FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
3-0 | 189 | Army Operations in Maritime Environments
counterair and an airspace control authority for joint airspace control. Normally, the JFC designates the air
component commander as the area air defense commander and airspace control authority, because the three
functions are so integral to one another. Coordination and integration with the surface combatants of the joint
maritime component commander performing AMD roles for critical joint bases is also required. With the
support of the component commanders, the area air defense commander develops, integrates, and distributes
a JFC-approved joint area air defense plan. (See to FM 3-01 or ATP 3-01.15 for detailed information about
the planning and integration of AMD.)
7-41. Theater and tactical ADA units provide early warning by employing sensors to detect air and missile
threats and disseminating air defense warnings to U.S. forces, allied or partnered forces, and civilian
populations. C2 elements disseminate air defense early warnings through various communication networks
and nodes, to include submitting an incoming threat or an all-clear message to the network. (See FM 3-01
for more detailed information on early warning tasks associated with AMD operations.)
7-42. Army forces in maritime environments should assume their land operations are being observed by the
enemy and not assume that AMD protection extends to their AO, especially when separated by extended
distances and vast bodies of water. Larger air threats entering friendly space can be detected early, and
identified, processed, and defeated as part of the air component’s roles and responsibilities to the JFC. There
remains a requirement to find (including detect, identify, and be prepared to defeat) UASs, which could be
launched from naval or commercial vessels or other land masses. Sensors, which include long-range and
short-range radars, optical devices, wireless, and audible alert systems face challenges detecting smaller
tactical UASs at sufficient ranges to mitigate effects. (See ATP 3-01.81 for more information regarding
counter-UAS planning and execution.)
7-43. The JFC normally designate JSAs and designates forces to provide the security of base, base clusters,
and lines of communications. Various types of security forces can secure the JSA and lines of
communications, including dedicated Army forces, coalition partners, and host-nation forces. Bases and base
clusters can be noncontiguous with each other even on relatively small islands, and they may be separated
by extended distances and vast bodies of water.
7-44. Army commanders can be assigned roles as an area commander, base cluster commander, or base
commander, all of which facilitate base defense in support of land and other Service forces. Base threats may
include special operations forces, naval gunfire, long-range surface-to-surface fires, and manned and
unmanned aircraft. Security forces should be able to coordinate for indirect and joint fire support, have a high
degree of tactical mobility, and a reasonable span of C2. (See JP 3-10 for more information on the joint
requirements for base defense and securing lines of communication. See ATP 3-37.10 for more information
on the techniques of establishing and securing bases.)
7-45. Threat employment of CBRN weapons can deny access to key terrain containing ports, airfields, or
staging areas for either friendly or enemy forces until decontamination is complete or until the land
component commander assumes the risk of operating in a contaminated environment. Army forces should
understand the threat’s intent, weapons capabilities, and weapons effects. The threat may range from artillery
or rockets to theater ballistic missiles. Delivery tactics could include overt or covert means (for example,
special operations forces), state-sponsored terrorism, or other asymmetric methods. Contamination
mitigation minimizes the time required to return personnel and mission-essential equipment to a
mission-capable state as part of an overall contamination mitigation plan for the JOA. (See ATP 3-11.32 for
more detailed information about CBRN and contamination mitigation techniques during security operations.)
7-46. Explosive ordnance disposal (EOD) units detect, identify, conduct onsite evaluations, render safe, and
conduct exploitation, disposal, or other disposition of explosive ordnance, including weapons of mass
destruction. They advise commanders on improvised explosive devices and other explosive hazard threats,
including the most effective way to defeat the devices. They also directly support requirements to render safe
explosive hazards that put the use of ports, airfields, and other critical infrastructure at risk. EOD units can
support remediation of areas that ensure access to clear aerial ports of debarkation and seaports of debarkation
facilities and other facilities that support seaports. (See JP 3-42 for a more detailed discussion on the joint
integration and Army roles for ordnance. See ATP 4-32 for detailed information on the techniques of EOD.)
7-47. Islands identified as key terrain for operations typically require additional engineer support to harden
existing key infrastructure or construct new infrastructure to meet the JFC’s requirements for airfields, ports, |
3-0 | 190 | Chapter 7
and survivability positions. Construction equipment, personnel, and supplies often require specific
transportation coordination and prioritization as critical assets for movement by air or sea. Remote locations
that do not have immediate access to organic engineer support require either locally procured or contracted
construction capabilities or manually constructed survivability positions that are concealed as best as possible
from enemy observation as part of survivability measures. (See FM 3-34 for fundamentals and planning
considerations on the employment of general and combat engineer capabilities. See ATP 3-37.34 for specific
techniques and considerations on protective positions, camouflage, and enhancing survivability.)
SECURITY OPERATIONS IN MARITIME ENVIRONMENTS
7-48. The JFC designates the area commander for base and lines of communication security, and most of
the security tasks are typically the responsibility of land force commanders. Collaborative planning and
integration between ground forces providing base security and naval and air forces providing sea lines of
communications security is crucial to maintaining freedom of navigation for combat operations. Army forces
provide security support to all bases within their designated JOA. Brigade combat teams (BCTs), military
police brigades, and maneuver enhancement brigades are suitable for this function. This responsibility can
include bases commanded by organizations that are not part of the area commander’s forces, such as
multinational allies or other joint services. The JFC may institute standard force protection policies for all
commands and bases within an AOR to ensure unity of effort.
7-49. A joint force land component commander (JFLCC) may be designated as the joint security coordinator
by the JFC, with other unified action partner forces assigned to support security plans for the JOA. The joint
security coordinator coordinates the overall protection of the joint security area in accordance with JFC
directives and priorities. This ensures the requirements and priorities are coordinated with the area air defense
commander. The joint security coordinator typically establishes a joint security coordination center. The staff
of this center may be part of the JFLCC headquarters, or this function may be delegated to a subordinate unit,
and it normally includes representatives from all components operating in the JSA to assist in meeting joint
security requirements.
7-50. Every island with a base, regardless of size, requires the same level of comprehensive planning to
ensure sufficient protection in the event there are no reinforcements immediately available when conflict
commences. Army forces should anticipate direct enemy attacks by small units or special operations ground
forces, attack aircraft, and indirect fires. Commanders must ensure that base defense measures are adequate
to detect and defeat small-unit operations (including Level I or Level II threats) well before crisis or conflict.
Dispersion mitigates effects of long-range fires and attack aircraft, but dispersion on small islands is not
always possible. Construction, reinforcement, and caching supplies may be the primary option to offset this
vulnerability, but they are necessary everywhere within range of threat capabilities.
7-51. Successful security of key terrain and infrastructure depends on an integrated and aggressive plan
consisting of dedicated security forces and responsive sustainment and protection forces (including medical,
ADA, and engineer). The theater army synchronizes the base security plans, integrates them into the overall
JFC’s intent, and allocates additional forces for securing sustainment nodes and command posts, key terrain,
or critical infrastructure necessary for combat operations. Remote island bases have the same security
planning considerations, but they vary in their tactical application based on the environment. These
considerations include, but are not limited to—
(cid:122) Defense against sea-based attacks, such as enemy special operations forces or naval fires.
(cid:122) The integration and application of coastal-based indirect fire systems and fire support planning.
(cid:122) Integrated planning for aviation support, including movement and protection of forward arming
and refueling points.
(cid:122) Coastal and harbor security support and integration of host-nation or local security forces.
(cid:122) Integration of coastal barrier systems, sea-based obstacles, and sea-based or harbor mines.
(See JP 3-10 for more information on joint security coordination command posts. See ADP 3-37 for more
information regarding the fundamentals of protection and protection planning.) |
3-0 | 191 | Army Operations in Maritime Environments
DEFEAT COMPONENTS OF ENEMY ANTIACCESS AND AREA
DENIAL AND ENABLE JOINT OFFENSIVE OPERATIONS
7-52. Army forces support joint defeat of enemy integrated air defense, fires and strike complexes,
surveillance, and reconnaissance, and integrated C2 networks to enable success during joint operations. AMD
and fire support are two of the Army’s critical contributions to these efforts, enabling ground, naval, and air
forces to maintain access to the various regions of an operational environment.
PROVIDE THEATER AIR AND MISSILE DEFENSE
7-53. Friendly ADA forces may protect maritime access points, such as shipping channels or ports, to enable
the flow of combat power and theater sustainment. Considerations for employing ADA capabilities during
AMD operations in a maritime environment are—
(cid:122) Defeat enemy air and missile threats encountered in strategic and tactical operations, including
medium-range, short-range, and close-range ballistic missiles; cruise missiles; UASs; rockets,
artillery, and mortars; tactical air-to-surface missiles; and fixed-wing and rotary-wing aircraft.
(cid:122) Integrate and maintain tactical data linkages to other Service and multinational forces conducting
AMD operations in the JOA, weapons systems, sensors, effectors, and C2 nodes at each echelon.
(cid:122) Provide early warning for air and missile attacks and disseminate attack warnings.
(cid:122) Provide extended-range surveillance of the airspace and detect, acquire, track, classify,
discriminate, and identify aerial objects from near-ground level to high altitudes in difficult terrain
and in adverse weather conditions.
(cid:122) Contribute to airspace management and control functions by identifying, coordinating, integrating,
and deconflicting Army assets in the JOA airspace.
7-54. The number and dispersion of critical assets across numerous islands may exceed the ability of
available ADA forces to defend against the air and missile threats. The employment of passive AMD
measures by tactical formations is critical to their survivability, particularly on remote islands that may not
have access to sufficient active ADA capabilities or reinforcement from a neighboring island chain. Access
to early warning networks with over-the-horizon and redundant communications increases reaction time and
further mitigates risks for remote locations primarily using passive defense measures. (See FM 3-01 for more
detailed information on planning considerations associated with AMD operations.)
FORCIBLE ENTRY OPERATIONS
7-55. In a maritime environment, Army forces are likely to conduct two complex forms of forcible entry
operations: airborne or air assault and amphibious landing. Forcible entry operations seize and hold
lodgments against armed opposition to set conditions for follow on operations. To set favorable conditions
for success during forcible entry, commanders and staffs must—
(cid:122) Visualize the entry location and understand the impact of other domains on forcible entry
operations.
(cid:122) Control air and maritime areas to protect the force and preserve lines of communications leading
up to and during the entry.
(cid:122) Disrupt enemy influence during entry.
(cid:122) Isolate the lodgment from reinforcement by enemy forces.
(cid:122) Maintain access to the lodgment throughout the duration of operations to build and sustain combat
power.
(cid:122) Manage the lodgment to integrate other supporting operations.
(cid:122) Seize and maintain the initiative to achieve surprise throughout the entry operations.
7-56. The JFC decides whether to conduct the forcible entry as a concurrent or integrated operation.
Concurrent forcible entry operations occur when a combination of amphibious assault, airborne, air, or
ground assault forcible entry operations are conducted simultaneously, but as distinct operations with
separate AOs and objectives. Integrated forcible entry operations occur when amphibious assault, airborne
assault, air assault, and ground forcible entries are conducted simultaneously within the same AO against |
3-0 | 192 | Chapter 7
mutually supporting objectives. Large island land masses would likely involve integrated forcible entry
involving U.S. Marines and potentially allied or partner forces. Smaller archipelagic island chains could
require concurrent forcible entries that enable security operations or subsequent main and supporting efforts
against larger objectives.
7-57. Forcible entry operations by ground, sea, or air all use the same phasing model to facilitate coordination
and synchronization. These phases are preparation and deployment, assault, stabilization of the lodgment,
introduction of follow-on forces, and termination or transition operations. Planning for forcible entry also
includes planning for—
(cid:122) Movement planning over extended lines of communications over water.
(cid:122) Information collection against an enemy with layered and integrated early warning.
(cid:122) Management of transitions when lines of communications and networks are extended over water.
(cid:122) Insertion of special operations forces.
(cid:122) Ensuring air superiority over the joint landing area.
(cid:122) Coordination for initial and reinforcing entry forces for the initial assault and main assault.
(cid:122) Establishment and operation of any potential intermediate staging bases.
(cid:122) Lodgment security, organization, and expansion from shore to an island interior.
(See JP 3-18 for more detailed discussion and information about Army forces roles, responsibilities, and
planning considerations for joint forcible entry operations.)
AMPHIBIOUS OPERATIONS
7-58. Planning for an amphibious operation is continuous, and it requires collaborative, parallel, and detailed
planning by all participating forces. The organization of any amphibious operation should be sufficiently
flexible to meet the planned objectives in each phase of the operation and account for unforeseen
developments. Sound planning provides for unity of effort through unity of command, centralized planning
and direction, and decentralized execution. JFCs may decide to establish a functional component command
to integrate planning and reduce JFC span of control. This improves the efficiency of information flow,
weapons systems management, component interaction, unity of effort, or control over the scheme of
maneuver. Regardless of approach, the JFC designates command relationships for the commanders of the
amphibious task force and landing forces. The designation of the supported and supporting role of the
amphibious force commanders is important, as it establishes main and supporting efforts and prioritizes
resources.
7-59. Opposed landings in a maritime environment are one of the most difficult and dangerous military
operations, so achieving the element of surprise should be pursued by all available means. Overt activities
that threaten the element of surprise should be kept to a minimum and conducted as close as practical to the
arrival of joint fire support assets in the JOA. Deception operations may facilitate surprise if they portray a
course of action the enemy expects or a timeline for execution different than planned. Deception operations
are a necessity during assault breaching of a defended beachhead. Large lane sizes demand large numbers of
weapons and multiple aircraft passes to clear zones prior to the assault. This may draw immediate attention
to the landing force unless alternate lanes are brought under fire as well
7-60. The landing force typically consists of maneuver, protection, and tactical echelon sustainment forces.
The JFC designates the landing forces commander. If Army forces are part of the landing force, they must
be task-organized with appropriate combat and sustainment capabilities to support the landing force. Army
forces also provide intra-theater ship-to-shore transport, including landing craft, cargo handling, logistics,
traffic control, and engineering capabilities.
Note. If the JFC organizes planning along functional lines, functional component commanders
normally exercise OPCON over their parent Services’ forces and tactical control (TACON) over
other Services’ forces attached or made available for tasking.
7-61. Setting conditions prior to the execution of any amphibious operation is critical. Enabling operations
that set conditions include supporting and pre-landing operations. These require detailed integration at all |
3-0 | 193 | Army Operations in Maritime Environments
echelons and highly synchronized employment of Army and joint capabilities that can reinforce success and
ensure landing force survivability under conditions where reinforcement or support may not be readily
available. Planning for forcible entry also includes planning for—
(cid:122) Force concealment as part of a larger joint military deception operation.
(cid:122) Maritime clearance of mines in the vicinity of transportation lanes, landing beaches, and shore-
based sustainment nodes.
(cid:122) Maritime and hydrographic reconnaissance for landing beaches and sea approach lanes.
(cid:122) Accurate prediction of weather and tidal conditions.
(cid:122) Seabasing of supporting aviation resources, such as aeromedical evacuation or attack aviation.
(cid:122) Assault breaching and beach clearance of anti-landing obstacles, which may include mines.
(cid:122) Status of civil and local national inhabited areas, to both conceal landing forces and prevent
civilian casualties.
7-62. Pre-landing operations take place between the commencement of the action phase (arrival of the
amphibious force into the operational area) and the ship-to-shore movement. There is rarely a clear transition
between support and pre-landing operations, and this must be planned for and clearly communicated across
echelons prior to execution. Some planning considerations during this phase include—
(cid:122) Obstacle clearance (including perimeter and main barrier minefields and the engineer and beach
barriers that canalize landing forces) and marking usable sea and shore channels for follow-on
forces.
(cid:122) Integration of naval fire support.
(cid:122) Integration of air support, including electromagnetic warfare and airspace between the landing
force and amphibious task force.
(cid:122) Clearance of fires on landing areas.
(cid:122) Ammunition and fuel expenditure prior to landing.
(cid:122) Loss and recovery of equipment prior to landing.
(cid:122) Loss of personnel and recovery of casualties prior to landing.
(cid:122) Resupply and rearming schedule for amphibious and landing forces.
(cid:122) Landing force requirements to support other forces prior to and after the landing assault.
(cid:122) Organization and location of reserve in a similar manner as the assault force.
7-63. During an amphibious operation, a subsidiary landing outside the designated landing area is normally
conducted by elements of the amphibious task force to support the main landing. Subsidiary landings should
be planned and executed by commanders with the same precision as the main landing. Amphibious
re-embarkation for follow-on operations may require additional support from specialized units or other
Service forces and additional logistics support to replace lost or damaged equipment and depleted supplies.
For tactical echelons, combat rubber raiding craft can provide flexibility to amphibious operations, including
movement to reconnaissance objectives and subsidiary landings sites, movement of forces inland from a
coast along waterways, or recovery of casualties to support vessels. Additionally, Army planning must
account for casualties and the continued medical treatment of patients, potential for CBRN decontamination,
requirement to transport remains or provide mortuary services, transportation and transfer of enemy
detainees, and logistics to support basic sustenance ashore. (See JP 3-02 for more information about the
fundamentals of planning and executing joint amphibious operations. See MCTP 13-10M for more detailed
information and considerations on amphibious embarkation. See ATP 3-17.2 for tactical considerations on
movement from ship to shore and the C2 of shore and beach parties.)
SUSTAIN LARGE-SCALE COMBAT OPERATIONS IN MARITIME
ENVIRONMENTS
7-64. Setting and sustaining a maritime theater includes RSOI of personnel and equipment and the protection
of forward-positioned forces critical to the security of key strategic assets, such as theater AMD, airfields,
ports, and sea lanes. Army watercraft are essential to sustainment in maritime environments as they are
designed to perform missions specifically related to intratheater movement of combat power and sustainment. |
3-0 | 194 | Chapter 7
While capable of deploying over strategic distances, Army watercraft are not strategic lift platforms, but they
are a critical link between strategic lift and land-oriented tactical movements. Army and Navy engineering
assets are critical to the establishment and maintenance of port facilities.
ESTABLISH PROTECTED RECEPTION, STAGING, ONWARD MOVEMENT, AND INTEGRATION
7-65. During armed conflict in a maritime operational environment, theater opening and RSOI vary to meet
mission requirements of the JFC. The theater engineer command is responsible for developing and
maintaining the necessary infrastructure (including ports and roadways) that support RSOI and follow-on
operations. Multiple islands requiring multiple ports will increase the demand for specialized engineer and
sustainment formations to construct, develop, maintain, and operate them.
7-66. Rather than gaining efficiencies from a consolidated location, the theater army may be required to
support multiple JSAs and RSOI sites. Using multiple RSOI locations increases the overall signal,
sustainment, protection, and maneuver requirements for the theater. An often-overlooked component of
RSOI is the mandatory combat training that needs to be conducted. TSC personnel do not conduct this
training; a maneuver force must provide the personnel. More RSOI locations require more trainers.
7-67. Multiple JSAs and JOAs will likely require the theater army to request additional signal assets to
support the theater signal brigade as they develop the necessary C2 architecture to support operations. Both
the strategic signal brigade and the tactical signal brigade will require significant augmentation to support
the theater and JOA communications network. Army forces maintain coastal, harbor, and inland waterway
defense while accounting for extended deployment times. Critical protection, firepower, and mobility assets
may also be disbursed across numerous islands in the AOR and in the JOA, requiring detailed coordination
and reconfiguration of loads prior to embarkation.
Note. Given the varying nature of islands and maritime environments where Army forces may
operate, there are many scenarios where RSOI take place outside the JOA, and onward movement
for Army forces may occur just prior to the execution of a forcible entry operation to an island.
This may also change from island to island, depending on the enemy situation.
7-68. In a maritime environment, reception, staging, and integration activities may need to occur prior to
onward movement into a JOA. The process of securing and uploading unit basic loads, addressing life support
for personnel, or reconfiguring underway must occur prior to debarking directly into combat. Units that
require extensive support for staging, including maintenance or cross-loading of supplies critical to
survivability (Class IV and Class V items), may require an intermediate staging base outside the JOA before
continuing on to their debarkation point. Additionally, units may execute onward movement out of sequence
from reception, staging, and integration. Units may need to conduct integration during embarkation or during
a reconfiguration at an intermediate base outside the JOA.
7-69. RSOI may occur from sea bases. Seabasing is the deployment, assembly, command, projection,
sustainment, reconstitution, and reemployment of joint power from the sea without reliance on land bases
within the operational area (JP 3-02). Seabasing provides Army forces with the ability to conduct certain
functions and tasks at sea without dependence on infrastructure ashore, and it minimizes the need for
stockpiles ashore while positioning joint forces for immediate employment. Seabasing requires detailed
collaborative planning between joint forces, but it can provide a secure base of operations with C2 capability,
and it minimizes the requirements ashore for an initial port and airfield to support missions. (See JP 3-02 for
more information on considerations for planning and executing staging operations from sea bases.)
CONDUCT THEATER SUSTAINMENT OPERATIONS
7-70. Theater sustainment in a maritime environment is a highly collaborative process. When directed to
provide management of common sustainment functions that include other Services, the TSC leads the joint
sustainment planning board. Army forces provide theater and port opening functions for joint forces to
maintain strategic and operational reach. Theater sustainment plans must account for—
(cid:122) Maritime movement of Army pre-positioned stocks (APS).
(cid:122) Joint logistics over-the-shore (JLOTS). |
3-0 | 195 | Army Operations in Maritime Environments
(cid:122) Intertheater transportation by joint assets.
(cid:122) Intratheater transportation for personnel during and after RSOI.
(cid:122) Classes of supply and access to field services.
(cid:122) Field and sustainment maintenance in remote locations.
(cid:122) Distribution.
(cid:122) Operational contract support.
(cid:122) General engineering (ports and airfields).
(cid:122) Sustaining and mitigating impact of limited island infrastructure.
(cid:122) Mortuary affairs.
7-71. Bringing APS ashore requires detailed planning as part of the movement control and sustainment
planning boards at the TSC and Army field support battalions. APS are positioned strategically, and they are
not designated to any specific unit. Floating stocks may be discharged in support of armed conflict and require
detailed early planning. In a maritime environment, the sustainment demands and maintenance footprint for
an APS download operation may quickly exceed the capabilities of a small island port. The APS download
has significant considerations for suitable, deep draft port facilities and infrastructure, support equipment,
host-nation and coalition approval for port access, maintenance personal, and detailed force protection and
security plans. The demand for maintenance and support personnel and security forces is significant, and it
requires additional sustainment planning. APS download operations typically require a TSC or division-level
C2 node and additional protection assets to mitigate their vulnerability to enemy attacks. (See ATP 3-35.1
for more information on planning for APS stocks in combat operations.)
7-72. JLOTS is a key enabler to combat operations in maritime environments. It is typically coordinated and
controlled by the TSC. JLOTS allows heavy forces to be moved from ship to shore when there are no modern
deep-water ports available, such as on various smaller atolls or when ports are not available due to combat
damage or volume of shipping. The strategic flexibility provided by JLOTS requires detailed coordination
and frequent training as a Navy and Army warfighting skill set before conflict occurs. This family of systems
includes vulnerable assets that facilitate the ship-to-shore movement of necessary supplies and the
administration of personnel supporting JLOTS. The offshore petroleum distribution system, elevated
causeway system, pier systems, roll on/roll off discharge facilities, and the administration architecture
associated with JLOTS employment are highly vulnerable, lack protection or early warning systems, and are
unable to quickly displace in the event of enemy attack. If a JFC is considering using a JLOTS, the command
should take measures to reduce its vulnerability. (See JP 4-01.6 for more detailed information about JLOTS.)
7-73. Because of the constraints imposed on ground movement in maritime operational environments, it is
critical that the TSC integrates into the JFC’s transportation board and working groups to prioritize and
execute transportation operations during armed conflict. This board and working group direct the planning
and coordination of modal operations, intermodal operations, movement control, and theater distribution.
Surface transportation normally requires a pre-planned transition from watercraft to motor transport at the
shoreline for the movement of supplies and personnel in-shore. Naval forces provide essential causeway,
sealift, and logistics over-the-shore support to land forces when ports may be austere, damaged, or non-
existent. Naval forces may be responsible for downloading supplies from vessels and delivering them to port
operations for release to Army forces. Commanders may task Army forces to assist with downloading and
uploading equipment and supplies from ships and boats. Naval construction capabilities provide port
construction such as warehouses, storage facilities and explosive ordnance disposal to locate and dispose of
mines along ports and channels.
7-74. Army watercraft provide additional sealift and sustainment capabilities to the JFC and JFLCC as part
of inter-island transportation support. Given the limited availability of these critical assets, most of which are
highly vulnerable to attack from enemy antiship systems, some Army equipment and forces may be
prioritized lower than other Service equipment and forces for transportation into and around the AOR. Army
watercraft operations depend on host-nation access and infrastructure improvement to enable both maneuver
forces and follow-on sustainment. Army units assigned to maritime environments with organic tactical
combat rubber raiding craft can also provide a tactical means of intra-island and possibly inter-island
resupply. This can reduce the burden for operational assets, providing increased access to restrictive littoral
terrain, a reduced signature for targeting, and flexibility to operational and tactical commanders. (See |
3-0 | 196 | Chapter 7
FM 4-01 for more information about Army transportation planning, command relationships, and overall
capabilities to the joint force. See ATP 4-15 for more a more detailed discussion about the techniques of
planning for and employing Army watercraft.)
