5-61. The division headquarters performs many of the same activities as the corps headquarters. The division headquarters fulfills its primary role as a tactical headquarters staffed, trained, and equipped to command two to five BCTs and other subordinate brigades and battalions. One or more of these brigades may be allied formations. Upon deployment into a theater, a division may undergo significant task organization in preparation for its assigned roles during operations. Initially, during crisis, a division conducts defensive, security, and stability tasks in support of joint operations. The primary role of a division during crisis is to demonstrate credible coercive force as a combined arms formation. Divisions should expect to conduct short notice training exercises with multinational partners and perform other activities that demonstrate capabilities as part of crisis response. In an immature theater, a division headquarters should be prepared to accommodate the command structure of the next higher echelon until that echelon’s systems are in place. (See ATP 3-91 for additional details on division operations.) BRIGADES 5-62. During crisis, brigades provide strategic leaders and JFCs with an alternative to deploying a corps or division. If strategic leaders or the joint force require a credible and rapidly deployable deterrent during an escalating crisis, they may decide to deploy a BCT, functional brigade, multifunctional brigade, or a combination thereof as part of a FDO or FRO. To conduct an effective FDO or FRO a brigade could be given prepare-to-deploy orders or conduct emergency deployment readiness exercises. Other options include moving brigades operating in a theater to dispersed locations with improved survivability that are advantageous for defense or integrating these forces into the area or mobile defensive plans of partner nations. If there is no corps or division present in the theater, the theater army provides C2 of the brigade. An example of a BCT rapidly deployed as an FRO occurred in 2019 in Iraq. Crisis Response: Baghdad Embassy Attack On 31 December 2019, during a time of heightened tensions with Iran, an initial wave of 750 paratroopers from the 82d Airborne division assigned to the immediate response force deployed to Baghdad to provide additional security. This deployment was in response to an attack that occurred on the U.S. embassy 18 hours earlier. The remainder of the Soldiers in the brigade deployed within days. In total, 3,000 Soldiers provided additional security at the embassy for almost two months. While forward deployed, the Soldiers continued training to demonstrate readiness, and they were postured to rapidly respond at the CCDR’s direction. CONSOLIDATING GAINS 5-63. During and after crisis response, Army forces consolidate gains to deny adversary forces the means to extend the crisis or create a similar crisis in the future. This will often entail maintaining an enhanced force posture in a JOA for a period of time to demonstrate U.S. willingness to defend allies and partners. Army forces continue to support improvements to host-nation capabilities through a security cooperation plan designed to make them less vulnerable to future crisis. If an adversary directly targets partner forces, or acts through a proxy, the United States must be prepared to reconstitute the partner’s forces as quickly as possible. The ability of Army forces to reconstitute partner nation forces is especially important to JFCs since, in many areas, only the Army has the capacity to conduct a comprehensive security cooperation program. Many allies and partners rely primarily on their armies and do not have robust navies or air forces. Consolidating gains
3-0
128
Chapter 5 during and after crisis response creates enduring change that reinforces deterrence against adversaries and improves relative advantages for U.S., allied, and partner forces. TRANSITION TO COMPETITION OR ARMED CONFLICT In the midst of war and crisis nothing is as clear or as certain as it appears in hindsight. Barbara Tuchman 5-64. There are two outcomes of a crisis—a de-escalation to competition or an escalation to armed conflict. Transitions are typically points of friction. Commanders emphasize information collection prior to and during transitions to maintain a detailed understanding of the threat and continuously assess the situation in order to position their forces to retain the initiative. TRANSITION BACK TO COMPETITION 5-65. During a crisis, partner nation security forces and government institutions may suffer losses that reduce capability and capacity due to the actions of adversary or proxy forces. Army forces may be tasked to execute security cooperation programs to help restore or maintain partner nation capabilities and capacity as a means to consolidate gains. Army forces seek to restore partner security forces and government institutions as quickly as possible to maintain popular support. Doing so reduces the need for large numbers of U.S. forces to deploy in the future or be maintained in theater to support or enable a partner nation’s security. A quick recovery also highlights the strength of the alliance or bilateral relationship of a partner nation with the United States. (See Chapter 4 for more information on partner nation capabilities and capacity.) 5-66. Army forces use products developed from the civil preparation of the environment to help rebuild partner-nation security forces. Army forces work with partner nations to do this and do not act unilaterally. The security force assistance brigade (SFAB) and civil affairs units are the ideal core for this effort, but all types of Army units may contribute. When the effort is large and there is a need for additional subject matter expertise, or there is a need to reconstitute host-nation conventional forces, additional Army forces may be required. (See JP 3-20 and FM 3-57 for more details on security cooperation and civil affairs operations.) 5-67. Army forces may help the JFC exploit favorably resolved crises to establish new patterns of behavior for a theater. While crises are generally uncertain and volatile, their resolution and resulting transition back to competition provide opportunities to capitalize on changes in an operational environment. Army forces support joint efforts to create and reinforce changes that benefit the United States and its allies and partners in competition and provide improved relative advantages that assist in deterring future adversary malign behavior. TRANSITION TO ARMED CONFLICT 5-68. Army forces responding to a crisis are prepared for and expect to fight. This saves time during the transition and requires an understanding of the OPLAN or likely concept of operations as early as possible. Forward-positioned forces reposition into battle positions or tactical assembly areas and take all available measures to protect themselves from attack in every domain as they prepare for combat. When located with allied or partner units, Army forces synchronize their activities to ensure unity of purpose and mutual support. Depending upon the enemy and distance from the United States, Army forces should expect to receive little support in the opening stages of a conflict and plan accordingly.
3-0
129
Chapter 6 Operations During Armed Conflict The art of war is simple enough. Find out where your enemy is. Get at him as soon as you can. Strike him as hard as you can, and keep moving on. Ulysses S. Grant Section I of this chapter introduces large-scale combat operations and the ways in which they vary. It addresses topics applicable to both offensive and defensive operations, including enemy methods, relative advantages, integrating with the joint force, defeat mechanisms, and enabling operations. Section II describes defensive operations. Section III describes offensive operations. Section IV describes transition to post-conflict competition and stability operations. SECTION I – ARMED CONFLICT AND LARGE-SCALE COMBAT OPERATIONS 6-1. Armed conflict encompasses the conditions of a strategic relationship in which opponents use lethal force as the primary means for achieving objectives and imposing their will on the other. The employment of lethal force is the defining characteristic of armed conflict, and it is the primary function of the Army. Lethality’s immediate effect is in the physical dimension—reducing the enemy’s capability and capacity to fight. However, the utility of lethal force extends into the information and human dimensions where it, along with the other instruments of national power, influence enemy behavior, decision making, and will to fight. 6-2. During armed conflict, operations usually reflect combinations of conventional and irregular warfare approaches. Leaders apply doctrine for large-scale combat operations during limited contingencies that require conventional warfare approaches. Irregular warfare includes counterinsurgency and unconventional warfare, which other publications specifically address. The initial actions of large-scale combat operations will likely overlap with actions initiated during competition and crisis. For example, while some units are engaged in offensive or defensive operations, other units may be completing non-combat evacuations while in contact with enemy forces. (See FM 3-24 for detailed information about counterinsurgency. See ATP 3-05.1 for more information about unconventional warfare.) 6-3. Large-scale combat operations are extensive joint combat operations in terms of scope and size of forces committed, conducted as campaigns aimed at achieving operational and strategic objectives through the application of force. Large-scale combat on land occurs within the framework of a larger joint campaign, usually with an Army headquarters forming the base of a joint force headquarters. These operations typically entail high tempo, high resource consumption, and high casualty rates. Large-scale combat introduces levels of complexity, lethality, ambiguity, and speed to military activities not common in other operations. 6-4. Large-scale combat operations occur in circumstances usually associated with state-on-state conflict, and they encompass divisions and corps employing joint and Army capabilities from multiple domains in a combined arms manner. Irregular warfare activities often complement large-scale combat operations, with conventional, irregular, and special operations forces conducting operations close to each other. This proximity requires cooperation between friendly forces of all types to ensure success. In other cases, irregular warfare occurs largely in a secondary joint operations area (JOA) or another theater of operations. When this occurs, the combatant commander (CCDR) ensures sufficient coordination of operations to support unity of purpose at the national level. 6-5. Successful large-scale combat operations defeat enemy armed forces while establishing control over land and populations to achieve operational and strategic objectives. They may capitalize on superior military capability to quickly overwhelm a weaker enemy and consolidate gains as part of a rapid campaign. Large
3-0
130
Chapter 6 scale combat operations against more capable enemy forces are likely to be of longer duration, lasting months or longer. 6-6. Army forces may execute large-scale combat operations in a supporting, enabling, or advisory role, instead of constituting the bulk of ground maneuver forces. One example was OPERATION INHERENT RESOLVE, beginning in 2014, during which a U.S.-led combined joint task force supported Iraqi Security Forces and Syrian Democratic Forces in defeating the Islamic State of Iraq and Syria. In these cases, U.S. forces applied large-scale combat operations tactics in support of a partner force. 6-7. The characteristics of large-scale combat operations vary based on many factors, including the enemy. When fighting against a less capable enemy, the U.S. joint force may have significant advantages in most domains. The principal concerns during such operations include how to win rapidly at minimal cost, consolidate gains, and transition responsibility for an area to legitimate authorities. When fighting against a peer enemy, able to contest the joint force in all domains, the operational environment becomes much more difficult. Integrated air defense and long-range fires systems; cyberspace and electronic warfare capabilities; chemical, biological, radiological, and nuclear capabilities (CBRN); and global reconnaissance and surveillance networks can create parity or significant enemy advantages in one or more domains, particularly early during a conflict and when operating close to its own borders. To succeed, the U.S. joint force must create its own relative advantages, preserve combat power, and rapidly exploit what opportunities it creates. Commanders must assume risk to create opportunity and sequence their operations because they cannot defeat enemy forces in a single decisive battle. ENEMY APPROACHES TO ARMED CONFLICT 6-8. Although peer enemies mainly seek to obtain their strategic objectives during competition, they will engage in armed conflict if they view that the rewards are worth the risk. Once engaged in armed conflict, peer enemies employ combinations of threat methods to render U.S. military power irrelevant whenever possible and inflict unacceptable losses on the United States, its allies, and its partners. Russia and China employ their instruments of national power and military capabilities in distinct ways. RUSSIA 6-9. The Russian view of war is that it is often undeclared, fought for relatively limited policy objectives, and occurs across all domains. Russian leaders assess that modern conflicts are characterized by a destructive and rapid initial period of war that is more decisive than in the past. Additionally, Russia considers that non-nuclear strategic precision-guided weapons can achieve strategic effects on par with nuclear weapons. Doctrinally, Russia plans to employ nuclear weapons in response to non-nuclear attacks when those attacks threaten Russian sovereignty. 6-10. During armed conflict, Russia seeks to exert simultaneous pressure in all domains. Russian strategies intend to increase the costs of confrontation and make the objectives of the United States and its allies politically and economically unsupportable. Russia’s objective is to weaken U.S. national will to continue a conflict by inflicting highly visible and embarrassing losses on U.S. forces. 6-11. Russian forces intend to win conflicts with massed and precision fires. Russian forces will attempt to set the operational conditions so that deployment of U.S. forces is ultimately counter to U.S. interests. If the U.S. does deploy forces, Russian goals are centered on creating constraints that prevent success of the United States’ campaign. Russian methodologies focus on four key areas: (cid:122) Disrupt or prevent understanding of the operational environment. Russian information warfare activities manipulate the acquisition, transmission, and presentation of information in a way that suits Russia’s preferred outcomes. (cid:122) Target stability. Russia may foster instability in key areas and among key groups so that regional security conditions do not support U.S. operational requirements. (cid:122) Disaggregate partnerships. Russia acts upon U.S. allies and partners to reduce the ability of the United States to operate in its preferred combined, joint, and interagency manner. (cid:122) Prevent access. Russia employs pre-conflict activities to deny access to U.S. forces, using nonlethal means initially and transitioning to lethal means if necessary. It seeks to undermine
3-0
131
Operations During Armed Conflict relationships, raise political stakes, manipulate public opinion, and attack resolve to constrain or deny basing rights, overflight corridors, logistics support, and concerted allied action. 6-12. As it applies instruments of national power, Russia integrates military forces and other means at selected times and locations to achieve desired objectives as part of its overall campaign. It uses offensive and defensive tactics and techniques that include acts of crime and terrorism. These actions can also be employed to manipulate population perceptions and dissuade support to U.S. military forces or other institutions. When necessary, Russia uses acts of physical violence, psychological operations, and different means of manipulating information to gain influence and develop voluntary or coerced cooperation in a target population. Concurrently, it uses indirect means to progressively degrade U.S. combat power and infrastructure resources and to otherwise psychologically influence the political, social, economic, military, and information variables of the operational environment. 6-13. Russian tactical-level units operate as combined arms forces to exploit the effects of both precision strikes and massed fires. Against lesser opponents, Russian forces employ deep maneuver when possible to defeat an enemy’s will to resist early in a conflict. In other cases, they mass capabilities in pursuit of more limited objectives while fixing their adversary along a broad front. Regardless of the situation, a basic principle of Russian military actions is to use the effects of strike actions to create the conditions for military success. 6-14. Russia prefers to employ all available national elements of power prior to using maneuver forces, and after force-on-force operations begin, it will continue to employ these integrated national capabilities to support tactical maneuver. Russian forces also employ denial and deception (maskirovka) to mask the true intent of their operation. To execute tactics, Russian units apply intelligence methods and decision making, that are scientifically based, to— (cid:122) Understand the conditions of an operational environment that will impact operations. (cid:122) Determine the tactical functions required and calculate the required allocation of combat power needed to accomplish a mission in a specific time and location. (cid:122) Understand the psychological and cognitive issues among competing friendly forces, aggressor forces, the local population, and other actors in an operational environment. CHINA 6-15. China considers three aspects in the country’s view of conflict: comprehensive national power, deception, and the Three Warfares. Comprehensive national power is made up of hard power and soft power. Hard power includes military capability and capacity, defense industry capability, intelligence capability, and related diplomatic actions such as threats and coercion. Soft power includes such things as economic power, diplomatic efforts, foreign development, global image, and international prestige. China views comprehensive national power as a vital measure of its global status. Ultimately, all forms of conflict— military, diplomatic, or other—must enhance China’s comprehensive national power. (For more information on China’s comprehensive national power, see ATP 7-100.3.) 6-16. Deception plays a critical role in every part of the Chinese approach to conflict. People’s Liberation Army planners employ stratagems to achieve their deception goals. Stratagems describe the enemy’s mindset, focusing on how to achieve the desired perceptions by the opponent, and then they prescribe ways to exploit those perceptions. 6-17. China’s strategic approach to conflict employs Three Warfares designed to support and reinforce the People’s Liberation Army’s traditional military operations. Though these approaches are called warfares, they are universally nonlethal and do not involve direct combat operations. If a battle must be fought, the Three Warfares are designed to unbalance, deceive, and coerce opponents to influence their perceptions in ways that create advantage. The Three Warfares are— (cid:122) Public opinion warfare. (cid:122) Psychological warfare. (cid:122) Legal warfare. 6-18. Public opinion warfare is China’s high-level information campaign designed to set the terms of political discussion. China views this effort as capable of seizing the initiative in a conflict before any shots
3-0
132
Chapter 6 are fired by shaping public discourse, influencing political positions, and building international acceptance of Chinese interests. 6-19. China’s psychological warfare is broadly similar to U.S. military information support operations in that it is intended to influence the behavior of a given audience. Psychological warfare is the deliberate manipulation of psychological reactions in target audiences, designed to create and reinforce attitudes and behaviors favorable to China’s objectives and guide adversary behavior towards China’s preferred outcomes. 6-20. Legal warfare for China is the setting of legal conditions for victory—both domestically and internationally. Legal warfare seeks to unbalance potential opponents by exploiting international or domestic law to hinder their military operations, to create legal justification for People’s Liberation Army operations worldwide, and to support Chinese interests through a valid legal framework. It guides how the People’s Liberation Army trains to treat prisoners of war, detainees, and civilians, and it guides how the People’s Liberation Army abides by international legal conventions, codes, and laws. 6-21. During armed conflict, China employs systems warfare in combination with the other threat methods, such as preclusion, isolation, and sanctuary. China employs these threat methods throughout all domains and at all levels of warfare. Systems warfare involves— (cid:122) Bypassing enemy systems’ areas of strength, thus gaining a combat advantage by approaching them asymmetrically. (cid:122) Developing systems that excel at exploiting perceived weaknesses in enemy systems, thereby offsetting their strengths by undermining the systems’ ability to perform assigned missions. (cid:122) Undermining international alliances through diplomatic efforts. (cid:122) Conducting cyberspace attacks to disable air or seaports. (cid:122) Using special operations forces to undermine civilian morale through covert operations. Note. China uses the term “special operations forces” to identify their special forces units per ATP 7-100.3. Russian doctrine uses the term “special purpose forces” for their special forces units. For brevity, this manual uses “special operations forces” to describe special forces units employed by an adversary or enemy. 6-22. Although many actors on the world stage have embraced the concepts of systems warfare, including Russia, China has woven the idea into every aspect of their warfighting capabilities and methods. The systems warfare concept consists of two basic ideas: creating purpose-built operational systems that combine key capabilities under a single command, and the use of these operational systems to asymmetrically target and exploit vulnerable components of an opponent’s system. The People’s Liberation Army believes that by effectively destroying, isolating, neutralizing, or offsetting key capabilities, it can degrade the enemy’s will and ability to resist enough to achieve victory. 6-23. At the tactical level, systems warfare centers largely on targeting high-value battlefield systems such as radars, command and communications nodes, field artillery and air defense systems, and critical logistics support means. China relies on heavy employment of long-range fires at maximum standoff distance to target friendly joint enablers and command and control (C2) nodes. Examples of tactical system warfare include using heavy rocket artillery to defeat or destroy enemy radars and artillery systems, electronic warfare to suppress or neutralize enemy command and communications networks, and deception operations to target enemy leaders’ situational understanding. RELATIVE ADVANTAGES DURING ARMED CONFLICT 6-24. Army leaders must anticipate enemy advantages and have a plan to overcome them. Army forces avoid attacking directly into enemy strengths. They best overcome enemy advantages by creating their own advantages to exploit in pursuit of assigned objectives. Army formations most effectively achieve overmatch through the integration and synchronization of joint and multinational capabilities employed from positions in multiple domains that create cascading dilemmas and defeat the enemy’s operational approach.
3-0
133
Operations During Armed Conflict PHYSICAL ADVANTAGES 6-25. Friendly forces require physical advantages to defeat enemy forces and occupy land areas, exert control over lines of communications, and protect the physical infrastructure used to attain information and human advantages. Throughout armed conflict, leaders seek physical advantages that include— (cid:122) Position. (cid:122) Range. (cid:122) Speed of movement. (cid:122) Technologically superior capabilities. (cid:122) Terrain and weather. 6-26. Positional advantage occurs when one force’s location facilitates its ability to exploit an enemy weakness. For example, a force positioned to attack the flank of an enemy defense oriented in a different direction is an advantage because it causes enemy forces to reposition and negates some of the benefits of a prepared defense. Gaining this advantage typically requires maneuver and involves assuming risk to a formation or in another part of the assigned area. 6-27. Friendly forces may enjoy a range advantage, particularly when employing joint capabilities. Superior range can enable the delivery of effects for which an enemy force has no immediate answer. Range advantage can also apply to distances friendly forces can move relative to enemy forces, particularly when friendly forces can do so quickly. 6-28. A higher speed of movement relative to enemy forces creates an advantage when leaders exploit it to move faster than enemy forces can effectively react or reposition. Speed of movement enables most other physical advantages—when employed with judgment. Speed mitigates risk and affords protection when units are closing with enemy forces while in range of enemy fires capabilities. The faster a unit closes with the enemy, the shorter the exposure. However, focusing on speed without applying judgment can cause units to blunder into enemy engagement areas and suffer heavy losses. 6-29. Leaders exploit technological advantages while directing course of action development and schemes of maneuver. New technological advantages do not always have to be new pieces of equipment. Using old technology or combining Army and joint capabilities in new and novel ways is often effective in gaining advantages. 6-30. Terrain and weather often provide advantages, especially in terms of mobility and countermobility. Leaders use high-speed avenues of approach to increase the speed of movement. They use severely restrictive terrain to reduce the mobility of enemy armored formations. In the offense, leaders use terrain to conceal their movement. In the defense, they use reverse slopes to provide cover and concealment. In the offense or defense, rain helps infantry reduce the noise of dismounted movement through wooded areas. Limited visibility periods help conceal battle positions and friendly movements from enemy reconnaissance efforts. INFORMATION ADVANTAGES 6-31. Information advantages invariably overlap with and emanate from physical and human advantages. To gain an information advantage, units first require a physical or human advantage. Army forces create and exploit information advantages by acting through the physical and human dimensions of an operational environment. Leaders combine information advantages with other advantages to understand the situation, decide, and act faster than enemy forces. Examples of information advantages during armed conflict include— (cid:122) The ability to access enemy C2 systems to disrupt, degrade, or exploit enemy information. (cid:122) Opportunities created by deception operations to achieve surprise and thwart enemy targeting. (cid:122) The ability to mask electromagnetic signatures. (cid:122) The ability to integrate and synchronize friendly forces in denied or degraded environments through use of redundant communications. (cid:122) The ability to rapidly share information with domestic and international audiences to counter enemy malign narratives.