7-75. Commercial shipping organizations may provide movement assets, but they require increased planning
and support due to a lack of organic protection systems. The theater army’s contribution to transportation
during combat operations in a maritime environment may be to protect lighterage operations. Lighterage is
the process in which small craft are used to transport cargo or personnel from ship-to-shore using amphibians,
landing craft, discharge lighters, causeways, and barges (JP 4-01.6). It can also transfer equipment and
personnel between ships or for intratheater transport. Lighterage includes landing craft and modular
causeway systems, such as ferries. To facilitate port operations at joint intermediate staging bases, Army
forces provide and operate float utility watercraft, such as harbor and ocean-going tugs, pusher tugs, floating
cranes, barges, floating causeways, and roll-on/roll-off discharge facilities. Once sustainment assets are
positioned to support specific tactical operations, it is difficult and time consuming to reposition them when
priorities shift.
7-76. For inter-theater and intra-theater air transportation operations by fixed-wing assets, the TSC is
responsible for consolidating, prioritizing, and processing aerial resupply requests. A division or corps
aviation officer determines consolidation and synchronization of rotary-wing movement based on the
commander’s priorities. Intra-theater rotary-wing movement in a JOA requires aircrews trained and equipped
for deck landing and overwater flight operations.
7-77. Army forces provide operational medical support to the joint force. Although military medical forces
are afforded protection under the law of armed conflict from being directly targeted, the geographic
constraints associated with providing medical support to forces on islands, in likely proximity to combatant
forces or key terrain, coupled with the effects of long-range fires, increases risks to medical forces and
facilities. Hardening of medical care facilities in exposed locations, like on small or remote islands, is crucial
to maintaining hospital survival. Additionally, threats from nonstate actors upon medical facilities and
capabilities may require increased protection measures. Units may need to rely on ship-based medical
facilities during initial operations, which requires joint planning and coordination. Higher-level care facilities
also place an increased demand on certain classes of supply, which may be difficult to transport, have special
storage requirements (for example, refrigeration), and be difficult to off-load in remote island locations. (See
FM 4-0 for more information on the Army's operational medical support to the joint force.)
7-78. The lethality of large-scale combat operations can devastate both the social fabric and the economic
viability of small islands where construction assets may be limited even before conflict occurs. Early
establishment of base security and maintaining viable governance may largely depend on the repair of critical
port and airfield infrastructure. A JTF commander may use either operational contract support or request
military engineers to repair facilities during combat operations (or improve their survivability prior to combat
operations).
7-79. In the Arctic, base infrastructure materials across the region need to have high thermal efficiency,
long-term durability, tolerance to repeated freeze and thaw cycles, and resistance to permafrost degradation.
Infrastructure in many austere locations has already deteriorated due to extreme environmental factors. It can
also complicate force sustainment operations as roadways, seaports, and airfields are potentially rendered
inoperable by ice, snow, seasonal thaws, and freeze cycles. Class IV construction material resupply for arctic
use may have long lead times. Therefore, infrastructure to be used by military units deployed to arctic areas
should be inspected as soon as possible to identify deterioration and inadequate systems. |
3-0 | 197 | Chapter 8
Leadership During Operations
Success ultimately rests on small things, lots of small things. Leaders have to have a feel
for small things – a feel for what is going on in the depths of an organization where small
things reside.
General Colin Powell
This chapter describes basic doctrine for combat leadership. It begins with a discussion
of the art of command, and it describes the impact of a commander’s competence,
presence, decision making during operations, and risk acceptance. It then describes the
role of commanders in driving the operations process. The chapter concludes with a
discussion on how leaders adapt their formations for missions while developing junior
leaders and teams.
THE ART OF COMMAND AND THE COMMANDER
8-1. The commander’s chief responsibilities during operations are to develop effective tactics and to lead
and direct the unit in executing them. Soldiers want and willingly follow leaders who win. The most important
quality for commanders or other leaders, however, is competence. Good leaders understand tactics, the
abilities of their own and enemy units, what is possible in any situation. Combined arms competence is the
combat commander’s greatest contribution to winning. Effective commanders lead and inspire their
subordinates to fight and win based upon that competence, while ensuring unity of purpose and unity of
effort. They do this through a combination of processes, the staffs and subordinate leaders they empower,
and their personal example and influence. While the commander is the primary leader of a formation, all
leaders play an important role in carrying out their higher echelon commander’s intent as they provide
command and control (C2) to their own subordinates during operations.
8-2. Commanders and their subordinate leaders determine success or failure through the decisions they
make, the examples they set, the actions they inspire, and their will to win. The commander is the focal point
for the employment of staff processes that inform the judgment critical for rapid, effective decision making.
Commanders must possess the confidence and skill to rapidly make difficult decisions, accepting risk to
create and exploit fleeting opportunities. They conceive and implement sound operational and tactical
solutions with the speed and force necessary to win. They also seek staff officers and subordinates who are
proficient at their specialties and use them to make the unit tactically effective.
8-3. Commanders have a moral responsibility to ensure their units are prepared for combat. They prepare
them through realistic training that reinforces individual and small-unit task and battle drill proficiency,
collective proficiency in the execution of mission essential tasks under the most demanding conditions, and
the development of staffs able to integrate the warfighting functions and joint capabilities in combined arms
approaches against enemy forces. Commanders resource training and protect subordinates’ training time.
They establish the command climate within their unit, direct staff and subordinates during operations, and
continually assess all aspects of their performance. They build trust, develop their subordinates’ competence
and confidence, encourage subordinate commanders to think critically, and demand that they demonstrate
initiative within the commander’s intent. Lastly, they prepare subordinates to assume responsibility one and
two echelons above their current assignment so that they can effectively assume control of the larger
formation when required to because of casualties or lost communications.
8-4. Commanders make decisions informed by judgment grounded in their experience, expertise, intuition,
and self-awareness. Judgment is the single most important leadership attribute applicable to selecting the
critical time and place to act, assigning missions, prioritizing, managing risk, and allocating resources. |
3-0 | 198 | Chapter 8
Thorough knowledge of military science, a strong ethical sense, and an understanding of enemy and friendly
capabilities across domains form the basis of the judgment required of commanders. Judgment becomes more
refined as commanders become more experienced, and good judgment becomes even more essential in
ambiguous or uncertain operational environments. Self-awareness and experience help commanders become
more expert about assessing situations and receiving assistance from their staffs. Self-awareness is required
to assess one’s self and to earn the trust of those one commands. Judgment allows commanders to distinguish
between risk acceptance essential to successful operations and potentially disastrous rashness. The
commander’s judgment and experience help shape information requirements and staff priorities during
operations. Subordinate commanders and staffs collaborate to provide the most relevant information in the
most effective format for the commander to make sound decisions.
APPLYING THE ART OF COMMAND
8-5. Command is more art than science because it requires commanders exercise their judgment, leverage
their experience, and use their intuition when leading their units. Commanders apply the art of command by
providing leadership, delegating authority, allocating resources, and making decisions. Subordinates
operating within the commander’s intent facilitate unity of effort to create and exploit relative advantages.
Higher echelon leaders provide subordinate echelons access to information and the authority to use Army
and joint multidomain capabilities through delegation. Leaders delegate appropriate authority to subordinates
based on an assessment of their competence, talents, and experience.
COMMANDER PRESENCE ON THE BATTLEFIELD
One of the most valuable qualities of a commander is a flair for putting himself in the right
place at the right time.
Field Marshal Sir William Slim
8-6. Commanders provide leadership in combat to inspire their Soldiers, especially in challenging
situations. Command presence is the influence commanders have on those around them, through their
physical presence, communications, demeanor, and personal example. Commanders establish command
presence through personal interaction with subordinates, either physically or virtually through C2 systems,
and demonstrating their character, competence, dignity, strength of conviction, and empathy prior to and
throughout operations.
8-7. Commanders go where they can best influence operations, assess units, and improve unity of effort.
Where commanders place themselves on the battlefield is one of the most important decisions they can make.
Commanding forward allows commanders to effectively assess and manage the effects of operations on their
formations through face-to-face interactions. It allows them to gather information about actual combat
conditions, but it must be balanced against the requirement to be where the best overall situational awareness
can be maintained for the entire formation. As far as operational conditions allow, leadership should be
exercised up front at critical times and places without interfering with subordinate leader prerogatives,
becoming unreachable by other elements of the unit, or making it simpler for the enemy to target multiple
echelons of leadership in one place.
8-8. At the battalion level and below, commanders lead by personal example, acquire much information
themselves, and communicate face to face with those they direct. Typically, they position themselves well
forward to influence the main effort during different phases of an operation. However, even at these levels,
commanders cannot provide direct leadership for their whole unit given the challenges of maintaining
continuous communications when units are dispersed or in contested electromagnetic environments.
8-9. At higher levels, echeloned command posts are central to effective C2. During operations, commanders
must assess the situation up front as often as possible without being disruptive to the focus of subordinate
commanders. They deliberately plan and organize their C2 approach to mitigate their loss of broad situational
understanding during battlefield circulation by the development of subordinate commanders, and staff
officers empowered to make decisions on the commander’s behalf to exploit opportunities and respond to
changing circumstances without needing to ask permission. |
3-0 | 199 | Leadership During Operations
8-10. Commanders convey importance and focus the efforts of the command by how they communicate,
regardless of where they are physically located. A calm and authoritative tone of voice generates a sense of
presence, as does a crisp and efficient manner of providing guidance; both require practice to master. No
matter their location, effective commanders encourage their troops, sense their morale, and inspire through
personal example. Commanders balance the risk of commanding forward with necessity to build trust by
depending upon subordinates to accurately report and demonstrate initiative in their portion of an area of
operations (AO). Lieutenant General Eichelberger’s actions to identify and address problems faced by the
32d Infantry Division in Buna in 1942 provide an effective example of commanding forward.
Commanding Forward—LTG Eichelberger at Buna
In autumn 1942, U.S. forces were attempting to establish positions from which to drive
the Japanese from New Guinea and the adjacent islands. The 32d Infantry Division
was to eliminate Japanese positions near the village of Buna. By the end of November,
however, the division had made little progress, and General Douglas MacArthur sent
Lieutenant General Robert Eichelberger, I Corps commander, there to correct the
situation. Eichelberger’s instructions were to “remove all officers who won’t fight [and]...
if necessary, put sergeants in charge of battalions and corporals in charge of
companies.”
Eichelberger and his staff arrived on 2 December and were disturbed by what they
observed: Soldiers were suffering from a number of tropical diseases. Rations were
scant. There was little discipline or military courtesy. Morale was low. Organization was
very poor. Only a few Soldiers were at the front line; many were in the rear areas, sent
there initially to recover from illness or injury, but now under no one’s effective control.
Fearing the jungle, Soldiers were afraid to patrol and, consequently, did not know the
location of Japanese positions. Leadership at all levels was ineffective.
Eichelberger moved quickly to address these problems. He had supplies flown in and
distributed so that Soldiers became better fed, clothed, and medically treated. He
stopped offensive operations for two days to reestablish effective C2. Patrols were sent
out nightly, and Japanese positions identified. Several commanders, including the
division commander, were replaced with officers who could instill a more disciplined
and aggressive attitude. Eichelberger was frequently near the front, wearing his rank
openly to show his Soldiers their commander was present. In addition to demonstrating
to his men that he was willing to share the same risks, Eichelberger was able to
observe battlefield conditions personally, leading to better commander’s visualization.
By 3 January 1943, after a series of resolute—albeit costly—attacks, the 32d Infantry
Division had overcome organized resistance at Buna. Eichelberger’s actions reversed
the tide of battle in the theater. From a collection of demoralized units, he created a
fighting force that stopped the Japanese advance.
8-11. Physical presence allows commanders to gain firsthand appreciation for the situation that they can
rarely gain any other way. Face-to-face discussions in their own or subordinate command posts and forward
presence allow commanders to see things that may not be conveyed by C2 systems. Forward presence
demonstrates a willingness to share danger and hardship, and it provides an opportunity to motivate
subordinates. Commanders should avoid putting their subordinates at additional risk when they are forward,
however, since the enemy is likely to quickly target senior commanders when their location becomes obvious.
The same consideration applies to their own command posts, which should disperse their footprint and
reposition often enough to complicate enemy targeting. The following factors, common to all levels of
command, may influence where commanders position themselves:
(cid:122) The need to understand the situation.
(cid:122) The need to make decisions. |
3-0 | 200 | Chapter 8
(cid:122) The need to communicate.
(cid:122) The need to motivate subordinates.
8-12. Commanders delegate authorities to subordinate leaders for the conduct of operations based upon their
judgment of their capabilities. This allows the commander to be elsewhere, potentially in a location that
permits broader perspective and understanding. It also enables faster decision making in contested
environments than if both leaders were in the same location, and it prevents the need for continuous
communication. Continuous communication allows enemy forces to detect and target commanders,
subordinates, and command posts. It should be avoided whenever possible. Exercising a mission command
approach to C2 and delegating the broadest possible authorities to subordinate leaders empowers them to
exploit opportunities and conduct more effective distributed operations.
COMMANDER’S INTENT
8-13. The commander’s intent is a clear and concise expression of the purpose of an operation and the desired
objectives and military end state (JP 3-0). The commander’s intent succinctly describes what constitutes
success for the operation. It facilitates unity of effort as it allows subordinates to understand what is expected
of them, what constraints apply, and most importantly, why the mission is being conducted. Understanding
why a mission is conducted is important both in maintaining unity of effort and in bolstering the morale and
will of subordinates. Soldiers who understand why they are called upon for a specific mission, and how that
mission aligns with the higher echelon commander’s intent and concept of operations, are more committed
to the success of that specific mission.
8-14. Commanders communicate their intent two echelons down to ensure subordinates understand the
boundaries within which they may exercise initiative while maintaining unity of effort. They likewise
understand the commander’s intent two echelons above them. A clear and concise commander’s intent should
be easily remembered and understood even without an order. Commanders collaborate with subordinates to
ensure their commander’s intent is understood. Soldiers who understand the commander’s intent are more
able to exercise disciplined initiative in unexpected situations than those who do not.
INITIATIVE
The fog of war works both ways. The enemy is as much in the dark as you are. BE BOLD!
General George S. Patton
8-15. Leaders at every echelon exercise initiative as they follow orders and adhere to a course of action or
scheme of maneuver. When the enemy does something unexpected, or a new threat or opportunity emerges
that offers a greater chance of success, subordinate leaders take action to adjust to the new situation and
achieve their commander’s intent. Disciplined initiative requires a bias towards action rather than waiting on
new orders. The mission command approach to C2 demands subordinates exercise initiative in the absence
of orders, when current orders no longer apply, or when an opportunity or new threat presents itself. The
cumulative effect of multiple subordinate commanders, leaders, and individual Soldiers exercising initiative
produces agility in Army formations. It enables Army forces to seize the operational initiative as they pose
multiple dilemmas on the enemy.
8-16. Commanders and subordinate leaders develop subordinates capable of exercising effective initiative
during both training events and operations. Leaders create opportunities during training events in which
subordinates must take action on their own. Commanders must foster a climate that encourages initiative
during training, before the unit is committed to combat. Accepting risk and underwriting good faith mistakes
establishes a unit culture that allows subordinates to learn and gain the experience they need to operate under
their own responsibility. Endurance requires that the burdens of combat leadership be shared between leaders
at each echelon, which is not possible without a leadership culture that demands disciplined initiative.
DISCIPLINE
8-17. Discipline underpins the effective application of initiative during operations. For many parts of an
operation, the benefits of exercising disciplined initiative outweigh the cost in synchronization. At other
times, when synchronization or a specific process is critical to successful execution, ill-advised initiative can |
3-0 | 201 | Leadership During Operations
be costly. Neither commanders nor subordinates are independent actors when exercising initiative.
Subordinates consider at least two factors when deciding how to exercise initiative, assessing each in terms
of the circumstances affecting it:
(cid:122) Whether the benefits of the action outweigh the risk of desynchronizing the overall operation.
(cid:122) Whether the action will further attainment of the desired end state.
(See ADP 6-0 for more information on disciplined initiative.)
ACCEPTING RISK TO CREATE AND EXPLOIT OPPORTUNITIES
8-18. Risk, uncertainty, and chance are inherent to all military operations. The pace and tempo of large-scale
combat operations demands a high level of expertise for commanders and staffs. Commanders delegate risk
acceptance to subordinates through their commander’s intent and other guidance. Based on this guidance,
refined as necessary by the commander and staff as the situation changes, leaders accept risk during
operations by massing effects in one area while taking economy of force measures in other areas to create
opportunities that can be exploited. Understanding how much or what kind of risk to accept requires the
ability to accurately see friendly and enemy forces and an operational environment in the context of a
particular situation. Leaders and staff officers who are competent in all aspects of their specialties assist the
commander in weighing the risk of various decisions and courses of action, balancing short-term versus long-
term risk to the mission and the force. This analysis, coupled with imagination and the courage to act boldly,
provides opportunities that outweigh the risk incurred. Successful commanders are aware of the effects of
cumulative risk over time, and therefore they continuously assess it throughout an operation.
8-19. Opportunities to exploit a relative advantage are fleeting during large-scale combat operations against
a capable enemy that adapts quickly. Delaying action while setting optimal conditions, waiting for perfect
intelligence, or achieving greater synchronization may end up posing a greater danger than swift acceptance
of significant risk now. Leaders’ judgment of risk must be thoroughly informed by their understanding of
their operational environment, particularly how actions in other domains impact their forces and how their
forces can generate effects outside the land domain. Leaders maintain a common operational picture with
their counterparts in higher and lower echelons, since any risk accepted at one echelon may impose additional
risk at other echelons. (See paragraphs 8-47 and 8-48 for further discussion on communicating with
subordinates.)
8-20. Contingency planning enables commanders to swiftly decide and act when the unexpected occurs. By
considering multiple enemy courses of action, available friendly capabilities, and developing appropriate
branch and sequel plans, the staff and the commander develop a deeper appreciation for how an operation
could unfold and build flexibility into their plans. Contingency planning also guards against confirmation
bias, where situational cues are interpreted in ways that match preconceived ideas. Effective planning
expands understanding of a situation and operational environment, allowing the commander and staff to be
better postured to rapidly decide, adjust, or simply be proactive.
8-21. Commanders designate commander’s critical information requirements (CCIRs) linked to decision
points during operations and the execution of branch and sequel plans developed during contingency
planning. CCIRs help subordinate leaders prioritize allocation of information collection assets and other
limited resources, including time. Detailed contingency planning and the development of CCIRs ensure that
commanders and staffs are proactive rather than reactive in responding to enemy activity. CCIRs potentially
become irrelevant as the situation changes; therefore, commanders, staffs, and other leaders must regularly
review and update CCIRs to ensure relevance throughout the conduct of operations. This is a forcing function
for questioning earlier assumptions made during planning that may no longer be valid. (See ADP 2-0 and
ADP 6-0 for more detailed descriptions of what constitutes CCIR.)
8-22. Commanders and staffs remain alert to exceptional information during operations. Exceptional
information results from an unexpected event or opportunity, or a new threat, which directly affects the
success of operations. It would have been a CCIR if it had been foreseen. Identifying exceptional information
requires initiative from subordinates, shared understanding of the situation, a thorough understanding of the
commander’s intent, and the exercise of judgement based on experience. |
3-0 | 202 | Chapter 8
COMMAND AND CONTROL DURING DEGRADED OR DENIED COMMUNICATIONS
8-23. U.S. adversaries, including Russia and China, have demonstrated the ability to contest communications
in the electromagnetic spectrum and degrade friendly C2. Degraded connectivity to a secure communications
network poses risks to situational understanding, C2, and ultimately mission accomplishment. Army forces
must be prepared to continue operations and achieve mission objectives when out of contact with higher
echelons or adjacent units. They should assume intermittent rather than continuous connectivity during the
course of operations. A mission command approach to C2 empowers subordinate leaders to act within the
commander’s intent with degraded communications, reporting their new situation when able to do so.
8-24. Exercising C2 with degraded connectivity does not begin when communications break down or when
a crisis develops. It must be trained and rehearsed as part of an overall cultural norm designed to make
friendly forces more difficult to detect. Commanders ensure that staffs are trained on analog and manual C2,
and that units have rehearsed reliable primary, alternate, contingency, and emergency communications plans.
During extended periods of communication breakdown, C2 becomes more difficult as shared understanding
of a situation deteriorates over time. To maintain C2 with degraded communication, personnel should be
trained and proficient in—
(cid:122) Employing all available C2 systems.
(cid:122) Operating dispersed command posts.
(cid:122) Maintaining an other-than-digital common operational picture (COP).
(cid:122) Managing information with analog processes.
(cid:122) Monitoring communications channels and crosstalk across echelons.
(cid:122) Maintaining manual running staff estimates.
(cid:122) Conducting command post battle drills.
8-25. Army forces improve readiness for degraded communications by decreasing vulnerabilities and
preparing appropriately. Units decrease their vulnerability through electromagnetic protection, including
emission control, electromagnetic masking, electromagnetic hardening, and electromagnetic security. (See
FM 3-12 for more information on electromagnetic protection.) Units practice degraded communications
during training and rehearsals, including those that involve allies, and they use the mission command
approach to C2 during garrison events. Ultimately, the solution to degraded communications is mission
command and training. Even under severely degraded conditions, Army forces continue to make decisions
and act in the absence of orders, when existing orders no longer fit the situation, or when unforeseen
opportunities arise.
8-26. All leaders must be prepared to take action and make timely decisions when communication is not
possible. The commander responsible for a decision may not be available to make that decision for a variety
of reasons, such as jammed communications, the loss of a command post, or being killed by the enemy. In
all cases, the senior leader able to communicate must be ready to take charge and make the best decisions
possible based on available information so operations can continue. The actions of Navy pilots in a degraded
communications environment during the battle of Midway demonstrated the effectiveness of exercising
disciplined initiative. |
3-0 | 203 | Leadership During Operations
Initiative in the Absence of Orders – Naval Bombers at Midway
On 4 June 1942, American naval aviators, acting on initiative and without
communications from higher echelon headquarters, struck a major blow in the Pacific
War at the Battle of Midway. The Japanese First Air Fleet, known as Kido Butai,
launched a massive raid against Midway Island, causing significant damage. The
American carriers Hornet, Enterprise, and Yorktown launched unsynchronized strikes
against Kido Butai by several different air groups. Once aloft these carrier groups were
soon beyond radio range of their ships and had to rely on prior intelligence, intuition,
and luck to find the enemy.
Lieutenant Commander John Waldron, commander of Torpedo 8 (Hornet), believed
his air group commander was leading the group on an incorrect heading. He broke
formation and led his squadron on another course. They found Kido Butai and
attacked, but the entire squadron was shot down because it had no fighter cover. The
torpedo bombers of Torpedo 6 (Enterprise) followed Waldron’s squadron and also
suffered heavy losses without scoring a hit. The dive bombers of Bombing 6
(Enterprise) and Scouting 6 (Enterprise) had launched earlier in the day and arrived at
their designated coordinates without finding the enemy. Lieutenant Commander
Clarence McClusky, commander of Bombing 6, could not radio back to the Enterprise
for further orders. Exercising disciplined initiative, he began to search the area despite
running low on fuel and found a Japanese destroyer, which he followed to Kido Butai
just as Japanese fighters completed the destruction of Torpedo 8 and Torpedo 6. The
Japanese fighters and anti-aircraft guns were entirely focused on the low altitude
attacks from the torpedo bombers, leaving them vulnerable to a high-altitude dive-
bombing run. McClusky ordered an attack by Bombing 6 which, by chance, occurred
at the same time as Bombing 3 (Yorktown) arrived on the scene. The resulting action
by two squadrons acting on their own initiative to carry out the mission fatally damaged
three Japanese carriers, the Kaga, Akagi, and Soryu, which sank later in the day,
putting the formerly outnumbered Americans at a 3:1 advantage in aircraft carriers.
The performance of commanders like Waldron and McClusky, out of contact with
higher commands and acting on their own initiative, led to victory at Midway.
DRIVING THE OPERATIONS PROCESS
8-27. Commanders employ the operations process to incorporate coalition and joint partners, empower
subordinate initiative, and to ensure authorities and risk acceptance are delegated to the appropriate echelon
required for the situation. Staffs and subordinate headquarters earn the commander’s trust by providing
relevant information, anticipating needs, and directing supporting actions. (See ADP 5-0 for more
information on the operations process and FM 6-0 for more on the role of commanders in operations.)
8-28. The major components of the operations process are planning, preparing, executing, and continuously
assessing the operation. Planning normally begins upon receipt of orders from a higher echelon headquarters
and continues through the execution of the operation. The commander and staff continually assess operations
and revise the plan through fragmentary orders. Commanders, assisted by their chiefs of staff or executive
officers, drive the preparation for an operation by allocating time, prioritizing resources, and supervising
preparation activities such as rehearsals to ensure their forces are ready to execute operations. During
execution, commanders and staffs focus their efforts on translating plans into direct action to achieve
objectives in accordance with higher commander’s intent. (See figure 8-1 on page 8-8 for a graphic depiction
of the operations process.) |
3-0 | 204 | Chapter 8
Figure 8-1. The operations process
UNDERSTAND
8-29. An operational environment includes portions of the land, maritime, air, space, and cyberspace
domains encompassing the area of operations and area of interest, understood through three dimensions—
human, physical, and information. Understanding how capabilities employed from each of the domains
influence outcomes in the three dimensions is foundational to success during operations. Commanders
communicate that understanding to subordinates. Commanders collaborate with their staffs, other
commanders, and mission partners to accurate frame the operational environment encompassing the mission
objectives. Commanders must be comfortable with a certain degree of uncertainty and ambiguity within an
operational environment—delaying action while seeking perfect understanding may prevent a unit from
exploiting a fleeting opportunity or make it vulnerable to enemy attack.
8-30. Commanders, supported by their operations and intelligence staff sections, direct the collection of
information and allocate capabilities from as many domains as possible. They use operational and mission
variables, intelligence preparation of the battlefield, and running estimates to help understand how
capabilities in each domain affect operations on land and vice versa. Competent commanders circulate
throughout their AORs as often as possible, collaborating with subordinate commanders and leaders while
observing the situation for themselves. Subordinates often possess a deeper or more nuanced sense of the
local situation or aspect of an operation than commanders. Direct exposure to conditions on the ground often
allows them to detect trouble or opportunity before a higher echelon staff member does. Maintaining shared
understanding is therefore a dynamic, ongoing process, since situations change as operations progress.
VISUALIZE
8-31. Commanders visualize a desired end state and potential solutions to solve or manage identified
problems. Commanders look up, out, and down as they develop their visualization of an operational
environment, relying on information and observations from superior and adjacent commanders, their staffs,
and subordinate commanders. An operational approach may require capabilities provided by external
organizations, and the effects delivered may be dependent on conditions in other domains.
DESCRIBE
8-32. Commanders describe their visualization to staffs and subordinate commanders to facilitate shared
understanding and purpose. Through collaboration and dialogue, commanders ensure subordinates
understand the visualization well enough to plan and conduct operations. Commanders continue to refine
their visualization throughout the planning and execution of an operation and balance frequent |
3-0 | 205 | Leadership During Operations
communication of this updated visualization with the need to provide sufficient time and freedom of
maneuver to subordinate leaders. Commanders’ descriptions of their visualizations should account for
interdependencies among various domains and the desired end states within those domains.
DIRECT
8-33. Commanders direct action to achieve results and lead forces to mission accomplishment. Decision
making and timely sharing of information ensures friendly forces reach a position of advantage relative to
the enemy. Commanders who are able to sense, understand, decide, act, and assess faster and more effectively
than enemy commanders can impose multiple dilemmas, requiring enemy forces to dedicate resources and
combat power which otherwise might further their objectives. Creating and maintaining this state of decision
dominance depends on the actions of the commander, informed by a knowledgeable and integrated staff.
Communications systems and other technologies can help enable decision dominance, but leaders must take
care to ensure they do not become overly reliant on technical solutions that may not always be available.
LEAD
8-34. Leadership is the most decisive element of combat power. Effective leadership can compensate for
deficiencies, while poor leadership can negate advantages. Commanders lead by personal example, the
quality of the guidance they provide throughout the operations process, and the actions they take during the
execution of operations. They focus on the decisions only they can make. Operations encompassing the
employment of capabilities from multiple domains demand rapid adjustments based on brief windows of
opportunity. Tactical patience is required to develop the conditions that create those opportunities over time.
When making or changing decisions, the commander’s will and personal presence provides the moral impetus
for necessary action in a timely manner. Friction is inherent in all military operations, and leadership exerted
by commanders and their subordinate leaders is what overcomes it.
ASSESS
8-35. Commanders, supported by their staffs, assess the situation before execution and throughout operations
to understand conditions and determine what decisions they must or are likely to make. They compare the
state of current operations to what was anticipated or planned, remain alert to variance from expectations,
and watch for information indicating an emerging threat or opportunity. Continuous assessment helps
commanders anticipate and adapt their forces to changing circumstances, enabling friendly forces to counter
unexpected threats or exploit opportunities. Effective commanders encourage cross talk and dialogue
between superior, subordinate, and adjacent staffs, and they conduct dialogue between commanders to share
observations and maintain situational understanding. They continuously review assumptions and cumulative
risk. Commanders must not be overly fixated on what is happening or may happen on the ground in the
physical dimension. Not assessing the relevant events occurring in other domains, or not considering the
information or human dimensions, increases the odds that enemy forces can achieve surprise.
ADAPTING FORMATIONS FOR MISSIONS AND TRANSITIONS
8-36. The conduct of successful operations requires leaders and units that are able to anticipate changes and
quickly adapt their formations, dispositions, or activities to meet those changes. Anticipating and adapting to
changes begins with commanders, but all leaders help create agile and adaptive units, develop subordinates,
inspire resilience in their people, and maintain mission focus in the face of adversity.
8-37. Changing conditions and transitions may impact the teamwork and cohesion of a formation; both
require adaptation and leader attention. Some examples include—
(cid:122) Task organization changes.
(cid:122) New or changing guidance.
(cid:122) Periods of intense privation and fatigue.
(cid:122) Mission transitions.
(cid:122) Mission failures or setbacks.
(cid:122) Reconstitution. |
3-0 | 206 | Chapter 8
The example of VII Corps actions during the Gulf War demonstrate how teamwork and cohesion allow units
to rapidly adapt and act when situations quickly change.
Crosstalk in the Desert—VII Corps in the Gulf War
On the morning of 17 January 1991, the day after the start of U.S. Central Command’s
major air operation against Iraq, the VII Corps commander, Lieutenant General
Frederick Franks, was with the 1st Infantry Division as it honed tank and Bradley
gunnery skills in the desert of Saudi Arabia. While there, he received a spot report from
Brigadier General John Landry, Corps Chief of Staff, over the radio: “55 Iraqi tanks
have crossed the Kuwaiti Border, heading southwest toward Hafir al-Batin and are
engaging Egyptian coalition forces in what may be the beginnings of an Iraqi
preemptive strike.”
Within seconds, Colonel Johnnie Hitt, commander of the Corps’ 11th Aviation Brigade,
entered the net indicating that he had monitored the report and alerted two Apache
battalions that could respond in 30 minutes if necessary. At the same time, Colonel
Don Holder, commander of the 2d Armored Cavalry Regiment, the Corps unit closest
to the reported enemy, called to notify Franks that he had issued orders for the entire
regiment to occupy blocking positions in the area and to make contact with the enemy
force with air and ground scouts. Those were the immediate and correct actions taken
by commanders as a result of monitoring the command network and having the
confidence to act—confidence developed through training, teamwork, and trust among
the key players of the VII Corps team.
8-38. Commanders are responsible for developing subordinate leaders and units that are capable of adapting
to the environment and the dynamic nature of operations. Training is the primary opportunity to do so, and
all leaders must work to be experts at training formations and developing subordinates during that training.
Successful adaptation and leader development depends on a command climate and learning environment that
encourages subordinates at all levels to become subject matter experts, think independently, and take the
initiative. Using a mission command approach, leaders foster a sense of shared commitment and involvement
in decision making. (See FM 6-22 for more information on leader development in a learning environment.)
Leaders help establish the conditions for subordinate adaptation by—
(cid:122) Developing leadership experience.
(cid:122) Fostering shared understanding.
(cid:122) Communicating with staff and subordinates.
(cid:122) Developing teams.
DEVELOPING LEADERSHIP EXPERIENCE
Judgment comes from experience and experience comes from bad judgment.
General of the Army Omar N. Bradley
8-39. Commanders and leaders develop subordinates when they prepare and then challenge them with
greater responsibility, authority, and accountability. They prepare their subordinates to succeed at the next
level of responsibility, since during combat many subordinates will be required to move up and replace more
senior leaders who become casualties, usually with no warning. It is the individual professional responsibility
of all leaders to develop their subordinates. (See FM 6-22 for more information on leader development.)
8-40. Commanders and leaders may develop their subordinates by observing them in training, accepting
subordinates’ risk taking when the consequences of failure are not decisive, and providing accurate feedback.
Leaders allow subordinates to accept risk on their behalf. They ensure subordinates make analytic risk
decisions as time and circumstances allow, while informing their higher echelon command of the risks they
are accepting. During training, leaders may allow subordinates to accept excessive tactical risk as a teaching |
3-0 | 207 | Leadership During Operations
point to ensure they learn what types of risk are acceptable, which are not, and how to better assess risk. This
sort of coaching helps leaders gain trust in their subordinates’ judgment and initiative, and it builds
subordinates’ trust in their leader. During operations, leaders intervene when subordinates accept risk that
exceeds the potential tactical benefits to the mission. Leaders inform subordinates, either at the time of the
decision (if time permits) or in an after-action review, of the residual risk accepted and why. They ensure
that risk management does not become risk aversion.
8-41. Inculcating risk acceptance goes hand in hand with accepting mistakes made in good faith.
Subordinates who learn from bad decisions become better leaders, and commanders who underwrite those
mistakes create a command climate where subordinates learn and gain the experience required to thrive under
hardship. Leaders reinforce the importance of a bias towards action by highlighting the value of simply
making a decision during operations, including imperfect decisions. Even so, commanders do not repeatedly
underwrite subordinates’ mistakes resulting from repeated lack of judgment or an inability to learn. Nor do
they tolerate repeated errors of omission or inaction where subordinates fail to exercise initiative. Leaders
act to ensure subordinates learn from mistakes. Methods of doing this include—
(cid:122) Publicly discussing a mistake as part of an after-action review, including one made by the leader,
to determine a better way to achieve the same purpose.
(cid:122) Correcting a subordinate directly, in situations when there is no time for an after-action review or
to enable better shared understanding by the entire team.
(cid:122) Correcting the systemic problem that enabled the mistake.
8-42. Commanders prepare their subordinates to take
their place when required, and they use training events Commanders and leaders at all levels are in
and professional development sessions to reinforce the control of their subordinates during a battle
value and necessity of exercising bold, appropriate only to the extent that they can
initiative. In addition to allowing progress over time, this communicate. The senior leader able to
prepares leaders to quickly assume greater communicate with the majority of a formation
in a fight needs to quickly take charge when
responsibilities immediately during combat. If an
it becomes apparent that the normal chain of
echelon of command is destroyed or otherwise made
command is no longer functional. This
mission ineffective during combat operations, a
requires leaders to be prepared to operate
subordinate leader must assume command as quickly as
on radio nets and other C2 systems two
possible. This may include elements of a subordinate levels up when the need arises.
echelon commander and staff assuming the
responsibilities of a higher echelon headquarters.
8-43. Self-awareness enables leaders to recognize their strengths and weaknesses and then to take
appropriate action. Leaders develop self-awareness through self-critique and self-regulation during training
and operations. They actively seek feedback, adapt to change, and possess the humility to accurately examine
their own experiences, performance, judgment, and decision making. Under rapidly changing conditions,
leaders’ self-awareness is a critical factor in making accurate assessments of changes and their own personal
capabilities to operate effectively in those conditions.
FOSTERING SHARED UNDERSTANDING
8-44. Shared understanding enables a mission command approach to C2. Commanders communicate their
intent two echelons down, and leaders look two echelons up to gain an understanding of the commander’s
intent, priorities of effort, and desired end state for operations. Commanders ensure understanding of their
intent during continuous dialogue with their subordinates. When relayed in an environment of mutual trust
and shared understanding, the commander’s intent frees commanders to move about the battlefield knowing
their subordinates understand the end state and what must be done to achieve it, even as conditions change.
Such climates allow leaders to operate knowing subordinates accurately and promptly report both positive
and negative information. Prompt and accurate reporting is critical in maintaining the tempo of decentralized
operations by dispersed forces along multiple axes.
8-45. Establishing shared understanding begins with leaders who educate and train themselves and their
subordinates in applicable allied, joint, and Army doctrine and common tasks, techniques, and procedures.
Training develops the teamwork, trust, and shared understanding that commanders need to exercise mission |
3-0 | 208 | Chapter 8
command and that forces need to achieve unity of effort. This is especially important when units are task-
organized and have different command structures than they had prior to an operation.
8-46. Coalition, joint, and Army C2 systems can enable distributed operations in a permissive environment.
Some systems, however, will be degraded by enemy or other action to a point that they may not be usable.
In these instances, the previously developed shared understanding enables subordinate leaders to take
effective action on their own while still working towards their commander’s end state. (See paragraphs 8-23
through 8-26 for more information on degraded communications and leadership.)
COMMUNICATING WITH STAFF AND SUBORDINATES
More than 50 percent of battle command in VII Corps was non-electric. That’s because we
were a team forged together quickly during deployment. We practiced using intent.
Commanders talked to each other. We were inside each other’s heads.
Lieutenant General Frederick Franks
8-47. Written orders continue to have an indispensable place in exercising C2, particularly before operations
commence and during their early stages. Clearly written orders promote consistency of approach in all areas
of C2, and they provide a common frame of reference from which to depart. During operations, oral
communications tend to be more important than written communications, for reasons of time and because of
the importance of personal interaction while leading. Face-to-face communication is the most effective
method, because humans use more than words to express themselves and understand each other. It is,
however, impossible to communicate face-to-face with all subordinates during engagements and battles.
Operations at the BCT level and below during close combat are largely dependent upon rapid, efficient
tactical radio communications. The military bearing of leaders when interacting in person, and the tone of
voice they use during communications when not in person, have significant impacts on their subordinates.
8-48. Effective leaders take positive steps that encourage, rather than impede, communications among and
with their subordinates and staff members. They make themselves available for dialogue, and they are open
to new information. Leaders who react rashly to new information, or who create barriers to communication,
whether intentional or not, decrease the chances that they will receive the timely information needed to make
critical decisions, and they may hinder the initiative of subordinates. Failure to properly receive and act on
new information leads to mission failure.
DEVELOPING TEAMS
8-49. Successful operations require shared understanding across domains and effective teamwork with the
joint and multinational organizations operating in those domains. Developing teams requires continuous
effort. It begins during home station activities and continues throughout preparation for and execution of
operations. Leaders may serve with unfamiliar subordinate units or serve under an unfamiliar higher echelon
headquarters, and they may have their task organization change multiple times during execution. To
effectively understand capabilities and lead across domains, Army leaders must also build trust with elements
of the joint force and Army units they may never see to effectively employ their capabilities. They need to
interact effectively with host-nation, allied, and partner nation forces, along with interagency and
intergovernmental partners, to ensure unity of effort when bringing to bear effects controlled by those outside
the joint force.
8-50. Operational requirements may cause units to deploy with different command structures than those used
at home station. Often they will not have trained with the higher echelon headquarters that employs them.
Collaboration and dialogue across echelons can mitigate these potential obstacles to team building. Through
these interactions, commanders gain insight into the needs of unfamiliar organizations while also sharing
their own vision and understanding.
8-51. By circulating among subordinate units, commanders can assess readiness, get to know new units in
the task organization, and personally motivate Soldiers. Leaders also visit and build productive personal
relationships with civilian leaders in other agencies, nongovernmental organizations, and the local population
in their AOs. Knowledge gained during these visits enables commanders to maintain situational
understanding and continuously update their visualization prior to and during execution. |
3-0 | 209 | Leadership During Operations
8-52. Different levels of training and cultures among organizations can pose challenges to building teams.
Army leaders apply their understanding of different cultures and agencies to place military efforts in context
and to serve on civil-military teams. To help build partnerships, commanders strive to have partners—
(cid:122) Represented, integrated, and actively involved in planning and coordinating activities.
(cid:122) Share an understanding of the situation and problems to solve.
(cid:122) Collectively determine the resources, capabilities, and activities necessary to achieve their goals.
(cid:122) Work for unity of effort toward achieving common goals.
8-53. Successful operations require leaders working with partners to develop a shared understanding of the
environment and a common commitment to solutions. Achieving unity of effort requires Army leaders to
have a high degree of cultural understanding and social skills. Without such understanding and skills, leaders
may fail to collaborate with diverse partners.
8-54. Quality leader development and training is required to grow and develop leaders capable of success
during operations. Deliberate investment in the abilities of individual leaders, teams, and units is foundational
to prosecuting those operations successfully across the competition continuum. (See FM 6-0 for more
information on C2, FM 6-22 for more information on leader development, FM 7-0 for more information on
training, and ATP 6-22.6 for more information on Army team building.) |
3-0 | 211 | Appendix A
The Principles of War
The art of war owns certain elements and fixed principles. We must acquire that theory,
and lodge it in our heads—otherwise, we will never get very far.
Frederick the Great
This appendix discusses the traditional principles of war. It then discusses the
principles of joint operations.
THE TRADITIONAL PRINCIPLES OF WAR
A-1. The nine principles of war represent the most important physical, human, and information factors that
affect the conduct of operations at the strategic, operational, and tactical levels. The principles are not a
checklist. While considered in all operations, they do not apply in the same way to every situation. Rather,
they summarize characteristics of historically successful operations. Applied to the study of past campaigns,
major operations, battles, and engagements, the principles of war are powerful analysis tools. Joint doctrine
adds three principles of operations to the nine traditional principles.
A-2. Originally derived from J.F.C. Fuller’s published works for the British army, the principles have
essentially remained the same over the last century, standing the test of analysis, experimentation, and
practice in war. Fuller is not the only influence on the U.S. Army’s theory of victory, which is the sum of
over two centuries of experience and study on the art of war and warfare. Eastern and Western military
theorists have often debated constants in the nature of war, and the principles of war as currently described
are informed by many points of view. Though the theories of victory and operational concepts have evolved
to meet the demands of military operations throughout the decades, the principles have stayed relevant. Fuller
ended his work in 1926 with a valuable maxim. Quoting Napoleon Bonaparte, he wrote, “The whole art of
war consists in a well-reasoned and extremely circumspect defensive, followed by rapid and audacious
attack.” Fuller closed his 1926 work, The Foundations of the Science of War, by summarizing the quote in
three bold words: GUARD, MOVE, HIT.
A-3. In Army doctrine, a principle is a comprehensive and fundamental rule or an assumption of central
importance that guides how an organization approaches and thinks about the conduct of operations
(ADP 1-01). Principles apply to the conduct of operations in general and to specific organizations or
functions. The principles of war are just one example. The nine traditional principles are organized
deliberately, enabling a practitioner to begin with actions on the objective and cognitively work backwards
to through the process of organizing forces and activities to accomplish their mission. The principles are—
(cid:122) Objective.
(cid:122) Offensive.
(cid:122) Mass.
(cid:122) Economy of force.
(cid:122) Maneuver.
(cid:122) Unity of command.
(cid:122) Security.
(cid:122) Surprise.
(cid:122) Simplicity. |
3-0 | 212 | Appendix A
OBJECTIVE
A-4. When undertaking any mission, commanders should have a clear understanding of the expected
outcome and impact. The ultimate military purpose of war is the defeat of the enemy’s armed forces and will
to fight by the use of organized violence or the threat of violence. The principle of objective drives all military
activity toward that end, with the least possible employment of resources on secondary considerations. This
requires a clear vision of the desired end state. Army commanders need to appreciate the political purpose
that war aims to achieve, and they need to understand how military conditions contribute to national policy
objectives. Commanders cannot separate the objective from the considerations of restraint and legitimacy.
Without these considerations, military actions can make strategic objectives unobtainable.
A-5. Below the strategic level, objective means ensuring all actions contribute to the goals of the higher
echelon headquarters. The attainment of intermediate objectives must be direct, quickly and economically
contributing to the ultimate end state. Commanders designate objectives that are decisive to accomplishing
the mission. These become the basis for all subordinate plans. Actions that do not contribute to achieving the
objective should be avoided. Conversely, determining and denying enemy forces their objectives narrow
options for enemy commanders to freely maneuver and exploit emerging opportunities. Denying enemy
forces their objectives while achieving the friendly objective is the ultimate purpose of all operations.
OFFENSIVE
A-6. The principle of offensive suggests that offensive action, or maintaining the initiative, is the most
effective and decisive way to pursue and attain a clearly defined common objective. This is fundamentally
true across all levels of warfare. When it is necessary to defend, commanders and staffs maintain an
aggressive mindset that seeks to attack the enemy throughout the depth of its formations and sets the
conditions for offensive action. The offense ensures that a force captures and holds the initiative, maintains
freedom of action, and achieves results. It permits political and military leaders to initiate operations on their
own terms, impose their will on the enemy, set favorable conditions for battle, exploit vulnerabilities, and
react rapidly to changing situations or emerging developments. No matter the echelon, the side that retains
the initiative through offensive action forces its opponent to react, rather than act.
A-7. The offensive applies to the operations and activities Army forces conduct in each domain. An
operational approach focused only on land can be defeated by opponents exploiting an offensive approach in
the other domains. Likewise, an offensive approach should extend to the human and information dimensions
of an operational environment Commanders and staffs maintain an offensive mindset during competition,
crisis, and armed conflict.
MASS
A-8. Integrating all the elements of combat power and synchronizing their application against a decisive
point achieves mass. Mass can be achieved in any of the domains and is mostly tied to the destroy defeat
mechanism. Massing effects against one or more decisive points in one or more domains is typically an
element of convergence. Concentrating forces, which should be done for only as long as necessary to avoid
providing the enemy lucrative targets, is typically necessary to achieve favorable ratios during close combat.
The massing of effects, together with the proper application of the other principles of war, may enable
numerically inferior forces to achieve decisive campaign and battle outcomes. Mass, like objective, implies
that it is best to minimize the use of resources on secondary efforts. The massing of effects at any echelon to
produce a desired effect on enemy forces is crucial to enabling maneuver.
A-9. Denying enemy forces the ability to mass at the time or place of their choosing is another consideration
for applying the principle of mass. Forcing enemy forces to maintain distributed operations, rather than
massing effects or forces as they require for success, can keep an enemy force from achieving its objectives,
reorganizing, or consolidating gains.
ECONOMY OF FORCE
A-10. A commander must employ available combat power in the most efficient way possible, and there is
seldom enough combat power available to enjoy a favorable correlation of forces everywhere. Economy of |
3-0 | 213 | The Principles of War
force, a reciprocal of mass, demands the judicious employment and distribution of forces. It requires
deliberately accepting risk in selected areas to achieve relative superiority—or overwhelming effects—in
others. Economy of force involves the discriminating employment and distribution of forces. Commanders
never leave any subordinate element without a purpose. The allocation of available combat power to tasks
such as limited attacks, defense, delays, deception, or even retrograde operations is measured to achieve mass
elsewhere. Accepting risk through economy of force creates opportunities to exploit.
MANEUVER
A-11. Maneuver is coordinated movement and fire in relation to enemy forces to put them at a disadvantage
with the least cost to friendly forces. Firepower, mobility, protection, and leadership enable maneuver.
Intelligence focuses–and sustainment enables–maneuver over distance and time. In the strategic sense,
maneuver has three interrelated characteristics: flexibility, mobility, and maneuverability. Flexibility must
characterize thought, plans, and operations to maintain the initiative during changing conditions with an
adaptive enemy. Flexibility enhances rapid reaction to unforeseen circumstances. Mobility is the capacity to
respond rapidly in crisis, move across strategic distances, and move to a position to conduct operational- and
tactical-level maneuver.
A-12. Tactically, maneuver is about moving forces and firepower into better positions relative to enemy
forces to gain a compelling advantage: the ability to destroy enemy forces unless they reposition while
making friendly forces more difficult to fix and destroy. It contributes to seizing, retaining, and exploiting
the initiative and preserving freedom of action. Maneuver allows commanders to concentrate and disperse
forces to keep enemy forces off balance and out of position. Conversely, limiting enemy maneuver keeps
them in positions of disadvantage, ideally leading to their eventual destruction or defeat at the time and place
of the friendly commander's choice.
UNITY OF COMMAND
A-13. This principle ensures that all efforts focus on a common goal. Unity of command means that a single
commander coordinates the actions of all forces toward a common objective. Cooperation may produce
coordination, but giving a single commander the required authority is the most effective way to achieve unity
of effort. Ultimately a single commander is responsible for an objective at each echelon. Diffusing
responsibility otherwise creates misunderstandings during the stress of combat. Commanders deny enemy
forces unity of command by destroying or disrupting enemy C2, taking action to isolate enemy echelons, and
exploiting boundaries between enemy formations. This makes coordination of forces, collaboration of
planning, and cohesive operations more challenging for enemy commanders. Denying enemy forces unity of
command is crucial to denying them the ability to exploit emerging tactical opportunities.
A-14. The joint, interagency, and multinational nature of operations creates situations where the commander
does not directly control all organizations in the area of operations (AO). Achieving unity of effort under
such conditions becomes the goal, which requires coordination and collaboration among forces-even though
they may not be part of the command structure-toward a commonly recognized objective.
SECURITY
A-15. Security enhances freedom of action by protecting and preserving combat power while reducing
friendly vulnerability to surprise. Every Army formation is responsible for its own security. The application
of the principle of security does not suggest over-cautiousness or avoidance of risk but rather the
unwillingness to cede any advantages to the enemy unnecessary. Security is closely related to the operational
imperative that friendly forces operate under the assumption that they are under observation and always in
contact with enemy forces. Security relies on gaining and maintaining enemy contact on friendly terms, and
it is directly related to the principle of surprise. Preventing surprise by maintaining contact with enemy forces
enhances security and denies them opportunities to seize the initiative.
A-16. At the strategic level, security requires active and passive measures to protect Army forces from
espionage, subversion, and strategic intelligence collection. At the tactical level, it is essential to protection
and the preservation of combat power. Security results from the protective measures commanders take to
prevent surprise, observation, detection, interference, espionage, or sabotage. |
3-0 | 214 | Appendix A
SURPRISE
A-17. Surprise results from taking actions for which an enemy or adversary force is unprepared. It is a
powerful, but temporary, combat multiplier. It is not essential to take adversary or enemy forces completely
unaware; it is only necessary that they become aware too late to react effectively. When done well, surprise
can decisively shift the balance of combat power in favor of friendly forces. Concealing capabilities and
intentions is difficult. Rapid advances in strategic surveillance, information gathering, and data skimming, as
well as the pervasiveness of social and mass media compound the difficulty of large-scale marshalling and
movement of manpower and equipment.
A-18. Factors that contribute to surprise include speed of movement, employment of combat power the
enemy does not expect, operations security, and variations in tactics that create ambiguity. Commanders can
create surprise using changes to tempo, size of forces, direction or location of a main effort, and timing.
Deception can aid in the probability of achieving surprise, and at the tactical level it is best practiced by
showing enemy forces what they expect to see until the last possible moment and then doing something
different. Proactive friendly reconnaissance and security measures deny enemy forces opportunities to
surprise friendly forces.