3-0
134
Chapter 6 (cid:122) The ability to inform a wide range of audiences to maintain legitimacy and promote the friendly narrative. (cid:122) The ability to rapidly share and analyze information among commanders and staffs to facilitate decisions and orders. HUMAN ADVANTAGES 6-32. Because war is a clash between opposing human wills, the human dimension is central to war. Army formations are principally designed to achieve objectives through the threat or employment of lethal force, which has a psychological effect. Understanding an enemy force’s tolerance for casualties and the political and social will to endure them is important to understanding the level of effort required to prevail against enemy forces in large-scale combat operations. Leaders do everything possible in the physical and information dimensions to reduce the enemy’s will to fight. During armed conflict, human advantages include— (cid:122) Political and national will that supports strategic objectives. (cid:122) Experienced, well-trained formations. (cid:122) Leadership well versed in the mission command approach to C2. (cid:122) Adherence to the law of war. (cid:122) Unit cohesion and Soldiers with the mental and physical stamina for combat. (cid:122) The trust of the host-nation population. (cid:122) Confidence in a sustainment system that provides the best possible medical treatment and adequate supplies. (cid:122) Interoperability and mutual trust between allies and host-nation partners. OPERATING AS PART OF THE JOINT FORCE 6-33. The Army always fights as part of a joint force, and usually as part of a multinational coalition during large-scale combat operations. Because combatant commanders (CCDRs) often assign the senior Army commander as the joint force land component commander (JFLCC), it is imperative that Army leaders from the JFLCC to brigade level understand the integration of operations on land with those in the other domains for the joint force. 6-34. The Army supports the joint force by providing the capabilities and capacity to apply sustained combined arms landpower through movement, close combat, and fires at whatever scale is necessary to defeat enemies on land. It does this by employing capabilities from the land, maritime, air, space, and cyberspace domains in support of ground operations on land and employing ground-based capabilities to enable operations in the other domains. 6-35. Army forces’ contributions to the joint force extend well beyond Army support to other Services (ASOS) through a variety of actions. They include— (cid:122) Establish C2 on land. (cid:122) Counter air and missile threats that deny air and maritime freedom of action with land-based systems. (cid:122) Defend and control key terrain. (cid:122) Defeat components of enemy antiaccess (A2) and area denial (AD). (cid:122) Conduct large-scale combat operations. (cid:122) Sustain large-scale combat operations. (cid:122) Consolidate gains. ESTABLISH COMMAND AND CONTROL ON LAND 6-36. Establishing C2 on land requires a land component command that assigns land areas and properly defines command and support relationships between subordinate forces. A commander assigns land areas and command and support relationships based on the mission and the commander’s concept of operations. A commander also considers the level of joint support available when assigning land areas and task-organizing
3-0
135
Operations During Armed Conflict forces. Army forces establish C2 of land areas at the direction of the joint force commander (JFC), normally the JFLCC. A JFLCC is the commander within a unified command, subordinate unified command, or joint task force (JTF) responsible to the establishing commander for recommending the proper employment of assigned, attached, or other available land forces; planning and coordinating land operations; and accomplishing assigned missions. C2 across the width and depth of the land component commander’s assigned areas requires access to strategic communications. Therefore, commanders plan for the movement and placement of strategic communications systems in C2 nodes. (See JP 3-31 and FM 3-94 for more information on the JFLCC.) 6-37. In addition to their assigned missions, Army forces generally consider four key issues. They are the assignment of subordinate land areas, the concept of mutual support between subordinates, the integration of echelons in terms of time, space, and purpose, and the proper task organization of the land force. Assigning Land Areas 6-38. The JFC typically assigns a land area of operations (AO) to the land component command. A land AO does not typically encompass the entire land operational area of the JFC’s joint operations area (JOA), but the size, shape, and positioning should be adequate for the JFLCC to accomplish the mission and protect the forces under the JFLCC’s control. In the assigned land AO, the JFLCC establishes an operational framework for the AO that assigns responsibilities to subordinate ground force commanders and allocates capabilities to fulfill those responsibilities. Based on the situation, the land component command assigns areas (AO, zone, or sector) to subordinate tactical echelons. Figure 6-1 on page 6-8 reflects a baseline doctrinal template for depths and frontages by echelon. (See Chapter 2 for more information on considerations for how to assign areas to subordinate echelons.) Note. Political constraints, geography, ally and partner dynamics, forces available, the types of operations being conducted, and the enemy all influence the appropriate AO size for each echelon.
3-0
136
Chapter 6 Figure 6-1. Doctrinal template of depths and frontages
3-0
137
Operations During Armed Conflict Applying Mutual Support 6-39. Commanders consider mutual support when task-organizing forces, assigning land areas, and positioning units. A high degree of mutual support between units provides flexibility and options to commanders and creates multiple dilemmas for enemy forces. When units can support each other, commanders have more options to combine capabilities from all warfighting functions and across all domains. Commanders and staffs assess supporting range of capabilities between units to understand their options with respect to mutual support and reducing the vulnerability of friendly forces to defeat in detail. Air capabilities and indirect fires have long ranges that provide options for increasing the supporting range between units. 6-40. Supporting distance depends on the mobility of the formation, the terrain, and the enemy situation. When units operate outside weapons ranges, they may be able to maneuver from supporting distances to enable each other. Infantry units may be able to maneuver a short supporting distance to enable an armored formation in severely restrictive terrain. A combat aviation brigade may be in supporting distance to aid an infantry brigade isolated from the rest of the division. When units must operate in a widely distributed manner, commanders and staffs position reserves so that they can maneuver in support of multiple formations depending on the situation. 6-41. Units are not within supporting distance regardless of their proximity to each other if they cannot communicate or are fixed by enemy forces. When units share a common operational picture (COP), relative proximity is less important than the ability to coordinate maneuver and fires. Exploiting the advantage of mutual support requires that units synchronize maneuver and fires more effectively than enemy forces do. 6-42. Large-scale operations involving both conventional and special operations forces require the integration and synchronization of conventional and special operations efforts. The JTF commander must consider the different capabilities and limitations of both conventional and special operations forces, particularly in the areas of C2 and sustainment. Exchanging liaison elements between conventional and special operations staffs further integrates efforts of all forces concerned. (For more information on coordinating conventional and special operations forces, see FM 6-05.) 6-43. Commanders assign subordinate units noncontiguous areas when the situation requires, either because the intent is to move along dispersed axes of advance or to minimize detection in locations like rear areas. When this occurs, the higher headquarters retains responsibility for the risk associated with the unassigned areas and mitigates that risk with capabilities it controls. As long as friendly forces have the initiative and can force the enemy to react, large units operating in non-contiguous areas are able to protect their lines of communication and can provide advantages at acceptable risk. However, risk to non-contiguous forces increases quickly the longer they become static, particularly in their rear areas. Large AOs with limited numbers of forces, and maritime environments where operations occur across groups of small islands are conditions that require non-contiguous assigned areas. 6-44. Joint capabilities can mitigate risk when subordinate units operate in noncontiguous areas of operations beyond supporting range or supporting distance of other ground forces. However, depending on joint capabilities outside an Army commander’s direct control entails the risk that those capabilities may not be available due to enemy activity, weather, or higher JFC priorities. (See Chapter 3 for more information on mutual support. See Chapter 8 for more information on non-contiguous assigned areas in maritime environments.) Integrating Echelons 6-45. Describing echelon roles and responsibilities in time, space, and purpose makes operations more cohesive Providing proper focus enables subordinate through the depth of an operational area where enemy initiative while allowing higher headquarters formations and irregular forces are intermingled with to employ their limited capabilities to friendly forces. Intermingling of forces increases greatest effect. complexity and make it difficult to retain unity of effort between echelons. Commanders and staffs integrate the operations of all echelons to ensure that they accrue advantages and accomplish objectives.
3-0
138
Chapter 6 6-46. Echelons maneuver subordinate formations to defeat enemy forces. Mission success demands that higher echelons provide support to subordinate operations. During large-scale combat operations, brigade combat teams (BCTs) and divisions generally focus on defeating enemy maneuver formations. Corps and higher echelons generally focus on defeating enemy integrated air defense systems and portions of the enemy’s integrated fires command according to the JFC plan and priorities. 6-47. BCTs need the time and space to defeat lead enemy security operations and maneuver echelons. Divisions provide time and protection for subordinate formations by disintegrating the cohesion of follow- on forces, reserves, and short- and mid-range fires that threaten close and rear operations. Divisions maneuver brigades in close operations against enemy maneuver forces. Divisions employ attack aviation and close air support to enable their operations and employ rear operations to sustain tempo and operational reach. Focusing on enemy maneuver forces does not prevent BCTs and divisions from attacking components of the enemy’s integrated air defense or fires capabilities. Corps routinely require divisions to attack priority enemy capabilities that are in the division’s assigned area or area of influence. 6-48. Corps maneuver divisions and set conditions by employing joint capabilities, including space and cyberspace effects, to defeat enemy mid- and long-range fires, air and missile defense capabilities, and their associated networks and sensors. Additionally, corps disrupt the movement of subsequent maneuver formations. Corps ensure division rear areas do not expand beyond their capacity to control, and they continue to expand division initial efforts to consolidate gains. The land component command provides mutual support to other components and maintains unity of effort on land with unified action partners. Land component command assessments ensure that tactical actions are having the desired effects in the physical, information, and human dimensions. They ensure that command narratives match the tactical situation, and that tactical actions reinforce command narratives. (See Figure 6-2 for a notional depiction of echelon roles and responsibilities in terms of time, space, and purpose.) 6-49. Higher headquarters actively aid their subordinate formations in their fights, not merely attaching or assigning them with additional capabilities. Commanders and staffs actively avoid becoming so narrowly focused on their echelon’s roles and responsibilities that they allow their subordinate formations to fail.
3-0
139
Operations During Armed Conflict Figure 6-2. Notional roles and responsibilities in terms of time, space, and purpose at different echelons.
3-0
140
Chapter 6 Task-Organizing 6-50. Commanders task organize their forces to ensure they are capable of fulfilling their roles, responsibilities, and purpose. Task-organizing is the act of designing a force, support staff, or sustainment package of specific size and composition to meet a unique task or mission (ADP 3-0). Considerations when task-organizing a force include the mission, training, experience, unit capabilities, sustainability, the operational environment, and the enemy threat. Task-organizing allocates assets to subordinate commanders and establishes command and support relationships. Task-organizing can be continuous, as commanders reorganize units for subsequent missions during the course of operations. The ability of Army forces to task-organize increases agility of formations. It lets commanders configure their units to best use available resources. It also allows Army forces to match unit capabilities to tasks. The ability of sustainment forces to tailor and task-organize ensures commanders have freedom of action to change with mission requirements. 6-51. The task organization of a formation supports C2 and formalizes command and support relationships between units. An effective task organization— (cid:122) Facilitates the commander’s intent and concept of operations. (cid:122) Ensures unity of command and synchronization of efforts through proper use of command and support relationships. (cid:122) Retains flexibility with the concept of operations. (cid:122) Ensures flexibility to meet unforeseen events and support future operations. (cid:122) Weights the main effort. (cid:122) Exploits enemy vulnerabilities. (cid:122) Allocates resources with minimum restrictions on their employment. (cid:122) Adapts to conditions imposed by changing variables. (cid:122) Maintains or creates effective combined arms teams. (cid:122) Offsets limitations and maximizes the potential of all available forces. (cid:122) Provides mutual support among subordinate units to the greatest extent possible. 6-52. Units organize and reorganize their forces based on the tasks their higher headquarters assign throughout the course of an operation. Commanders ensure that each subordinate echelon has sufficient combat power assigned, attached, or in support to accomplish its missions. The allocation of supporting joint and Army capabilities takes into account main and supporting efforts by phase of an operation and other factors, like where to accept risk with economy of force efforts to create opportunities elsewhere. 6-53. Task organization changes place burdens on subordinate units, no matter how agile they may be. Before changing task organization, leaders consider less disruptive options, such as changes in support relationships and priorities of support. COUNTER AIR AND MISSILE THREATS 6-54. Enemy air and missile capabilities are a significant threat to Army forces. They increase risk to formations building combat power in assembly areas, to forces transiting lines of communications, and forces conducting rear operations. While able to attack friendly forces during offensive operations, they are particularly dangerous to command posts and any units detected while in static positions. Defeating enemy air and missile threats is necessary to create opportunities for offensive maneuver. However, the employment of maneuver forces that cause forward-positioned enemy air and missile capabilities to displace can complement counter-air operations. 6-55. Counter-air is a theater mission that integrates offensive and defensive operations to establish and maintain a desired degree of control of the air by neutralizing or destroying enemy aircraft and missiles, both on the ground and in the air. These operations may include the use of Army manned or unmanned aircraft and long-range fires, maneuver forces, special operations, space operations, cyberspace operations, and electromagnetic warfare capabilities. 6-56. Defensive counter-air operations are all defensive measures within the theater designed to neutralize or destroy enemy forces attempting to penetrate or attack through friendly airspace. Defensive counter-air encompasses active and passive defensive actions taken to destroy, nullify, or reduce the effectiveness of
3-0
141
Operations During Armed Conflict hostile air and missile threats against friendly forces and assets. The goal of defensive counter-air operations, in concert with offensive counter-air operations, is to provide an area from which forces can operate while protected from air and missile threats. Defensive counter-air operations must be integrated and synchronized with offensive counter-air operations and all other joint force operations. The area air defense commander, when established by the JFC, is responsible for defensive counter-air planning and operations. 6-57. The JFC designates an area air defense command with the authority to plan, coordinate, and integrate overall joint force defensive counter-air operations through the joint air operations center. Together they establish an integrated air defense system. With the support of the component commanders, the area air defense command develops, integrates, and distributes a JFC-approved joint area air defense plan. 6-58. Friendly forces conduct air and missile engagements in accordance with guidelines and rules established by the area air defense commander, who is normally the joint force air component commander. A joint force air component commander is from the service with the most air assets and the capability to plan, task, and control joint air operations in an AO, typically the Air Force or Navy. 6-59. The Army air and missile defense command (AAMDC) is the Army’s lead organization for Army air and missile defense (AMD) forces in a theater. The AAMDC commander, as the theater army AMD coordinator, assists the ARFOR commander and the area air defense commander in the planning and coordination of the critical asset list and the creation of the defended asset list. 6-60. Army air defense artillery (ADA) forces conduct AMD operations for the joint force. Army forces may attack to seize key terrain for the emplacement and employment of theater air and missile defense systems by the JFC to defeat portions of the enemy air and missile capabilities. Forward deployed or early entry ADA forces defend critical assets against air attack while the JFC builds combat power. 6-61. The critical asset list identifies the most critical assets requiring protection, and it serves as the foundation for a defended asset list, which allocates available ADA forces. Integration with joint or multinational AMD components in the JOA can mitigate some shortages of AMD systems. Short-range air defense (SHORAD) provides air defense against low-altitude air threats for key joint and Army assets, primarily amphibious landing sites, ports, airfields, command posts, and crossing sites. Integrated C2 across all ADA echelons enables the most efficient allocation of limited SHORAD and early warning assets. High-to-medium altitude AMD forces defend joint and Army forces against ballistic missile threats. 6-62. When planning, positioning, and determining how often ADA units are required to conduct survivability moves, units take into account the range of enemy indirect fires and the ability of enemy forces to identify ADA unit signatures. Maneuver units may be required to defend ADA units against ground attack. (See JP 3-01 for more information on countering air and missile threats. See FM 3-01 for more information about Army AMD operations.) DEFEND AND CONTROL KEY TERRAIN 6-63. The joint force has enduring requirements that include defending allies with forward-stationed forces, controlling strategic lines of communications to enable the deployment of combat power, and controlling the key terrain required during joint forcible entry operations. The contributions of Army forces both protect and enable the other members of the joint force, which in turn enable greater freedom of action and opportunities for operations on land. (See Section II of this chapter for information on defense during large-scale combat operations.) Defense by Forward-Stationed Forces 6-64. Armed conflict often occurs after a long period of competition and is likely to begin with some form of enemy aggression against a U.S. ally or partner, an attack on forward-stationed U.S. forces, or both. Forward-stationed forces whose combat mission involves defending as part of an allied effort may be required to conduct mobile or area defenses or retrogrades or reposition to tactical assembly areas where they can prepare for their role in future operations. Advisor teams from the theater-aligned security force assistance brigade (SFAB) may embed alongside threatened partners, providing real-time tactical intelligence and access to U.S. capabilities. Commanders and staffs ensure defending forces have the appropriate priority for Army and joint fires. Operation plans (OPLANs) and supporting subordinate plans identify main defensive
3-0
142
Chapter 6 positions, security areas, force requirements, the locations of tactical assembly areas, and other planned locations. Building on preparations made during competition, units occupy these positions and, when able, they make improvements to overhead cover, concealment, communications, and fields of fire. Friendly forces hinder enemy detection efforts by combining real preparations with preparations of fake positions. Defensive preparations during competition, particularly the establishment of survivability positions, preserve combat power when enemy preparatory fires commence with little or no warning. 6-65. Forward-stationed forces that have a mission to reposition at the outset of armed conflict require familiarization and understanding of routes and future positions. They acquire this during competition. As part of rehearsals, units exercise alert and recall procedures, load plans, ammunition draws and distributions, tactical road marches, and passages of lines with the actual units that they would pass through. Leaders ensure rehearsals reflect combat conditions as much as possible, and they pay attention to details such as limited visibility movements, secure radio communications with allies, and in-transit maintenance plans. 6-66. Army forces, especially those stationed in forward locations or tasked to protect critical joint capabilities, continuously improve the survivability of their positions. Whenever possible, leaders ensure that key capabilities are mobile, and they take active measures to complicate their targeting during competition and crisis by moving them irregularly, using camouflage, digging in when stationary, and maintaining dispersion. Unit standards and discipline, inculcated and habituated with a protection mindset during training, determine success or failure during the opening phases of a conflict. 6-67. Depending upon what a specific OPLAN says or a situation dictates, some forward-stationed forces may reposition to tactical assembly areas to conduct specific tasks or preserve combat power. They may conduct these operations in or out of contact, and leaders must plan and rehearse them to be successful. When they involve rearward passage of lines through allied forces, units participate in rehearsals using the same procedures and secure communications planned for actual execution to maintain operations security. 6-68. When bypassed by enemy maneuver forces, commanders of forward-positioned forces take the initiative to stay in the fight. They seek to defeat elements of enemy follow-on forces. They make every attempt to disrupt enemy sustainment and long-range fires capabilities conducting deep strikes against friendly forces. These operations are most successful when supported by local populations. (See paragraphs 6-159 through 6-161 for more information on passages of lines. See paragraph 6-190 for more information on retrograde operations.) Control Strategic Lines of Communications and Key Terrain 6-69. Controlling strategic lines of communications and key terrain is essential to the joint force’s ability to project sustain combat power. Russia and China can contest joint operations across the globe, from the strategic support area in the continental U.S., along air, land, and maritime shipping lanes, to intermediate staging bases, and forward to tactical assembly areas. Because strategic lines of communications usually include key land areas, Army forces play a critical role in defending them. 6-70. Enemies integrate conventional and irregular warfare capabilities to disrupt lines of communications from the strategic support area to the close area. Enemy air, space, cyberspace, and missile capabilities are able to range targets anywhere in the world. Enemies can employ espionage or surrogates to attack infrastructure and populations in the continental United States. Enemy surface and subsurface maritime capabilities, in conjunction with unconventional approaches, will disrupt maritime lines of communications. Enemy medium- and long-range fires will contest the ability of Army forces to move combat power into forward tactical assembly areas. 6-71. Army forces control key staging areas such as airfields, railheads, and ports. They employ survivability methods and techniques appropriate to the situation to harden their positions. Depending on the operational and mission variables, these areas may be vulnerable to enemy cyberspace attacks and other methods of information warfare, espionage, terrorist attacks, special operations forces, ballistic missile attacks, and weapons of mass destruction. 6-72. Although the other Services are responsible to secure the air and maritime lines of communications, Army forces may secure some land areas, especially in vicinity of airfields and ports. Aircraft and ships must displace at irregular intervals to complicate enemy targeting, which in turn complicates planning requirements when Army forces are required to provide protection or other forms of support. Securing key
3-0
143
Operations During Armed Conflict terrain for use by other Services is important, even when it initially reduces combat power available for other purposes. Enabling other Services helps ensure the flow of Army forces into theater. 6-73. During armed conflict, joint operations to enforce sanctions or conduct blockades may require Army forces to control critical maritime choke points from land. Army capabilities, such as unmanned aircraft systems (UASs), long-range precision fires, AMD, attack aviation, electromagnetic warfare, inform and influence activities, security force assistance, and area security provide the joint force with options. (See JP 3-32 for more information on sea control.) 6-74. During offensive operations, commanders economize security of rear areas and protection of lines of communications to weight the main effort. To mitigate risk, commanders cooperate within the joint force and with multinational and other unified action partners for support. Allies and partners, in particular, can provide security capacity, situational awareness, and expertise in interacting with local populations, relieving Army forces of area security operations better suited to host-nation forces. DEFEAT COMPONENTS OF ENEMY ANTIACCESS AND AREA DENIAL 6-75. Enemy A2 and AD approaches deny friendly force protection and freedom of action. Enemies pursue A2 and AD approaches with lethal means that significantly increase the risk to forward-stationed forces and the ability to deploy and stage additional forces into tactical assembly areas. Understanding the structure and function of the enemy’s integrated fires command helps friendly forces disintegrate the cohesion of enemy A2 and AD approaches and create exploitable opportunities for the joint force to conduct offensive operations. Enemy Integrated Fires Command 6-76. An integrated fires command is a dedicated combination of C2 structures and organic and attached joint fire support units. The integrated fires command exercises centralized C2 of all allocated, dedicated fire support assets retained by its level of command. This can include aviation, artillery, naval gunfire, and surface-to-surface missile units from different commands and services. It also exercises C2 over all reconnaissance, intelligence, surveillance, and target acquisition assets dedicated to its support. An integrated fires command is tasked to engage designated operational and strategic targets. Integrated fires commands are typically associated with campaign-level headquarters. However, there are circumstances where an integrated fires command may be formed at the theater level. For example, the theater could have two separate campaigns, requiring a centralization of critical fire support assets at theater level to achieve the strategic or theater campaign objectives. Enemy forces integrate air and missile defense capabilities with the integrated fires command in different ways depending on their capabilities and the situation. Figure 6-3 on page 6-16 illustrates a notional theater-level integrated fires command.