SIMPLICITY
A-19. Guidance, plans, and orders should be as simple and direct as possible. Objectives and operations must
be presented in clear, concise, understandable terms. At the tactical level, simplicity of plans and instructions
contribute to successful operations and reduce the chances for misunderstanding and confusion. All factors
being equal, a simple plan executed promptly is preferred to a complex plan executed too late. Simple plans
allow better understanding and troop leading at all echelons, and they also permit branches and sequels to be
easily nested, understood, and executed. Joint, interagency, and multinational operations place a premium on
simplicity, accounting for differences in language and culture that can inherently complicate integration.
Simple plans and orders minimize the confusion inherent in command posts during operations. The more
complicated a plan is, the more vulnerable it is to friction. Simplicity addresses the fog and friction of war,
helps commanders and their staffs to maintain shared understanding, and accounts for the nature of war as a
human endeavor.
PRINCIPLES OF JOINT OPERATIONS
A-20. Joint doctrine adds three principles of operations (perseverance, legitimacy, and restraint) to the
traditional nine principles of war to account for operations other than conventional large-scale combat, such
as peacekeeping and counterinsurgency. The additional principles are relevant to how the joint force uses
combat power across the competition continuum, particularly during limited contingency. Like the traditional
principles, these three do not apply equally across all joint operations but can be universally important and
directly relate to the laws of armed conflict. The additional principles are—
(cid:122) Restraint.
(cid:122) Perseverance.
(cid:122) Legitimacy.
(See JP 3-0 for more detailed information on the principles of joint operations.)
RESTRAINT
A-21. The purpose of restraint is to prevent the unnecessary use of force when better methods of achieving
the objective exist. Restraint informs legitimacy.
A-22. Destructive force can have a negative military and political consequences in some contexts. Therefore,
judicious use of force is necessary. Restraint requires the careful and disciplined balance of security, the
conduct of military operations, and national objectives. Excessive force antagonizes those parties involved,
thereby damaging the legitimacy of friendly forces and potentially enhancing the legitimacy of the adversary.
Sufficiently detailed rules of engagement from a commander tailored to the specific circumstances of the
operation can facilitate appropriate restraint. |
3-0 | 215 | The Principles of War
PERSEVERANCE
A-23. The purpose of perseverance is to ensure the commitment necessary to achieve national objectives.
Perseverance recognizes that enduring outcomes may require enduring commitment of forces.
A-24. Perseverance involves preparation for measured, protracted military operations in pursuit of national
objectives. Some joint operations may require years to reach the desired end state. The underlying causes of
the crisis may be elusive, making it difficult to achieve decisive resolution. The patient, resolute, and
persistent pursuit of national goals and objectives is essential to success. This frequently involves diplomatic,
economic, and informational measures to supplement military efforts. Army leaders contribute to
perseverance by managing the expectations of seniors and subordinates while setting reasonable objectives
to achieve over time.
LEGITIMACY
A-25. The purpose of legitimacy is to maintain legal and moral authority during the conduct of operations. It
is relevant across the competition continuum and the range of military operations. Legitimacy, a decisive
factor in the application of information in the operational environment, is based on the actual and perceived
legality, morality, and rightness of the actions from the various perspectives of interested audiences. These
audiences can include our national leadership and domestic population, governments, civilian populations,
and nations and organizations around the world.
A-26. Committed forces must sustain the legitimacy of the operation and of the coalition and host
government, particularly when the host or partner government's legitimacy is decisive to the operation. All
actions must be considered in the light of competing strategic and tactical requirements, and exhibit fairness
in dealing with competing factions where appropriate. Legitimacy may depend on adherence to objectives
agreed to by the international community, ensuring the action is appropriate to the situation and to the
perception of fairness in dealing with various factions. Restricting the use of force, restructuring the type of
forces employed, protecting civilians, and ensuring the disciplined conduct of the forces involved may
reinforce legitimacy. |
3-0 | 217 | Appendix B
Command and Support Relationships
Nothing is more important in war than unity in command.
Napoleon Bonaparte
This appendix describes command and support relationships for joint, Army, and
multinational forces.
COMMAND
B-1. Command is central to all military action, and unity of command is central to unity of effort. Inherent
in command is the authority that a military commander lawfully exercises over subordinates, including the
authority to assign missions and accountability for their successful completion. Command is exercised in
both the administrative and operational branches of the chain of command, although the specific authorities
differ. Although commanders may delegate authority to accomplish missions, they may not absolve
themselves of the responsibility for the accomplishment of these missions. Authority is never absolute; the
extent of authority is specified by the establishing authority, directives, and law. (See JP 1, Volume 2 for
more information on command.)
SUPPORT RELATIONSHIPS
B-2. A support relationship is established by a common superior commander between subordinate
commanders when one organization should aid, protect, complement, or sustain another force. The support
relationship is used by the Secretary of Defense to establish and prioritize support between and among
combatant commanders (CCDRs), and it is used by joint force commanders (JFCs) to establish support
relationships between and among subordinate commanders. (See JP 1, Volume 2 for more information on
support.)
CHAIN OF COMMAND
B-3. The President and Secretary of Defense exercise authority and control of the armed forces through two
distinct branches of the chain of command, as described in JP 1, Volume 2: the operational and administrative
branches. The operational branch runs from the President, through the Secretary of Defense, to the CCDRs
for missions and forces assigned to combatant commands. The administrative branch runs from the President
through the Secretary of Defense to the secretaries of the military departments.
B-4. The typical operational chain of command extends from the CCDR to a joint task force (JTF)
commander, then to a functional component or Service component commander. JTFs comprise forces from
more than one Service placed under the operational control (OPCON) of the JTF. Within their commands,
CCDRs and JTF commanders establish joint command relationships among forces as described in paragraphs
B-7 through B-12.
B-5. Under joint doctrine, each Unified Command includes a Service component command that provides
administrative control (ADCON) for Service forces assigned to that Unified Command. A Service component
command consists of the Service Component headquarters and all Service Forces assigned to the Unified
Commander. Army doctrine distinguishes between the Army component of a combatant command and Army
components of other joint forces. Under Army doctrine, Army Service component command (ASCC) refers
to the Army component assigned to a combatant command. There is only one ASCC within a combatant
command’s area of responsibility. The Army components of all other joint forces are called ARFORs. An
ARFOR is the Army component and senior Army headquarters of all Army forces assigned or attached to a
combatant command, subordinate joint force command, joint functional command, or multinational |
3-0 | 218 | Appendix B
command. (FM 3-94) It consists of the senior Army headquarters and all Army forces that the CCDR
subordinates to the JTF or places under the control of a multinational force commander. The ARFOR
becomes the conduit for ADCON functions specified in unit deployment orders. (See FM 3-94 and JP 3-0
for more information on ARFOR.)
JOINT COMMAND RELATIONSHIPS
B-6. JP 1, Volume 2 specifies and details four types of joint command relationships. They are—
(cid:122) Combatant command (command authority) (COCOM).
(cid:122) Operational control.
(cid:122) Tactical control.
(cid:122) Support.
COMBATANT COMMAND (COMMAND AUTHORITY)
B-7. COCOM is the command authority over assigned and allocated forces vested only in commanders of
combatant commands or as directed by the President or the Secretary of Defense in the Unified Command
Plan and cannot be delegated or transferred. COCOM only extends to those forces assigned or allocated to
the combatant command by the Secretary of Defense. COCOM is established in federal law by Section 164,
Title 10, United States Code (USC). Normally, the CCDR exercises this authority through subordinate JFCs,
Service components, and functional component commanders. COCOM includes the directive authority for
logistics.
OPERATIONAL CONTROL
B-8. The authority to exercise OPCON is exclusively derived from COCOM authority. Forces provided by
the Services and attached to a combatant command are typically in an OPCON command relationship.
OPCON is the authority to perform those functions of command over subordinate forces involving—
(cid:122) Organizing and employing commands and forces.
(cid:122) Assigning tasks.
(cid:122) Designating objectives.
(cid:122) Giving authoritative direction necessary to accomplish missions.
B-9. OPCON normally includes authority over all aspects of operations and joint training necessary to
accomplish missions. It does not include directive authority for logistics or matters of administration,
discipline, internal organization, or unit training. OPCON does include the authority to delineate functional
responsibilities and operational areas of subordinate JFCs. In two instances, the Secretary of Defense may
specify adjustments to accommodate authorities beyond OPCON in an establishing directive: when
transferring forces between CCDRs or when transferring members or organizations from the military
departments to a combatant command. Adjustments will be coordinated with the participating CCDRs.
TACTICAL CONTROL
B-10. TACON is inherent in OPCON. TACON may be delegated to and exercised by commanders at any
echelon at or below the level of combatant command. TACON provides sufficient authority for controlling
and directing the application of force or tactical use of combat support assets within the assigned mission or
task. TACON does not provide organizational authority or authoritative direction for administrative and
logistics support; the commander of the parent unit continues to exercise these authorities unless otherwise
specified in the establishing directive.
JOINT SUPPORT RELATIONSHIPS
B-11. Support is a command authority in joint doctrine. A superior commander establishes a supported and
supporting relationship between subordinate commanders when one organization should aid, protect,
complement, or sustain another force. Designating supporting relationships is important. It conveys priorities
to commanders and staffs planning or executing joint operations. Designating a support relationship does not |
3-0 | 219 | Command and Support Relationships
provide authority to organize and employ commands and forces, nor does it include authoritative direction
for administrative and logistic support. (See figure B-1 for a depiction of joint command relationships. See
table B-1 for a listing of joint doctrine support categories.)
Note. The joint command relationship of ‘Support’ is distinct from Army support relationships.
See paragraphs B-23through B-28 for a discussion of Army support relationships.
Figure B-1. Joint command relationships
Table B-1. Joint support categories
Category Definition
General support Support given to the supported force as a whole and not to any particular
subdivision thereof (JP 3-09.3).
Mutual support That support which units render each other against an enemy, because of their
assigned tasks, their position relative to each other and to the enemy, and their
inherent capabilities (JP 3-31).
Direct support A mission requiring a force to support another specific force and authorizing it to
answer directly to the supported force’s request for assistance (JP 3-09.3).
Close support The action of the supporting force against targets or objectives that are sufficiently
near the supported force as to require detailed integration or coordination of the
supporting action (JP 3-31).
B-12. Support is, by design, somewhat vague but very flexible. Establishing authorities ensure both
supported and supporting commanders understand the authority of supported commanders. JFCs often
establish supported and supporting relationships among components. An Army headquarters designated as
the land component may be the supporting force during some campaign phases and the supported force in |
3-0 | 220 | Appendix B
other phases. A joint support relationship is not used when an Army commander task-organizes Army forces
in a supporting role. When task-organized to support another Army force, Army forces use one of four Army
support relationships.
OTHER AUTHORITIES
B-13. Some authorities exist outside joint command relationships. These authorities include—
(cid:122) Administrative control.
(cid:122) Coordinating authority.
(cid:122) Direct liaison authorized.
Administrative Control
B-14. Administrative control is direction or exercise of authority over subordinate or other organizations in
respect to administration and support (JP 1, Volume 2). This includes organization of Service forces, control
of resources and equipment, personnel management, unit logistics, individual and unit training, readiness,
mobilization, demobilization, discipline, and other matters not included in the operational missions of the
subordinate or other organizations.
Coordinating Authority
B-15. Coordinating authority is the authority delegated to a commander or individual for coordinating
specific functions or activities involving forces of two or more military departments, two or more joint force
components, or two or more forces of the same Service. The commander or individual granted coordinating
authority can require consultation between the agencies involved, but that person does not have the authority
to compel agreement. In the event that essential agreement cannot be obtained, the matter shall be referred
to the appointing authority. Coordinating authority is a consultation relationship, not an authority through
which command may be exercised. (See JP 1, Volume 2 for more information on coordinating authority.)
Direct Liaison Authorized
B-16. Direct liaison authorized is that authority granted by a commander (any level) to a subordinate to
directly consult or coordinate an action with a command or agency within or outside of the granting command
(JP 1, Volume 2). Direct liaison authorized is more applicable to planning than operations, and it always
carries with it the requirement of keeping the commander granting direct liaison authorized informed. Direct
liaison authorized is a coordination relationship, not an authority through which command may be exercised.
ARMY COMMAND AND SUPPORT RELATIONSHIPS
B-17. Army command relationships are similar but not identical to joint command authorities and
relationships. Differences stem from the way Army forces task-organize internally and the need for a system
of support relationships between Army forces. Another important difference is the requirement for Army
commanders to handle the administrative support requirements that meet the needs of Soldiers. These
differences allow for flexible allocation of Army capabilities within various Army echelons.
ARMY COMMAND RELATIONSHIPS
B-18. Table B-2 lists the Army command relationships and authorities typically associated with each.
Command relationships define superior and subordinate relationships between units. The type of command
relationship often relates to the expected longevity of the relationship between the headquarters involved,
and it quickly identifies the degrees of operational and administrative control that the gaining and losing
Army commanders provide. Army command relationships include:
(cid:122) Organic.
(cid:122) Assigned.
(cid:122) Attached. |
3-0 | 221 | Command and Support Relationships
(cid:122) OPCON. (See paragraphs B-8 and B-9.)
(cid:122) TACON. (See paragraph B-10.)
Table B-2. Army command relationships
Then the inherent responsibilities are:
Authorities
Unless
CDR can
If modified,
Are Establish/ impose on
relation- Have May be ADCON assigned Provide maintain Have gaining unit
ship command task- responsi- position liaison communica priorities further
relationship organized bility establish
is— or AO to— -tions command
with— by— goes -ed by—
by— with— or support
through
relationship
—
of—
Attached;
Organic Organic Organic OPCON;
Organic Organic HQ Organic HQ N/A N/A
HQ HQ HQ TACON; GS;
GSR; R; DS
Attached;
Gaining Gaining Gaining OPCON;
Assigned Gaining HQ Gaining HQ N/A N/A
HQ HQ HQ TACON; GS;
GSR; R; DS
As Attached;
Unit to
Gaining Gaining required Gaining OPCON;
Attached Gaining HQ Gaining HQ which
HQ HQ by gaining HQ TACON; GS;
attached
HQ GSR; R; DS
Parent unit
and gaining
As As required
unit; gaining OPCON;
Gaining required by gaining Gaining
OPCON Gaining HQ unit may Parent HQ TACON; GS;
HQ by gaining HQ and HQ
pass GSR; R; DS
HQ parent HQ
OPCON to
lower HQ
As As required
Gaining required by gaining Gaining TACON; GS
TACON Gaining HQ Parent HQ Parent HQ
HQ by gaining unit and HQ GSR; R; DS
HQ parent HQ
ADCON administrative control GSR general support—reinforcing
ASCC Army Service component command HQ headquarters
AO area of operations N/A not applicable
CDR commander OPCON operational control
DS direct support R reinforcing
GS general support TACON tactical control
Organic
B-19. Organic forces are those assigned to and forming an essential part of a military organization. For
example, a brigade engineer battalion is an organic unit in a brigade combat team (BCT). The Army
establishes organic command relationships through organizational documents such as tables of organization
and equipment and tables of distribution and allowances. If temporarily task-organized with another
headquarters, organic units return to the control of their organic headquarters after completing the mission.
Assigned
B-20. Army assigned units remain subordinate to the higher echelon headquarters for extended periods,
typically years. Assignment is based on the needs of the Army, and it is formalized by orders rather than
organizational documents. Although force tailoring or task-organizing may temporarily detach units, they
eventually return to either their headquarters of assignment or their organic headquarters. An Army |
3-0 | 222 | Appendix B
headquarters is typically responsible for executing the ADCON responsibilities for subordinate Army units
under its command unless modified by a higher headquarters.
Attached
B-21. Attached units are temporarily subordinated to the gaining headquarters, often for months or longer.
They return to their parent headquarters (assigned or organic) when the reason for the attachment ends. The
Army headquarters that receives another Army unit through assignment or attachment assumes responsibility
for certain ADCON requirements, and particularly sustainment, that normally extend down to that echelon,
as specified by directives or orders. For example, when an Army division commander attaches an air defense
battery to a BCT, the brigade commander assumes responsibility for unit training, maintenance, resupply,
and unit-level reporting for that battalion.
B-22. Army commanders normally place a unit OPCON or TACON to a gaining headquarters for a given
mission, lasting perhaps a few days. OPCON lets the gaining commander task-organize and direct forces.
TACON does not let the gaining commander task-organize the unit. Neither OPCON nor TACON affects
ADCON responsibilities.
ARMY SUPPORT RELATIONSHIPS
B-23. Table B-3 lists Army support relationships. Army support relationships are not a command authority
and are more specific than the joint support relationships. Commanders establish support relationships when
subordination of one unit to another is inappropriate. If a unit has an established command relationship with
a headquarters, a support relationship is unnecessary as the command relationship already grants the gaining
commander all the authorities required. Commanders assign a support relationship when—
(cid:122) The support is more effective if a commander with the requisite technical and tactical expertise
controls the supporting unit, rather than the supported commander.
(cid:122) The echelon of the supporting unit is the same as or higher than that of the supported unit. For
example, the supporting unit may be a brigade, and the supported unit may be a battalion. It would
be inappropriate for the brigade to be subordinated to the battalion, hence the use of an Army
support relationship.
(cid:122) The supporting unit supports several units simultaneously. The requirement to set support
priorities to allocate resources to supported units exists. Assigning support relationships is one
aspect of command and control (C2).
B-24. Army support relationships allow supporting commanders to employ their units’ capabilities to achieve
results required by supported commanders. Support relationships are graduated from an exclusive supported
and supporting relationship between two units—as in direct support—to a broad level of support extended to
all units under the control of the higher echelon headquarters—as in general support. Support relationships
do not alter ADCON. Any transfer of ADCON responsibilities should be specified in the order establishing
the support relationship. |
3-0 | 223 | Command and Support Relationships
Table B-3. Army support relationships
Then the inherent responsibilities are:
Authorities
a CDR can
Are
Have impose on
If relation- command May be Receives assigned Provide Establish/ Have gaining
ship is— relation- task- sustain- position or liaison maintain priorities unit further
organiz- ment an area of communica- establish
ship to— command
ed by— from— operations tions with— ed by—
with— or support
by—
relation-
ship by—
Parent HQ;
Direct Parent Parent Supported Supported Supported
Parent HQ supported See note.
support HQ HQ HQ HQ HQ
HQ
Parent HQ; Reinforced
Parent Parent Reinforced Reinforced Not
Reinforcing Parent HQ reinforced HQ; then
HQ HQ HQ HQ applicable
HQ parent HQ
Reinforced Reinforced Parent
General
Parent Parent HQ and as HQ and as HQ; then Not
support– Parent HQ Parent HQ
HQ HQ required by required by reinforced applicable
reinforcing
parent HQ parent HQ HQ
As As required
General Parent Parent Not
Parent HQ Parent HQ required by by parent Parent HQ
support HQ HQ applicable
parent HQ HQ
Note. Commanders of units in direct support may further assign support relationships between their subordinate units and
elements of the supported unit after coordination with the supported commander.
CDR commander HQ headquarters
B-25. For the Army, direct support is a support relationship requiring a force to support another specific
force and authorizing it to answer directly to the supported force’s request for assistance. A unit
assigned a direct support relationship retains its command relationship with its parent unit, but it is positioned
by and has priorities of support established by the supported unit. (Joint doctrine considers direct support a
mission rather than a support relationship.) A field artillery unit in direct support of a maneuver unit is
concerned primarily with the fire support needs of only that unit. The commander of a unit in direct support
recommends position areas and coordinates for movement clearances where the unit can best support the
maneuver commander’s concept of the operation.
B-26. General support is that support given to the supported force as a whole and not to any particular
subdivision thereof. Units assigned a general support relationship are positioned and have priorities
established by their parent unit. A field artillery unit assigned in general support of a force has all of its fires
under the immediate control of the supported commander or his designated force field artillery headquarters.
B-27. Reinforcing is a support relationship requiring a force to support another supporting unit. Only
like units (for example, artillery to artillery) can be given a reinforcing mission. A unit assigned a reinforcing
support relationship retains its command relationship with its parent unit, but it is positioned by the reinforced
unit. A unit that is reinforcing has priorities of support established by the reinforced unit, then the parent unit.
For example, when a direct support field artillery battalion requires more fires to meet maneuver force
requirements, another field artillery battalion may be directed to reinforce the direct support battalion.
B-28. General support—reinforcing is a support relationship assigned to a unit to support the force as
a whole and to reinforce another similar type unit. A unit assigned a general support—reinforcing support
relationship is positioned and has its priorities established by its parent unit and secondly by the reinforced
unit. For example, an artillery unit that has a general support—reinforcing relationship supports the force as
a whole and provides reinforcing fires for other artillery units. |
3-0 | 224 | Appendix B
OTHER RELATIONSHIPS
B-29. Several other relationships established by higher echelon headquarters exist with units that are not in
command or support relationships. These relationships are limited or specialized to a greater degree than the
command and support relationships, and they may be detailed in a command’s implementing directives.
These limited relationships are not used when tailoring or task-organizing Army forces. Use of these
specialized relationships helps clarify certain aspects of OPCON or ADCON. (See table B-4 for a listing of
other relationships.)
Table B-4. Other relationships
Relationship Operational use Established by Authority and limitations
TRO TRO is an authority The CCDR identified TRO allows the CCDR to provide
exercised by a in the “Forces for guidance on operational
combatant commander Unified Commands” requirements and training priorities,
over assigned RC memorandum. The review readiness reports, and
forces not on active CCDR normally review mobilization plans for RC
duty. Through TRO, delegates TRO to forces. TRO is not a command
CCDRs shape RC the ASCC. relationship. ARNG forces remain
training and readiness. under the command and control of
Upon mobilization of their respective State Adjutant
the RC forces, TRO is Generals until mobilized for Federal
no longer applicable. service. USAR forces remain under
the command and control of the CG,
USARC until mobilized.
TRA TRA is an authority for Higher commander. TRA includes responsibility for all
a designated facets of command that enable
commander to give commanders to accomplish their
direction to an mission. It does not include those
attached unit for leader installation command authorities
development, vested in the Army Senior
individual and Commander.
collective training, and
unit readiness.
DIRLAUTH Allows planning and The parent unit Limited to planning and coordination
direct collaboration headquarters. This is between units.
Note. See also between two units a coordination
paragraph B-16. assigned to different relationship, not an
commands, often authority through
based on anticipated which command may
tailoring and task be exercised.
organization changes
Aligned Informal relationship to Theater army and Normally establishes information
facilitate planning parent command. channels for coordination between
between a theater the gaining theater army and Army
army and other Army units that are likely to be committed
units identified in to that area of responsibility.
operations and
exercises in a specific
combatant command.
ASCC Army Service component command RC Reserve Component
ARNG Army National Guard TRO training and readiness oversight
CCDR combatant commander USAR United States Army Reserve
CG commanding general USARC United States Army Reserve Command
DIRLAUTH direct liaison authorized |
3-0 | 225 | Command and Support Relationships
Training and Readiness Oversight
B-30. Training and readiness oversight (known as TRO) is the authority that CCDRs may exercise over
assigned Reserve Component forces when not on active duty or when on active duty for training. As a matter
of Department of Defense policy, this authority includes—
(cid:122) Providing guidance to Service component commanders on operational requirements and priorities
to be addressed in military department training and readiness programs.
(cid:122) Commenting on Service component program recommendations and budget requests.
(cid:122) Coordinating and approving participation by assigned Reserve Component forces in joint
exercises and other joint training when on active duty for training or performing inactive duty for
training.
(cid:122) Obtaining and reviewing readiness and inspection reports on assigned Reserve Component forces.
(cid:122) Coordinating and reviewing mobilization plans (including post-mobilization training activities
and deployability validation procedures) developed for assigned Reserve Component forces.
(See JP 1, Volume 2 for more information on training and readiness oversight.)
Training and Readiness Authority
B-31. Training and readiness authority (known as TRA) is the discrete authority, granted by a higher echelon
commander, for a designated commander to give direction to an attached unit for leader development,
individual and collective training, and unit readiness (to include maintenance, manning, and equipping). It
also includes responsibility for the health, welfare, morale, and discipline of assigned and attached personnel,
and all facets of command that enable unit commanders to accomplish their missions. It does not include
those installation command authorities vested in the Army senior commander. The commander executing
training and readiness authority has a responsibility to coordinate unit readiness with the applicable
installation Army senior commander.
Aligned
B-32. Alignment is an informal relationship between a theater army and other Army units identified for use
in the area of responsibility of a specific geographic combatant command. Alignment helps focus unit
exercises and other training on a particular region. This may lead to establishment of direct liaison authorized
between the aligned unit and a different ASCC. Any modular Army force may find itself included in an
expeditionary force package heading to a different combatant command. Therefore, Army commanders
maintain a balance between regional focus and global capability.
MULTINATIONAL COMMAND AND SUPPORT CONSIDERATIONS
B-33. Army forces routinely serve in multinational operations, and echelons above brigade headquarters may
form the core of a multinational headquarters. As such, it is important that Army commanders and staffs
understand multinational command structures and authorities.
B-34. Multinational operations is a collective term to describe military actions conducted by forces of two or
more nations, usually undertaken within the structure of the coalition or alliance. An alliance is the
relationship that results from a formal agreement between two or more nations for broad, long-term objectives
that further the common interests of the members. Alliances have standing headquarters, organizations, and
standardized agreements for the conduct of operations. Examples include NATO and the Combined Forces
Command, Korea. Operations conducted with units from two or more allies are referred to as combined
operations.
B-35. A coalition is an ad hoc arrangement between two or more nations for a common action, and a coalition
is formed for a limited purpose and time. Coalitions are formed by different nations with specific objectives,
usually for a single occasion or for longer cooperation in a narrow sector of common interest. Operations
conducted with units from two or more coalition members are referred to as coalition operations. (See
FM 3-16 for further details on multinational operations.) |
3-0 | 226 | Appendix B
COMMAND AUTHORITY
B-36. The Army and joint force have doctrinal definitions for command and support relationships. However,
these definitions and authorities only apply to U.S. forces. In multinational operations, each nation determines
the authority it will delegate to multinational commanders for the employment of their forces. The nations
involved also establish national caveats. Command authority for a multinational force’s command is normally
negotiated between the participating nations, and it can vary from nation to nation. Command authority is
specified in the implementing agreements, and it may include aspects of OPCON, TACON, support
relationships, and coordinating authority. A clear and common understanding of what authorities are
specified in the implementing agreement is essential to operations. This is particularly important when similar
terms have different meanings to the various participants.
B-37. In many cases, coordinating authority may be the only acceptable means of accomplishing a
multinational mission. Coordinating authority is a consultation relationship between commanders, not an
authority by which C2 may be exercised. Normally, it is more applicable to planning than to operations. Use
of coordinating authority requires agreement among participants, as the commander exercising coordinating
authority does not have the authority to resolve disputes.
MULTINATIONAL COMMAND STRUCTURE
B-38. All multinational operations have two chains of command regardless of structure or authority. The first
is a national chain of command extending back to national capitals. The second is the multinational chain of
command constructed by the United Nations, alliance, or coalition. As unity of command is all but impossible
given parallel national chains of command, multinational commanders strive for unity of effort. In doing so,
multinational commanders develop a high level of mutual trust and comfort with other national contingents.
B-39. United Nations forces, alliances, and coalitions create command structures that meet the needs,
diplomatic realities, constraints, and objectives of the participating nations. No single command structure fits
the needs of all alliances, United Nations forces, and coalitions; however, the basic structures for
multinational operations fall into one of four types:
(cid:122) Integrated.
(cid:122) Lead nation.
(cid:122) Parallel.
(cid:122) Combination
B-40. Regardless of how a multinational force is organized operationally, each nation furnishing forces
normally establishes a national component, often called a national command element, to ensure effective
administration of its forces. The logistic support element of this component is referred to as the national
support element.
Integrated Command Structure
B-41. Integrated commands have representative members from the member nations in the command
headquarters. Multinational commands organized under an integrated command help ensure the capabilities
of member nations are represented and employed properly.
Lead Nation Command Structure
B-42. A lead nation command structure exists when all member nations place their forces under the control
of one nation. The lead nation command can be distinguished by a dominant lead nation command and staff
arrangement with subordinate elements retaining strict national integrity.
Parallel Command Structures
B-43. Under a parallel command structure, no single force commander is designated. The multinational force
leaders must develop a means for coordination among the participants to attain unity of effort. This can be
accomplished through the use of coordination centers. Nonetheless, because of the absence of a single
multinational force command, the use of a parallel command structure should be avoided if possible. |
3-0 | 227 | Command and Support Relationships
Combination Command Structure
B-44. In a combination command structure, the lead nation concept and a parallel command structure exist
simultaneously in a coalition. This occurs when two or more nations are the controlling elements for a mix
of international forces. This structure is more desirable than the parallel command structure, but an effort to
achieve a total lead-nation concept for unity of command is preferred.
NORTH ATLANTIC TREATY ORGANIZATION COMMAND RELATIONSHIPS AND AUTHORITIES
B-45. NATO is an example of a multinational organization with agreed upon structure and authorities. When
planning and conducting operations as part of NATO, it is particularly important for leaders to understand
the command relationships and the specified authorities, whether they are attached to a NATO command or
receiving NATO capabilities. It is also important to understand that NATO terms and acronyms are similar
to U.S. acronyms at times, but they often describe different authorities than joint and Army terms. NATO
has five command relationships:
(cid:122) Full command (FULLCOM).
(cid:122) Operational command (OPCOM).
(cid:122) OPCON.
(cid:122) Tactical command (TACOM).
(cid:122) TACON.
(See table B-5 on page B-12 for a listing of NATO treaty organization command relationships. See Allied
Tactical Publication 3.2.2 and AJP-3 for additional discussion of the authorities for each command
relationship.) |
3-0 | 228 | Appendix B
Table B-5. North Atlantic Treaty Organization command relationships
Authority FULLCOM OPCOM OPCON TACOM TACON
May further OPCOM OPCOM OPCON TACOM TACON
delegate
OPCON OPCON TACOM TACON
command
TACOM TACOM TACON
authority
TACON TACON
Task-organize X X
the assigned
element
Assign missions X X X (limited)
to the assigned
element
Assign tasks to X X X X (limited)
the assigned
element for the
purpose of
which it has
been assigned
Coordinate X X X X X
movement, local
defense, and
force protection
Planning and X X X X X
coordination
Administrative X
and logistic
responsibility
FULLCOM full command TACOM tactical command
OPCOM operational command TACON tactical control
OPCON operational control
Full Command
B-46. FULLCOM is the military authority and responsibility of a commander to issue orders to subordinates.
It covers every aspect of military operations and administration and exists only within national services. The
term command, as used internationally, implies a lesser degree of authority than when it is used in the national
sense. NATO or coalition commanders do not have FULLCOM over the forces assigned to them, since, in
assigning forces to NATO, nations delegate only OPCOM or OPCON.
Operational Command
B-47. OPCOM in NATO is the authority granted to a commander to assign missions or tasks to subordinate
commanders, to deploy units, to reassign forces, and to retain or delegate OPCON and TACON as the
commander deems necessary. It does not necessarily include responsibility for administration or logistics.
Operational Control
B-48. OPCON in NATO is the authority delegated to a commander to direct assigned forces so that
commander may accomplish specific missions or tasks, which are usually limited by function, time, or
location, and to deploy assigned units, and to retain or assign TACON of those units. It does not include
authority to assign separate employment of components of the units concerned. By itself, it does not include
administrative or logistics control. For forces allocated under OPCON, the gaining commander may not break |
3-0 | 229 | Command and Support Relationships
up the organizational integrity of the force for separate employment. Under OPCON forces assigned may
only be employed within certain constraints such as function, time, or location imposed by the higher echelon
authority.
Tactical Command
B-49. TACOM in NATO is the authority delegated to a commander to assign tasks to forces under that
command for the accomplishment of the mission assigned by higher authority. Under TACOM the gaining
commander may only allocate to the assigned force a specific task consistent for the accomplishment of the
mission and purpose assigned by the higher commander. Under TACOM the assigned force is allocated for
specific tasks, and it is normally allocated for a limited period. This prevents the gaining commander from
employing the assigned force in a role or manner not intended by the higher commander. When the task is
complete or the specific timeframe expires, the TACOM relationship with the gaining force ends.
Tactical Control in NATO
B-50. TACON in NATO is the detailed and usually local direction and control of movements or maneuvers
necessary to accomplish missions or assigned tasks. TACON is generally used to indicate those units that
will be located in another unit or formation’s assigned geographic boundaries, where the gaining unit
becomes responsible for coordination aspects within the shared AO. The gaining commander has authority
to coordinate local defense, including force protection and terrain allocation. |
3-0 | 231 | Appendix C
Contested Deployments
The end for which a soldier is recruited, clothed, armed, and trained, the whole object of
his sleeping, eating, drinking, and marching is simply that he should fight at the right place
and the right time.
Carl von Clausewitz
This appendix discusses unit considerations for conducting deployment operations
contested by a peer threat. It begins with an overview and a discussion of threat
capabilities that can affect force projection. It then covers considerations when moving
from home station to port of embarkation, when in transit from port of embarkation to
port of debarkation, and when conducting reception, staging, onward movement, and
integration (RSOI) in a theater of operations. The appendix further expands upon the
homeland as a specific operational area where homeland defense and defense support
of civil authorities (DSCA) missions will likely be conducted as other units deploy. It
concludes with considerations for training and preparation that Army leaders can
incorporate into preexisting exercises or conduct as separate events.
FORCE PROJECTION AND THREAT CAPABILITIES
C-1. Army forces cannot expect to deploy without being challenged by the threat. For decades, U.S. military
forces conducted uncontested and generally predictable deployments from home stations to operational
theaters because threat actors lacked the capability to significantly affect deploying units at home station or
while in transit to a theater of operations. This is no longer the case. Peer threats possess the capability and
capacity to observe, disrupt, delay, and attack U.S. forces at any stage of force projection, including while
still positioned at home stations in the United States and overseas. Commanders and staffs must therefore
plan and execute deployments with the assumption that friendly forces are always under observation and in
contact.
C-2. A peer threat’s ability to impact U.S. military operations prior to arrival in an operational area extends
beyond directly targeting unit personnel and equipment. The Army relies on various interdependent
infrastructures, the majority of which it does not own or operate, making its domestic operations heavily
reliant on external resources. This includes the use of civilian transportation infrastructure to move from
installations to ports of embarkation, and it also includes home station military dependencies on civilian
infrastructure for power, communications, fuel, water, and other life support.
C-3. During armed conflict, Army forces should expect deployments to be contested by enemy actions in
all domains. Army forces will require greater emphasis on protection functions to conserve combat power
and should expect to provide forces to support homeland defense and DSCA operations. Defending U.S.
territory against attacks by state and non-state actors through an active, layered defense while simultaneously
seeking to project forces in a conflict with a peer enemy requires coordination across organizations, agencies,
and jurisdictions at the local, state, and federal levels.
C-4. Threat actions to contest a deployment are most visible during crisis and armed conflict, but they can
also occur during competition. Army forces deploy globally as part of operations during competition to meet
national objectives, assure allies and partners, and deter adversary malign actions. Adversary abilities to
disrupt these deployments create risks that leaders must assess and mitigate during movement planning and
execution. While a conventional attack on U.S. forces conducting operations during competition is unlikely,
the greater the perceived danger to their vital national interests, the greater the chance a peer threat will
contest U.S. military force projection. Leaders account for this intensified risk during planning and conduct |
3-0 | 232 | Appendix C
training to improve their units’ resilience and ability to mitigate risk, coordinate with appropriate partner
organizations, and respond effectively.
C-5. While a threat’s use of lethal capabilities to target the U.S. homeland or deploying forces is unlikely
before a crisis or the commencement of armed conflict, it may choose to use other methods to surveil and
disrupt Army forces during competition. Russia, China, and other threats possess wide-ranging capabilities
to conduct cyberspace attacks, disrupt space capabilities, and conduct information warfare to influence the
perceptions and behavior of target audiences. Attribution for these malign activities is challenging.
Adversaries take steps to deliberately obscure the source of these activities, and they take full advantage of
the ambiguity provided by operating below the threshold of armed response. Cyberspace attacks can be used
to compromise government, private sector, and military capabilities, potentially targeting military
dependencies on civilian infrastructure. Disruption of space capabilities can be used to hamper
communication and navigation capabilities of both military forces and the civilian infrastructure they rely
upon. Information warfare, including dissemination of or support for disinformation and misinformation, can
be used to attempt to fracture bonds among elements of society. This may include seeking to create or
exacerbate divisions between the military, government, private sector, and the public, both nationally and in
local municipalities.
C-6. Peer threats use a variety of means to understand and predict U.S. and allied force projection, including
open source and cyberspace collection. Army leaders should understand threat collection capabilities to
reduce the chance of effective detection. Different ways threat forces are able to collect on a division’s
deployment are described in this notional scenario.
Notional Threat Open Source and Cyberspace Collection
A division has received prepare to deploy orders. Division leaders considered this
deployment routine, and they failed to address operations security or force protection
at home station during the planning process. As a result, threat forces are able to
understand many details of the pending deployment through open-source and
cyberspace collection.
Threat intelligence agencies read aircraft tail numbers arriving and departing from air
bases that typically support division operations, analyzing observations posted by
hobbyists to assess likely missions and cargo. They also analyze publicly available
movement contracts for taking unit equipment from fort to port. Increased availability
of rental residences near the installation indicates that Soldiers are invoking
deployment clauses in their leases, and decreased availability of personal storage
units indicates Soldiers are storing their belongings for a deployment. Commercially
available applications and databases that track food ordering, cell phone presence and
activity, and other data are used to show a continued staff presence after normal
business hours at the division headquarters.
As the deployment gets closer, Soldier and family member social media posts increase
in volume and provide information about upcoming deployment timelines and
locations. Threat agents go through financial transactions and credit card data stored
on accessible servers to better understand specific unit and key leader timelines and
vulnerabilities. Threat agents also comb through Soldier and family member personal
data collected as part of application and device user agreements. Some of this data,
normally sold for advertising purposes, was purchased through shell companies on the
open market. Other credit, banking, and identity data was illegally obtained on the dark
web or through other illicit methods.
C-7. Threat forces will conduct information warfare operations to slow or otherwise degrade force
projection. These campaigns can vary in scope and size, and may target local communities, Service members, |
3-0 | 233 | Contested Deployments
Department of Defense (DOD) Civilians, contractors, and Soldiers’ family members. This includes, but is
not limited to—
(cid:122) Targeted threats through social media, email, or other means designed to frighten and distract
deploying Soldiers and their families.
(cid:122) Cyberspace attacks against Soldier and family member banks and credit agencies, cutting off or
disrupting access to personal funds.
(cid:122) Cyberspace attacks against civilian infrastructure (including transportation, supply, fuel, and
navigation) used to support military operations.
(cid:122) Targeted strikes against defense communications infrastructure to disrupt communications
between units, installations, and other unified action partners that assist in deployment.
(cid:122) Disinformation dissemination and misinformation support designed to—
(cid:131) Undermine the legitimacy of, or otherwise reduce support for, U.S. Government action.
(cid:131) Incite civil unrest in local communities and along rail and road lines of communications that
deploying forces need or plan to use to reach ports of embarkation.
(cid:131) Reduce trust in future official communications, from government, law enforcement, or
military officials, by releasing disinformation that appears genuine but contains incorrect or
confusing information.
C-8. Threat information warfare operations can be conducted at a very low cost compared to conventional
warfare methods, and they have global reach. At low levels, they can be used to hamper military deployments.
With sufficient scale or precision, they have the potential to completely halt effective unit deployment
operations. Targeted disinformation and threats delivered via social media to the family members of every
Soldier in a unit could potentially be devastating without prior planning, preparation, and trust building.
C-9. Commanders and their staffs must understand the potential effects of adversarial disinformation
operations on units and leaders. Targeted adversary or enemy activities in the information dimension could
rapidly degrade the performance of Soldiers, impacting their readiness. It could also degrade civilian
performance and affect the critical infrastructure they manage. Leaders combat this through public
communications both prior to and during deployment operations, coordination with relevant public affairs
personnel, and Service member and family preparation. This preparation can include incorporating response
strategies for disinformation dissemination into exercises and other training.
C-10. As U.S. forces transition from competition to crisis or armed conflict, threat actors will increase the
intensity and lethality of their tactics. This could include infrastructure sabotage by pre-positioned agents,
cyber or information attacks broader in scope (such as targeting an oil pipeline supplying a large region rather
than only a specific port), or long-range precision strikes using a variety of munitions. Concurrently, they
posture for, and may eventually escalate through, nonlethal and lethal actions of increasing intensity to
improve stand-off and prevent power projection from the U.S. homeland and other basing and staging areas.
Threat actors may also strike transport vessels along sea lines of communication while these vessels are en
route to a seaport of debarkation.
C-11. Peer threats may choose to support proxy forces or influence unwitting groups, including irregular
forces, saboteurs, sympathetic civil organizations, and criminals. These groups may be used to prevent timely
deployment operations by denying access to roads or facilities with crowds, protests, or looting. Use of these
forces may also allow for direct action against U.S. targets while masking culpability. Threat actors may
design these activities to affect the economy and global trade in addition to the political-military balance in
the United States or overseas. Additionally, other state and non-state actors may exploit the situation with
attacks in pursuit of their own objectives. These attacks may be conducted within the United States or allied
nations, in the theater into which Army forces are preparing to deploy, or in other, unrelated regions.
C-12. Leaders anticipate adversary activities in all domains while preparing for or conducting deployment
operations. Disruptions may not be preventable. They can, however, be mitigated through training,
preparation, and coordination with unified action partners. Effective mitigation in planning, preparation, and
execution ensures the Army provides the required forces to combatant commanders (CCDRs) and other joint
force commanders (JFCs). (See AR 525-93 for Army deployment policies and responsibilities.) |
3-0 | 234 | Appendix C
FORT TO PORT
C-13. As part of the strategic support area, home station installations, Reserve Centers, National Guard
Armories, and other designated points of origin are where force projection begins. They present targets that
enemy forces may attack to delay, disrupt, and degrade force flow into theater. Additional vulnerabilities are
present along all routes of movement, and at all potential sea and aerial ports of embarkation. Army forces
at all echelons must comprehensively assess emerging threat capabilities that will impede deployment in a
contested environment. To the greatest extent possible, formations should account for being under constant
observation through strict operations security, including the safeguarding of information on specific
deployment timelines and locations and maintaining dispersion of critical assets. The effects of attacks on
critical military, national, or private infrastructure could halt or delay unit deployment operations before units
have departed the United States.
C-14. Contested deployments are a national issue, and they require coordination with a large number of
civilian unified action partners to overcome the challenges peer threats can create. However, moving Army
forces from military installations to ports of embarkation is also a local and regional challenge. When routine
deployment is not possible, installations and units should have a plan to mitigate deployment disruptions.
C-15. Deployment disruption mitigation planning requires collaboration between the deploying unit, the
installation, appropriate federal, state, and local agencies (both government and law enforcement), and U.S.
Army Reserve and National Guard elements. Installations are responsible for building these relationships and
understanding how threats will likely affect their local areas. Installations do this by modifying their threat
working groups to incorporate relevant military, government, and other local and regional stakeholders. The
working group shares information about threats that promote civil unrest, cyber threats that impact critical
transportation infrastructure, and other threat activities that impact deployment operations. Key planning and
training considerations are—
(cid:122) The local, state, and federal authorities able to mitigate deployment disruptions.
(cid:122) Coordination and relationship building with local, state, and federal civilian law enforcement
agencies to ensure effective movement control from fort to port.
(cid:122) Understanding about critical infrastructure vulnerable to sabotage and unsuited for the movement
of heavy equipment along surface lines of communication, both road and rail.
(cid:122) Planning to use alternate railheads and marshalling yards and multiple lines of communication to
reach ports of embarkation.
(cid:122) Developing alternate surface transportation options to deliver unit equipment to a sea port of
embarkation when rail service is degraded or disrupted.
(cid:122) Establishment of fuel, maintenance, and rest locations along lines of communications.
(cid:122) Implementation of a communication plan that informs the public while maintaining operations
security.
(cid:122) Establishing specific cyber defenses for systems and associated data used to support movement.
C-16. Having an understanding of the requirements and developing mitigation plans to move from the
installation to the assigned port of embarkation can help overcome threat activities that could stop or hinder
deployments. An example of this is using Army heavy equipment transportation systems (known as HETS)
to move tanks, using contract carriers to move other tracked vehicles, and convoying wheeled vehicles to a
seaport of embarkation if rail transportation from the installation is degraded or disrupted.
C-17. To effectively implement a mitigation plan, deploying units and the installation must have an
understanding of the capabilities of civilian infrastructure (such as weight limitations on routes from the
installation to the port). This includes using data from, and potentially requires coordination with, the Military
Surface Deployment and Distribution Command about rail lines and roads designated as part of the strategic
rail and highway corridor networks. Planners must consider the security of critical nodes and terrain along
projected routes and conduct prior coordination with local and state authorities for security. Existing
adversary capabilities that could be used to target civilian infrastructure were exercised during EXERCISE
JACK VOLTAIC 3.0, conducted in 2020. |
3-0 | 235 | Contested Deployments
Adversary Impacts on Civilian Infrastructure
Exercises and research projects provide insight into how peer threats could disrupt the
deployment of Army forces by targeting civilian infrastructure. In the Army Cyber
Institute’s EXERCISE JACK VOLTAIC 3.0, military, interagency, municipal, state, and
commercial partners collaborated to assess interdependencies and available actions
by different stakeholders in response to such targeting.
During the scenario, the movement of military equipment was disrupted by a
combination of traffic delays; social media-incited protests; port access manipulation;
the manipulation of rail and vessel cargo manifests; natural gas and electrical
disruptions; and, ultimately, interference with the weight distribution for the automated
load plan for a ship in port (causing it to tip and dump containers into the shipping
channel).
None of the measures, taken individually, prevented movement of unit equipment from
reaching the destination by the required delivery date. Taken together, however, the
actions caused cascading effects that challenged Army unit and installation leaders,
port officials, and state and municipal government and law enforcement personnel.
C-18. Units establish and maintain an accurate common operational picture (COP) when subordinate or
supported units and equipment are en route to ports of embarkation. This includes maintaining visibility of
friendly forces and potential threat actions. It also encompasses awareness of partner civilian and military
entities supporting the deployment, including law enforcement, mobilized reserve component units, and air
and rail activities.
C-19. Deploying units and installations coordinate with agencies at ports of embarkation to take action should
an adversary’s efforts impact deployment operations. This coordination can help Army forces rapidly adjust
to emerging circumstances. Unit and installation personnel that manage deployments must rapidly develop
new transportation plans if needed, using previously developed branch plans as a start point.
C-20. When load planning, Army leaders and staffs must work with transportation authorities to ensure
sufficient enabling forces are paired with combat arms forces during transit. Army leaders, working with
transportation officials, develop methods to effectively load combat-configured forces in a manner that
maximizes available deck space on the transport vessel while making these units operationally relevant upon
arrival. Generally, it is desirable for tactical units to be configured as company teams or battalion task forces
with the requisite supporting enablers to allow immediate employment.
C-21. In most circumstances when threat actions have not significantly degraded port operations, the port
support activity stevedores load Army equipment once it arrives at the port of embarkation for transport to
the operational theater. In these circumstances, Army forces effectively lose physical control of this
equipment until it arrives in theater. Prior to departure for the port, Army forces coordinate with
transportation and port officials to ensure that unit containers, rolling stock, and other unit equipment sets are
loaded in ways to balance requirements for transport efficiency, combat readiness upon offloading, and risk
to readiness if a transport vessel or craft is destroyed en route.
PORT TO PORT
C-22. Ports of embarkation in the strategic support area, whether in the United States or overseas, are likely
targets of cyberspace attack, space capability degradation or denial, and other impacts designed to reduce
capabilities or capacity as U.S. forces conduct deployment operations into other theaters. During armed
conflict, enemy forces have the range and capacity to target ports with long-range fires, special operations
forces, and other capabilities.
C-23. Port authorities open, close, and manage port operations based on their pre-existing requirements, not
based on what is necessarily most advantageous to a given unit’s deployment requirements. This might
include requirements for other Army forces, the joint force, or other government or commercial entities |
3-0 | 236 | Appendix C
designated as priorities for a period of time. Early, frequent, and detailed coordination with port authorities
helps mitigate potential disruptions to deployment operations. Installations and units incorporate port
officials into deployment readiness exercises and other training events to improve mutual understanding and
effectiveness.
C-24. Adversary actions may directly or indirectly cause port officials to close their port or reduce operations.
If this occurs, and if authority is granted to use another port, commanders consider the impacts to both their
unit and the broader military effort, and to civilian requirements, before recommending or deciding to move
assets to another port of embarkation. Port operations conducted by other government agencies or civilian
officials may take priority over those that Army forces need to conduct based on current local, state, or
national requirements. Additionally, other ports may become congested or disrupted by the time Army forces
arrive. Adhering to the original plan while adapting to challenges at the port is generally less disruptive to
the overall deployment effort than moving to another port.
C-25. Depending on the level of conflict and assessed threat to their interests, peer enemies may attempt to
disrupt or destroy unit equipment while in transit. If all of a unit’s equipment is placed on one transport this
could lead to the catastrophic loss of land component capability for the JFC. Spreading unit equipment across
multiple transport ships increases the likelihood that some will arrive and be available for employment. While
this is not the most efficient or expeditious method to transport Army equipment, it helps ensure that the JFC
receives some employable level of Army tactical and operational capability.
C-26. During armed conflict, Army forces conduct additional protection activities based on enemy
capabilities. Effective targeting by enemy lethal and nonlethal effects will drive protection and mitigation
actions for unit personnel and equipment. Army forces maybe called on to provide additional protection
capabilities to support port authorities. Unit commanders and staffs should balance protection requirements,
both at the port and in-transit, against requirements to get as many critical capabilities to the required
operational theater as quickly as possible and requirements to have combat-ready units arrive at ports of
debarkation for employment by JFCs.
C-27. Whether conducting operations at a port during competition, crisis, or armed conflict, Army forces
coordinate with the relevant authorities to mitigate potential complications at the port. This includes—
(cid:122) Coordinating for products that provide a general layout of the port and flow of port operations.
(cid:122) Obtaining an understanding of transport ship loading.
(cid:122) Understanding port authority structure and decision making.
(cid:122) Understanding reliance of the port on local infrastructure to conduct operations and identifying
potential redundancies (for example, if power is lost can port gantry cranes load containers).
(cid:122) Planning to train Soldiers on port equipment, such as material handling equipment.
C-28. Additional considerations for port-to-port transport are the use of unit personnel to improve, monitor,
and maintain equipment readiness while in transit. Units should anticipate execution of vehicle maintenance
at the port, and leaders may place a limited number of unit personnel on a transport vessel to ensure enabling
and combat arms equipment is ready for immediate employment upon arrival in theater.