3-0
144
Chapter 6 Figure 6-3. Fires assets of a notional theater-level integrated fires command 6-77. The integrated fires command executes all fire support tasks for the supported command. The integrated fires command is designed to— (cid:122) Exploit precision and massed fires through carefully integrated ground and air fire support. (cid:122) Minimize the amount of time from target acquisition to engagement. 6-78. An integrated fires command and its component systems have key vulnerabilities that Army forces can target when supporting joint force operations. Like any military system, it requires sustainment capabilities and other support that Army forces can detect and attack. It has electromagnetic signatures that enable detection from friendly joint intelligence, surveillance, and reconnaissance (ISR) from all domains. Enemy networks depend on C2 nodes Army forces can target. Perhaps most importantly, systems within an integrated fires command are comprised of land-based capabilities, including sensors, fires capabilities, and C2 nodes, all of which Army forces can attack. Defeating Antiaccess and Area Denial Approaches 6-79. Defeating enemy A2 and AD approaches requires continuous effort, best facilitated by forward-stationed forces positioned and protected before hostilities commence. This allows air and naval capabilities to stage closer to joint force targets, increasing the number of sorties they conduct. It allows Army forces and the rest of the forward-postured joint force to retain the terrain and facilities necessary for
3-0
145
Operations During Armed Conflict the introduction of additional friendly forces into theater. Preserving forward-stationed forces and retaining critical terrain inside a theater during the opening stages of a conflict provides depth and operational reach of the joint force. 6-80. A2 and AD are two different enemy approaches that the joint force typically expects to encounter. The joint force often considers them as part of the same challenge because retaining or regaining access to geographic areas requires a cohesive joint approach through all domains. Defeating A2 and AD requires a multidomain approach that includes Army forces retaining or seizing critical terrain to establish the depth necessary for defeating enemy forces. 6-81. Commanders defeat enemy A2 and AD approaches by employing multiple attacks through multiple domains. Complementary and reinforcing networked A2 and AD capabilities are resilient against a single line of attack. An enemy operating near its border is able to reconstitute forces and capabilities from homeland sanctuaries. Maneuvering the right capabilities within range to attack critical vulnerabilities might incur too much risk when all threat systems are operating at full capability. Therefore, leaders destroy or isolate the most exposed parts of the enemy’s systems over time, degrading them enough to support maneuver and create other opportunities to exploit. Destruction, isolation, and dislocation of various parts of an enemy integrated fires complex or air defense system can all contribute to its disintegration. 6-82. The main physical components of enemy A2 and AD systems are sensors, firing platforms, networks, C2, sustainment, and the forces securing them. Army forces attack these components as part of a joint operation that integrates all available capabilities. The JFLCC requests joint effects to support Army forces. The JFLCC may request space capabilities to detect enemy systems, offensive space operations for specific effects, and offensive cyberspace operations or electromagnetic capabilities to attack an enemy’s networks (See FM 3-12 for information on offensive cyberspace operations.) 6-83. The JFLCC is responsible for integrating joint capabilities and synchronizing their employment and effects to achieve convergence in order to enable subordinate maneuver. Achieving convergence is a key part of the approach to defeating enemy A2 and AD. 6-84. Army forces request space and cyberspace effects to disrupt A2 and AD C2 networks and create other effects. Army formations synchronize cyberspace and electromagnetic warfare effects against the enemy’s network, disrupting human and automated communications between sensors, firing units, and command posts. When Army planners identify a requirement, they request space and cyberspace effects according to unit procedures. They must understand the planning and preparation timelines required for the effects they are requesting. For example, initiating cyberspace effects takes time, and it should be part of initial OPLAN development and revisions. Many cyberspace effects can take months to generate, even though they can be delivered rapidly once developed. This is a challenge for Army echelons whose planning horizons during combat are measured in terms of hours and days. Therefore, it is important that Army leaders anticipate desired cyberspace effects well in advance of when they will need to integrate them. (See FM 3-12 for more information on requesting cyberspace effects. See FM 3-14 for more information on space operations.) 6-85. Army forces employ combinations of defeat mechanisms to attack components of an enemy’s A2 and AD system within the overall intent of degrading and ultimately defeating its ability to function cohesively. Subordinate echelons align their operations and objectives with conditions set by the land component command and act rapidly to exploit them. This combination of attacks and objectives ultimately defeats the enemy’s preferred operational approach and renders the enemy force vulnerable to follow-on operations by the JFC. Commanders use deliberate and dynamic targeting to create opportunities to attack the enemy and create redundancies for friendly forces. (See JP 3-60 and ATP 3-60 for more information on dynamic and deliberate targeting processes.) 6-86. Commanders must account for the possibility that enemy forces are able to regenerate some or all of their capabilities, in some cases by repositioning forces from elsewhere. Commanders and staffs continually assess enemy A2 and AD systems and maintain enough combat power to defeat enemy regeneration efforts to avoid surprise and preserve friendly freedom of action. Defeating enemy A2 and AD approaches typically enables joint forcible entry operations and the movement of friendly forces from aerial ports of debarkation and seaports of debarkation to their tactical assembly areas.
3-0
146
Chapter 6 JOINT FORCIBLE ENTRY OPERATIONS 6-87. Forcible entry is the seizing and holding of a military lodgment in the face of armed opposition or forcing access into a denied area to allow movement and maneuver to accomplish the mission (JP 3-18). A forcible entry operation may be the JFC’s opening move to seize the initiative. Forcible entry operations may be used to conduct operational movement and maneuver to attain positional advantage or as part of a deception. 6-88. Commanders design their forcible entry operations to seize and hold a lodgment against armed opposition. A lodgment is a designated area in a hostile or potentially hostile operational area that, when seized and held, makes the continuous landing of troops and materiel possible and provides maneuver space for subsequent operations (JP 3-18). This requires friendly forces to be combat loaded and prepared for immediate combat operations prior to their arrival on the ground in the lodgment area. A force defends the perimeter of a lodgment until it has sufficient forces to break out and conduct offensive operations. CONDUCT LARGE-SCALE COMBAT OPERATIONS 6-89. During large-scale combat operations, Army forces conduct offensive, defensive, and stability operations to defeat enemy forces. Defeat of enemy forces in close combat is normally required to achieve campaign objectives and national strategic goals after the commencement of hostilities. Divisions and corps are the formations central to the conduct of large-scale combat operations, as they are organized, trained, and equipped for the deep, rear, and support operations that enable subordinate success during close combat. The ability to prevail in ground combat is a decisive factor in breaking an enemy’s will to continue a conflict. Conflict resolution requires the Army to conduct sustained operations with unified action partners as long as necessary to achieve national objectives. Section II and Section III of chapter 6 describe how Army forces, as part of a joint force, conduct defensive and offensive operations during large-scale combat. SUSTAIN LARGE-SCALE COMBAT OPERATIONS 6-90. Large-scale combat operations require greater sustainment than other types of operations. Their high tempo and lethality significantly increase maintenance requirements and expenditure of supplies, ammunition, and equipment. Large-scale combat incurs the risk of mass casualties, which increase requirements for health service support, mortuary affairs, and large-scale personnel and equipment replacements. Large-scale combat operations demand a sustainment system to move and distribute a tremendous volume of supplies, personnel, and equipment. (See FM 4-0 for more information on sustainment.) 6-91. Army sustainment is a key enabler of the joint force on land. Army forces provide sustainment to other elements in the joint force according to the direction of the JFC. The JFC has the overall responsibility for sustainment throughout a theater, but the JFC headquarters executes many of its sustainment responsibilities through the TSC. When directed, Army sustainment capabilities provide the bulk of Army support to other services through executive agency, common-user logistics, lead Service, and other common sustainment resources. (See JP 4-0 for more information on joint sustainment. See ADP 4-0 for more information on the Army sustainment roles and responsibilities.) 6-92. Capabilities from other domains enable sustainment of Army forces. Air sustainment capabilities provide responsive sustainment for high priority requirements. Maritime-enabled sustainment supports large- scale requirements. Space- and cyberspace-enabled networks facilitate rapid communication of sustainment requirements and precise distribution. 6-93. Successful sustainment operations strike a balance between protecting sustainment capabilities and providing responsive support close to the forward line of troops. A well-planned and executed logistics operation permits flexibility, endurance, and application of combat power. Plans must anticipate and mitigate the risk posed by enemy forces detecting and attacking friendly sustainment capabilities. Sustainment formations pursue operations security, survivability, and protection with the same level of commitment as all other forces. While most rear and support operations are economy of force endeavors when allocating combat power in divisions and corps, the continuity and survivability of those operations are vital to deep and close operations.
3-0
147
Operations During Armed Conflict 6-94. Dispersion of assets and redundancy help protect sustainment formations. Dispersing sustainment formations makes it less likely that enemy long-range fires can destroy large quantities of material. Dispersion also creates flexibility, as several nodes can execute the sustainment concept without a single point of failure. However, dispersed sustainment operations complicate C2 and can be less efficient than a massed and centralized approach. Commanders balance the risk between dispersion and efficiency to minimize exposure to enemy fires while maintaining the ability to enable the supported formation’s tempo, endurance, and operational reach. 6-95. Commanders must plan for the possibility of heavy losses to personnel, supplies, and equipment. Even with continuous and effective sustainment support, units may rapidly become combat ineffective due to enemy action. Commanders at all levels must be prepared to conduct reconstitution efforts to return ineffective units to a level of effectiveness that allows the reconstituted unit to perform its future mission. Reconstitution is an operation that commanders plan and implement to restore units to a desired level of combat effectiveness commensurate with mission requirements and available resources (ATP 3-94.4). 6-96. Reconstitution is a significant combined arms operation, and the actions involved in reconstitution transcend normal day-to-day force sustainment actions. Reconstitution is a command decision, typically made two echelons above the unit being reconstituted, and it is conducted across all warfighting functions, using existing systems and units to accomplish. No resources exist solely to perform reconstitution. Reconstitution requires the full support of commanders and staffs at all echelons to achieve the necessary results commensurate with future mission success. Reconstitution efforts following a CBRN attack present even greater challenges. If units cannot decontaminate equipment, commanders must assess the risk to the mission and personnel in continuing operations with or without contaminated equipment. (See ATP 3-94.4 for more information on reconstitution.) 6-97. Maneuver commanders, at the combatant command, ASCC, field armies, corps, or division echelons, direct reconstitution as an operation. Command guidance should address the timing, location, degree to which the unit is reconstituted, and the training required before the reconstituted unit resumes operations. As a general consideration, the more degraded or combat ineffective a unit becomes, the greater the sustainment effort and amount of individual and collective training the unit will require to return it to combat effectiveness. (See FM 4-0 for more information on supplying reconstitution.) CONSOLIDATE GAINS DURING ARMED CONFLICT 6-98. Army forces consolidate gains for the joint force by making temporary advantages more enduring. Consolidating gains is not a phase, but rather an imperative that achieves the ultimate purpose of campaigns and operations. Army forces consolidate gains continuously during the conduct of operations, with varying emphasis by each echelon over time. Consolidating gains initially focuses on the exploitation of tactical success to ensure enemy forces cannot reconstitute any form of resistance in areas where they were initially defeated. A small unit consolidating on an objective and preparing for enemy counterattacks can be the first part of a larger effort to consolidate gains. 6-99. Unity of purpose for consolidating gains starts at the theater strategic level, where leaders plan and coordinate the resources necessary to achieve the JFC’s desired end state. They provide subordinate echelons a shared visualization of the security conditions necessary for the desired political or strategic end state. Achieving the desired end state generally requires a whole-of-government effort with unified action partners within and outside of the theater of operations. At the operational and tactical levels, land component commands and corps exploit division tactical success by maintaining contact with enemy remnants, bypassed forces, and the capabilities that enemy forces could militarize to protract the conflict. Friendly forces employ lethal and nonlethal capabilities to defeat remaining enemy forces in detail. Commanders direct information activities to reduce the will of those forces to resist and the local population to support them. 6-100. Conducting detainee operations plays a significant role in consolidating gains. Failure to secure defeated enemy forces quickly gives them the opportunity to break contact, recover the will to fight, and then reorganize resistance with whatever means remaining available to them. Capture of defeated enemy units and individuals separated or disorganized by friendly action is therefore critical. Large numbers of detainees may place a tremendous burden on operational forces as tactical forces divert combat power to process and secure them. Additionally, friendly forces must account for the detention of irregular forces and criminal actors that
3-0
148
Chapter 6 take advantage of a lack of civil security and civil control. Leaders assess the threat posed by irregular forces and criminal actors to determine whether or not these groups warrant detention by friendly forces. (See FM 3-63 for more information on detainee operations.) 6-101. Army forces must deliberately plan and prepare for consolidating gains because it is resource intensive and requires significant coordination with unified action partners. Planning for consolidating gains includes an assessment of operational risk, available combat power, changes to task organization, and additional assets required to achieve the desired end state. Assets might include— (cid:122) Additional forces to provide area security tasks. (cid:122) Host-nation, partner, and allied security forces. (cid:122) ISR assets. (cid:122) Engineers. (cid:122) Military police. (cid:122) Explosive ordnance disposal units. (cid:122) Medical units. (cid:122) Logistics units. (cid:122) Civil affairs units. (cid:122) Psychological operations units. (cid:122) CBRN units. 6-102. Operations to consolidate gains can take many forms. These operations can include— (cid:122) Offensive operations. Forces conduct offensive operations to complete the defeat of fixed or bypassed enemy forces. (cid:122) Area security. Forces conduct security tasks to defeat enemy remnants, proxy or insurgent forces, and terrorists; control populations and key terrain; and secure routes, critical infrastructure, populations, and activities within an assigned area. (cid:122) Stability operations. Forces execute minimum-essential stability operations tasks and ensure the provision of essential governmental services (in support of host nation or in place of the host nation), emergency infrastructure reconstruction, and humanitarian relief. These may include military governance. (cid:122) Influence local and regional audiences. Commanders communicate credible messaging to specific audiences to prevent interference and generate support for operations or the host nation. (cid:122) Defensive operations. Establish security from external threats. Commanders ensure sufficient combat power is employed to prevent physical disruption from threats across the various domains seeking to reverse or subvert the military gains made by friendly forces. (cid:122) Detainee operations. Commanders and staffs must consider detainee operations prior to a conflict, during, and after large-scale combat operations have ceased. Detainee operations have long-lasting operational and strategic impacts. 6-103. Determining when and how to consolidate gains at the operational level and applying the necessary resources at the tactical level requires clear understanding about where to accept risk during an operation. Failure to consolidate gains generally leads to failure in achieving the desired end state, since it represents a failure to follow through on initial tactical successes and cedes the initiative to determined enemies seeking to prolong a conflict. Security is necessary for transition of responsibility to a legitimate governing authority and the successful completion of combat operations. Army forces integrate the capabilities of all unified action partners and synchronize their employment as they consolidate gains. 6-104. Although operations to consolidate gains may at times be economy of force efforts, they are critical to the long-term success of the joint force’s operation. Enemy forces will continue to challenge Army gains even after their forces are defeated to gain time for a favorable political settlement, set conditions for a protracted resistance, and alter the nature of the conflict to gain relative advantages. Enemy forces will execute information warfare, exploit cultural seams, challenge security, encourage competition for resources, promote conflicting narratives, support religious divides, and create alternatives to legitimate authority. As long as enemy forces have a will to resist, they will continue to attempt to undermine friendly gains.
3-0
149
Operations During Armed Conflict 6-105. Consolidating gains requires a significant commitment of combat power in addition to the combat power being employed to maintain tempo and pressure on enemy main body forces. When available, Army forces rely on host-nation forces better suited for operations that involve close interaction with local populations. When a host nation or an ally is unable to provide support, Army forces are responsible for consolidating gains. During large-scale combat operations, corps should plan for a division and a division should plan for a BCT to conduct operations with the purpose of consolidating gains. APPLYING DEFEAT MECHANISMS 6-106. As described in Chapter 2, defeat mechanisms are broad means by which commanders visualize and describe how they plan to defeat enemy forces. Defeat mechanisms have interactive and dynamic relationships constrained only by the resources available and imagination. Defeat mechanisms are most useful for commanders at the division-level and above to develop operational and strategic approaches to defeat enemy forces. For commanders at the brigade combat team-level and below, the defeat mechanisms may offer limited utility. Defeat mechanisms are not tactical tasks, and commanders at the lower tactical echelons do not develop or employ defeat or stability mechanisms. 6-107. Once developed, defeat mechanisms help commanders and staffs determine tactical options for defeating enemy forces in detail. Commanders translate defeat mechanisms into tactics and describe them in the concept of operations. Commanders use tactics to apply friendly capabilities against enemy forces in the most advantageous ways from as many domains as possible. Understanding how tactics support each of the defeat mechanisms improves tactical judgment. (See ADP 3-90 for more information on tactics.) DESTROY 6-108. Destruction and the threat of destruction lies at the core of all the defeat mechanisms and makes them compelling in a specific context. It is the defeat mechanism with the most enduring effect. A commander can achieve the destruction of smaller units with massed fires. However, destruction is the most resource-intensive outcome to achieve on a large scale. Commanders use destruction as a defeat mechanism when— (cid:122) Enemy forces are not vulnerable to other means. (cid:122) The tactical situation requires the use of overwhelming combat power. (cid:122) The risk of loss is acceptable. (cid:122) It is necessary to set conditions for other defeat mechanisms. 6-109. The physical effects of destruction have significant implications in the information and human dimensions. The destruction of enemy capabilities sends the message that enemy forces may be overmatched, and defeat is imminent. Casualties and the loss of life have negative psychological impacts that can either embolden or degrade enemy morale and will to fight. Typically, significant death and destruction degrade enemy morale and will. The joint force can sometimes achieve similar results with modest and precise applications of combat power. However, modest applications of combat power may prolong the joint force’s ability to achieve a decisive outcome. Excessive destruction of infrastructure can create a humanitarian crisis and create civilian casualties or suffering that undermines domestic and international support for military operations, so commanders must exercise judgment appropriate to each operational context. For moral, legal, and pragmatic reasons, commanders should take precautions to avoid death and destruction unnecessary for operational success, and they must always comply with the law of armed conflict. 6-110. At the operational level, physical destruction is rarely feasible or acceptable as the overarching defeat mechanism. Operational-level commanders choose elements of enemy forces that must be destroyed to enable the other defeat mechanisms. They synchronize Army, joint, and unified action partner capabilities to destroy critical components of enemy warfighting systems, such as sensors, long-range fires capabilities, C2 nodes, supply depots, and critical infrastructure. 6-111. At the tactical level, the lower the echelon the more central destruction is to its operation. Corps and divisions destroy enemy formations and critical capabilities to enable tactical success. They destroy enemy surveillance, reconnaissance, C2, fires, maneuver, protection, and sustainment capabilities. They destroy these capabilities to limit the effectiveness of enemy offensive or defensive schemes and preserve friendly
3-0
150
Chapter 6 combat power. At brigade echelons and below, units close with and destroy weapon systems, combat platforms, and personnel to render enemy forces incapable of resistance. DISLOCATE 6-112. Dislocate as a defeat mechanism renders an enemy’s position ineffective and, ideally, irrelevant. Dislocation can enable surprise. It forces enemy forces to react to the unexpected, and it imposes new dilemmas on enemy decision makers. If the dislocation that occurs is great enough, enemy forces may reconsider their risk assessment and conclude that they must surrender or reposition because their position no longer offers a reasonable expectation of success. More commonly, dislocation will force an enemy to make major changes to its dispositions and give up considerable ground. 6-113. The challenge of dislocation is that enemy leaders likely understand the value of the position desired by the friendly force, and they have made efforts to protect it. Therefore, to maneuver forces into positions that are so advantageous they render the enemy dispositions ineffective, commanders must often make use of deception and assume considerable risk. 6-114. Dislocation extends into the human and information dimensions. Combinations of physical maneuver and information activities can undermine the confidence of decision makers and their forces. Deception operations that enable surprise can present enemy forces with dilemmas they did not expect, and they may incite them to question other assumptions they made about friendly courses of action. For example, an enemy force preparing a defense that believes terrain and weather will protect its flank is surprised when friendly forces maneuver there during an attack. Not only is the geographic position and orientation of the enemy defense rendered ineffective, but so too is the confidence of the force. The force may begin to question its leadership while it adjusts its dispositions under the pressures of time and friendly contact. 6-115. At the operational level, commanders dislocate the enemy by posturing friendly forces in multiple assembly areas that do not make any single course of action obvious, and then they threaten maneuver along multiple axes of advance that exceed the enemy force’s ability to mass effects. While dislocation alone is unlikely to cause enemy forces to lose the will to fight, it creates favorable conditions for the combination of other defeat mechanisms. It can overwhelm enemy networked air defense and integrated fires systems, and it can enable a tempo of offensive operations from which enemy defenses cannot recover. 6-116. At the tactical level, vertical and horizontal envelopments and turning movements are common forms of maneuver that can precipitate dislocation. While these tactics can create rapid success, they may come with significant risk to rear areas and flanks, operational reach, and maintaining the momentum required to achieve objectives in accordance with a specific timeline. These tactics are most often successful against enemy units operating at or beyond the limit of their supporting capabilities, adjacent units, or reserves. Essentially, the friendly force assesses that it can achieve an advantageous position and exploit it faster than supporting enemy forces can react. The defeat of North Korean forces in 1950 illustrates the relationship between the defeat mechanisms of destroy and dislocate.