RSOI DURING CONTESTED DEPLOYMENTS
C-29. Historically, even during armed conflict, Army forces enjoyed high degrees of sanctuary in rear areas
to receive and organize forces before moving them forward. However, the long-range strike capabilities of
peer adversaries mean that sanctuary to conduct unimpeded RSOI operations in rear areas can no longer be
assumed. It is likely that strikes by peer threats will degrade or destroy port and other transportation
infrastructure vital to U.S force projection. This could cause Army forces to arrive in a disaggregated manner
and disrupt RSOI operations. While integrating U.S. forces in theater could be challenging, Army planners
must also consider host-nation requirements for logistics infrastructure. The host nation’s response to an
attack on its infrastructure, including its military mobilization, can affect freedom of movement for U.S.
forces. All of these challenges may require JFCs to alter their operational plans or stay in a defensive posture
for an extended period until sufficient combat power is built to enable offensive operations.
C-30. The theater army has primary responsibility for conducting RSOI for the entire joint land force. Army
equipment may arrive in a piecemeal fashion across numerous ports. Commanders must establish secure |
3-0 | 237 | Contested Deployments
communications across the distributed footprint, which allows staff coordination for unit personnel to meet
their equipment and facilitate ship offloading. Units provide port support teams with the right personnel and
capabilities to expedite port operations, such as licensed vehicle operators and communications. This helps
ensure ports of debarkation are not congested with disabled equipment or frustrated cargo. If some unit
equipment is lost in transit due to destruction of transport vessels, some tactical unit personnel may be
temporarily held at theater facilities to facilitate re-equipping efforts or be otherwise retasked by the
combatant command or theater army commander.
C-31. If ports are unavailable, are severely degraded, or do not have the draft required for deep draft strategic
sealift vessels, the JFC may consider joint logistics over-the-shore (JLOTS) operations. JLOTS provides the
JFC with a limited capability to discharge strategic sealift ships. JLOTS requires a significant amount of lead
time to build the needed conditions for successful operations, and it entails significant risk that strategic
leaders will need to balance against its potential benefits. (See Chapter 6 of this publication or JP 4-01.6 for
more information on JLOTS.)
C-32. After reception is complete, staging occurs. Staging during force projection contested by a peer threat
requires understanding of threat standoff and friendly protection capabilities. Units must disperse and seek
concealment to improve survivability. Operation plans (OPLANs) should take into account the need for
expanded assembly areas to increase distances between vehicles and between unit assembly areas. As
deploying units assemble, efforts focus on preparing for future operations and integrating into the joint force.
Theater-specific training requirements may need to be conducted while afloat or at home station prior to
movement to the theater to minimize staging timelines.
C-33. Onward movement during contested deployments requires units to execute movement and sustainment
along multiple, dispersed routes. Road, rail, and other lines of communication must be assessed and classified
for use by arriving forces. Units can avoid aggregation, enhance survivability, and achieve balance by
directing personnel, equipment, materiel, and information flow at a rate that can be accommodated at every
point along the entire network, from origin to destination. Key to the onward movement process is speed of
movement to rapidly get combat power to the operational area for employment.
C-34. To facilitate rapid onward movement and overcome the likely degradation of Global Positioning
System (known as GPS) and other enabling transportation technology, units conduct convoy briefs, have
paper maps, and conduct detailed route planning. This helps prepare Soldiers for the unique considerations
of the host-nation transportation infrastructure, and it mitigates vulnerability to threat attacks. Theater-level
personnel may augment or conduct separate briefings to share information about current conditions and threat
tactics.
C-35. RSOI concludes with integration. Effective and efficient integration operations can reduce force
vulnerability by ensuring units quickly assess vulnerabilities and counter potential threats to forces,
infrastructure, and information systems as they transfer capabilities to an operational commander’s force.
When forces are fully integrated, operational control (OPCON) is transferred to the gaining unit. (See Chapter
4 and ATP 3-35 for additional information on RSOI operations.)
HOMELAND DEFENSE AND DEFENSE SUPPORT OF CIVIL
AUTHORITIES
C-36. While Army forces are preparing to deploy during crisis response or armed conflict against a peer
threat, other units may be tasked to support homeland defense or DSCA. The circumstances that lead to
national authorities directing the deployment of Army forces may also necessitate operations to
simultaneously defend the U.S. homeland or support civil authorities. Additionally, the act of deploying
forces may incite enemy attacks on the homeland, causing some forces to be mobilized for homeland defense
or DSCA while others deploy forward to the operational theater. Homeland defense is the protection of United
States sovereignty, territory, domestic population, and critical infrastructure against external threats and
aggression or other threats as directed by the President (JP 3-27). Defense support of civil authorities is
support provided by U.S. Federal military forces, DOD Civilians, DOD contract personnel, DOD component
assets, and National Guard forces (when the Secretary of Defense, in coordination with the governors of the
affected states, elects and requests to use those forces in Title 32, USC status) in response to requests for |
3-0 | 238 | Appendix C
assistance from civil authorities for domestic emergencies, law enforcement support, and other domestic
activities, or from qualifying entities for special events (DODD 3025.18).
C-37. Homeland defense and DSCA operations are conducted in a complex operational environment that
contains layers of different jurisdictions (federal, state, territorial, tribal, and local), many agencies and
organizations, the private sector, and several allies and multinational partners. Interorganizational
coordination and synchronization with governmental and nongovernmental entities may assume a level of
importance not matched in most overseas theaters of operations. Within the same city, Army forces may be
simultaneously conducting different missions, each with distinct authorities and requirements. This could
include adjacent units conducting—
(cid:122) Deployment preparation activities.
(cid:122) Homeland defense missions as directed by U.S. Northern Command or U.S. Indo-Pacific
Command.
(cid:122) DSCA in support of the Department of Homeland Security or other organizations.
C-38. Changes in an operational environment based on threat action or other circumstances may cause
changes to planned and ongoing operations. Army forces preparing to deploy to another theater may be tasked
to support U.S. Army North instead. Additionally, units conducting DSCA may be required to transition to
homeland defense, or vice versa. Commanders and staffs must remain agile to ensure they understand the
responsibilities and authorities for different missions, remaining in constant contact with other unified action
partners to ensure shared understanding. Depending on mission requirements and available personnel, this
may include agency representatives, liaison officers, and staff representatives able to collaborate, share
information, analyze ongoing activities, and participate in planning.
HOMELAND DEFENSE
C-39. When conducting homeland defense missions, U.S. Army North has been designated to serve as the
land component command for U.S. Northern Command. Depending on the threat, defending critical
infrastructure and maintaining force projection capability for joint and Army forces will require significant
augmentation and cross-command integration. Commercial infrastructure plays a critical role in enabling the
communications systems that directly support operations. This infrastructure may be damaged to the point
that military and supporting operations are adversely affected.
C-40. Protection functions are essential during any operation, and they take on specific importance during
homeland defense. Protection during homeland defense includes measures and activities not only conducted
for use by the joint force, but also for commercial, law enforcement, and government partners. These
protection functions can be supported through a number of activities. Planning for these operations should
include deception, mobility, dispersion, systems resiliency and redundancy, protective construction, warning
and surveillance, and operations security. Additional coordination will be required if Army units are tasked
to provide these capabilities for government and commercial partners or to build upon existing capabilities
so that partners can conduct them themselves.
C-41. Army forces support joint force and national efforts to provide the latest relevant information to the
American public while maintaining operations security, and they will also counter disinformation posted on
social media and distributed through other means. Timely, relevant, and effective responses are critical to
mission accomplishment when a peer threat is using high volumes of disinformation to achieve its objectives.
Unit commanders and other leaders follow their supported command’s public affairs guidance and act in a
supporting role to local, state, and federal agencies.
DEFENSE SUPPORT OF CIVIL AUTHORITIES
C-42. Army support of civil authorities is vital to enabling other units that are deploying under contested
conditions. The range of DSCA responses by Army forces includes support provided by the Regular Army,
activated Army Reserve, and the National Guard in Title 32 United States Code (USC) or Title 10 USC
status. Even in the absence of orders or in uncertain and chaotic situations, units providing support in the
homeland enable core DSCA activities to provide support for domestic disasters, provide support for
domestic CBRN incidents, provide support for domestic civilian law enforcement, and provide other
designated domestic support. Domestic military operations are constrained by statute and policy to a greater |
3-0 | 239 | Contested Deployments
degree than military operations conducted abroad, and units should become familiar with requisite
authorities.
C-43. Homeland defense and DSCA operations may also be conducted in a wide range of circumstances not
tied to the preparation or execution of force projection to another operational theater. This can include
responses to both external and internal threats, natural or manmade disasters, support to law enforcement,
and other activities. (See DODD 3025.18, JP 3-27, JP 3-28, and ADP 3-28 for more information on DSCA
and homeland defense.)
TRAINING AND PREPARATION CONSIDERATIONS
C-44. Training and preparation to conduct deployment operations contested by threat forces will stress joint
and unified action partner interoperability and coordination. The Army and other unified action partners
conduct joint deployment exercises whenever possible, develop information and intelligence sharing
architectures, and collaborate during other preparation activities. Preparing for a contested deployment,
defending the homeland, and executing DSCA operations are not primary considerations for most Army
units. However, when preparing for large-scale combat operations, units should augment their training plans
to help prepare for deployments contested by threat forces and related activities. Examples include—
(cid:122) Conduct deployment readiness exercises that include port authority, law enforcement, and other
stakeholder participation from municipal, state, federal, and commercial organizations.
(cid:122) Conduct a road march to a training center rotation from an Army installation to simulate extended
convoy operations and test maintenance capability of Army equipment and personnel.
(cid:122) Conduct tabletop exercises with members of the installation threat working group to discover gaps
in planning and build a cohesive team.
(cid:122) Conduct training with local communities to test the ability of the installation and local law
enforcement to handle demonstrations that may occur due to misinformation.
(cid:122) Conduct training to improve Soldier and family member awareness of likely threat information
warfare actions and potential response strategies.
(cid:122) Coordinate to ensure installation and unit threat working groups, emergency response centers, and
cyber security measures are expanded to account for critical civilian dependencies, including
reliance on civilian infrastructure.
(cid:122) Establish and test a primary, alternate, contingency, and emergency (known as PACE)
communication plan among key Army units, installations, armories, and unified action partners
that facilitate deployment operations.
(cid:122) Identify requisite command and logistics nodes along primary and alternate routes to ports of
embarkation, across multiple modes of transportation if appropriate.
(cid:122) Prepare numerous road march plans to compensate for degraded or disrupted lines of
communications.
(cid:122) Maintain port overview packages for likely ports of embarkation.
(cid:122) Build and implement an installation strategic communication plan that informs the public while
maintaining operations security.
(cid:122) Prepare Soldiers and family members for extended periods of no direct connectivity during initial
stages of crisis or armed conflict to maintain operations security.
(cid:122) Create plans for direct communication between Army installations and family members during
the initial stages of a crisis or armed conflict to help mitigate the effects of threat disinformation
and answer family questions.
(cid:122) Ensure ready access to relief funds and supplies for dependents in case of threat attacks against
financial institutions.
(cid:122) Work with local, state, and federal law enforcement agencies to build relationships and understand
requirements if later tasked to conduct homeland defense or DSCA. |
3-0 | 241 | Source Notes
This division lists sources by page number. Where material appears in a paragraph, it
lists the page number followed by the paragraph number. All websites accessed on 23
August 2022.
1-1 “War is thus an act…”; Carl von Clausewitz, On War, translated and edited by Michael
Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1988), 75.
1-3 “We don’t maintain…” Ronald Reagan, “Radio Address to the Nation on the Observance of
Armed Forces Day.” (21 May 1983). Available at
https://www.reaganlibrary.gov/archives/speech/radio-address-nation-observance-armed-
forces-day.
1-5. “[We] now need another…” Barbara W. Tuchman, “Generalship,” Parameters, The US Army
War College Quarterly: Parameters, Volume 2, Number 1 (1972). Available at
https://press.armywarcollege.edu/parameters/vol2/iss1/18/.
1-16 “Since men live upon…”: Julian S. Corbett, Some Principles of Maritime Strategy
(Annapolis, MD: Naval Institute Press, 1988), 16.
2-1 “If you know the enemy and know yourself…” Sun Tzu quoted in Thomas R. Phillips, ed.,
Roots of Strategy (Harrisburg, PA: Stackpole Books, 1985), 50.
2-9 Systems Warfare and Sanctuary: Eastern Ukraine, 2014. Vignette adapted from Army
University Press staff, unpublished text, 2017.
2-12 “[S]eparate ground, air…”; Dwight D. Eisenhower, “Special Message to the Congress on
Reorganization of the Defense Establishment, 3 April 1958.” Available at
https://www.eisenhowerlibrary.gov/eisenhowers/quotes.
3-1 “There are not more …”; Sun Tzu, quoted in Thomas R. Phillips, ed., Roots of Strategy
(Harrisburg, PA: Stackpole Books, 1985), 28.
3-2 “The art of war…”; Infantry in Battle by The Infantry Journal Inc. (Washington, DC, 1939),
1.Available at https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-
books/infantry-in-battle.pdf.
3-13 Second Nagorno Karabakh War: September–November 2020. Vignette adapted from
Phillip Andrews, “Lessons from the Nagorno-Karabakh 2020 Conflict” (Center for Army
Lessons Learned Catalog). August 2021.21-655. https://call2.army.mil/docs/doc18162/21-
655.pdf (accessed on 16 August 2022): 1, 3-5. Edward Erickson. The 44-Day War in
Nagorno-Karabakh: Turkish Drone Success or Operational Art? (Military Review. August
2021.) Available at https://www.armyupress.army.mil/Portals/7/military-review/img/Online-
Exclusive/2021/erickson/Erickson-the-44-day-war.pdf (accessed on 17 August 2022): 11.
Matthew Santaspirt and Luke Shabro, host. “Top Attack: Lessons Learned from the Second
Nagorno-Karabakh War.” (The Convergence: An Army Mad Scientist Podcast, episode 317, 1
April 2021.) Available at https://madsciblog.tradoc.army.mil/317-top-attack-lessons-learned-
from-the-second-nagorno-karabakh-war/.
4-1 “In all history…”; Dwight D. Eisenhower on the formation of NATO. Available at
https://www.presidency.ucsb.edu/documents/remarks-the-opening-the-nato-meetings-paris.
4-5 Failure to Prepare for War: Philippines, 1941. Vignette adapted from Louis Morton, The
Fall of the Philippines (Washington, DC: Center of Military History, 1993), 14–15, 18, 32–
33, 35–36, 43–45, 48, 50, 457, 467, 560–561. Available at
https://history.army.mil/html/books/005/5-2-1/CMH_Pub_5-2-1.pdf. |
3-0 | 242 | Source Notes
4-9 “There is only…”; Winston Churchill, quoted in Field Marshall Alan Francis Brooke in
Diaries, 1939-1946. Available at
https://kingscollections.org/catalogues/lhcma/collection/a/br60-001/br60-05/br60-05-
1?id=1022&asId=as1.
4-10 Successful Engagement: State Partnership Program. Vignette adapted from the State
Partnership Program website, https://www.nationalguard.mil/leadership/joint-staff/j-
5/international-affairs-division/state-partnership-program/.
4-12 Liberia: OPERATION UNITED ASSISTANCE. Vignette adapted from
https://usacac.army.mil/sites/default/files/publications/16-22.pdf.
5-1 “The 1930’s…”; John F. Kennedy, Radio and television address to the American people on
the Soviet arms build-up in Cuba, 22 October 1962. Available at
https://www.jfklibrary.org/learn/about-jfk/historic-speeches/address-during-the-cuban-
missile-crisis.
5-7 Effective Response: OPERATION PAUL BUNYAN. Vignette adapted from Joint Chiefs
of Staff briefing folder “Korea–Operation Paul Bunyan” of the Presidential County Files for
East Asia and the Pacific, Box 10, 1974–77, Gerald R. Ford Presidential Library. Available at
https://www.fordlibrarymuseum.gov/library/document/0324/1553751.pdf. Reed R. Probst
Negotiating with the North Koreans: the U.S. Experience at Panmunjom, 16 May 1977, U.S.
Army War College, Carlisle Barracks PA. Available at
https://apps.dtic.mil/sti/pdfs/ADA042858.pdf.
5-10 Deployment Friction: Task Force Ironhorse in OPERATION IRAQI FREEDOM.
Vignette adapted from Christopher D. Croft and Kelvin D. Crow, “Creatively Deploying the
Heavy Division: Getting the 4th Infantry Division to Iraq in 2003,” Army University Press
website, https://www.armyupress.army.mil/Books/Browse-Books/iBooks-and-
EPUBs/Deploying-the-Heavy-Division/.
5-15 Crisis Response: Baghdad Embassy Attack. Combined Arms Doctrine Doctorate staff,
unpublished text, 2021.
5-16 “In the midst…”; Barbara Tuchman, Guns of August (New York: Ballantine Books, 1962),
485.
6-1 “The art of war…”; Ulysses S. Grant, statement to John Hill Brinton at the start of his
Tennessee River campaign, early 1862, in John H. Brinton, Personal Memoirs of John H.
Brinton, Major and Surgeon U.S.V., 1861–1865 (1914; reproduced Carbondale, IL: Southern
Illinois University, 1996), 239.
6-23 Defeat of the North Korean People’s Army, September 1950. Vignette adapted from
Department of Defense, Headquarters X Corps, War Diary Summary for Operation Chromite
15 August to 30 September 1950 (1950), 1–2. Available at
https://cgsc.contentdm.oclc.org/digital/collection/p4013coll11/id/1569/rec/2; and Department
of Military Art and Engineering, United States Military Academy Operations in Korea (West
Point, NY: Department of Military Art and Engineering, United States Military Academy,
1953), II-1–II15. Available at
https://cgsc.contentdm.oclc.org/digital/collection/p4013coll11/id/1330/rec/19.
6-26 Disintegration of Egyptian Defense: 1973 Arab-Israeli War. Vignette adapted from
George W. Gawrych, the 1973 Arab-Israeli War: The Albatross of Decisive Victory (Combat
Studies Institute: U.S. Army Command and General Staff College, 1996), 5–14, 27–36, 59–
65, 68. Available at https://apps.dtic.mil/sti/pdfs/ADA323718.pdf. Historical Evaluation and
Research Organization, Analysis of Factors that have Influenced Outcomes of Battles and
Wars: A Data Base of Battles and Engagements, Vol. VI (report prepared for the U.S. Army
Concepts and Analysis Agency, June 1983), 203–221. Available at
https://apps.dtic.mil/dtic/tr/fulltext/u2/b087722.pdf.
6-31 “Even in the defensive position...” Carl von Clausewitz, On War translated and edited by
Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1988), 357.
6-40 “For I am convinced...” General Donn A. Starry, Press On! Selected Works of General Donn
A.Starry Volume 1: Selected, edited, edited, annotated, and with an introductory essay by |
3-0 | 243 | Source Notes
Lewis Sorley (Combat Studies Institute Press, U.S. Army Combined Arms Center, Fort
Leavenworth, Kansas, First Printing, September 2009), 249. Available at
https://www.tradoc.army.mil/wp-content/uploads/2020/10/a507478-Press-On-General-Starry-
Works-Vol-1-Sorley.pdf.
7-1 “The basic objectives…”; Chester W. Nimitz, “Employment of Naval Forces: Who
Commands Sea Commands Trade,” Monthly NEWSLETTER (March 1948). Available at
https://www.history.navy.mil/content/history/nhhc/research/library/online-reading-room/title-
list-alphabetically/e/employment-of-naval-forces.html.
7-6 Faulty Assumptions—Defeat Across Multiple Domains in Malaya. Malaya and Singapore:
Faulty Assumptions—Defeat Across Multiple Domains, Army University Press Staff,
Unpublished text, 2017.
7-7 “Amphibious warfare requires…”; Henry K. Hewitt, quoted in JP 3-02.
7-10 “A landing on…”; Basil H. Liddell Hart, quoted in Vice Admiral George Carroll Dyer, The
Amphibians Came to Conquer: The Story of Admiral Richmond Kelly Turner, Volume 1
(Washington, DC: U.S. Government Printing Office, 1969), 318. Available at
https://www.marines.mil/Portals/1/Publications/FMFRP%2012-109-
I%20%20The%20Amphibians%20Came%20to%20Conquer%20-%20Vol%20I.pdf.
8-1 “Success ultimately…”; Colin Powell, It Worked for Me (New York: HarperCollins
Publishing, 2014), 18.
8-2 “One of the most…”; William Joseph Slim, Unofficial History (New York: Orion Publishing
Group, 1962. Reprinted by Pen & Sword Books), 156.
8-3 Commanding Forward—LTG Eichelberger at Buna. Vignette adapted from Thomas M.
Huber, “Eichelberger at Buna: A Study in Battle Command,” in Studies in Battle Command
(Fort Leavenworth, KS: US Army Command and General Staff College: GPO, 1995),
123-128. Available at https://www.armyupress.army.mil/Portals/7/combat-studies-
institute/csi-books/battles.pdf.
8-4 “The fog of…”; George S. Patton, quoted in Pat Williams, The Paradox of Power (Anderson,
IN: Warner Press, 2002), 168.
8-7 Initiative in the Absence of Orders – Naval Bombers at Midway. Vignette adapted from
The Battle of Midway Including the Aleutian Phase, June 3 to June 14, 1942, Strategical and
Tactical Analysis. Richard W. Bates Naval War College 1948, Available at
https://apps.dtic.mil/sti/pdfs/ADA003054.pdf. “Battle of Midway, 4-7 June 1942.” Naval
History and Heritage Command. Available at https://www.history.navy.mil/browse-by-
topic/wars-conflicts-and-operations/world-war-ii/1942/midway.html. H-072-1: Torpedo
Squadron 8's TBF Avenger Detachment in the Battle of Midway. Samuel J. Cox, Director
NHHC, May 2022. Available at https://www.history.navy.mil/about-
us/leadership/director/directors-corner/h-grams/h-gram-072/h-072-1.html.
8-10 Crosstalk in the Desert—VII Corps in the Gulf War. Vignette adapted from TRADOC
Pam 525-100-1 [obsolete], Leadership and Command on the Battlefield: Operations JUST
CAUSE and DESERT STORM (Fort Monroe, VA: HQ, TRADOC, 1992), 28. Available at
https://cgsc.contentdm.oclc.org/digital/collection/p4013coll9/id/690.
8-10 “Judgment comes from…”; Simon Bolivar Buckner, as quoted by Omar N. Bradley in
“Leadership: An Address to the US Army War College, 07 Oct. 71,” Parameters 1, no. 3
(1972): 8. Available at
https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1034&context=parameters.
8-12 “More than 50…”; Frederick Franks, “Battle Command: A Commander’s Perspective,”
Military Review (May-June 1996): 4–25. Available at
https://cgsc.contentdm.oclc.org/digital/collection/p124201coll1/id/438/.
A-1 “The art of war…”; Frederick the Great, Unterhaltungen mit Friedrich dem Grossen.
Memoiren und Tagebücher von Heinrich de Catt, edited by Reinhold Koser, Leipzig, 1884.
B-1 “Nothing is more important...”. Napoleon Bonaparte, quoted in T.R. Phillips, Roots of
Strategy (Lanham, MD: Stackpole Books, 1985), 427. |
3-0 | 244 | Source Notes
C-1 “The end for which a soldier is...”. Carl von Clausewitz, On War, translated and edited by
Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1988). 95.
C-2 Notional Threat Open Source and Cyberspace Collection. Combined Arms Doctrine
Doctorate staff, unpublished text, 2021.
C-5 Adversary Impacts on Civilian Infrastructure “Jack Voltaic 3.0”; Jack Voltaic 3.0: Cyber
Research Report (West Point, NY: Army Cyber Institute). Available at
https://cyber.army.mil/Research/Jack-Voltaic/. |
3-0 | 245 | Glossary
The glossary lists acronyms and terms with Army or joint definitions. Where Army and
joint definitions differ, (Army) precedes the definition. The proponent publication for
terms is listed in parentheses after the definition.
SECTION I – ACRONYMS AND ABBREVIATIONS
A2 antiaccess
AAMDC Army air and missile defense command
AD area denial
ADA air defense artillery
ADCON administrative control
ADP Army doctrine publication
AFTTP Air Force tactics, techniques, and procedures
AJP Allied joint publication
AMD air and missile defense
AO area of operations
AOR area of responsibility
APS Army pre-positioned stocks
AR Army regulation
ASCC Army Service component command
ASOS Army support to other Services
ATP Army techniques publication
BCD battlefield coordination detachment
BCT brigade combat team
C2 command and control
CBRN chemical, biological, radiological, and nuclear
CCDR combatant commander
CCIR commander’s critical information requirement
CCP combatant command campaign plan
CFLCC coalition forces land component commander
COCOM combatant command (command authority)
COP common operational picture
DOD Department of Defense
DODD Department of Defense directive
DSCA defense support of civil authorities
FDO flexible deterrent option
FID foreign internal defense |
3-0 | 246 | Glossary
FM field manual
FRO flexible response option
FULLCOM full command
ISR intelligence, surveillance, and reconnaissance
JFC joint force commander
JFLCC joint force land component commander
JLOTS joint logistics over-the-shore
JOA joint operations area
JP joint publication
JSA joint security area
JTF joint task force
MCRP Marine Corps Reference Publication
MCTP Marine Corps tactical publication
MCWP Marine Corps Warfighting Publication
MDTF multi-domain task force
METT-TC (I) mission, enemy, terrain and weather, troops and support available, time
available, civil considerations, and informational considerations
MIB-T military intelligence brigade-theater
NATO North Atlantic Treaty Organization
NEO noncombatant evacuation operation
NKPA North Korean People’s Army
NTTP Navy tactics, techniques, and procedures
OPCOM operational command
OPCON operational control
OPLAN operation plan
RSOI reception, staging, onward movement, and integration
SFA security force assistance
SFAB security force assistance brigade
SHORAD short-range air defense
STANAG standardization agreement
TACOM tactical command
TACON tactical control
TEC theater engineer command
TPFDD time-phased force and deployment data
TRADOC United States Army Training and Doctrine Command
TSC theater sustainment command
UAS unmanned aircraft system
U.S. United States
USAFFE United States Army Forces in the Far East
USAID United States Agency for International Development
USC United States Code
USSOCOM United States Special Operations Command |
3-0 | 247 | Glossary
SECTION II – TERMS
administrative control
Direction or exercise of authority over subordinate or other organizations in respect to administration
and support. (JP 1, Volume 2)
adversary
A party acknowledged as potentially hostile to a friendly party and against which the use of force may
be envisaged. (JP 3-0)
*agility
The ability to move forces and adjust their dispositions and activities more rapidly than the enemy.
air domain
The atmosphere, beginning at the Earth’s surface, extending to the altitude where its effects upon
operations become negligible. (JP 3-30)
antiaccess
Action, activity, or capability, usually long-range, designed to prevent an enemy force from entering an
operational area. (JP 3-0)
area defense
A type of defensive operation that concentrates on denying enemy forces access to designated terrain
for a specific time rather than destroying the enemy outright. (ADP 3-90)
area denial
Action, activity, or capability, usually short-range, designed to limit an enemy force’s freedom of
action within an operational area. (JP 3-0)
area of influence
An area inclusive of and extending beyond an operational area wherein a commander is capable of
direct influence by maneuver, fire support, and information normally under the commander’s
command or control. (JP 3-0)
area of interest
That area of concern to the commander, including the area of influence, areas adjacent to it, and
extending into enemy territory. (JP 3-0)
area of operations
An operational area defined by a commander for the land or maritime force commander to accomplish
their missions and protect their forces. (JP 3-0)
area reconnaissance
A type of reconnaissance operation that focuses on obtaining detailed information about the terrain or
enemy activity within a prescribed area. (ADP 3-90)
area security
A type of security operation conducted to protect friendly forces, lines of communications, and
activities within a specific area. (ADP 3-90)
ARFOR
The Army component and senior Army headquarters of all Army forces assigned or attached to a
combatant command, subordinate joint force command, joint functional command, or multinational
command. (FM 3-94)
attack
A type of offensive operation that destroys or defeats enemy forces, seizes and secures terrain, or both.
(ADP 3-90) |
3-0 | 248 | Glossary
battle
A set of related engagements that lasts longer and involves larger forces than an engagement.
(ADP 3-90)
breach
A synchronized combined arms activity under the control of the maneuver commander conducted to
allow maneuver through an obstacle. (ATP 3-90.4)
civil preparation of the environment
The continuous development of civil knowledge within an area of operations to help commanders
identify capabilities within civil society that can be integrated with operations for stability and security
activities. (FM 3-57)
civil reconnaissance
A targeted, planned, and coordinated observation and evaluation of specific civil aspects of the
environment such as areas, structures, capabilities, organizations, people, or events. (JP 3-57)
clearing
A mobility task that involves the elimination or neutralization of an obstacle that is usually performed
by follow-on engineers and is not done under fire. (ATP 3-90.4)
close combat
Warfare carried out on land in a direct-fire fight, supported by direct and indirect fires and other assets.
(ADP 3-0)
*close operations
Tactical actions of subordinate maneuver forces and the forces providing immediate support to them,
whose purpose is to employ maneuver and fires to close with and destroy enemy forces.
close support
The action of the supporting force against targets or objectives that are sufficiently near the supported
force as to require detailed integration or coordination of the supporting action. (JP 3-31)
combat power
The total means of destructive and disruptive force that a military unit/formation can apply against an
enemy at a given time. (JP 3-0)
combined arms
The synchronized and simultaneous application of arms to achieve an effect greater than if each
element was used separately or sequentially. (ADP 3-0)
command and control warfighting function
The related tasks and a system that enable commanders to synchronize and converge all elements of
combat power. (ADP 3-0)
commander’s intent
A clear and concise expression of the purpose of an operation and the desired objectives and military
end state. (JP 3-0)
common operational picture
(Army) A display of relevant information within a commander’s area of interest tailored to the user’s
requirements and based on common data and information shared by more than one command.
(ADP 6-0)
contingency plan
A branch of a campaign plan that is planned based on hypothetical situations for designated threats,
catastrophic events, and contingent missions outside of crisis conditions. (JP 5-0)
*conventional warfare
A violent struggle for domination between nation-states or coalitions of nation-states. |
3-0 | 249 | Glossary
consolidate gains
Activities to make enduring any temporary operational success and to set the conditions for a
sustainable security environment, allowing for a transition of control to other legitimate authorities.
(ADP 3-0)
*convergence
An outcome created by the concerted employment of capabilities from multiple domains and echelons
against combinations of decisive points in any domain to create effects against a system, formation,
decision maker, or in a specific geographic area.
countermobility
A set of combined arms activities that use or enhance the effects of natural and man-made obstacles to
prevent the enemy freedom of movement and maneuver. (ATP 3-90.8)
cover
(Army) A type of security operation done independent of the main body to protect them by fighting to
gain time while preventing enemy ground observation of and direct fire against the main body.
(ADP 3-90)
crisis
An emerging incident or situation involving a possible threat to the United States, its citizens, military
forces, or vital interests that develops rapidly and creates a condition of such diplomatic, economic, or
military importance that commitment of military forces and resources is contemplated to achieve
national and/or strategic objectives. (JP 3-0)
*cyberspace domain
(Army) The interdependent networks of information technology infrastructures and resident data,
including the Internet, telecommunication networks, computer systems, embedded processors and
controllers, and relevant portions of the electromagnetic spectrum (ADP 3-0)
decisive point
Key terrain, key event, critical factor, or function that, when acted upon, enables commanders to gain a
marked advantage over an enemy or contribute materially to achieving success. (JP 5-0)
*deep operations
Tactical actions against enemy forces, typically out of direct contact with friendly forces, intended to
shape future close operations and protect rear operations.
defeat
To render a force incapable of achieving its objectives. (ADP 3-0)
defeat in detail
Concentrating overwhelming combat power against separate parts of a force rather than defeating the
entire force at once. (ADP 3-90)
defeat mechanism
A method through which friendly forces accomplish their mission against enemy opposition.
(ADP 3-0)
defense support of civil authorities
Support provided by U.S. Federal military forces, DOD Civilians, DOD contract personnel, DOD
component assets, and National Guard forces (when the Secretary of Defense, in coordination with the
governors of the affected states, elects and requests to use those forces in Title 32, USC status) in
response to requests for assistance from civil authorities for domestic emergencies, law enforcement
support, and other domestic activities, or from qualifying entities for special events. (DODD 3025.18)
defensive operation
An operation to defeat an enemy attack, retain key terrain, gain time, and develop conditions favorable
for offensive or stability operations. (ADP 3-0) |
3-0 | 250 | Glossary
deployment
The movement of forces into and out of an operational area. (JP 3-35)
depth
The extension of operations in time, space, or purpose to achieve definitive results. (ADP 3-0)
destroy
A tactical mission task that physically renders an enemy force combat-ineffective until it is
reconstituted. Alternatively, to destroy a combat system is to damage it so badly that it cannot perform
any function or be restored to a usable condition without being entirely rebuilt. (FM 3-90-1)
direct liaison authorized
That authority granted by a commander (any level) to a subordinate to directly consult or coordinate an
action with a command or agency within or outside of the granting command. (JP 1, Volume 2)
direct support
A mission requiring a force to support another specific force and authorizing it to answer directly to
the support force’s request for assistance. (JP 3-09.3)
*direct support
(Army) A support relationship requiring a force to support another specific force and authorizing it to
answer directly to the supported force’s request for assistance.
*disintegrate
To disrupt the enemy’s command and control, degrading the synchronization and cohesion of its
operations.
*dislocate
To employ forces to obtain significant positional advantage in one or more domains, rendering the
enemy’s dispositions less valuable, perhaps even irrelevant.
*domain
A physically defined portion of an operational environment requiring a unique set of warfighting
capabilities and skills.
electromagnetic reconnaissance
The detection, location, identification, and evaluation of foreign electromagnetic radiations (energy).
(JP 3-85)
electromagnetic warfare
Military action involving the use of electromagnetic and directed energy to control the electromagnetic
spectrum or to attack the enemy. (JP 3-85)
end state
The set of required conditions that defines achievement of the commander’s objectives. (JP 3-0)
*endurance
The ability to persevere over time throughout the depth of an operational environment.
enemy
A party identified as hostile against which the use of force is authorized. (ADP 3-0)
engagement
A tactical conflict, usually between opposing lower echelon maneuver forces. (JP 3-0)
essential element of friendly information
A critical aspect of a friendly operation that, if known by a threat would subsequently compromise,
lead to failure, or limit success of the operation and therefore should be protected from enemy
detection. (ADP 6-0) |
3-0 | 251 | Glossary
exploitation
(Army) A type of offensive operation that usually follows a successful attack and is designed to
disorganize the enemy in depth. (ADP 3-90)
fires warfighting function
The related tasks and systems that create and converge effects in all domains against the adversary or
enemy to enable operations across the range of military operations. (ADP 3-0)
fixing force
A force designated to supplement the striking force by preventing the enemy from moving from a
specific area for a specific time. (ADP 3-90)
force projection
The ability to project the military instrument of national power from the United States, or another
theater in response to requirements for military operations. (JP 3-0)
force tailoring
The process of determining the right mix of forces and the sequence of their deployment in support of
a joint force commander. (ADP 3-0)
forcible entry
Seizing and holding of a military lodgment in the face of armed opposition or forcing access into a
denied area to allow movement and maneuver to accomplish the mission. (JP 3-18)
foreign internal defense
Participation by civilian agencies and military forces of a government or international organizations in
any of the programs and activities undertaken by a host nation government to free and protect its
society from subversion, lawlessness, insurgency, terrorism, and other threats to its security. (JP 3-22)
forward passage of lines
Occurs when a unit passes through another unit’s positions while moving toward the enemy.
(ADP 3-90)
friendly force information requirement
Information the commander and staff need to understand the status of friendly force and supporting
capabilities. (JP 3-0)
gap
A ravine, mountain pass, river, or other terrain feature that presents an obstacle that may be bridged.
(ATP 3-90.4)
general support
Support given to the supported force as a whole and not to any particular subdivision thereof.
(JP 3-09.3)
*general support—reinforcing
(Army) A support relationship assigned to a unit to support the force as a whole and to reinforce
another similar type unit.
guard
A type of security operation done to protect the main body by fighting to gain time while preventing
enemy ground observation of and direct fire against the main body. (ADP 3-90)
homeland defense
The protection of United States sovereignty, territory, domestic population, and critical infrastructure
against external threats and aggression or other threats as directed by the President. (JP 3-27)
*human dimension
Encompasses people and the interaction between individuals and groups, how they understand
information and events, make decisions, generate will, and act within an operational environment. |
3-0 | 252 | Glossary
*informational considerations
Those aspects of the human, information, and physical dimensions that affect how humans and
automated systems derive meaning from, use, act upon, and are impacted by information.
information collection
An activity that synchronizes and integrates the planning and employment of sensors and assets and as
well as the processing, exploitation, and dissemination systems in direct support of current and future
operations. (FM 3-55)
*information dimension
The content and data that individuals, groups, and information systems communicate and exchange, as
well as the analytics and technical processes used to exchange information within an operational
environment.
integration
The arrangement of military forces and their actions to create a force that operates by engaging as a
whole. (JP 1, Volume 1)
intelligence preparation of the battlefield
The systematic process of analyzing the mission variables of enemy, terrain, weather, and civil
considerations in an area of interest to determine their effect on operations. (ATP 2-01.3)
intelligence warfighting function
The related tasks and systems that facilitate understanding the enemy, terrain, weather, civil
considerations, and other significant aspects of the operational environment. (ADP 3-0)
interagency coordination
The planning and synchronization of efforts that occur between elements of Department of Defense
and participating United States Government departments and agencies. (JP 3-0)
interoperability
The ability to act together coherently, effectively, and efficiently to achieve tactical, operational, and
strategic objectives. (JP 3-0)
interorganizational cooperation
The interaction that occurs among elements of the Department of Defense; participating United States
Government departments and agencies; state, territorial, local, and tribal agencies; foreign military
forces and government agencies; international organizations; nongovernmental organizations; and the
private sector. (JP 3-08)
*irregular warfare
(Army) The overt, clandestine, and covert employment of military and non-military capabilities across
multiple domains by state and non-state actors through methods other than military domination of an
adversary, either as the primary approach or in concert with conventional warfare.
isolate
To separate a force from its sources of support in order to reduce its effectiveness and increase its
vulnerability to defeat. (ADP 3-0)
joint force
A force composed of elements, assigned or attached, of two or more Military Departments operating
under a single joint force commander. (JP 3-0)
joint operations
Military actions conducted by joint forces and those Service forces employed in specified command
relationships with each other, which, of themselves, do not establish joint forces. (JP 3-0)
joint security area
A specific area to facilitate protection of joint bases and their connecting lines of communications that
support joint operations. (JP 3-10) |
3-0 | 253 | Glossary
land domain
The area of the Earth’s surface ending at the high water mark and overlapping with the maritime
domain in the landward segment of the littorals. (JP 3-31)
large-scale combat operations
Extensive joint combat operations in terms of scope and size of forces committed, conducted as a
campaign aimed at achieving operational and strategic objectives. (ADP 3-0)
leadership
The activity of influencing people by providing purpose, direction, and motivation to accomplish the
mission and improve the organization. (ADP 6-22)
*lethality
The capability and capacity to destroy.
levels of warfare
A framework for defining and clarifying the relationship among national objectives, the operational
approach, and tactical tasks. (ADP 1-01)
lighterage
The process in which small craft are used to transport cargo or personnel from ship-to-shore using
amphibians, landing craft, discharge lighters, causeways, and barges. (JP 4-01.6)
lodgment
A designated area in a hostile or potentially hostile operational area that, when seized and held, makes
the continuous landing of troops and materiel possible and provides maneuver space for subsequent
operations. (JP 3-18)
main effort
A designated subordinate unit whose mission at a given point in time is most critical to overall mission
success. (ADP 3-0)
maritime domain
The oceans, seas, bays, estuaries, islands, coastal areas, and the airspace above these, including the
littorals. (JP 3-32)
meeting engagement
A combat action that occurs when a moving force, incompletely deployed for battle, engages an enemy
at an unexpected time and place. (ADP 3-90)
military engagement
Contact and interaction between individuals or elements of the Armed Forces of the United States and
those of another nation’s armed forces, or foreign and domestic civilian authorities or agencies, to
build trust and confidence, share information, coordinate mutual activities, and maintain influence.
(JP 3-0)
mobile defense
A type of defensive operation that concentrates on the destruction or defeat of the enemy through a
decisive attack by a striking force. (ADP 3-90)
mobility
A quality or capability of military forces which permits them to move from place to place while
retaining the ability to fulfill their primary mission. (JP 3-36)
mobility tasks
Those combined arms activities that mitigate the effects of obstacles to enable freedom of movement
and maneuver. (ATP 3-90.4)
mobilization
The process by which the Armed Forces of the United States, or part of them, are brought to a state of
readiness for war or other national emergency. (JP 4-05) |
3-0 | 254 | Glossary
movement and maneuver warfighting function
The related tasks and systems that move and employ forces to achieve a position of relative advantage
over the enemy and other threats. (ADP 3-0)
movement to contact
(Army) A type of offensive operation designed to develop the situation and to establish or regain
contact. (ADP 3-90)
*multidomain operations
The combined arms employment of joint and Army capabilities to create and exploit relative
advantages to achieve objectives, defeat enemy forces, and consolidate gains on behalf of joint force
commanders.
multinational operations
A collective term to describe military actions conducted by forces of two or more nations, usually
undertaken within the structure of a coalition or alliance. (JP 3-16)
mutual support
That support which units render each other against an enemy, because of their assigned tasks, their
position relative to each other and to the enemy, and their inherent capabilities. (JP 3-31)
*national strategic level of warfare
The level of warfare at which the U.S. government formulates policy goals and ways to achieve them
by synchronizing action across government and unified action partners and employing the instruments
of national power.
offensive operation
An operation to defeat or destroy enemy forces and gain control of terrain, resources, and population
centers. (ADP 3-0)
operation
A sequence of tactical actions with a common purpose or unifying theme. (JP 1, Volume 1)
operational approach
A broad description of the mission, operational concepts, tasks, and actions required to accomplish the
mission. (JP 5-0)
operational environment
The aggregate of the conditions, circumstances, and influences that affect the employment of
capabilities and bear on the decisions of the commander. (JP 3-0)
operational framework
A cognitive tool used to assist commanders and staffs in clearly visualizing and describing the
application of combat power in time, space, purpose, and resources in the concept of operations.
(ADP 1-01)
operational level of warfare
The level of warfare in which campaigns and operations are planned, conducted, and sustained to
achieve operational objectives to support achievement of strategic objectives. (JP 3-0)
operational reach
The distance and duration across which a force can successfully employ military capabilities. (JP 3-0)
passage of lines
An operation in which a force moves forward or rearward through another force’s combat positions
with the intention of moving into or out of contact with the enemy. (JP 3-18) |
3-0 | 255 | Glossary
peace operations
Multiagency and multinational crisis response and limited contingency operations involving all
instruments of national power with military missions to contain conflict, redress the peace, and shape
the environment to support reconciliation and rebuilding and facilitate the transition to legitimate
governance. (JP 3-07.3)
*physical dimension
The material characteristics and capabilities, both natural and manufactured, within an operational
environment.
principle
A comprehensive and fundamental rule or an assumption of central importance that guides how an
organization approaches and thinks about the conduct of operations. (ADP 1-01)
priority intelligence requirement
The intelligence component of commander’s critical information requirements used to focus the
employment of limited intelligence assets and resources against competing demands for intelligence
support. (JP 2-0)
*protection warfighting function
The related tasks, systems, and methods that prevent or mitigate detection, threat effects, and hazards
to preserve combat power and enable freedom of action.
pursuit
A type of offensive operation designed to catch or cut off a hostile force attempting to escape, with the
aim of destroying it. (ADP 3-90)
*rear operations
Tactical actions behind major subordinate maneuver forces that facilitate movement, extend
operational reach, and maintain desired tempo.
rearward passage of lines
Occurs when a unit passes through another unit’s positions while moving away from the enemy.
(ADP 3-90)
reception
The process of receiving, offloading, marshalling, accounting for, and transporting of personnel,
equipment, and materiel from the strategic and/or intratheater deployment phase to a sea, air, or surface
transportation point of debarkation to the marshalling area. (JP 3-35)
reconnaissance
A mission undertaken to obtain, by visual observation or other detection methods, information about
the activities and resources of an enemy or adversary, or to secure data concerning the meteorological,
hydrographic, or geographic characteristics of a particular area. (JP 2-0)
reconnaissance in force
A type of reconnaissance operation designed to discover or test the enemy’s strength, dispositions, and
reactions or to obtain other information. (ADP 3-90)
reconstitution
(Army) An operation that commanders plan and implement to restore units to a desired level of combat
effectiveness commensurate with mission requirements and available resources. (ATP 3-94.4)
redeployment
The transfer or rotation of forces and materiel to support another commander’s operational
requirements, or to return personnel, equipment, and materiel to the home and/or demobilization
stations for reintegration and/or out-processing. (JP 3-35)
*reinforcing
A support relationship requiring a force to support another supporting unit. |
3-0 | 256 | Glossary
*relative advantage
A location or condition, in any domain, relative to an adversary or enemy that provides an opportunity
to progress towards or achieve an objective.
relief in place
An operation in which, by direction of higher authority, all or part of a unit is replaced in an area by
the incoming unit and the responsibilities of the replaced elements for the mission and the assigned
zone of operations are transferred to the incoming unit. (JP 3-07.3)
reserve
That portion of a body of troops that is withheld from action at the beginning of an engagement to be
available for a decisive movement. (ADP 3-90)
retrograde
(Army) A type of defensive operation that involves organized movement away from the enemy.
(ADP 3-90)
route reconnaissance
A type of reconnaissance operation to obtain detailed information of a specified route and all terrain
from which the enemy could influence movement along that route. (ADP 3-90)
screen
A type of security operation that primarily provides early warning to the protected force. (ADP 3-90)
seabasing
The deployment, assembly, command, projection, reconstitution, sustainment, and re-employment of
joint power from the sea without reliance on land bases within the operational area. (JP 3-02)
*sector
An operational area assigned to a unit in the defense that has rear and lateral boundaries and
interlocking fires.
security cooperation
All Department of Defense interactions with foreign security establishments to build security
relationships that promote specific United States security interests, develop allied and partner nation
military and security capabilities for self-defense and multinational operations, and provide United
States forces with peacetime and contingency access to allied and partner nations. (JP 3-20)
security force assistance
The Department of Defense activities that support the development of the capacity and capability of
foreign security forces and their supporting institutions. (JP 3-20)
security forces
Duly constituted military, paramilitary, police, and constabulary forces of a state. (JP 3-22)
security operations
Those operations performed by commanders to provide early and accurate warning of enemy
operations, to provide the force being protected with time and maneuver space within which to react to
the enemy, and to develop the situation to allow commanders to effectively use their protected forces.
(ADP 3-90)
security sector reform
A comprehensive set of programs and activities undertaken by a host nation to improve the way it
provides safety, security, and justice. (JP 3-07)
*setting the theater
The broad range of activities continuously conducted to establish conditions for the successful
execution of operations in a theater. |
3-0 | 257 | Glossary
simultaneity
The execution of related and mutually supporting tasks at the same time across multiple locations and
domains. (ADP 3-0)
situational understanding
The product of applying analysis and judgment to relevant information to determine the relationships
among the operational and mission variables. (ADP 6-0)
*space domain
The area above the altitude where atmospheric effects on airborne objects become negligible.
special reconnaissance
Reconnaissance and surveillance actions conducted as a special operation in hostile, denied, or
diplomatically and/or politically sensitive environments to collect or verify information of strategic or
operational significance, employing military capabilities not normally found in conventional forces.
(JP 3-05)
stability mechanism
The primary method through which friendly forces affect civilians in order to attain conditions that
support establishing a lasting, stable peace. (ADP 3-0)
stability operation
An operation conducted outside the United States in coordination with other instruments of national
power to establish or maintain a secure environment and provide essential governmental services,
emergency infrastructure reconstruction, and humanitarian relief. (ADP 3-0)
staging
Assembling, holding, and organizing arriving personnel, equipment, and sustaining materiel in
preparation for onward movement. (JP 3-35)
striking force
A dedicated counterattack force in a mobile defense constituted with the bulk of available combat
power. (ADP 3-90)
*support area operations
The tactical actions securing lines of communications, bases, and base clusters that enable an echelon’s
sustainment and command and control.
supporting distance
The distance between two units that can be traveled in time for one to come to the aid of the other and
prevent its defeat by an enemy or ensure it regains control of a civil situation. (ADP 3-0)
supporting effort
A designated subordinate unit with a mission that supports the success of the main effort. (ADP 3-0)
supporting range
The distance one unit may be geographically separated from a second unit yet remain within the
maximum range of the second unit’s weapons systems. (ADP 3-0)
survivability
(Army) A quality or capability of military forces which permits them to avoid or withstand hostile
actions or environmental conditions while retaining the ability to fulfill their primary mission.
(ATP 3-37.34)
sustainment warfighting function
The related tasks and system that provide support and services to ensure freedom of action, extended
operational reach, and prolong endurance. (ADP 3-0)
synchronization
The arrangement of military actions in time, space, and purpose to produce maximum relative combat
power at a decisive place and time. (JP 2-0) |
3-0 | 258 | Glossary
tactical level of warfare
The level of warfare at which forces plan and execute battles and engagements to achieve military
objectives. (JP 3-0)
tactics
The employment, ordered arrangement, and directed actions of forces in relation to each other.
(ADP 3-90)
task-organizing
The act of designing a force, support staff, or sustainment package of specific size and composition to
meet a unique task or mission. (ADP 3-0)
tempo
The relative speed and rhythm of military operations over time with respect to the enemy. (ADP 3-0)
*theater strategic level of warfare
The level of warfare at which combatant commanders synchronize with unified action partners and
employ all elements of national power to fulfill policy aims within the assigned theater in support of
the national strategy.
threat
Any combination of actors, entities, or forces that have the capability and intent to harm United States
forces, United States national interests, or the homeland. (ADP 3-0)
troop movement
The movement of Soldiers and units from one place to another by any available means. (ADP 3-90)
understanding
In the context of decision making, knowledge that has been synthesized and had judgment applied to
comprehend the situation’s inner relationships, enable decision making, and drive action. (ADP 6-0)
unified action
The synchronization, coordination, and/or integration of the activities of governmental and
nongovernmental entities with military operations to achieve unity of effort. (JP 1, Volume 1)
unity of effort
Coordination and cooperation toward common objectives, even if the participants are not necessarily
part of the same command or organization, which is the product of successful unified action.
(JP 1, Volume 2)
warfighting function
A group of tasks and systems united by a common purpose that commanders use to accomplish
missions and training objectives. (ADP 3-0)
*zone
An operational area assigned to a unit in the offense that only has rear and lateral boundaries.
zone reconnaissance
A type of reconnaissance operation that involves a directed effort to obtain detailed information on all
routes, obstacles, terrain, and enemy forces within a zone defined by boundaries. (ADP 3-90) |
3-0 | 259 | References
All websites accessed 23 August 2022.
REQUIRED PUBLICATIONS
These documents must be available to the intended user of this publication.
DOD Dictionary of Military and Associated Terms. May 2022.
FM 1-02.1. Operational Terms. 09 March 2021.