3-0
151
Operations During Armed Conflict Defeat of the North Korean People’s Army, September 1950 In early August 1950, the North Korean People’s Army (NKPA) advance had driven U.S. and Republic of Korea forces back into the southeastern portion of the Korean peninsula and threatened to push them into the sea. To stop the advance of the NKPA, U.S. and Republic of Korea forces held a defensive perimeter, approximately 140 miles wide, along the Naktong and Nam Rivers. Over the next few weeks, NKPA and friendly forces engaged in heavy fighting with attacks and counterattacks occurring along the entire perimeter, as the NKPA attempted to break through the defensive line. Throughout this period of the war, the NKPA held the initiative against U.S. and Republic of Korea forces, but by mid-September the initiative shifted to friendly forces. On 15 September, while United Nations and NKPA forces were decisively engaged in the south, the U.S. X Corps conducted a two-division amphibious landing at Inchon, on the west coast of Korea, north of Seoul. This operational-level turning movement, code-named OPERATION CHROMITE, occurred 150 miles behind enemy lines and caught the NKPA completely by surprise. In the following days, X Corps captured the Seoul-Suwon area and severed NKPA lines of communications. In conjunction with the amphibious landing, the U.S. Eighth Army launched a major counteroffensive against the twelve NKPA divisions opposing it in the south. With the support of United Nations’ air power, the Eighth Army penetrated the enemy’s forward defenses at multiple places and advanced northwest to link up with the X Corps. The combined actions by X Corps and Eighth Army left an estimated force of eight NKPA divisions isolated in southwestern Korea. Outflanked, unable to resupply or reinforce, and facing strong pressure in its close and rear areas, the NKPA began to collapse. Some NKPA units and individuals began to retreat, and their initial retreat quickly turned into a rout. Those NKPA units unable to retreat were destroyed or captured by friendly forces. By the end of September, the NKPA ceased to exist as an organized fighting force in South Korea. ISOLATE 6-117. Isolating an enemy force separates it from its physical, information, or human sources of support. It involves denying the enemy force access to resupply of personnel and equipment, access to intelligence, and shared understanding with adjacent units and higher echelon headquarters. Isolation denies enemy ground forces access to capabilities from other domains, forcing them to operate only in a limited area of the land domain with the resources they have on hand. 6-118. At the operational level, it is difficult to achieve complete isolation of an enemy force not already physically separated from the enemy main body. Even limited access to air, ground, and maritime lines of communications can sustain a prepared and determined enemy force for long periods. However, operational-level commands can employ capabilities to temporarily isolate units or critical capabilities from the rest of an enemy formation in one or more domains. This enables defeat of the enemy in detail, or it sets conditions for operations in other domains. Operational headquarters conduct activities that physically and psychologically isolate enemy leaders from their formations and other sources of support. This may include disrupting communications networks or access to space and cyberspace capabilities for a specific enemy echelon or conducting influence activities to lessen local support for national objectives. When an enemy force includes elements from different nations, it is possible to isolate one or more of them physically or by informational means. Exploiting differences in national aims or cultural divisions degrades the enemy’s overall effectiveness. 6-119. At the tactical level, physically blocking lines of communications, controlling key terrain, fixing supporting units, and encircling an enemy force are tactics that support the achievement of isolation.
3-0
152
Chapter 6 Electromagnetic attack capabilities help tactical leaders deny enemy forces access to reliable communications, and they can play a major role in creating psychological isolation. Destroying enemy command posts at one echelon can isolate that echelon’s subordinate formations from the next higher echelon, temporarily causing significant disruption to coherent C2. 6-120. While isolation on its own may not cause defeat, it increases the vulnerability of enemy forces to destruction, dislocation, and disintegration. It can also reduce the will to fight and increase the probability of uninformed decision making, which then amplifies the effects of the other defeat mechanisms. DISINTEGRATE 6-121. To disintegrate is to attack the cohesion of the whole and involves preventing components of an enemy formation or capability from fulfilling their role as part of the overall effort. Disintegration causes the formation or capability to function less effectively, creating vulnerabilities that the friendly force can exploit. Disintegration is most effective when created by a combination of the other three defeat mechanisms, and it includes both physical and cognitive effects on enemy forces. Disintegration is typically temporary and causes enemy forces to adapt. Creating more lasting effects requires forces that are ready to exploit the opportunity provided by disintegration. Commanders ensure they have sufficient combat power for exploitation, and they synchronize their exploitation efforts with the temporal effects of disintegration. 6-122. Disintegration sets conditions for achieving operational level objectives. Destruction, isolation, and dislocation all focus on relatively limited parts of a larger enemy force in specific geographic areas, whereas the effects of disintegration can have repercussions throughout the depth and breadth of the enemy’s echelons. Effective disintegration can cause collapse of coherent organized resistance for operationally significant periods. 6-123. To disintegrate an enemy formation or capability, commanders need only to disrupt or desynchronize enemy forces to the degree required for achieving the desired end state. In this sense, disintegration provides a measure of economy the other defeat mechanisms do not. Commanders do not need to create decisive effects at a single point in space, time, or domain. Even modest impacts on a combination of objectives across multiple domains can produce the necessary effects over time. Operational-Level Disintegration 6-124. Operational-level echelons disintegrate large enemy formations and their capabilities by attacking their individual components. Attacking operational-level C2 infrastructure impacts all enemy functions, and it is the most direct way to cause disintegration. Degrading enemy communications using a combination of lethal fires, electromagnetic attack, and joint-enabled offensive cyberspace operations disrupts an enemy force’s ability to synchronize operations. Deception compounds and accelerates the effects the other defeat mechanisms contribute towards disintegration. 6-125. Army forces disintegrate the components of integrated air defenses, long-range fires systems, and C2 networks to enable friendly freedom of action. The requirement to disintegrate these systems does not end with forcible entry operations or the start of offensive operations. Because these systems are resilient, disintegrating them relies on assessing them throughout the duration of a campaign. 6-126. Enemy systems that enable A2 and AD approaches have vulnerabilities that include sensors, communications links to firing platforms, and dependencies on space-based global navigation satellite systems and the electromagnetic spectrum. The data and processors that facilitate detection and fire mission transmission can be an exploitable vulnerability. Commanders can employ joint fires capabilities to destroy enemy long-range surface-to-surface and surface-to-air systems, which are difficult to replace. Friendly forces that have penetrated enemy defensive echelons can further disintegrate enemy integrated fires systems with direct fire or the threat of being overrun. While enemy forces reposition, their effectiveness is degraded. 6-127. Army forces can disintegrate enemy maneuver formations by converging joint capabilities in ways that interdict main supply routes, mobility corridors, and transportation infrastructure such as bridges, rail heads, airfields, ferries, and tunnels. These actions affect enemy repositioning and rapid reaction to friendly operations. Commanders can focus on the destruction of the best-trained and equipped enemy forces in a particular formation, which may disrupt the cohesion of the larger formation and lower its morale.
3-0
153
Operations During Armed Conflict 6-128. Enemy operations depend on sustainment systems in the same way friendly operations do. Destroying or disrupting supply depots, logistics convoys, fuel facilities, and sustainment units can render the enemy formations they sustain incapable of achieving their intended objectives. Even limited attacks on enemy sustainment capabilities can delay their operations, degrade their combat power, and make them vulnerable to early culmination. Tactical-Level Disintegration 6-129. Senior tactical echelons disintegrate enemy forces by attacking vulnerabilities that make them less able to employ a combined-arms approach to operations. Disrupting enemy communications with electromagnetic attacks or physical attacks against C2 nodes are means of doing this. Commanders use deception to create uncertainty and slow enemy decisions. They conduct reconnaissance and security operations and maintain operations security to prevent enemy forces from developing an accurate picture of friendly dispositions and courses of action. 6-130. Army forces employ forms of maneuver that avoid the enemy force’s main effort and enable friendly forces to decisively engage enemy forces without becoming fixed targets for long-range fires. Seeking or creating assailable flanks creates opportunities for exploitation in depth, forcing enemy forces to fight from unfavorable terrain or in directions they did not anticipate. Penetrations, envelopments, and turning movements are forms of maneuver well suited for doing this. Because enemy forces can anticipate the most favorable friendly forms of maneuver, their preparations focus on denying them. Therefore, friendly courses of action require sufficient combat power employed with a combination of stealth, speed, deception, and risk acceptance to be successful. 6-131. Disrupt, degrade, neutralize, reduce, isolate, delay, suppress, deny, fix, bypass, and deceive are examples of common tasks and effects that leaders combine to disintegrate enemy tactical echelons. Leaders use these tasks to limit enemy freedom of maneuver, impose friction on enemy operations, and disrupt enemy synchronization. 6-132. A combined-arms approach helps retain sufficient combat power and the mobility necessary to exploit the opportunities disintegration provides. The 1973 Arab-Israeli War illustrates the importance of a combined-arms approach to achieving disintegration.
3-0
154
Chapter 6 Disintegration of Egyptian Defense: 1973 Arab-Israeli War After the destruction of its air force and defeat of its ground forces by Israel in the 1967 Six Day War, Egypt reorganized its armed forces in preparation for what it saw as the inevitable next conflict. With help from the Soviet Union, it acquired a modern integrated air defense system and anti-tank guided missile systems to counter the Israeli air and armor forces that had been a large factor in its defeats in three previous wars. These new capabilities gave the Egyptian army the opportunity to surprise the potent Israeli Defense Forces air-ground team, which it exploited in 1973. In a well-planned and rehearsed operation, Egyptian forces rapidly assaulted across the Suez Canal, penetrated Israeli Defense Force defensive positions, and established a deliberate defense after a short advance. The Israeli counterattack with aircraft and an armored brigade was defeated with heavy losses from surface-to-air missiles and anti-tank guided missile systems, respectively. The losses were a shock to the previously undefeated Israeli air and armor forces, which needed to quickly reconstitute and adapt to a very different operational environment than 1967. The Israeli Army recognized that a mounted, tank-only approach was not going to defeat well-trained infantry with modern long-range anti-tank missiles. Only a combined arms approach to close combat would be effective, so it quickly task-organized infantry units into the armored brigades. Once the task-organized brigades penetrated Egyptian first echelon defenses and cleared key objectives, the Israeli Army was able to disrupt and ultimately defeat the integrated air defense system by destroying vulnerable launchers and radars with direct fire. The Israeli action forced the remaining integrated air defense systems to displace further into Egypt. With the integrated air defense system effectively defeated, the Israeli air force maneuvered unimpeded in support of its ground forces and contributed to the complete tactical defeat of the Egyptian army. The success of the Israeli Defense Force combined approach to operations later in the war sharply contrasts with the failure of its hasty and unbalanced initial counterattack. The Israeli Defense Force’s success is also an example of how ground forces enabled operations in the air domain, which in turn were able to enable the ground forces. Lastly, the Israeli Defense Force operational approach took advantage of the integrated air defense system’s critical vulnerabilities, which included dependence upon relatively fixed positions. Disintegration of the integrated air defense system did not occur until the Israeli Defense Force was able to create and then exploit opportunities on the ground through hard fought close combat. ENABLING OPERATIONS 6-133. Enabling operations set friendly conditions required for most operations. Commanders direct enabling operations to support the conduct of offensive, defensive, and stability operations and defense support to civil authorities tasks. The execution of enabling operations alone does not directly accomplish the commander’s end state, but enabling operations must occur to complete the mission. Examples of enabling operations are— (cid:122) Reconnaissance. (cid:122) Security. (cid:122) Troop movement. (cid:122) Relief in place. (cid:122) Passage of lines.
3-0
155
Operations During Armed Conflict (cid:122) Countermobility. (cid:122) Mobility. RECONNAISSANCE 6-134. Reconnaissance is a mission undertaken to obtain, by visual observation or other detection methods, information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographic, or geographic characteristics of a particular area (JP 2-0). Reconnaissance occurs continuously in all domains. Reconnaissance identifies terrain characteristics, obstacles to mobility, the disposition of enemy forces, and the relevant characteristics of the civilian population. It facilitates mobility and prevents surprise. Reconnaissance prior to unit movements and occupation of assembly areas is critical to protecting friendly forces and preserving combat power. Units perform reconnaissance to make contact with enemy forces on favorable terms. Leaders at every echelon emphasize the importance of reporting and rapidly updating digital and analog systems. (See ADP 3-90 for more information on reconnaissance.) 6-135. There are seven fundamentals of successful reconnaissance operations. They are— (cid:122) Ensure continuous reconnaissance. (cid:122) Do not keep reconnaissance assets in reserve. (cid:122) Orient on reconnaissance objectives. (cid:122) Report all required information rapidly and accurately. (cid:122) Retain freedom of maneuver. (cid:122) Gain and maintain enemy contact. (cid:122) Develop the situation rapidly. 6-136. There are five types of reconnaissance operations. They are— (cid:122) Zone reconnaissance. (cid:122) Area reconnaissance. (cid:122) Route reconnaissance. (cid:122) Reconnaissance in force. (cid:122) Special reconnaissance. 6-137. Zone reconnaissance is a type of reconnaissance operation that involves a directed effort to obtain detailed information on all routes, obstacles, terrain, and enemy forces within a zone defined by boundaries (ADP 3-90). Commanders assign a zone reconnaissance when they need additional information on a zone before committing other forces. 6-138. Area reconnaissance is a type of reconnaissance operation that focuses on obtaining detailed information about the terrain or enemy activity within a prescribed area (ADP 3-90). This area may consist of a single location, such as a town, a ridgeline, a forest, an airhead, a bridge, an installation, or any other critical operational feature such as obstacles. (See ADP 3-90 for more information on area reconnaissance.) 6-139. Route reconnaissance is a type of reconnaissance operation to obtain detailed information of a specified route and all terrain from which the enemy could influence movement along that route (ADP 3-90). The route may be a road, highway, trail, mobility corridor, avenue of approach, or axis of advance. The reconnaissance effort provides new or updated information on route conditions, such as obstacles and bridge classifications, and enemy, adversary, and civilian activity along the route. (See ATP 3-34.81 for more information on route reconnaissance, route classification, and the classification of features along routes.) 6-140. A reconnaissance in force is a type of reconnaissance operation designed to discover or test the enemy’s strength, dispositions, and reactions or to obtain other information (ADP 3-90). Battalion-sized task forces or larger organizations usually conduct a reconnaissance in force. Commanders assign this operation when an enemy force is operating within an area, and they cannot obtain adequate information about the enemy force by other means. 6-141. Special reconnaissance is reconnaissance and surveillance actions conducted as a special operation in hostile, denied, or diplomatically and/or politically sensitive environments to collect or verify information
3-0
156
Chapter 6 of strategic or operational significance, employing military capabilities not normally found in conventional forces (JP 3-05). Special reconnaissance provides an additional capability for commanders and supplements other conventional reconnaissance and surveillance actions. 6-142. During the conduct of any variation of reconnaissance, the commander may require information about a specific aspect of the area of operations (AO). To obtain this information the commander may direct a specific focus task which typically requires the use of an organization uniquely trained and equipped for the mission. Focus tasks include electromagnetic, engineer, CBRN, and civil reconnaissance. 6-143. Electromagnetic reconnaissance is the detection, location, identification, and evaluation of foreign electromagnetic radiations (energy) (JP 3-85). Electromagnetic reconnaissance supports information collection at brigade and higher echelons using assigned electromagnetic warfare personnel and capabilities. Information obtained through electromagnetic reconnaissance assists the commander with situational understanding and can support signals intelligence activities. Electromagnetic reconnaissance may result in electromagnetic protection modifications or lead to an electromagnetic attack against enemy capabilities. (For more information on electromagnetic reconnaissance see FM 3-12.) 6-144. Engineer reconnaissance obtains information about the infrastructure, terrain, or threat. This may include data on obstacles, gap crossing sites, airfields, bridges, tunnels, roads, and trails. Engineer units do not have designated reconnaissance teams. Engineer reconnaissance is directed and task-organized based on mission requirements using assets that would otherwise support other engineer missions. (For more on engineer reconnaissance see ATP 3-34.81.) 6-145. CBRN reconnaissance includes missions to obtain information on suspected or confirmed chemical, biological, radiological, or nuclear threats and hazards in an assigned area. CBRN reconnaissance identifies indicators of enemy CBRN production or employment and indicators related to civilian or industrial facilities that could be weaponized or produce hazards when damaged or destroyed. (For more on CBRN reconnaissance see ATP 3-11.37.) 6-146. Civil reconnaissance is a targeted, planned, and coordinated observation and evaluation of specific civil aspects of the environment such as areas, structures, capabilities, organizations, people, or events (JP 3 57). Civil reconnaissance verifies or refutes civil information, supports operational environment assessments, and detects and monitors changes in the civil component. It is conducted over time through routine engagement and patterned civil observance using active and passive sensors, virtual sensors, and other means. (For more information on civil reconnaissance see FM 3-57.) SECURITY OPERATIONS 6-147. Units may perform security tasks to the front, flanks, or rear of their main body, and they must be aware of enemy threats in all domains relevant to their assigned area. The main difference between the performance of security and reconnaissance tasks is that security tasks orient on the force, area, or facility being secured, while reconnaissance tasks orient on enemy forces and terrain. Security tasks are supporting efforts. The ultimate goal of security operations is to protect main body forces from surprise and deny enemy freedom of action to collect on friendly forces. The protected force may not always be a military force; it can also be the civilian population, civil institutions, and civilian infrastructure in the unit’s assigned area. 6-148. There are a number of general considerations when performing security operations. These apply to all security tasks, but they are most applicable to the performance of screen, guard, and cover tasks. The screen, guard, and cover tasks share many common control measures, starting with boundaries defining the security area. The main body unit establishes the security area. For a security force operating to the front of the main body, the lateral boundaries of the security area are normally an extension of the lateral boundaries of the main body. The security force’s rear boundary is normally the battle handover line. (See ADP 3-90 for additional information on common security control measures for security operations.) 6-149. Security operations are those operations performed by commanders to provide early and accurate warning of enemy operations, to provide the forces being protected with time and maneuver space within which to react to the enemy, and to develop the situation to allow commanders to effectively use their protected forces (ADP 3-90). The four types of security operations are area security, cover, guard, and screen.
3-0
157
Operations During Armed Conflict 6-150. Area security is a type of security operation conducted to protect friendly forces, lines of communications, and activities within a specific area (ADP 3-90). The security force may be protecting the civilian population, civil institutions, and civilian infrastructure with a unit’s assigned area. 6-151. Cover is a type of security operation done independent of the main body to protect them by fighting to gain time while preventing enemy ground observation of and direct fire against the main body (ADP 3-90). A force tasked to cover may do so offensively or defensively. 6-152. Guard is a type of security operation done to protect the main body by fighting to gain time while preventing enemy ground observation of and direct fire against the main body (ADP 3-90). Units performing a guard cannot operate independently. They rely on fires and functional and multifunctional support assets of the main body. A force tasked to guard may do so offensively and defensively. 6-153. Screen is a type of security operation that primarily provides early warning to the protected force (ADP 3-90). Screens provide less protection than guards or covers. Screen missions are defensive in nature and accomplished by establishing a series of observation posts and patrols to ensure observation of the assigned area. The screen force gains and maintains enemy contact consistent with the operation order and destroys or repels enemy reconnaissance units by conducting counter-reconnaissance. 6-154. The screen, guard, and cover security operations provide increasing levels of combat power and increasing levels of security for the main body. Area security preserves freedom to move reserves, position fire support means, protect C2 systems, and conduct sustainment operations. Commanders balance the combat power employed for security against the requirements of the main and supporting efforts. 6-155. All maneuver forces are capable of conducting security operations. All Army BCTs conduct security operations as part of their mission-essential task list, while maneuver enhancement brigades, when properly task-organized, support theater army, corps, and divisions by conducting screens and area security throughout its assigned area of operations. Habitual support relationships with attachments and established standard operating procedures facilitate unity of effort and efficiency during security operations spanning multiple echelons of divisions and corps. 6-156. Successful security operations in any domain depend on properly applying five fundamentals. These fundamentals are— (cid:122) Provide early and accurate warning. (cid:122) Provide reaction time and maneuver space. (cid:122) Orient on the protected force, area, or facility. (cid:122) Perform continuous reconnaissance. (cid:122) Maintain enemy contact. (See ADP 3-90 for additional information on the conduct of security operations.) TROOP MOVEMENT 6-157. Troop movement is the movement of Soldiers and units from one place to another by any available means (ADP 3-90). Units perform troop movements using different methods, such as dismounted foot marches, mounted marches using tactical vehicles, or air, rail, and water means in various combinations. The method employed depends on the situation, the size and composition of the moving unit, the distance the unit must cover, the urgency of execution, and the condition of the troops. It also depends on the availability, suitability, and capacity of the different means of transportation. Troop movements over extended distances have extensive sustainment considerations. RELIEF IN PLACE 6-158. A relief in place is an operation in which, by direction of higher authority, all or part of a unit is replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and the assigned zone of operations are transferred to the incoming unit (JP 3-07.3). Units have three techniques for conducting a relief: sequentially, simultaneously, or staggered. A sequential relief occurs when each element in the relieved unit is relieved in succession, from right to left, left to right, front to rear, or rear to front. A simultaneous relief occurs when all elements are relieved at the same time. A staggered relief occurs
3-0
158
Chapter 6 when each element is relieved in a sequence determined by the tactical situation, not its geographical orientation. Simultaneous relief takes the least time to execute but is more easily detected by enemy forces. Sequential or staggered reliefs can occur over a significant amount of time. These three relief techniques can occur regardless of the operational theme in which the unit is participating. (See ADP 3-90 for more information about relief in place.) PASSAGE OF LINES 6-159. A passage of lines is an operation in which a force moves forward or rearward through another force’s combat positions with the intention of moving into or out of contact with the enemy (JP 3-18). There are two types: a forward passage of lines and a rearward passage of lines. A forward passage of lines occurs when a unit passes through another unit’s positions while moving toward the enemy (ADP 3-90). A rearward passage of lines occurs when a unit passes through another unit’s positions while moving away from the enemy (ADP 3-90). 6-160. Units perform a passage of lines to continue their attacks or perform counterattack, retrograde, and security tasks that involve advancing or withdrawing through other units’ positions. A passage of lines potentially involves close combat. It involves transferring the responsibility for an AO between two units. That transfer of authority usually occurs when roughly two thirds of the passing force have moved through one or more passage points. The headquarters directing the passage of lines is responsible for determining when the passage of lines starts and ends. If not directed by higher authority, the stationary unit commander and the passing unit commanders determine—by mutual agreement—the time to pass responsibility for an area. They disseminate this information to the lowest levels of both organizations. 6-161. Units have several reasons for conducting a passage of lines. These reasons include to— (cid:122) Sustain offensive tempo and avoid culmination. (cid:122) Maintain the viability of the defense by transferring responsibility from one unit to another. (cid:122) Transition from the performance of delay or security tasks by one force to a defending unit. (cid:122) Relieve a unit for another mission or task. (See ADP 3-90 for more information on passage of lines.) COUNTERMOBILITY OPERATIONS 6-162. Countermobility is a set of combined arms activities that use or enhance the effects of natural and man-made obstacles to prevent the enemy freedom of movement and maneuver (ATP 3-90.8). The primary purposes of countermobility are to shape enemy movement and maneuver and to prevent the enemy from gaining a position of advantage. Countermobility is conducted to support forces operating along the range of military operations. Countermobility directly supports offensive and defensive operations. 6-163. In support of offensive operations, countermobility activities isolate objectives and prevent enemy forces from repositioning, reinforcing, and counterattacking. They enable flank protection as operations progress into the depth of enemy defenses or as an integrated economy-of-force effort to provide general flank security. In support of defensive operations, countermobility activities disrupt enemy attack formations and assist friendly forces in defeating the enemy in detail, to channel attacking enemy forces into an engagement area or areas throughout the depth of the defense, and to protect the flanks of friendly counterattack forces. 6-164. The conduct of countermobility activities typically requires engineers and includes proper obstacle integration with the maneuver plan, adherence to obstacle emplacement authority, and positive obstacle control. Combined arms obstacle integration synchronizes countermobility into the concept of operations. Because most obstacles have the potential to prevent the freedom of movement and maneuver to both friendly and enemy forces, it is critical that commanders weigh the risks and evaluate the trade-offs of employing different types of obstacles. Countermobility activities include— (cid:122) Siting obstacles. (cid:122) Constructing, emplacing, or detonating obstacles. (cid:122) Marking, reporting, and recording obstacles. (cid:122) Maintaining obstacle integration.
3-0
159
Operations During Armed Conflict (See ATP 3-90.8 for more information on countermobility.) MOBILITY OPERATIONS 6-165. Freedom to move and maneuver within an operational area is essential to applying combat power. Most operational environments and enemy forces present numerous challenges to movement and maneuver. Leaders overcome these challenges through the integration of combined arms mobility. 6-166. Mobility tasks are those combined arms activities that mitigate the effects of obstacles to enable freedom of movement and maneuver (ATP 3-90.4). There are six primary mobility tasks: (cid:122) Conduct breaching. (cid:122) Conduct clearing (of areas and routes). (cid:122) Conduct gap crossing. (cid:122) Construct and maintain combat roads and trails. (cid:122) Construct and maintain forward airfields and landing zones. (cid:122) Conduct traffic management and enforcement. 6-167. Mobility tasks enable friendly forces to move and maneuver freely on the battlefield. Effective execution of mobility tasks depends on information collection and intelligence. Breaching and gap crossing in support of maneuver are primarily conducted using combat engineer units, often during close combat. 6-168. Gap crossing, clearing, and the construction of combat roads and trails, forward airfields, and landing zones primarily support movement and require combat and general engineering units. Mobility tasks in support of movement are not normally conducted under fire, although the threat of fire is always present. 6-169. A breach is a synchronized combined arms activity under the control of the maneuver commander conducted to allow maneuver through an obstacle (ATP 3-90.4). A successful obstacle breach is a synchronized and rehearsed combined arms activity under the control of the maneuver unit. Breaching is a mission undertaken to penetrate an obstacle. Breaching facilitates penetrations through enemy reinforcing obstacles covered with direct and indirect fire. 6-170. Clearing is a mobility task that involves the total elimination or neutralization of an obstacle that is usually performed by follow-on engineers and is not done under fire (ATP 3-90.4). It is generally accomplished by destroying, altering, or removing obstacles. 6-171. A gap is a ravine, mountain pass, river, or other terrain feature that presents an obstacle that may be bridged (ATP 3-90.4). Gaps will exist in an operational environment and present a significant challenge to movement and maneuver. A gap crossing is the projection of combat power across a linear obstacle (a wet or dry gap). SECTION II – DEFENSIVE OPERATIONS Even in the defensive position awaiting the enemy assault, our bullets take the offensive. So the defensive form of war is not a simple shield, but a shield made up of well-directed blows. Carl von Clausewitz 6-172. Defensive operations defeat an enemy attack, buy time, economize forces, hold key terrain, or develop conditions favorable for offensive operations. Although offensive operations are usually required to achieve decisive results, it is often necessary, even advisable, to defend. Defensive operations alone do not normally achieve a decision unless they are sufficient to achieve the overall political goal, such as protecting an international border. PURPOSE AND CONDITIONS FOR THE DEFENSE 6-173. One purpose of defending is to create conditions for the offense that allows Army forces to regain the initiative. Other reasons for conducting the defense include—
3-0
160
Chapter 6 (cid:122) Retaining decisive terrain or denying a vital area to an enemy force. (cid:122) Attritting or fixing an enemy force as a prelude to the offense. (cid:122) Countering enemy action. (cid:122) Accepting risk in one area to create offensive opportunities elsewhere. 6-174. There are many potential conditions for defensive operations. They include— (cid:122) Enemy aggression initiating armed conflict requires forward-stationed friendly forces to defend to buy time and conserve combat power until reinforced. (cid:122) Offensive operations culminate and the commander needs to build combat power while countering enemy offensive operations. (cid:122) A unit is assigned an economy of force defensive role as a supporting effort. (cid:122) The higher echelon headquarters directs a mission to defend an area, population, key infrastructure, or other key terrain in support of the overall course of action. (cid:122) U.S. forces accomplish all objectives and transition to a defense to deter future enemy aggression. 6-175. The key to a successful corps or division defense is a concept of operations that allows defensive forces to break the enemy’s momentum and seize the initiative. Surprise is as important in defense as in offense, and the defensive concept should avoid obvious dispositions and techniques. When executing a defense, commanders orchestrate combat power from all available domains to synchronize effects at a decisive place and time that results in the enemy’s defeat. Commanders decide where to concentrate combat power and where to accept risk. Success may require that a defending unit exploit opportunities to seize the initiative, such as a spoiling attack or counterattack. 6-176. Time is often the most important resource for defending forces. The enemy chooses the time and location for its attack, so the amount of time friendly units have to prepare a defense is often unknown and usually inadequate. Defending corps and divisions must have a sense of urgency to complete their planning, coordinating, rehearsing, and conducting information collection. Their subordinate units need time to develop engagement areas by preparing battle positions, pre-positioning sustainment assets, and emplacing obstacles. Taken together this means that strict adherence to priorities of work and priorities of effort is critical to time management. 6-177. Defending commanders seek to create more time to prepare an effective defense. A corps or division commander may task-organize and resource a security force for employment in the security area to guard or cover main battle area forces as a means to create additional preparation time and prevent surprise. Commanders may also launch spoiling attacks, raids, or feints to disorganize enemy preparations and gain more time to prepare. A defender continually attacks enemy forces in depth with joint and Army fires and aviation to attrit the enemy force and disrupt its scheme of maneuver. Friendly conventional and special operations forces can slow an enemy attack by complicating the enemy force’s movements and supply. Uncertainty as to when or where enemy forces will attack requires a commander to maintain a larger reserve. 6-178. A successful defense requires the integration and synchronization of all available assets. The defending commander assigns missions, allocates forces (including the reserve), and apportions functional and multifunctional support and sustainment resources within the construct of main and supporting efforts. The commander determines where to concentrate defensive efforts and where to accept risks based on the results of intelligence preparation of the battlefield. This determination includes accounting for the enemy’s reconnaissance and surveillance efforts and the vulnerability of friendly troop concentrations to massed enemy fires. Commanders strive to counter enemy attacks by accounting for its capabilities in each domain that can influence friendly forces. CHARACTERISTICS OF THE DEFENSE 6-179. Successful defenses share some important characteristics. They include— (cid:122) Disruption—deceiving or destroying enemy reconnaissance forces, breaking up combat formations, separating echelons, and impeding an enemy force’s ability to synchronize its combined arms. (cid:122) Flexibility—developing plans that anticipate a range of enemy actions and allocate resources accordingly.
3-0
161
Operations During Armed Conflict (cid:122) Maneuver—achieving and exploiting a position of physical advantage over an enemy force. (cid:122) Mass and concentration—creating overwhelming combat power at specific locations to support the main effort. (cid:122) Depth—engaging multiple enemy echelons, enemy long-range fires, sustainment, and C2. (cid:122) Preparation—preparing the defense before attacking enemy forces arrive. (cid:122) Security—conducting security, protection, information activities, operations security, and cyberspace and electromagnetic warfare tasks. (See ADP 3-90 for more information on the characteristics of the defense.) ENEMY OFFENSE 6-180. Enemy tactics, capabilities, and probable courses of action all inform defensive planning. Defending commanders must see the terrain and their own forces from the enemy perspective in all relevant domains to anticipate both threat courses of action and friendly weaknesses that an enemy force could exploit. Defending commanders identify probable enemy objectives and possible enemy avenues of approach to achieve them. Understanding enemy capabilities in all domains is critical to devising the most effective friendly defensive schemes. Identifying enemy limitations helps determine opportunities to exploit friendly advantages. 6-181. At the initiation of offensive operations, enemy forces seek to disrupt and destroy friendly C2, apply overwhelming firepower, and rapidly penetrate friendly rear areas. They use information warfare to attack information systems, deceive, and protect their own information systems. Enemy forces use electronic attack and long-range strikes against C2 systems, information collection systems, air defense systems, and aircraft. The enemy’s goal is to weaken or destroy the joint force’s decision-making, air and missile defense, and air combat capabilities, which creates opportunities for enemy forces to achieve early decisive success. 6-182. A key to an enemy force’s ability to achieve early dominance is to strike first. General considerations that influence the enemy force’s decision to initiate offensive operations include when the enemy determines the joint force is unprepared for an attack, when the enemy identifies a weakness in the joint force that it can exploit, or when the enemy is fully prepared and can commit to operations at any time. The enemy’s decision is tied to factors that provide them with the greatest opportunity to win the first battle, which they believe greatly improves their chances for success in later operations. 6-183. An enemy force seeks to establish early advantages in the air, space, and cyberspace domains to set conditions for dominance in the maritime and land domains. An enemy force aims to prevent the joint force from introducing additional forces into the conflict region and to disrupt the friendly logistics systems enabling forward-positioned forces. Enemy forces concentrate their long-range attacks on C2 nodes, logistics bases, and assembly areas to disrupt the joint force’s defensive operations and to degrade the joint force’s ability to prepare for offensive operations. 6-184. When enemy leaders commit forces into ground combat during offensive operations, they typically attempt to conceal the location of their main effort with multiple fixing attacks on the ground, allowing them to isolate friendly forward units. Enemy forces use fires and electronic attack to disrupt critical friendly command posts, radars, and fire direction centers. 6-185. Generally, enemy forces seek to reinforce success, massing capabilities at a vulnerable point to achieve large force-ratio advantages to enable a rapid penetration of friendly defenses. Enemy leaders use mobile forces to exploit a penetration rapidly to the maximum possible depth to make the overall friendly defensive position untenable. Enemy forces seek advantages in both volume and range of fires to simultaneously mass fires at the point of penetration to enable rapid closure and breakthrough, fix other friendly elements along the forward line of own troops, and target key friendly C2 and logistics nodes along the depth of the defense. Enemy forces prefer to use fires to fix, move around friendly battle positions when possible, and move through destroyed units when necessary. Enemy forces seek to maneuver tactically to a depth that achieves operational objectives in support of their overall strategic purpose. Enemy forces employ reconnaissance, electronic warfare, information warfare, and other capabilities at their disposal to both enable and exploit initial tactical gains. These are likely to include chemical weapons. (See figure 6-4 on page 6-34 for an illustration of a notional enemy offensive operation.)
3-0
162
Chapter 6 Figure 6-4. Notional enemy offensive operation TYPES OF DEFENSIVE OPERATIONS 6-186. There are three types of defensive operations. These operations have significantly different concepts and present different problems. Units consider each independently when planning and executing the defense. Although the names of these types convey the overall aim of a selected operation, most defenses at division and higher echelons combine elements of all three types. The types of defensive operations are— (cid:122) Area defense. (cid:122) Mobile defense. (cid:122) Retrograde. AREA DEFENSE 6-187. An area defense is a type of defensive operation that concentrates on denying enemy forces access to designated terrain for a specific time rather than destroying the enemy outright (ADP 3-90). The variations of an area defense include defense of a linear obstacle, perimeter defense, and reverse slope defense. The purpose of an area defense is to retain the terrain where the bulk of the defending force positions itself in mutually supporting prepared positions. Units maintain their positions and control the terrain between these
3-0
163
Operations During Armed Conflict positions and focus their fires into engagement areas. Units may supplement these fires with a possible counterattack. Units at all echelons can conduct an area defense, and Army forces may have maritime engagement areas. They may use an area defense to transition to offensive operations, retrograde operations, or stability operations. (See ADP 3-90 for more information on area defense.) MOBILE DEFENSE 6-188. A mobile defense is a type of defensive operation that concentrates on the destruction or defeat of the enemy through a decisive attack by a striking force (ADP 3-90). The mobile defense focuses on defeating or destroying enemy forces by allowing them to advance to a point where they are exposed to a decisive counterattack by a striking force. The striking force is a dedicated counterattack force in a mobile defense constituted with the bulk of available combat power (ADP 3-90). A fixing force is a force designated to supplement the striking force by preventing the enemy from moving from a specific area for a specific time (ADP 3-90). The fixing force is used to hold attacking enemy forces in position, to turn attacking enemy forces into ambush areas, and to retain areas from which to launch the striking force. 6-189. A mobile defense requires assigned areas of considerable depth. Units shape the battlefield causing an enemy force to overextend its lines of communications, expose its flanks, and dissipate its combat power. Likewise, units must be able to move their forces into a position where they can defeat an attacking force. Divisions and larger formations normally execute mobile defenses. (See ADP 3-90 for more information on mobile defense.) RETROGRADE 6-190. A retrograde is a type of defensive operation that involves organized movement away from the enemy (ADP 3-90). The three variations of the retrograde are delay, withdraw, and retirement. An enemy force may compel these operations, or units may execute them voluntarily, such as when a security force executes a rearward passage of lines through a main battle area. In either case, the higher echelon headquarters executing the retrograde must approve the operation before its initiation. A retrograde is not conducted in isolation; it is a transitional operation. It is part of a larger maneuver scheme designed to preserve combat power for future operations. Forward-stationed forces should be prepared to execute retrograde operations as part of a multinational force when outnumbered during the early part of a conflict. DEFENSIVE OPERATIONAL FRAMEWORK CONSIDERATIONS 6-191. In the defense, commanders typically retain the deep and rear areas, but they divide the close area into two distinct portions: the security area and main battle area. Commanders use this approach to synchronize operations, including those in air, space and cyberspace, to defeat an enemy force throughout its depth. Figure 6-5 on page 6-36 depicts friendly defensive operations across a notional operational framework.
3-0
164
Chapter 6 Figure 6-5. Notional operational framework during defensive operations EXTENDED DEEP OPERATIONS 6-192. Operational- and strategic-level deep operations are typically outside an assigned land AO for a corps or division, but parts fall within the senior Army formation’s area of interest and area of influence. During defensive operations, Army forces may request JFC or other strategic effects against strategic infrastructure or sanctuary areas that are enabling enemy offensive operations. 6-193. Strategic leaders may task Army long-range fires, cyberspace, space, and other global capabilities to support attacking targets in the extended deep area to set conditions for friendly defensive operations. Long-range artillery and ground-based missile capabilities can range enemy long-range missile batteries, manufacturing and economic nodes, critical infrastructure such as airfields and ports, strategic communications nodes, and strategic sustainment and reserve locations. Special operations forces, either unilaterally or combined with indigenous forces, can attack vulnerable targets, influence populations, and motivate or support established networks, such as local militias and resistance groups, to gather valuable information, oppose enemy forces, and weaken popular support to enemy offensive operations. Friendly-backed indigenous forces, or guerilla forces, can also damage or degrade critical infrastructure to disrupt enemy sustainment activities. DEEP OPERATIONS DURING DEFENSIVE OPERATIONS 6-194. Deep operations are essential to the effectiveness of the defense. The commander uses them to attrit, isolate, disrupt, and disorganize attacking formations and to create windows of opportunity in which to act decisively against lead enemy echelons. Deep operations are the commander’s means of ensuring success in the main battle area by limiting the enemy’s options, disrupting the enemy’s ability to mass fires against
3-0
165
Operations During Armed Conflict friendly battle positions and denying the ability of subsequent echelons to support the lead echelon. Commanders use rocket artillery, rotary-wing aviation, UASs, special operations forces, space and cyberspace capabilities, electromagnetic warfare, and influence activities to conduct deep operations. Commanders request joint fires to divert, disrupt, delay, or destroy the enemy’s long-range capabilities before they are in direct contact with Army forces. The battlefield coordination detachment, as the senior Army operational commander’s liaison with the air component, serves a central role in relaying requests for joint fires to the joint air operations center. (See JP 3-03 for information on interdiction.) 6-195. Deep operations begin to disrupt the cohesion of the enemy attack as early as possible, before the enemy closes with maneuver forces in the security area. Psychological effects degrade the will of enemy forces to fight, interfere with enemy decision making, and disrupt enemy attacks as they begin, especially when combined with attacking C2 nodes, fires, and other key capabilities. Deception to conceal the location and disposition of defending forces and limit the effectiveness of enemy fires delays the enemy’s ability to mass effects. Army forces in the defense conduct deep operations to— (cid:122) Isolate enemy forces in the security area and main battle area from follow-on echelons. (cid:122) Disrupt the enemy’s ability to support committed forces with fires and logistics. (cid:122) Guard against interference with the commitment of friendly reserves. (cid:122) Attrit sufficient enemy combat power to achieve favorable force ratios in the main battle area. (cid:122) Transition to the offense. 6-196. As part of conducting deep operations, corps and division commanders maintain a current intelligence picture of enemy forces throughout their area of interest. They coordinate for and integrate effects created by special operations core activities to achieve operational and strategic objectives and disrupt enemy forces, capabilities, and infrastructure that support enemy offensive operations. Commanders also ensure that deep operations remain focused on setting conditions for forces in the security and main battle areas while avoiding becoming overly fixated on close operations. 6-197. As enemy formations approach the forward line of troops, leaders monitor enemy movements, determine which elements of the enemy force are most threatening, and attack high-payoff targets, including enemy long-range fires, air defense systems, logistics assets, and C2 nodes. The commander uses reconnaissance and security forces and fires to disrupt the enemy approach and delay enemy second echelon forces and reserves in ways that desynchronize the enemy attack. When available, commanders employ offensive space and cyberspace capabilities in combination with electromagnetic attacks to disrupt enemy communications and hinder the enemy’s ability to adapt. Deep operations in the defense may also seek to suppress enemy air defenses to enable friendly air capabilities, including air interdiction and close air support, to operate in the security area and main battle area. 6-198. Commanders synchronize deep operations among subordinate echelons through the use of fire support coordination measures. Coordinated fire lines are permissive fire support coordination measures that commanders can use for rapid engagement of targets while simultaneously providing flexibility for friendly forces. In the defense, the corps establishes a coordinated fire line with subordinate divisions, so that the corps can target critical enemy capabilities with surface-to-surface fires beyond where the divisions need to focus in their own close and deep areas. SECURITY AREA OPERATIONS 6-199. During the defense, the security force occupies an assigned area far enough forward of the forward edge of the battle area to protect main battle area units from surprise. Security forces provide early warning to give main battle area units time to reposition forces against enemy maneuver and to mitigate the effects of enemy medium-range fires. 6-200. Commanders have the option of employing a screen, guard, or cover in a security area, depending on the mission variables. When deciding which option to use, commanders consider the following: (cid:122) The depth, breadth, and terrain of the security area relative to number of forces available. (cid:122) The capabilities of the security force relative to the threat it faces, particularly its mobility. (cid:122) The amount of time the commander needs the security force to provide forces in the main battle area.
3-0
166
Chapter 6 6-201. Commanders determine the location, orientation, and depth of the security area based on the terrain available and the purpose of the defense. Units identify enemy avenues of approach and named areas of interest. The depth of the security area determines the time available to react to approaching enemy forces. Occupying a deep security area allows the security force to destroy enemy reconnaissance assets without compromising critical observation posts or positions. It prevents enemy forces from easily penetrating the security area and prevents gaps when observation posts or units displace or are lost. Security forces cover less depth along a broad front because they have fewer resources to position in depth and potentially fewer opportunities to exploit terrain. Shallow security areas may require units to task-organize and resource their security forces to perform guard operations that provide more reaction time for the main body. 6-202. The task organization of the security force depends on its role in the overall concept for defense. Covering forces and guard forces require more reinforcement than screening forces. Fires, engineers, aviation, and other attachments increase the ability of guard or covering forces to slow and disorganize the enemy, degrade the enemy’s security forces, and gain additional time for the defending commander. 6-203. Commanders determine when to occupy security areas based on their assessment of all possible enemy courses of action and the preparation required in the main battle area. They allow enough time for their security force to move and establish its positions. The mission variables influence how these security forces deploy and occupy positions. Commanders may push forward to establish a security area, or they may establish one along a current forward line of troops while preparing the main battle area further to the rear, depending upon the favorability of the terrain and enemy dispositions. 6-204. Information collection capabilities enable the performance of security tasks. Commanders focus their collection on named areas of interest to detect and track enemy forces. Data and reporting from UASs, intelligence operations, ground sensors, and national assets can expand the areas under surveillance, provide early warning, and cue security forces. Rotary-wing aircraft detect and report enemy forces at extended ranges with sensors. This permits security force units on the ground to concentrate their forces on likely enemy avenues of approach, named areas of interest, targeted areas of interest, and restrictive terrain that degrades sensor performance. Commanders employ their information collection assets to detect enemy force movements, which provides time to reposition security forces and employ assets to counter enemy actions. 6-205. The security force’s rear boundary is normally the battle handover line. Handover of the battle from forces in the security area to forces in the main battle area requires close coordination to avoid confusion and fratricide. The security force must retain freedom to maneuver to conduct a rearward passage of lines. Main battle area forces establish contact points, passage lanes, and routes through the main battle area. Control of indirect fires passes to main battle area units as the security force moves through the passage lanes. Typically, battalion-sized units of a security force hand the battle over to the brigades through which they pass. Regardless of size or echelon, they must be able to alert the main battle area commander that the enemy is approaching on particular avenues of approach and keep the enemy’s leading units under observation. After passage, security area forces move where directed and begin preparing for subsequent operations. MAIN BATTLE AREA OPERATIONS 6-206. The main battle area is where the commander intends to deploy the bulk of the unit’s combat power and defeat an attacking enemy force. The commander positions forces in the main battle area to block enemy penetrations, choosing terrain that puts enemy forces at the greatest possible disadvantage. Commanders assign sectors to subordinate forces in the main battle area as a means of controlling subordinate maneuver unit operations. Defensive sectors should align with major enemy avenues of approach. The force responsible for the most dangerous sector is typically the main effort. Commanders employ their reserves in the main battle area to halt an enemy attack, to destroy penetrating enemy formations, or to counterattack to regain the initiative. 6-207. Restrictive terrain, choke points, and natural obstacles such as rivers usually favor an area defense oriented on key terrain and avenues of approach. Open, less restrictive terrain usually favors a mobile defense, which orients on the enemy. Most defenses at the division and corps levels offer opportunities for a combination of mobile and area defense. Corps and division commanders maintain situational awareness about close operations in the main battle area while maintaining focus on deep operations to prevent enemy forces from reinforcing or effectively supporting their forward echelons.
3-0
167
Operations During Armed Conflict 6-208. Spoiling attacks and counterattacks can be used to disrupt enemy forces and prevent them from massing combat power or exploiting success in the main battle area. Future operations cells conduct contingency branch and sequel planning to counter potential enemy penetrations of the main battle area, typically by repositioning forces and establishing decision points for committing the reserve. RESERVE 6-209. Commanders base the size of their reserve on the level of uncertainty about the enemy force’s capabilities and intentions. A commander’s concept of operations describes the size, composition, location, and priorities of planning for the reserve. The more uncertainty that exists, the larger the reserve is. The purpose of the reserve during the defense is to maintain a hedge against uncertainty and counter enemy success, usually by blocking a penetration or enveloping it from a flank. When planning a defense, commanders cannot typically be strong everywhere, and therefore they accept risk about unlikely enemy courses of action. A reserve mitigates the risk the commander assumes. Commanders may use reserves to counterattack enemy vulnerabilities, such as exposed flanks or support units, or to defeat isolated parts of the enemy forward echelon. In some cases, a commander must use the reserve to reinforce battle positions in the main battle area to hold critical terrain, block penetrating enemy forces, or to react to threats against the division or corps rear area. Units position their reserve force for maximum flexibility. 6-210. Commanders determine the reserve’s planning priorities based on their estimate of the situation. Commanders of brigades or larger formations normally retain about one quarter of their force in reserve, though the percentage depends on the scheme of maneuver and the commander’s level of uncertainty. Higher levels of uncertainty require a larger reserve. 6-211. Timing is critical to counterattacks. Commanders must anticipate the circumstances requiring commitment of their reserve and rehearse its commitment to the main battle area. Rehearsals help validate the reserve’s response plan and increase the speed with which it can respond. Commanders make the decision to commit a reserve promptly, with sound understanding of the movement and deployment timelines from its assembly area to the main battle area in existing terrain and weather conditions. If committed too soon, reserves may not have the desired effect or be in a good position for commitment against a more dangerous situation later. Committed too late, the reserve may not be able to influence the situation enough to meet the overall intent. Movement control and air defense in the rear area is vital to getting the reserve into the battle on time and in good order. 6-212. Reserves may be air or ground maneuver units or a combination of the two. They should be task-organized with combined arms capabilities and given priority for the employment of joint capabilities. Commanders take the strengths and weaknesses of the reserve into account and plan accordingly. For example, employing an air assault force provides a formation that can respond rapidly to a threatened area or rapidly threaten an enemy flank after seizing key terrain. Once committed, however, it has limited mobility and sustainment capabilities. 6-213. The mobility and lethality of attack aviation makes it one of the most responsive and effective types of reserves. It can rapidly counterattack enemy armored penetrations. Despite its effectiveness, attack aviation should never be the only reserve element due to the potential impacts of weather and the risk incurred by not having enough aviation available for other critical roles, such as enabling security area operations. 6-214. Once commanders commit a reserve, they immediately begin to constitute another one from uncommitted forces or from forces in less threatened areas. When selecting the new reserve, commanders consider what capabilities would be most effective in the situation and the likely locations where it would be employed. REAR OPERATIONS DURING DEFENSIVE OPERATIONS 6-215. Rear operations maintain freedom of action in the security and main battle areas and prevent culmination. The rear command post enables this freedom of action by planning and directing sustainment, conducting terrain management, providing movement control, and providing area security of the rear area. Rear operations ensure prompt delivery of commodities in high demand during defensive operations, particularly ammunition. Depending on the enemy situation, commanders commit maneuver units to secure rear operations, although all forces conducting rear operations must maintain local security and conduct
3-0
168
Chapter 6 survivability tasks. Leaders must consider the terrain, protection, and sustainment requirements for higher headquarters or joint enablers that may be located in the rear area. (See FM 3-94 for more information on the rear command posts.) 6-216. Because rear operations divert combat power from other priorities, commanders must weigh the need for this diversion against other potential consequences, and they must be prepared to assume risk based upon both mission analysis and running estimates. Assuming risk may be as simple as suspending all but critical operations in the rear area for a time, so that units operating in the rear area can concentrate on self- defense at critical junctures. 6-217. Leaders mitigate vulnerabilities associated with command posts, support areas, staging areas, and transportation operations by doing everything possible to limit enemy detection, harden critical nodes, and counter enemy attacks before they can inflict significant losses. Effective counter-UAS operations are critical to countering enemy reconnaissance attempting to identify high-payoff friendly targets. Electromagnetic protection, limited offensive space control operations, dispersion, and repositioning capabilities within the rear area to complicate enemy targeting, particularly of critical C2 nodes, is very important during the defense when a division or corps is relatively static for extended periods of time. (See ATP 3-01.81 for more information on counter-UAS operations.) TRANSITION TO OFFENSE 6-218. The ultimate goal of defensive operations is to defeat the enemy’s attacks and transition, or threaten to transition, to the offense. Units must deliberately plan for transitions to identify and establish the necessary friendly and enemy conditions for a successful transition. As friendly forces meet their defensive objectives, forces consolidate and reorganize for offensive operations or prepare to facilitate forward passages of lines for fresh formations. Units should do everything possible to prevent enemy forces from reinforcing their forward echelons, consolidating, or reorganizing while friendly forces prepare for follow-on operations. 6-219. Commanders transition to the offense when they assess they have enough combat power to maintain pressure on the enemy. They do not wait for perfect conditions, and they sometimes must push tired formations to attack because the opportunity to complete the defeat of enemy formations reduces the risk of future casualties fighting the same enemy formations after they have recovered. Commanders continuously assess the effects of battle on their formations relative to their opponents, and they let that assessment guide how hard they pursue enemy forces and how high of a tempo they sustain. (See ADP 3-90 for additional information on the defense.) SECTION III – OFFENSIVE OPERATIONS For I am convinced that one cannot win, especially outnumbered, without attacking. But to attack on today’s battlefield requires craft and cunning—a concept of offense that we’ve perhaps only begun to understand. General Donn A. Starry 6-220. The key to successful offensive operations is to achieve all desired objectives prior to culmination. This requires the force in the offense to have some combination of relative advantage in the physical, information, or human dimensions. Typically, offensive operations require advantages in multiple domains, but commanders may achieve those advantages through deception operations and surprise rather than the physical means of combat power alone. PURPOSE AND CONDITIONS FOR THE OFFENSE 6-221. The purpose of the offense is to defeat or destroy enemy forces and to gain control of terrain, resources, or population centers. Offensive operations take something from an enemy force. They are characterized by aggressive initiative on the part of subordinate commanders, by rapid shifts of the main effort to create and exploit opportunity, by momentum, and by the deepest, most rapid possible destruction of enemy defensive schemes and the capabilities that enable them.
3-0
169
Operations During Armed Conflict CHARACTERISTICS OF THE OFFENSE 6-222. The high risk, tempo, and physical toll of offensive operations require high levels of unit training, morale, and cohesion. Successful offenses share these characteristics: (cid:122) Audacity—the ability to assume risk to create opportunity with bold action. (cid:122) Concentration—orchestrating forces or effects to create and exploit opportunity. (Concentrating effects is called “mass.”) (cid:122) Surprise—taking action that catches enemy forces off guard. (cid:122) Tempo—maintaining a pace of operations that is faster than the enemy’s, but not so fast that it cannot be sustained for as long as necessary to achieve all assigned objectives. (See ADP 3-90 for more information on the characteristics of the offense.) ENEMY DEFENSE 6-223. The purposes of enemy defensive operations are to set military conditions to resume offensive operations or defend until the enemy achieves a favorable political outcome. The enemy employs two types of defenses generally, a maneuver defense and an area defense. A maneuver defense trades terrain for the opportunity to destroy portions of an opponent’s formation and render the opponent’s combat system ineffective. In an area defense, the enemy denies key areas to friendly forces. In most situations against a peer or superior opponent, enemy forces are willing to surrender terrain to preserve their major combat forces, since the loss of those forces threatens the survival of the enemy’s state or regime. Figure 6-6 on page 6-42 depicts a notional enemy maneuver defense.
3-0
170
Chapter 6 Figure 6-6. Notional enemy maneuver defense 6-224. The enemy establishes a defensive system on favorable terrain and employs capabilities throughout the depth of the battlefield. The enemy’s goal is to resist the joint force’s ability to attack in depth by creating layered standoff that makes integrated action between ground forces and the rest of the U.S. joint force impossible. In the disruption zone, enemy forces attack the joint force with long-range fires and limited objective attacks by ground forces to preempt or disrupt the joint force’s planned attack. Enemy forces employ aviation, artillery, and ballistic missiles in long-range attacks against the joint force’s C2 systems, long-range fires capabilities, attack helicopters, logistics bases, and assembly areas. The enemy uses special operations forces, guerilla forces, and proxy forces in limited objective attacks to harass and disrupt the friendly forces’ preparations for offensive operations. 6-225. In the main battle zone, the enemy force designs its defensive system to defeat penetrations of its main defensive lines and envelopments by the joint force’s ground, airborne, or air assault forces. Along its defensive lines, the enemy attempts to slow and disrupt friendly forces with a combination of obstacles, prepared positions, electronic warfare, and favorable terrain. The enemy’s basic goal is to fix friendly forces with maneuver units and destroy them with massed fires in a layered defensive approach. The layered approach starts with identifying friendly units with long-range air, space, and cyberspace capabilities and then targeting them with fires before they are in range to maneuver during close combat. Ideally, they would attrit friendly forces to the point that they lack the combat power to exploit any initial successes they achieve. 6-226. Enemy forces continuously improve positions in ways that make attacks against them more costly and allow enemy forces to commit the minimum amount of ground combat power forward. Enemy forces
3-0
171
Operations During Armed Conflict use deception, dispersion, and repositioning to avoid easy acquisition by friendly information collection systems. Enemy forces typically employ significant reserves to counterattack penetrations and attempted envelopments. Integrated air defense systems arrayed in depth provide protection and freedom of movement for enemy maneuver units and fires systems. 6-227. Forward-positioned enemy forces focus on providing observed fires for long-range surface-to-surface systems and fixing friendly forces long enough to be engaged effectively by those systems. Enemy forces are likely to conduct a maneuver defense, whenever they are able, by using a series of subsequent battle positions to achieve depth. An enemy commander seeks to use fires and obstacles to prevent decisive engagement of the defending ground forces as they reposition, while causing friendly forces to move as slowly as possible under continuous fire. An enemy force can be expected to employ significant electronic warfare, reconnaissance, surveillance (including UASs), and cyberspace capabilities as part of this defensive effort. Peer enemies can employ chemical weapons, and some can employ tactical nuclear weapons, to prevent the culmination of their defending forces. TYPES OF OFFENSIVE OPERATIONS 6-228. The types of offensive operations describe the general sequence of the offense and recommended formations. The purpose discriminates one from another. The four types of offensive operations are— (cid:122) Movement to contact. (cid:122) Attack. (cid:122) Exploitation. (cid:122) Pursuit. MOVEMENT TO CONTACT 6-229. Movement to contact is a type of offensive operation designed to develop the situation and to establish or regain contact (ADP 3-90). It creates favorable conditions for subsequent tactical actions. Units conduct a movement to contact when the enemy situation is vague or not specific enough to conduct an attack. Forces conducting a movement to contact seek to make contact with the smallest friendly force feasible. A movement to contact may result in a meeting engagement. A meeting engagement is a combat action that occurs when a moving force, incompletely deployed for battle, engages an enemy at an unexpected time and place (ADP 3-90). If friendly forces make contact with an enemy force, they have five options: attack, defend, bypass, delay, or withdraw. ATTACK 6-230. An attack is a type of offensive operation that destroys or defeats enemy forces, seizes and secures terrain, or both (ADP 3-90). Attacks incorporate coordinated maneuver. An attack is different from a movement to contact since knowledge of the enemy’s disposition enables units to synchronize and employ combat power more effectively. There are four variations of attacks: (cid:122) Ambush. (cid:122) Counterattack. (cid:122) Raid. (cid:122) Spoiling attack. EXPLOITATION 6-231. An exploitation is a type of offensive operation that usually follows a successful attack and is designed to disorganize the enemy in depth (ADP 3-90). Exploitations seek to disintegrate enemy forces to the extent that they have no alternative but surrender or retreat. Division and higher echelon headquarters normally plan exploitations as branches or sequels to current operations.
3-0
172
Chapter 6 PURSUIT 6-232. A pursuit is a type of offensive operation designed to catch or cut off a hostile force attempting to escape, with the aim of destroying it (ADP 3-90). Pursuits entail rapid movement and decentralized control. Any offensive operation can transition into a pursuit if enemy resistance breaks down and enemy forces flee. Generally, a pursuit normally follows a successful exploitation. There are two types of pursuits: (cid:122) Frontal. (cid:122) Combination. OFFENSIVE OPERATIONAL FRAMEWORK CONSIDERATIONS 6-233. Within the context of the higher echelon commander’s operational framework and the general phasing scheme, commanders must design attacks that defeat enemy forces across all echelons, while enabling subordinate disciplined initiative. When designing attacks, commanders divide the task of defeating an enemy force and maintain an integrated approach through deep, close, and rear operations. Commanders account for air, space, cyberspace, and when relevant, maritime capabilities across the operational framework. Figure 6-7 illustrates friendly offensive operations across a notional operational framework. Figure 6-7. Notional operational framework during offensive operations EXTENDED DEEP AREA DURING OFFENSIVE OPERATIONS 6-234. The extended deep area is an important part of any formation’s area of interest because it contains enemy capabilities that can inflict damage on friendly forces and affect friendly forces’ operational reach and endurance. Enemy strategic C2 nodes and long-range fires capabilities, including ground-based missiles and aviation assets, are generally located in the extended deep area out of the corps or division’s AO. The situation
3-0
173
Operations During Armed Conflict in the extended deep area influences future operations, and it may become part of an assigned area when offensive operations progress, forward boundaries advance, and units move around the battlefield. Commanders integrate the effects and activities of special operations forces and partner irregular forces in extended deep areas. Army forces request joint effects in the deep area, and they may be tasked by the JFC to employ long-range fires against targets in the extended deep area. Disrupting enemy decision making or destroying enemy long-range fires capabilities limits the enemy’s ability to mount a coordinated defense and can destroy enemy forces reconstituting or preparing for counterattacks. DEEP OPERATIONS DURING OFFENSIVE OPERATIONS 6-235. Deep operations focus on parts of an assigned area that are not in direct fire contact with the main body of the formation but may be in the future. At division and corps, which have assigned and attached long-range fires capabilities, the deep area extends beyond the forward line of troops to a distance that corresponds with the ability of Army and joint capabilities to reach. Divisions and corps integrate special operations forces, depending on C2 relationships, with deep operations to degrade the enemy’s will to fight, destroy high-payoff targets, and disrupt enemy defensive infrastructure and sustainment. Special operations forces operating in deep areas require control measures to synchronize actions and mitigate risk. 6-236. Commanders use graphic control measures in the deep area to delineate responsibility for targets, employment of fires, axes of advance, and future ground objectives. Forward boundaries, coordinated fire lines, fire support coordination lines, kill boxes, and restricted fire areas are all coordination measures that commanders use to integrate deep operations among echelons. 6-237. Commanders synchronize joint and organic lethal and nonlethal effects in the deep area to disrupt enemy echelons, neutralize reserves, and destroy key capabilities including counterbattery radars and fires systems that can impact close operations. For example, a commander may combine massed fires against the enemy reserve with military information support operations, attacking that unit’s resupply operations to psychologically isolate it from the main body and erode its will to fight. 6-238. Corps and divisions may use their indirect fires capabilities to support close operations and to conduct deep operations. Commanders employ reconnaissance and security forces, both air and ground, to make initial contact, detect targets, and facilitate fires in support of deep operations. They may shift priority of fires from deep to close operations in support of the main effort. 6-239. Commanders may also employ reconnaissance and security forces to conduct deep operations. Commanders may task-organize dedicated security forces to make contact with the smallest possible ground formations and to develop the situation before the main body can be decisively engaged. Normally an attacking unit does not need extensive forward security forces; most attacks are launched from positions already in contact with the enemy, which reduces the usefulness of a separate forward security force. An exception occurs when the attacking unit is transitioning from the defense to an attack, and it had previously established a forward security area as part of the defense. CLOSE OPERATIONS 6-240. Close operations occur where forces at divisions and lower echelons maneuver and where forces at the BCT and lower echelons conduct most direct fire engagements. BCTs and lower echelon formations destroy or render enemy forces combat ineffective through movement and fires during close operations. Close combat at the BCT-level and below relies heavily on the warfighting skill and determination of leaders and small-unit teams. Battle drills and creating effects from massed indirect fire play a critical role in success during close combat, since immediate action or reaction can determine success and failure. 6-241. When commanders achieve their initial objectives in the close area, they transition to the next phase of the operation, or they execute a branch or sequel should the situation require a change to the original plan. A branch may require friendly forces to defeat a counterattacking enemy force on the division’s flank with joint capabilities or reserves. When commanders defeat most enemy defensive forces, they may transition some of their focus to consolidating gains. For example, when lead friendly echelons fix and bypass enemy forces to maintain momentum, follow-on friendly forces must defeat the bypassed enemy forces to prevent them from disrupting friendly lines of communications, negatively influencing local populations, or breaking
3-0
174
Chapter 6 out. Commanders initiate operations to consolidate gains as early as possible, while still in close proximity to enemy units, to mitigate the risks those enemy units breaking contact could generate later. 6-242. Close operations require graphic control measures to synchronize the application of combat power, to ensure integration of subordinate units, to maintain maximum pressure on the enemy, and to mitigate the risk of fratricide within the friendly force. There is no arbitrary benefit to minimizing or maximizing the number of graphic control measures for a particular operation. The optimum number of graphics depends on the mission variables. Having many graphics provides options and agility to the plan, and this can be especially helpful in air-ground coordination or facilitating rapid changes of direction. Leaders balance the complexity of control measures. They should be simple enough for bold execution and detailed enough to enable agility and adaptation based on the situation. The best approach for employing control measures is to ensure they maximize subordinate unit freedom of action and prevent subordinate units from having more tasks than they can reasonably accomplish. 6-243. Commanders adjust the employment of graphic control measures according to the situation, but they always consider the range and speed of subordinate unit capabilities and their overall operational tempo. As units move forward, rear boundaries typically require corresponding shifts to ensure the unit’s assigned area does not exceed its area of influence. BCTs have limited ability to control long lines of communication, and their tempo and endurance is affected by time and distance of resupply, casualty evacuation, and other sustainment considerations. Division boundaries require similar considerations, with the added complexity of displacing division C2 nodes to support operations. Moving a division C2 node requires careful planning to maintain continuous C2 of subordinate formations and avoid unnecessary tactical pauses. 6-244. Commanders and staffs maintain situational awareness about adjacent friendly and enemy units in their area of interest. Although commanders and staffs have a plan for where a zone of attack will be and can use it to create initial boundaries and other graphic control measures, enemy forces operate independently of them. This means that while friendly forces have some constraints or restrictions in terms of employing capabilities outside of their assigned area, enemy forces do not. This requires friendly forces to understand what enemy capabilities outside their assigned area can influence friendly operations and closely coordinate responses with friendly units to the flanks and rear. REAR OPERATIONS DURING THE OFFENSE 6-245. Rear operations encompass a wide range of activities directly controlled through the rear command post of a corps or division. Rear operations include sustainment operations, support area security, risk mitigation of areas not assigned to subordinate units, terrain management, movement control, coordinating and synchronizing protection capabilities, consolidating gains, and conducting stability operations as required. Corps and division reserves typically occupy positions in the rear area before their commitment, and they must receive priority of movement through the rear area when they are repositioned or committed. Rear operations contribute to the operational reach, tempo, freedom of action, endurance, and momentum of the whole formation. 6-246. Rear operations must adapt to the forward progress of the attacking divisions or BCTs. This may require moving support units, the rear command post, and sustainment activities forward as an attack progresses. The rear command post typically assumes responsibility for much of the new land area gained by the attacking forces. The division rear command post must be prepared to assume responsibility for the land areas left by forward-moving forces. In particular, it must be ready to control and repair routes, manage terrain for follow-on support units, and assure that the division reserve can move without obstruction. These activities may also require the rear command post to direct the reduction of explosive ordnance threatening critical infrastructure or key resources. 6-247. Tactical units move through rear areas on their way to being integrated into corps or division operations. These units report through the rear command post and occupy assembly areas designated by the rear command post until they are able to integrate with the main command post, should they be employed as part of close or deep operations. Long-range fires, ADA, CBRN decontamination, aviation, and reserve units occupy assembly areas and other positions in the rear area. Their requests for fires and other enablers, their use of ground and airspace, and their other operations are coordinated through the rear command post, unless otherwise directed by the main command post.
3-0
175
Operations During Armed Conflict 6-248. Commanders typically economize combat power reserved to protect their rear operations. Bypassed enemy forces, enemy special operations forces, and irregular forces pose a significant threat to rear operations. Typically, divisions assign a BCT to provide security and consolidate gains in rear areas. Maneuver enhancement brigades, with augmentation, employ a tactical combat force to defeat Level III threats throughout the support areas, including major sustainment nodes and main supply routes. (See JP 3-10 for more information on threat levels.) 6-249. Rear operations play a key role during transitions. For example, a transition between defense and offense increases the amount of fuel, maintenance, and movement support required for operations. A transition to stability operations requires greater humanitarian aid supplies, force protection and construction material, and contract support. 6-250. When required, commanders conduct reconstitution operations in the rear area, where enemy direct fire contact is unlikely. While reconstitution operations are dominated by sustainment factors, they are not the exclusive responsibility of sustainment units. All warfighting functions contribute to an effective reconstitution. 6-251. As stability becomes a greater focus of operations, commanders must assess the resources available against the mission to determine how best to conduct the minimum-essential stability operations tasks and what risk they can accept. The land component commander can establish a civil affairs task force to operate in the rear area and form a transitional military authority or support civil administration that facilitates the ultimate consolidation of gains in support of the desired strategic end state. The purpose of the civil affairs task force is to concentrate stability operations in an AO under a commander’s main effort. Additionally, commanders may require Soldiers from all branches to conduct civil security related tasks such as transitional public security tasks until local security forces are able to conduct these tasks. The speed with which transition from U.S. forces to local authorities occurs is dependent on the ability to plan and control elements aimed at developing and legitimizing governance at the tactical and operational levels. (See FM 3-57 for more information regarding the civil affairs task force.) TRANSITION TO DEFENSE AND STABILITY 6-252. When offensive operations culminate before enemy forces are defeated, friendly forces rapidly transition to the defense. Commanders may deliberately transition to the defense when enemy forces are incapable of fully exploiting an opportunity, or when they believe they can build combat power to resume the offense before enemy forces can react effectively. Depending on where culmination occurs, friendly forces may have to reposition forces on defensible terrain and develop a form of defense and scheme of maneuver based on an assessment of the mission variables. 6-253. Successful offensive operations end because Army forces have achieved their assigned objectives. A successful offense can also require a transition to a defensive posture dominated by stability operations and a strategic environment moving toward post-conflict political goals. These operations have the goal of transitioning responsibility for security and governance to legitimate authorities other than U.S. forces. 6-254. As a transition to stability operations occurs, leaders focus on stability tasks and information activities to inform and influence populations and conduct security force assistance. Effective collaboration with diplomatic and humanitarian organizations enhances the ability to achieve stability mechanisms. Army forces play a key role in enabling the joint force to establish and conduct military governance until a civilian authority or government is given control of their assigned areas. TRANSITION TO POST-CONFLICT COMPETITION 6-255. Army forces conclude armed conflict by establishing conditions that are favorable to the United States on the ground. Army forces support these conditions throughout armed conflict by consolidating gains and prosecuting operations with desired end state in mind. As hostilities end, stability tasks dominate operations with the purpose of transitioning responsibilities to legitimate authorities in a secure environment. Army forces provide the joint force with the option of establishing a military transitional government before transitioning full governing responsibility to host-nation or other provisional governments.
3-0
176
Chapter 6 6-256. Standards for transitioning governance responsibility depend on the credibility, capability, and capacity of the governing organization to maintain the favorable conditions established during armed conflict. Strategic leaders determine the broad conditions for transition at the outset of operations and refine them based on how the situation changes. Army forces play a key role in understanding the host-nation culture, understanding critical infrastructure, assisting strategic leaders in the development of realistic transition goals and timings, and determining the duration and scale of U.S. commitments required to maintain stability. THEATER ARMIES DURING TRANSITION TO POST-CONFLICT COMPETITION 6-257. Theater armies play a key role in transition to post-conflict competition. Unlike JTFs that are created for limited durations, theater armies maintain a continuous, long-term focus on theater strategy and relevant national interests. A theater army anticipates and requests the additional forces, functional capabilities, and resources required to support transition. Theater requirements will change as combat operations reduce and focus on stability tasks increase. Theater armies refine logistic estimates, update security cooperation plans, request engineer units capable of infrastructure development, refocus civil affairs requirements, improve communications infrastructure, and address any other critical requirements. 6-258. Enabling legitimate authorities requires coordination with unified action partners, as well as a favorable attitude among the population towards friendly forces supporting the effort. The theater army’s goal is to replace U.S. combat forces with host-nation or other provisional authorities. 6-259. Security force assistance (SFA) is a key component of any plan to transition. SFA requires trained, educated professional officers and noncommissioned officers as trusted advisors to partner-nation security forces. A theater army supports JFCs in integrating conventional forces and special operations forces into SFA plans that support transition and sustainable political outcomes. 6-260. The theater army engages other regional actors to assist in promoting the stability of the region and managing the transition. In most cases, successful transition requires the theater army to retrograde equipment, close the JOA, coordinate for the redeployment of Army forces, and manage a long-term security cooperation plan. Relationships with regional leaders help to facilitate these requirements and provide stability for local populations. CORPS DURING TRANSITION TO POST-CONFLICT COMPETITION 6-261. Corps play a key role in transitioning from combat to stability-focused operations. As part of this, consolidate gains activities may require the Army corps to employ forces to perform these tasks: (cid:122) Establish area security throughout the entire corps AO. This includes offense and defense tasks to destroy or neutralize remaining threats and protect the civilian population and infrastructure. (cid:122) Conduct stability tasks necessary to create conditions that allow for the eventual transition to a legitimate authority. (cid:122) Conduct security force assistance to build the capability and capacity of foreign security forces. (cid:122) Dissuade enemies and adversaries from reinitiating hostile or disruptive operations and persuading them to abide by sanctions, laws, or international dictates. (cid:122) Coordinate and influence the assumption of responsibility by host-nation or other authorities. (cid:122) Synchronize psychological actions aligned with friendly unit activities (including deeds, words, and images) to favorably influence civilian attitudes toward friendly security forces and the eventual transition to legitimate authority. 6-262. As large-scale combat operations conclude in a corps AO, the corps continues to adjust its operational framework to meet the increasing demand on stability tasks, while maintaining a posture that prevents enemy forces from reconstituting their forces and operations. Operations primarily focus on providing area security in high threat areas, followed by the performance of stability tasks in lower threat areas. During transition, corps will likely conduct simultaneous offense, defense, and stability operations.
3-0
177
Operations During Armed Conflict DIVISIONS DURING TRANSITION TO POST-CONFLICT COMPETITION 6-263. During transition, divisions will likely conduct simultaneous offense, defense, and stability operations. Divisions must sustain those forces in combat operations concurrently with stability operations. In addition, division support assets must be prepared to displace from established support areas, through areas where security may not yet be established, to new support areas to better support those forces in combat operations prior to area security being established. 6-264. Divisions perform the stability tasks necessary to create conditions within an AO that allow for transition to a legitimate civilian authority or a unified action partner to act as a transitional authority. Divisions also manage brigades as they conduct SFA to build the capability and capacity of foreign security forces. Finally, divisions dissuade adversaries from reinitiating hostile or disruptive operations and persuade them to abide by sanctions, laws, or international dictates. BRIGADES DURING TRANSITION TO POST-CONFLICT COMPETITION 6-265. Task-organized BCTs perform most area security tasks, and they facilitate the accomplishment of most stability tasks in concert with unified action partners. Army forces take specific actions upon culmination of large-scale combat operations. These actions include— (cid:122) Consolidation. (cid:122) Establishing area security. (cid:122) Conducting stability tasks. 6-266. The transition from large-scale combat operations to area security tasks entails risk. Units shifting focus from combat to consolidation are vulnerable to counterattack. Historical evidence suggests a force is most vulnerable after a hard-fought win. Commanders and staffs should plan for a quick transition and stress the importance of local security. (See FM 3-90-1 for additional information on consolidation.) 6-267. Forces first perform minimum-essential stability tasks, and then they maintain or reestablish a stable operational environment and provide essential governmental services, emergency infrastructure reconstruction, and humanitarian relief. BCTs further develop and reassess situations, perceptions, and opportunities through continuous information collection to maintain positive momentum to achieve additional gains.
3-0
179
Chapter 7 Army Operations in Maritime Environments The basic objectives and principles of war do not change. The final objective in war is the destruction of the enemy’s capacity and will to fight, and thereby force him to accept the imposition of the victor’s will. This submission has been accomplished in the past by pressure in and from each of the elements of land and sea, and during World War I and II, in and from the air as well. The optimum pressure is exerted through that absolute control obtained by actual physical occupation. This optimum is obtainable only on land where physical occupation can be consolidated and maintained. Fleet Admiral Chester W. Nimitz, United States Navy This chapter describes Army operations in a predominantly maritime environment. It begins with a discussion of the unique characteristics and challenges posed by maritime regions. It continues with a discussion of maritime planning considerations, and it concludes with a description of a potential operational approach for a maritime environment. SECTION I – OVERVIEW OF THE MARITIME ENVIRONMENT 7-1. Previous conflicts have proven the critical role of land forces in maritime Although the Pacific Theater of World War II is often associated with dramatic battles fought by U.S. Navy and theaters. In almost all cases it is land that Marine Corps, U.S. Army forces provided considerable makes a maritime area important to a combat power to the theater. Most of the 22 divisions that combatant commander. Land masses near served in the Pacific endured 100 to 300 days of continuous or surrounded by water create maritime combat during the island-hopping campaign. Several units choke points, enable force projection in and spent over 500 days in the war against Imperial Japanese forces. The Americal Division spent over 600 days in combat. out of maritime areas, and contain the Casualties for Army forces exceeded 85,000 killed, captured, majority of the world's population. The wounded, or missing in action. The 77th Infantry Division ultimate objective of conflict is typically not alone sustained 9,212 casualties in 208 days of combat. control over vast expanses of open water, During battles that included Guadalcanal, New Guinea, the but rather the land and people who control Philippines, and Okinawa, Army forces provided both combat it. Planning and training for the unique power and critical sustainment to a complex campaign that spanned from Alaska to Australia. considerations of operations in these environments is critical, as is an integrated planning approach with the rest of the joint force. A maritime operational environment adds coordination and synchronization requirements for Army echelons that typically operate and train in land operational environments. Army and joint force planning must reflect an understanding of the dynamic nature of the threats and constraints to land forces in maritime regions. Army movement and maneuver between land masses is almost entirely dependent on joint capabilities. Control of critical land masses is essential to the sustainment and protection of joint operations in a maritime operational environment. This interdependence has been historically crucial to success during armed conflicts against peer threats in maritime theaters, and it continues to be crucial in the foreseeable future. PHYSICAL CHARACTERISTICS OF THE MARITIME ENVIRONMENT 7-2. Habitable land masses vary in size and geology. They include land masses as large as Australia to small islets that make up larger atoll systems, such as the Marianas islands in Micronesia or Alaska’s Aleutian Islands chain. Regardless of their size, not all islands are suitable for extended occupation without externally
3-0
180
Chapter 7 provided water and other supplies. While most islands are natural, formed by tectonic or volcanic action, manmade islands created for military and other purposes are also found within certain regions, such as the South China Sea. Maritime land masses include a variety of environmental conditions. Islands throughout Southeast Asia are predominantly jungle and savanna regions. Islands throughout the Baltic, Arctic, and sub- Arctic regions may experience prolonged periods of extreme cold weather. Mountainous terrain can be found on jungle, Arctic, and desert islands. Each island can contain unique environmental planning considerations that can affect the way Army forces are resourced and employed. (See ATP 3-90.97 for more information on cold weather environments. See ATP 3-90.98 for more information on operations in jungle environments. See ATP 3-90.99 for more information on operations in desert environments.) 7-3. Currently, 22 nations in the world are recognized as archipelagic states, and these unique maritime nations can include several cultures, religions, languages, and geopolitical histories within their own territorial boundaries. Regional influences, littoral urbanization, external actors, regional geopolitical perspectives, and local economic conditions may change from island to island, even when those islands comprise a single country. Commanders and staffs must understand these complex factors to influence outcomes in the human and information dimensions of an operational environment. Corps, divisions, or even brigades may have an area of operations (AO) that spans several islands, each with a unique culture and history. 7-4. In a predominantly maritime environment, any land that can be occupied to attain a physical position of relative advantage by friendly or enemy forces can become key terrain. The largely maritime domains challenge planners to account for operational reach and the impact of space and time on reinforcement of existing forward-stationed forces and allies. The distance between bases throughout the maritime regions hinders mutually supporting operations and sustainment from supporting echelons in the theater. Remoteness and distance increases vulnerability to amphibious raids by enemy special operations forces and attacks from long-range aircraft or missiles, and it increases the risk of physical isolation by air and naval forces. LITTORAL REGIONS 7-5. Maritime environments include littoral regions, divided into two segments: seaward and landward. Seaward segments include the area from open ocean to the shore, which must be controlled to support operations ashore. Landward segments are those areas inland from the shore that can be supported and defended directly from the sea. Maritime littoral regions are divided into five categories: (cid:122) Enclosed and semi-enclosed seas—bodies of water surrounded by a landmass and connected to either an ocean or another enclosed sea by a connecting body of water, such as a strait. (cid:122) Islands—single land masses surrounded by a body of water. (cid:122) Archipelagoes—groups of islands. (cid:122) Open seas—unenclosed bodies of water, typically outside of territorial boundaries. (cid:122) Marginal seas—portions of open seas or oceans that bound land masses such as peninsulas, islands, and archipelagos. 7-6. Operations in these environments require information concerning tides in the local area, average wave heights, and daily wind forecasts, as tides and winds may unexpectedly impact wave heights. Tidal flow and currents impact operations for small or shallow draft vessels. Tidal changes can also affect vehicle mobility when crossing unimproved beachheads or operations without causeways or engineer support. Extreme weather plus the corrosive effects of salt water can rapidly degrade the maintenance readiness of equipment already at the extent of long logistics lines of communications. ARCTIC REGION 7-7. The Arctic region is significantly influenced by maritime considerations. The Artic encompasses part of the areas of responsibility of three different geographic combatant commands, eight countries, and all time zones. There are two primary transit routes through the Arctic: the Northwest Passage and the Northern Sea Route. The Arctic is a geopolitically competitive region and a potential area for armed conflict. There are various international partnerships and alliances within the region, with overlapping relationships complicated by international disputes about maritime boundaries. The Arctic presents a harsh and demanding maritime, land, and air environment for military operations. Extreme temperatures, long periods of darkness and
3-0
181
Army Operations in Maritime Environments extended daylight, high latitudes, seasonally changing terrain, and rapidly changing weather patterns define Arctic conditions, and they all have impacts on the operational and mission variables. The variability of the physical terrain and weather exposes military forces and capabilities to increased levels of risk. 7-8. The Arctic is not challenging solely due to extreme cold temperatures. Ground mobility is typically most favorable during the winter months. Summer poses significant challenges for most vehicles moving off road, while the most challenging period is the spring thaw when ground movement becomes impossible across large swaths of territory. Regardless of season, air and sea mobility are critical enablers for military operations. Thawing permafrost affects infrastructure across the region. Lacking the climate moderating effect of the warm Gulf Stream, the North American Arctic hosts a much harsher environment than the European Arctic. The warming of the Arctic has led to longer windows of reduced ice conditions over a larger area. Long-term trends indicate a more consistently navigable Arctic, potentially affecting the mobility of Army and threat forces during armed conflict. 7-9. Operations in the Arctic region get more complicated when roadways, seaports, and airfields can become unusable depending on seasons. The loss or change of sea ice can open new waterways and increase transit through the region. This could require additional forces, equipment capability, and infrastructure investments to secure the U.S. homeland, allied partners and infrastructure, or the northern avenues of approach during armed conflict. CONSIDERATIONS UNIQUE TO THE MARITIME ENVIRONMENT 7-10. Threats to Army forces in a maritime theater include those in any other type of theater. Additionally, commanders and staffs must take into account unique joint and enemy courses of action in planning and executing operations in a maritime environment. JOINT FORCE CONSIDERATIONS IN A MARITIME ENVIRONMENT 7-11. The heavily interdependent nature of joint operations means that the defeat of one part of the joint force puts the other parts at significant risk. The failure of Army forces to retain key terrain or protect air and naval bases while preserving their own combat power could result in the loss of air and maritime superiority, which in turn could lead to the ultimate defeat in detail of unsupported Army forces in an entire area of responsibility (AOR). 7-12. Army forces require a joint common operational picture (COP) of friendly forces and their operations, including those of allies and partners, in all domains. An inaccurate joint or partner COP could cause flawed assumptions and situational understanding that decreases effective decision making. 7-13. As with other environments, planning land operations in maritime environments should address relevant factors affecting friendly and enemy operations. The products and tools typically gathered to plan and portray the unique characteristics of a maritime environment include riverine and coastal navigation charts or tidal reports and observations from local fishing communities. Additional characteristics to consider include— (cid:122) Coastal terrain and soil compositions. (cid:122) Commerce and trade along navigable waterways. (cid:122) Maritime-specific infrastructure. (cid:122) Navigable bodies of water. (cid:122) Population densities and variations along shores and near navigable waterways. (cid:122) Tidal flow, surf conditions, and current directions. (cid:122) Natural obstacles adjacent to terrain (including sandbars, shoals, mud flats, and dunes). ENEMY COURSES OF ACTION UNIQUE TO THE MARITIME ENVIRONMENT 7-14. Enemy forces have the ability to take multiple actions unique to the maritime environment to hinder joint operations. They use capabilities from all domains to interdict lines of communications between the strategic support area and forward-positioned Army forces, putting forces at risk of isolation and beyond the supporting distance from other joint force elements. Enemy forces target shipping that carries the bulk of
3-0
182
Chapter 7 Army heavy equipment into theater and the pre-positioned equipment already in theater as part of their preclusion and isolation approaches. While Army forces can take measures to protect equipment already in theater, they are dependent upon the other Services for the protection of people, equipment, and supplies in transit. 7-15. Threats may employ asymmetric tactics to reinforce their area denial (AD) approaches throughout a region, Defeating enemy forces before they capitalizing on the vulnerability of isolated friendly locations can generate superior combat power lacking adequate protection. Locations that cannot be and expand lodgments is critical. reinforced or supported by other elements of the joint force are particularly vulnerable. Attacks by enemy special operations and naval forces are difficult for Army forces to detect and counter without proper positioning and preparation. Anticipating possible enemy courses of action in one region that would support a broad theater-wide outcome should drive friendly priorities of planning and preparation. 7-16. Enemy forces may use proxy forces to destabilize regional partners, further delaying Army forces from safely accessing basing and lines of communications. Proxy forces can facilitate enemy reconnaissance, surveillance, and disruption of joint operations. They can also affect access to sea-lanes and airports for transportation, hindering the resupply of island bases, and limiting the ability to reinforce forward-positioned friendly forces through attacks on bases and base clusters. 7-17. Enemy surface-to-surface and surface-to-air fires systems are critical to the layered defense and early warning systems necessary to attack forward-positioned friendly forces with little warning. These systems simultaneously prevent reinforcement or support of those friendly forces. Enemies position robust and integrated air and missile defenses, early warning surveillance radars, and electronic warfare capabilities that range elements of the U.S. joint force put them at risk during competition, crisis, and conflict. Enemy medium range ballistic missiles, cruise missiles, anti-ship missiles, and air and naval forces also put friendly forces at risk. This combination of systems warfare approaches threatens land-based forces even when they do not directly target them, since land-based forces require the support of air and maritime forces for sustainment, early warning, and protection. ARMY-SPECIFIC CONSIDERATIONS 7-18. Commanders and staffs account for multiple considerations Forward-based Army forces in when planning and executing operations in a maritime range of adversary fires require environment. Counter-reconnaissance by Army forces on an significant hardening for island requires a 360-degree approach to avoid surprise. survivability against enemy ballistic Responding to threats requires highly mobile capabilities that missiles, aircraft, naval fires, and mass effects against enemy forces quickly. Although threats can cyberspace attacks. Forward-based approach from any direction to achieve surprise, there are Army forces can defend critical joint constraints in terms of where enemy forces are able to land during infrastructure when properly an amphibious or air assault and range constraints that might positioned and prepared. cause aircraft to favor certain approaches. Intelligence preparation of the battlefield requires an understanding of air and maritime avenues of approach and their relationship to a particular land mass or grouping of land masses. 7-19. Army forces positioned at existing bases within the range of adversary long-range fires establish primary and alternate survivability positions for themselves while providing air and missile defense (AMD) and local security to airbases and ports. They may also be required to defend against amphibious assaults, and airborne or air assault operations by enemy forces seeking to control a particular land area or destroy critical infrastructure. Army forces operating on islands with austere infrastructure and resources require significant sustainment during prolonged operations. 7-20. Land areas able to accommodate significant military forces in strategically or operationally important areas are scarce in maritime environments, and what is available is already a known point for enemy planners. This makes surveillance of friendly activities simpler, affecting the ability to achieve surprise or avoid being surprised. It also makes the process of enemy observation, information collection, and subsequent targeting
3-0
183
Army Operations in Maritime Environments faster and more effective. The implications, with regard to friendly forces concealing and protecting themselves, are significant. 7-21. The British defeat in Malaya is a historical example of a poorly executed defense at both the operational and tactical levels. It also is an example of a peer threat exploiting superior planning, leadership, and aggressive action across multiple domains to overcome numerical inferiority against a defending force. Faulty Assumptions—Defeat Across Multiple Domains in Malaya On 8 December 1941, Imperial Japanese forces launched the invasion of Malaya from their strongholds in French Indochina. Japanese intelligence suggested that General Yamashita’s 70,000 troops were outnumbered nearly 2 to 1, so he concluded that only a bold, rapidly executed attack with aggressive, well-trained troops would ensure victory. The British Empire was decisively engaged in North Africa, the battle of the Atlantic, and the defense of the home islands. While it deployed additional ground, naval, and air units to Singapore, the combination of time, distance, and demands in other theaters made further reinforcement unlikely. Those forces that arrived before the commencement of hostilities had little time to train or prepare for operations against an opponent of unknown quality in an unfamiliar environment. The allied defense of Malaya rested on several false assumptions. First, allied forces assumed there would be sufficient warning of an attack, which in turn, would allow for adequate air and naval reinforcements. The few major naval reinforcements (the battleship Prince of Wales and battle cruiser Repulse) were sunk, and the aircraft rapidly lost against a qualitatively superior Japanese air arm. The Allies assumed that the dense jungle terrain would impede enemy ground movement and simplify defense of the peninsula; but it actually hindered the defenders more than the Japanese. They assumed the enemy main effort would come from the sea, which was the most heavily fortified part of their defense. It did not. They assumed their air force to be superior to that of the Japanese. It was not. They also assumed that the British and Commonwealth troops were better trained than the Japanese Army. They were not. These beliefs cost the Allies and provided an opportunity for the Japanese forces. The Japanese launched a successful night amphibious assault on the northern coasts of Malaya and advanced south along the eastern coast. They also made simultaneous landings in Thailand, just north of the Malaya border, and sent units south into the interior and along the west coast. The Allies attempted to slow the Japanese advance with prepared positions along the roads and by destroying bridges, but the Japanese repeatedly bypassed or enveloped static positions by moving off the roads and conducting amphibious landings. On 10 December, Japan sank the last major allied naval units and achieved air supremacy. By 27 January 1942, allied forces had retreated across the strait onto the island of Singapore. Japan subsequently invaded Singapore on 7 February and completed its conquest on the 15th. In just over two months, Yamashita’s 25th Army of 70,000 troops decisively defeated a defending force of over 140,000 soldiers at the cost of just under 10,000 casualties. Yamashita’s use of speed, maneuver, and surprise allowed him to dictate the operational tempo of the invasion. He ably exploited opportunities provided by the Japanese air and naval forces while generating his own with aggressive maneuver on the ground. The simultaneous presentation of multiple dilemmas across the air, maritime, and land domains led to the largest surrender of British forces in history. (See figure 7-1 for a map of operations in Malaya.)
3-0
184
Chapter 7 Figure 7-1. Operations in Malaya SECTION II – MARITIME ENVIRONMENT PLANNING AND OPERATIONAL FRAMEWORK Amphibious warfare requires the closest practicable cooperation by all the combatant services, both in planning and execution, and a command organization which definitively assigns responsibility for major decisions throughout all stages of the operation... Admiral Henry K. Hewitt 7-22. Planning for operations in maritime environments requires commanders and staffs carefully consider the operational environment. Commanders and staffs need to consider that applying an operational framework in a maritime environment is significantly different than applying an operational framework to a land operation.
3-0
185
Army Operations in Maritime Environments PLANNING CONSIDERATIONS FOR A MARITIME ENVIRONMENT 7-23. Planning for operations on land in maritime environments requires a high level of complex detail to coordinate the movement and landing of troops, equipment, and supplies by air and surface means. The success of Army operations in the maritime environment are uniquely dependent on unity of effort and integrated, collaborative planning with joint headquarters and subordinate echelons. 7-24. The joint force commander (JFC) for major maritime operations is typically a senior naval officer. The JFC ensures unity of effort across the joint force and ensures the task and purpose of Army operations nest with the overall joint operational concept. Despite the physical distances and relative isolation typically associated with land operations in a largely maritime environment, Army commanders must maintain situational understanding through joint collaboration to ensure their operations or activities do not have a negative effect on other operations or units. This includes maintaining situational awareness during movement, which requires direct and continuous integration of Army personnel into the command and control (C2) nodes of Marine Corps, Navy, and Air Force units. This may also include integration with multinational amphibious or maritime units. 7-25. Army corps, divisions, and brigades supporting or reporting to JFCs must understand the joint planning process and contribute to it even as they conduct parallel planning using Army processes with their subordinate echelons. This directly contributes to the successful execution of operations across an extended battlefield, where long distances and sporadic network connectivity affect the situational awareness and synchronization of forces. (See JP 5-0 for additional information on planning and execution of the joint planning process.) 7-26. Planning for operations in maritime environments requires collaboration between Army forces and other relevant components of the joint force command and integration across warfighting and joint functions at each echelon. Ideally, planning should be conducted by commanders and their staffs in the same location, which in some cases may be aboard a ship or in the air. When this is not practical, the exchange of liaison officers facilitates planning functions. Planning efforts—particularly in crisis situations—are conducted in parallel and collaboratively across the involved echelons and Services. This is crucial for any assault operation conducted across extended maritime distances. Integrated planning is facilitated by using operational planning teams formed around planners from functional areas that include subordinate and supporting command liaison officers. Aligning Army warfighting function cells with the joint functions enables integrated planning. APPLYING THE OPERATIONAL FRAMEWORK 7-27. Applying the operational framework in maritime environments requires commanders and staffs to consider the impacts of maritime surface areas and integration with maritime forces. It also requires a different appreciation about what constitutes deep, close, and rear operations in relation to each other. The physical separation of forces by bodies of water affects considerations of mutual support since many operations are likely to involve noncontiguous AOs. Army echelons may have responsibilities for information collection of maritime surface areas and for providing fires into maritime and littoral regions in support of other Services. Army forces may be required to defend against enemy amphibious assaults, requiring tactical level coordination with Navy and Marine Corps forces. Army forces may also conduct amphibious landings or airborne and air assault operations over water in support of joint operations. Operations that were previously considered close, such as forcible entry, can extend into a deep area based on distance between islands or sea bases. Tactical support areas may be separated by extended distances and require the use of watercraft or other joint capabilities to support tactical level sustainment or tactical maneuver forces to secure sea lines of communications. ASSIGNING A JOINT OPERATIONS AREA WITHIN AN AREA OF RESPONSIBILITY 7-28. The Unified Command Plan designates the AOR. Within that AOR, a larger maritime environment might have several joint operations areas to facilitate C2 and resource prioritization. For example, United States Indo-Pacific Command may designate a JOA for operations in the South China Sea and a JOA for operations in Korea. Both JOAs require unique C2, movement and maneuver, sustainment, intelligence, fires, and protection planning and resources. This also includes the designation of an appropriate land component
3-0
186
Chapter 7 headquarters and staff to facilitate joint integration specific to that JOA and the particular Army operations within it. A JOA is established for operations within an AOR that is specialized or limited in its scope or duration, and a JFC directs military operations as a joint task force (JTF). DESIGNATING A JOINT SECURITY AREA 7-29. Within the JOA, the JFC designates numerous joint security areas (JSAs). In a maritime environment, JSAs can be separated by considerable distances, and they probably will not be with areas that are actively engaged in combat. A theater army headquarters or theater sustainment command (TSC) may be required to conduct theater sustainment operations from a single designated JSA or from multiple locations, depending on mission requirements. Army forces may also be designated to secure the JSA and critical intermediate staging bases. (See JP 3-10 for additional information on planning and execution of operations in the JSA.) ASSIGNING AN AREA OF OPERATIONS 7-30. An AO is the operational area defined by a commander for land and maritime forces. The JFC assigns land areas of operations. The designation of subordinate AOs in a maritime environment enables freedom of action, maintains tempo, and maximizes available combat power. Larger island land masses may allow Army forces to operate with a contiguous AO, with the unit boundaries directly adjacent to each other. Smaller archipelagic island chains may require a noncontiguous AO and may even leave some islands within a designated AO completely unoccupied by friendly forces depending on the operational requirements and threat. Figure 7-2 illustrates a notional corps area of operations with significant maritime aspects. Figure 7-2. Notional corps area of operation with maritime aspects
3-0
187
Army Operations in Maritime Environments Deep Operations in Maritime Environments 7-31. Deep operations in a maritime environment may focus on defeating enemy antiaccess (A2) and AD capabilities to set conditions for joint offensive operations using information collection, special operations forces, and fires. They may also focus on reconnaissance and security activities in support of joint defensive operations using the same capabilities. In either situation, Army intelligence capabilities support operations in the extended deep area, enabling the JFC to understand and visualize the operational environment before shaping with fires or maneuver forces in subsequent operations. Army fires assets may also be designated in a support role to other component commands, providing suppression of enemy air defense for aerial attack of island-based enemy forces or surface fires to defeat enemy naval forces. Joint forcible entry operations, to include the amphibious landing of Army forces, may seize key terrain to begin or exploit the disintegration of an enemy A2 or AD approach in a specific joint operations area (JOA). Close Operations in Maritime Environments 7-32. Close operations in a maritime environment may Seizure or defense of key terrain may be appear much the same as a traditional land-based necessary for placement of surface-to- approach discussed in Chapter 6. Seizing key terrain surface or surface-to air-fires capabilities to requires Army forces to conduct offensive operations, enable other component commands. which can include airborne, air assault, and amphibious assaults. Close operations also include defense of islands and island-based nodes that facilitate joint operations, such as airfields and ports. Given the isolated nature of some forward-deployed Army forces critical to the success of joint operations, those forces may be required to conduct defensive operations for extended periods until additional forces arrive. Sustainment planning should assume isolation for periods of several weeks or more. Rear Operations in Maritime Environments 7-33. Rear operations in a maritime environment include those necessary to set and sustain the theater and facilitate combat operations for the joint force. These operations include conducting protected reception, staging, onward movement, and integration (RSOI) and conducting theater sustainment. RSOI could occur thousands of miles away from where a unit would be employed in combat. These operations require increased joint integration during the planning process to ensure prioritization of critical joint resources and to mitigate risk to vulnerable and extended air and sea lines of communications. 7-34. Sustainment and protection operations are associated with support areas, enabling the building and preservation of combat power. While forces positioned on land masses have their own support areas, large expanses of water may require waterborne or airborne transportation for the staging and movement of personnel and equipment between various echeloned support areas. Support areas may be sea based or land based on islands, connected by sea or air lines of communications. These strategic and tactical support areas are critical assets that can be vulnerable to enemy attack, and they typically require increased security considerations, such as anti-submarine and theater AMD. SECTION III – OPERATIONAL CONSIDERATIONS FOR A MARITIME ENVIRONMENT A landing on a foreign coast in the face of hostile troops has always been one of the most difficult operations of war. Captain Sir Basil H. Liddell Hart 7-35. In a predominantly maritime JOA, naval and air components are typically the key components of the JFC’s operational approach. Army forces develop a nested operational approach that reflects and supports the JFC plan. This section details what Army forces consider to successfully nest their operational approach with the joint force. (See ATP 5-0.1 for a more detailed discussion on the Army’s recommendations for developing operational approaches. See JP 5-0 for a more detailed discussion of the joint operations planning processes.)
3-0
188
Chapter 7 ESTABLISH COMMAND AND CONTROL 7-36. Given the size of an AOR for most maritime environments and the distance between land areas, there may be multiple active JOAs, each with separate headquarters. Maritime environments impose significant challenges for theater army signal and sustainment architecture. Subordinate ARFORs rely on maritime and space capabilities to overcome these challenges. DEFEND AND CONTROL KEY TERRAIN 7-37. Friendly forces are stationed or positioned in dispersed forward positions in maritime theaters, and often have been there for decades to facilitate joint operations throughout a maritime theater. Their locations are typically key or even decisive terrain, which requires that Army forces must also be able to defend and control that terrain. Their ability to do so is a function of survivability that depends on active and passive defense measures, reinforcement with critical weapons systems, hardening and camouflaging of command posts, securing critical C2 networks, sustainment, and the employment of protection-oriented land forces. Providing active and passive AMD, to include early warning, reduces the effectiveness of enemy long-range fires or attack. Forward-positioned forces must be prepared to fight outnumbered and from exposed terrain, specifically islands, for as long as is required. This increases the need for security throughout the AOR and forward-positioned sustainment capabilities. Army forces enhance the protection of their own less mobile assets by continually improving the survivability of their positions. 7-38. Retaining critical island terrain through an effective defense, one that includes counterreconnaissance and security operations, is vital for the success of the JFC’s objectives to deny enemy forces a relative advantage. Retaining key land masses enables joint freedom of action for operations in the air and maritime domains, since land-based capabilities can maintain a persistent physical presence that lessens requirements on air and naval forces to secure avenues of approach. Defeating enemy C2 systems is key to defeating layered standoff, A2 weapons, early warning, and enemy reconnaissance and surveillance capabilities. The ability to maintain key terrain for access and security enables the JFC to employ key long-range fires and protection capabilities. This enables regional access during armed conflict critical for maritime freedom of navigation and air superiority. Denying enemy access to limited terrain, sea channels, airspace, and cyberspace by occupying key terrain is crucial to creating an advantage. As there is no easy exfiltration from an exposed island base or maneuver to positions outside of enemy fires ranges, the physical reinforcement of bases may be critical to the success of Army forces in enabling joint force success. PROTECTION SUPPORT TO THE DEFENSE 7-39. The ability to protect and augment the security of the other Services is critical in maritime theaters because of the relative isolation of the forces they position forward and the exposure of those forces to threat capabilities that could be employed with few indications or warnings. The following tasks directly support theater setting and are critical to the success of joint maritime operations: (cid:122) AMD, to include counter-unmanned aircraft systems (UASs). (cid:122) Littoral defense. (cid:122) Area security (base and base cluster defense). (cid:122) Chemical, biological, radiological, and nuclear (CBRN) defense. (cid:122) Explosive ordnance disposal support. (cid:122) General, combat, and geospatial engineering support. 7-40. Ground-based theater-level AMD assets are typically operational control (OPCON) to the Army air and missile defense command (AAMDC) for the JOA. The AAMDC is assigned to the theater army and generally placed in support of the area air defense commander. Army short-range air defense (SHORAD) units are assigned or attached to theater, corps, or division commands, and are OPCON to air defense artillery (ADA) commanders at these echelons. Army forces provide security for designated high priority assets, including layering SHORAD assets into the security plan as part of a defended asset list. The JFC normally delegates authority to the joint force air component commander, as the area air defense commander, for engagements of air and missile threats. When the JFC organizes the joint force, in addition to a joint force air component commander, the JFC also normally designates an area air defense commander for defensive