FM 1-02.2. Military Symbols. 18 May 2022.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
JOINT AND DEPARTMENT OF DEFENSE PUBLICATIONS
Most Department of Defense publications are available online: https://www.esd.whs.mil/DD/.
Most joint publications are available online: https://www.jcs.mil/.
DODD 3025.18. Defense Support of Civil Authorities (DSCA). 29 December 2010.
JP 1, Volume 1. Joint Warfighting. 29 June 2020.
JP 1, Volume 2. The Joint Force. 19 June 2020.
JP 2-0. Joint Intelligence. 26 May 2022.
JP 3-0. Joint Campaigns and Operations. 18 June 2022.
JP 3-01. Countering Air and Missile Threats. 21 April 2017.
JP 3-02. Amphibious Operations. 04 January 2019.
JP 3-03. Joint Interdiction. 26 May 2022.
JP 3-05. Joint Doctrine for Special Operations. 22 September 2020.
JP 3-07. Joint Stabilization Activities. 11 February 2022.
JP 3-07.3 Peace Operations. 01 March 2018.
JP 3-08. Interorganizational Cooperation. 12 October 2016.
JP 3-09.3. Close Air Support. 10 June 2019.
JP 3-10. Joint Security Operations in Theater. 25 July 2019.
JP 3-13.3. Operations Security. 06 January 2016.
JP 3-13.4 Military Deception. 14 February 2017.
JP 3-16. Multinational Operations. 01 March 2019.
JP 3-18. Joint Forcible Entry Operations. 27 June 2018.
JP 3-20. Security Cooperation. 23 May 2017.
JP 3-22. Foreign Internal Defense. 17 August 2018.
JP 3-27. Homeland Defense. 10 April 2018.
JP 3-28. Defense Support of Civil Authorities. 29 October 2018.
JP 3-29. Foreign Humanitarian Assistance. 14 May 2019.
JP 3-30. Joint Air Operations. 25 July 2019.
JP 3-31. Joint Land Operations. 03 October 2019. |
3-0 | 260 | References
JP 3-32. Joint Maritime Operations. 08 June 2018.
JP 3-35. Joint Deployment and Redeployment Operations. 31 March 2022.
JP 3-36. Joint Air Mobility and Sealift Operations. 04 January 2021.
JP 3-42. Joint Explosive Ordnance Disposal. 09 September 2016.
JP 3-52. Joint Airspace Control. 13 November 2014.
JP 3-57. Civil-Military Operations. 9 July 2018.
JP 3-60. Joint Targeting. 28 September 2018.
JP 3-68. Joint Noncombatant Evacuation Operations. 26 May 2022.
JP 3-85. Joint Electromagnetic Spectrum Operations. 22 May 2020.
JP 4-0. Joint Logistics. 04 February 2019.
JP 4-01.6. Joint Logistics Over-the-Shore. 03 February 2017.
JP 4-05. Joint Mobilization Planning. 23 October 2018.
JP 5-0. Joint Planning. 01 December 2020.
ARMY PUBLICATIONS
Unless otherwise indicated, most Army publications are available online at https://armypubs.army.mil.
ADP 1. The Army. 31 July 2019.
ADP 1-01. Doctrine Primer. 31 July 2019.
ADP 2-0. Intelligence. 31 July 2019.
ADP 3-0. Operations. 31 July 2019.
ADP 3-05. Army Special Operations. 31 July 2019.
ADP 3-07. Stability. 31 July 2019.
ADP 3-19. Fires. 31 July 2019.
ADP 3-28. Defense Support of Civil Authorities. 31 July 2019.
ADP 3-37. Protection. 31 July 2019.
ADP 3-90. Offense and Defense. 31 July 2019.
ADP 4-0. Sustainment. 31 July 2019.
ADP 5-0. The Operations Process. 31 July 2019.
ADP 6-0. Mission Command: Command and Control of Army Forces. 31 July 2019.
ADP 6-22. Army Leadership and the Profession. 31 July 2019.
AR 10-87. Army Commands, Army Service Component Commands, and Direct Reporting Units.
11 December 2017.
AR 525-93. Army Deployment and Redeployment. 22 October 2019.
ATP 2-01.3. Intelligence Preparation of the Battlefield. 01 March 2019.
ATP 3-01.15/MCTP 10-10B/NTTP 3-01.8/AFTTP 3-2.31. Multi-Service Tactics, Techniques, and
Procedures for Air and Missile Defense. 14 March 2019.
ATP 3-01.81. Counter-Unmanned Aircraft System Techniques. 13 April 2017.
ATP 3-01.94. Army Air and Missile Defense Command Operations. 20 April 2016.
ATP 3-05.1. Unconventional Warfare at the Combined Joint Special Operations Task Force Level.
09 April 2021.
ATP 3-05.2. Foreign Internal Defense. 19 August 2015.
ATP 3-06/MCTP 12-10B. Urban Operations. 21 July 2022.
ATP 3-07.31. Multi-Service Tactics, Techniques, and Procedures for Peace Operations. 02 May 2019.
ATP 3-09.13. The Battlefield Coordination Detachment. 24 July 2015. |
3-0 | 261 | References
ATP 3-11.32/MCWP 10-10E.8/NTTP 3-011.37/AFTTP 3-2.46. Multi-Service Tactics, Techniques,
and Procedures for Chemical, Biological, Radiological, and Nuclear Passive Defense.
13 May 2016.
ATP 3-11.37/MCRP 10-10E.7/NTTP 3-11.29/AFTTP 3-2.44. Multi-Service Tactics, Techniques, and
Procedures for Chemical, Biological, Radiological, and Nuclear Reconnaissance and
Surveillance. 31 March 2021.
ATP 3-13.3. Army Operations Security for Division and Below. 16 July 2019.
ATP 3-17.2/MCRP 3-20. B. 1 [3-21.1B]/NTTP 3-02.18/AFTTP 3-2.68. Airfield Opening:
Multi-Service Tactics, Techniques, and Procedures for Airfield Opening. 27 October 2018.
ATP 3-34.81/MCWP 3-17.4. Engineer Reconnaissance. 01 March 2016.
ATP 3-35. Army Deployment and Redeployment. 23 March 2015.
ATP 3-35.1. Army Pre-Positioned Operations. 21 April 2022.
ATP 3-37.10/MCRP 3-40D.13. Base Camps. 27 January 2017.
ATP 3-37.34/MCTP 3-34C. Survivability Operations. 16 April 2018.
ATP 3-57.20/MCRP 3-33.1C. Multi-Service Techniques for Civil Affairs Support to Humanitarian
Assistance. 15 February 2013.
ATP 3-60. Targeting. 07 May 2015.
ATP 3-72/MCRP 10-10E.9/NTTP 3-72.1/AFTTP 3-2.65. (U) Operations in a Nuclear Environment.
07 March 2022.
ATP 3-90.4/MCWP 3-17.8. (CUI) Combined Arms Mobility. 10 June 2022.
ATP 3-90.8/MCTP 3-34B. (U) Combined Arms Countermobility. 30 November 2021.
ATP 3-90.40. Combined Arms Countering Weapons of Mass Destruction. 29 June 2017.
ATP 3-90.97. Mountain Warfare and Cold Weather Operations. 29 April 2016.
ATP 3-90.98/MCTP 12-10C. Jungle Operations. 24 September 2020.
ATP 3-90.99/MCTP 12-10D. Desert Operations. 07 April 2021.
ATP 3-91. Division Operations. 17 October 2014.
ATP 3-92. Corps Operations. 07 April 2016.
ATP 3-93. Theater Army Operations. 27 August 2021.
ATP 3-94.4 Reconstitution Operations. 05 May 2021.
ATP 3-96.1. Security Force Assistance Brigade. 02 September 2020.
ATP 4-15. Army Watercraft Operations. 3 April 2015.
ATP 4-32. Explosive Ordnance Disposal (EOD) Operations. 12 May 2022.
ATP 4-94. Theater Sustainment Command. 28 June 2013.
ATP 4-98. Army Field Support Brigade. 30 June 2021.
ATP 5-0.1. Army Design Methodology. 01 July 2015.
ATP 6-0.5. Command Post Organization and Operations. 01 March 2017.
ATP 6-22.6. Army Team Building. 30 October 2015.
ATP 7-100.3. Chinese Tactics. 09 August 2021.
FM 2-0. Intelligence. 06 July 2018.
FM 3-01. U.S. Army Air and Missile Defense Operations. 22 December 2020.
FM 3-04. Army Aviation. 06 April 2020.
FM 3-05. Army Special Operations. 09 January 2014.
FM 3-07. Stability. 02 June 2014.
FM 3-09. Fire Support and Field Artillery Operations. 30 April 2020.
FM 3-11. Chemical, Biological, Radiological, and Nuclear Operations. 23 May 2019.
FM 3-12. Cyberspace Operations and Electromagnetic Warfare. 24 August 2021. |
3-0 | 262 | References
FM 3-13.4. Army Support to Military Deception. 26 February 2019.
FM 3-14. Army Space Operations. 30 October 2019.
FM 3-16. The Army in Multinational Operations. 08 April 2014.
FM 3-18. Special Forces Operations. 28 May 2014.
FM 3-22. Army Support to Security Cooperation. 22 January 2013.
FM 3-24/MCWP 3-33.5. Insurgencies and Countering Insurgencies. 13 May 2014.
FM 3-34. Engineer Operations. 18 December 2020.
FM 3-52. Airspace Control. 20 October 2016.
FM 3-53. Military Information Support Operations. 4 January 2013.
FM 3-55. Information Collection. 03 May 2013.
FM 3-57. Civil Affairs Operations. 28 July 2021.
FM 3-63. Detainee Operations. 2 January 2020.
FM 3-90-1. Offense and Defense. Volume 1. 22 March 2013.
FM 3-94. Armies, Corps, and Division Operations. 23 July 2021.
FM 3-96. Brigade Combat Team. 19 January 2021.
FM 4-0. Sustainment Operations. 31 July 2019.
FM 4-01. Army Transportation Operations. 03 April 2014.
FM 5-0. Planning and Orders Production. 16 May 2022.
FM 6-0. Commander and Staff Organization and Operations. 16 May 2022.
FM 6-05/MCRP 3-30.4/NTTP 3-05.19/AFTTP 3-2.73/USSOCOM Pub 3-33. Multi-Service Tactics,
Techniques, and Procedures for Conventional Forces and Special Operations Forces
Integration, Interoperability, and Interdependence. 25 January 2022.
FM 6-22. Leader Development. 30 June 2015.
FM 6-27/MCTP 11-10C. The Commander’s Handbook on the Law of Land Warfare. 07 August 2019.
FM 7-0. Training. 14 June 2021.
MARINE CORPS PUBLICATION
Most Marine Corps publications are available online:
https://www.marines.mil/News/Publications/MCPEL.
MCTP 13-10M. Amphibious Embarkation. 14 January 2021. Available at
https://www.marines.mil/News/Publications/MCPEL/Electronic-Library-
Display/Article/2472180/mctp-13-10m/.
NATO PUBLICATIONS
Unless otherwise indicated, NATO documents are available at https://nso.nato.int/nso/nsdd/main/list-
promulg.
Most Standardization Agreements are available on the NATO Standardization Office website (user
registration required): https://nso.nato.int/nso/.
AJP-01. Allied Joint Doctrine. 28 February 2017.
AJP 3. Allied Joint Doctrine for the Conduct of Operations. 11 February 2019.
STANAG 2199. Command and Control of Allied Land Forces. 15 December 2016.
UNITED STATES LAW
Most acts and public laws are available at http://uscode.house.gov/.
Title 10, United States Code, Armed Forces. Section 164. Commanders of combatant commands:
assignment; powers and duties. |
3-0 | 263 | References
Title 22, United States Code. Foreign Relations and Intercourse. Section 2151. Foreign Assistance
Act.
Title 22, United States Code. Section 2751. Arms Export Control Act.
Title 32, United States Code. National Guard.
OBSOLETE PUBLICATION
This section contains an obsolete publication that is referenced for citation only.
TRADOC Pam 525-100-1 [obsolete]. Leadership and Command on the Battlefield: Operations JUST
CAUSE and DESERT STORM. Fort Monroe, VA: Headquarters, TRADOC, 1992. Available
at https://cgsc.contentdm.oclc.org/digital/collection/p4013coll9/id/690.
OTHER PUBLICATIONS
Andrews, Phillip. “Lessons from the Nagorno-Karabakh 2020 Conflict.” Center for Army Lessons
Learned Catalog. Leavenworth, KS: August 2021. Available at
https://call2.army.mil/docs/doc18162/21-655.pdf.
“Jack Voltaic 3.0”. Cyber Research Report. West Point, NY: Army Cyber Institute. Available at
https://cyber.army.mil/Research/Jack-Voltaic/.
Bates, Richard W. The Battle of Midway Including the Aleutian Phase, June 3 to June 14, 1942,
Strategical and Tactical Analysis. Newport, RI: Naval War College,1948. Available at
https://apps.dtic.mil/sti/pdfs/ADA003054.pdf.
“Battle of Midway, 4-7 June 1942.” H-072-1: Naval History and Heritage Command. Available at
https://www.history.navy.mil/browse-by-topic/wars-conflicts-and-operations/world-war-
ii/1942/midway.html.
Bradley, Omar N. “Leadership: An Address to the US Army War College, 07 Oct. 71,” Parameters 1,
no. 3.1972. Available at
https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1034&context=parameters.
Brinton, John H. Personal Memoirs of John H. Brinton, Major and Surgeon U.S.V., 1861–1865.1914;
reproduced at Carbondale, IL: Southern Illinois University, 1996.
Brooke, Field Marshall Alan Francis 1st Viscount Alanbrooke of Brookeborough. Diaries, 1939-1946.
Available at https://kingscollections.org/catalogues/lhcma/collection/a/br60-001/br60-
05/br60-05-1?id=1022&asId=as1.
Center for Army Lessons Learned. Handbook Number 16-22, Joint Forces Command Operation
United Assistance Case Study Lessons and Best Practices. Available at
https://usacac.army.mil/sites/default/files/publications/16-22.pdf.
Clausewitz, Carl von. On War, translated and edited by Michael Howard and Peter Paret. Princeton,
NJ: Princeton University Press, 1988.
Corbett, Sir Julian Corbett. Some Principles of Maritime Strategy. Annapolis, MD: Naval Institute
Press, 1988.
Cox, Samuel J. “Torpedo Squadron 8's TBF Avenger Detachment in the Battle of Midway.” Naval
History and Heritage Command. May 2022. Available at https://www.history.navy.mil/about-
us/leadership/director/directors-corner/h-grams/h-gram-072/h-072-1.html.
Croft, Christopher D. and Kelvin D. Crow, “Creatively Deploying the Heavy Division: Getting the 4th
Infantry Division to Iraq in 2003.” Army University Press. May 2018. Available at
https://www.armyupress.army.mil/Books/Browse-Books/iBooks-and-EPUBs/Deploying-the-
Heavy-Division/.
Dyer, George Carroll. The Amphibians Came to Conquer: The Story of Admiral Richmond Kelly
Turner, Volume 1. Washington, DC: U.S. Government Printing Office, 1969. Available at
https://www.marines.mil/Portals/1/Publications/FMFRP%2012-109-
I%20%20The%20Amphibians%20Came%20to%20Conquer%20-%20Vol%20I.pdf. |
3-0 | 264 | References
Eisenhower, Dwight D. Special Message to the Congress on Reorganization of the Defense
Establishment. 03 April 1958. Available at
https://www.eisenhowerlibrary.gov/eisenhowers/quotes.
Eisenhower, Dwight D. Remarks at the Opening of NATO Meetings in Paris. 16 December 1957.
Available at https://www.presidency.ucsb.edu/documents/remarks-the-opening-the-nato-
meetings-paris.
Erickson, Edward. “The 44-Day War in Nagorno-Karabakh: Turkish Drone Success or Operational
Art?” Military Review. August 2021. Available at
https://www.armyupress.army.mil/Portals/7/military-review/img/Online-
Exclusive/2021/erickson/Erickson-the-44-day-war.pdf.
Fuller, J.F.C. The Foundations of the Science of War. London: Hutchinson and Company, 1926.
Franks, Frederick, “Battle Command: A Commander’s Perspective,” Military Review. May-June 1996.
Gawrych, George W. Leavenworth Papers Number 21. The 1973 Arab-Israeli War: The Albatross of
Decisive Victory. Combat Studies Institute. Fort Leavenworth, KS: U.S. Army Command and
General Staff College, 1996. Available at https://apps.dtic.mil/sti/pdfs/ADA323718.pdf.
Historical Evaluation and Research Organization. Analysis of Factors that have Influenced Outcomes
of Battles and Wars: A Data Base of Battles and Engagements, Vol. VI. U.S. Army Concepts
ad Analysis Agency. June 1983. Available at
https://apps.dtic.mil/dtic/tr/fulltext/u2/b087722.pdf.
Headquarters X Corps War Diary Summary for OPERATION CHROMITE 15 August to 30 September
1950. Department of Defense. 1950. Available at
https://cgsc.contentdm.oclc.org/digital/collection/p4013coll11/id/1569/rec/2.
Huber, Thomas M. “Eichelberger at Buna: A Study in Battle Command,” in Studies in Battle
Command. Combat Studies Institute. Fort Leavenworth, KS.: U.S. Army Command and
General Staff College, 1995. Available at
https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/battles.pdf.
Infantry in Battle. The Infantry Journal Inc. Washington, DC, 1939.
Interim National Security Strategic Guidance. The White House: Washington, DC, March 2021.
Available at https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf.
Joint Chiefs of Staff. Korea–Operation Paul Bunyan. Briefing Paper. Washington, D.C. August 1976.
Available at https://www.fordlibrarymuseum.gov/library/document/0324/1553751.pdf.
Kennedy, John F. Radio and television address to the American people on the Soviet arms build-up in
Cuba. 22 October 1962. Available at https://www.jfklibrary.org/learn/about-jfk/historic-
speeches/address-during-the-cuban-missile-crisis.
Morton, Louis. The Fall of the Philippines. Washington, DC: Center of Military History, United States
Army, 1993. Available at https://history.army.mil/html/books/005/5-2-1/CMH_Pub_5-2-
1.pdf.
Nimitz, Chester W. “Employment of Naval Forces: Who Commands Sea Commands Trade,” Monthly
NEWSLETTER (March 1948). Available at
https://www.history.navy.mil/content/history/nhhc/research/library/online-reading-room/title-
list-alphabetically/e/employment-of-naval-forces.html.
Operations in Korea. Department of Military Art and Engineering, United States Military Academy.
West Point, NY: U.S.M.A. A.G. Printing Office, February 1953. Available at
https://cgsc.contentdm.oclc.org/digital/collection/p4013coll11/id/1330/rec/19.
Phillips, Thomas R. Sun Tzu, ed., Roots of Strategy. Lanham, MD: Stackpole Books, 1985.
Powell, Colin. It Worked for Me. New York: HarperCollins Publishing, 2014.
Probst, Reed R. Negotiating with the North Koreans: the U.S. Experience at Panmunjom. U.S. Army
War College, Carlisle Barracks PA. 16 May 1977. Available at
https://apps.dtic.mil/sti/pdfs/ADA042858.pdf. |
3-0 | 265 | References
Reagan, Ronald. “Radio Address to the Nation on the Observance of Armed Forces Day.” (21 May
1983). Available at https://www.reaganlibrary.gov/archives/speech/radio-address-nation-
observance-armed-forces-day.
Santaspirt, Matthew, and Shabro, Luke, host. “Top Attack: Lessons Learned from the Second
Nagorno-Karabakh War.” The Convergence: An Army Mad Scientist Podcast, episode 317, 1
April 2021. Available at https://madsciblog.tradoc.army.mil/317-top-attack-lessons-learned-
from-the-second-nagorno-karabakh-war/.
Slim, William Joseph. Unofficial History. New York: Orion Publishing Group, 1962. Reprinted by Pen
& Sword Books.
Sorley, Lewis editor. Press On! Selected Works of General Donn A. Starry. Volume 1. Combat Studies
Institute Press. Fort Leavenworth, KS: U.S. Army Combined Arms Center, September 2009.
Available at https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-
books/PressOnI.pdf.
State Partnership Program. Available at https://www.nationalguard.mil/leadership/joint-staff/j-
5/international-affairs-division/state-partnership-program/.
Tuchman, Barbara W. “Generalship,” Parameters, The US Army War College Quarterly: Parameters,
Volume 2, Number 1 (1972). Available at
https://press.armywarcollege.edu/parameters/vol2/iss1/18/.
Tuchman, Barbara W. The Guns of August. New York: Ballantine Books. 1962.
Williams, Pat. The Paradox of Power. Anderson, IN: Warner Press, 2002.
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate (APD)
website at https://armypubs.army.mil/.
DA Form 2028. Recommended Changes to Publications and Blank Forms. |
3-0 | 267 | Index
Entries are by paragraph number.
methods during crisis, 5-4– transition to, 4-101–4-110
A
5-8
Army air and missile defense
accepting risk to create and
agility, 3-8–3-11 command, 4-78
exploit opportunities, 8-18–
defined, 3-8
Army command and support
8-22
air, 2-69–2-70 relationships, B-17–B-32
account for being under
air and missile defense, Army command relationships,
constant observation and all
provide theater, 7-52–7-53 B-18–B-22
forms of enemy contact,
3-56–3-68 air and missile threats, counter, Army echelons, 2-79–2-94
6-54–6-62
account for constant enemy Army echelons during
observation, 3-62–3-65 air domain, 1-93–1-96 competition, roles of, 4-55–
defined, 1-93 4-96
achieving convergence, 3-22–
3-26 aligned, B-32 Army echelons during crisis,
activities, joint, 2-55–2-57 amphibious operations, 7-58– 5--52–5-63
to achieve strategic goals, 7-63 Army field support brigade,
4--5–4-8 antiaccess, defined, 2-48 4--85
to control escalation, 5-7 antiaccess and area denial, Army force posture, 2-77–2-78
to counter a United States
defeat enemy, 7-52–7-62 Army forces, challenges for,
response, 4-9
approaches, defeating, 1--15–1-22
to mitigate U.S. deterrence,
6-79–6-86
5--8 Army forces in the theater,
to preclude United States anticipate, plan, and execute exercise command and
access to a region, 4-10– transitions, 3-85–3-90 control over, 4-64–4-65
4--11 applying, defeat mechanisms, Army operations, 1-1–1-8
adapting formations for 6-106–6-132 in maritime environments,
missions and transitions, mutual support, 6-39–6-44 7-1–7-79
8-36–8-54 the art of command, 8-5– Army strategic contexts, 1-65–
8-26
administrative control, defined, 1-77
the operational framework,
B-14 Army support relationships,
7--27–7-34
provide, 4-60 B-23–B-28
arctic region, 7-7–7-9
advantages, human, during Army support to the joint force
armed conflict, 6-32 area defense, defined, 6-187 during crisis, 5-15–5-19
human, during crisis, 5-14 area denial, defined, 2-49
Army-specific considerations,
information, during armed
area of influence, defined, maritime environment, 7-18–
conflict, 6-31
3-137 7-21
information, during crisis,
area of interest, defined, 3-138 art of command, and the
5-13
physical, during armed area of operations, assigning, commander, 8-1–8-4
conflict, 6-25–6-30 7-30 applying, 8-5–8-26
physical, during crisis, defined, 3-129 assess, 8-35
5-11–5-12 area reconnaissance, defined, assigned, B-20
relative, 5-10–5-14 6-138
assigned areas, 3-128–3-132
advantages during armed area security, defined, 6-150
assigning, joint operations area
conflict, relative, 6-24–6-32
ARFOR, defined, B-5 within an area of
adversary, activities to shape a armed conflict, 1-72–1-73 responsibility, 7-28
crisis, 5-5–5-6 and large-scale combat area of operations, 7-30
methods during operations, 6-1–6-171 land areas, 6-38
competition, 4-4–4-11
enemy approaches to, 6-8– assistance, humanitarian, 4-54
6-23 |
3-0 | 268 | Index
Entries are by paragraph number.
attached, B-21–B-22 operational, B-47 competition or armed conflict,
attack, defined, 6-230 tactical, B-49 transition to, 5-64–5-68
unity of, A-13–A-14
authorities, other, B-13–B-16 conduct large-scale combat
command and control, during operations, 6-89
B degraded or denied
conduct theater sustainment
battle, defined, 1-63 communications, 8-23–8-26 operations, 7-70–7-78
establish in maritime
battlefield coordination conflict, contingency planning
environments, 7-36
detachment, 4-82–4-83 for, 4-67-4-70
establish on land, 6-36–
breach, defined, 6-169 6-53 conflict type determination,
brigade combat teams, 2-90– exercise over Army forces 4-106
2-91 in the theater, 4-64–4-65 considerations unique to the
during competition, 4-96 of deep, close, and rear maritime environment, 7-10–
brigades, 5-62 operations, 3-160–3-162 7-21
during transition to post- command and control, consolidate gains,
conflict competition, warfighting function, 2-3–2-5 continuously, 3-93–3-95
6-265–6-267 defined, 2-3 defined, 1-74
multifunctional and command and support during armed conflict, 6-98–
functional, 2-92–2-94 considerations, 6-105
build allied and partner multinational, B-33–B-50 consolidating gains, 1-74–1-77
capabilities and capacity, command and support during competition, 4-97–
4-16–4-17 relationships, B-1–B-50 4-102
during crisis, 5-63
C command authority, B-36–B-37
contested deployments, C-1–
chain of command, B-3–B-5 command relationships, Army,
C-44
B-18–B-22
challenges, for Army forces,
joint, B-6–B-16 contingency plan, defined, 4-67
1-15–1-22
overcoming, 1-23–1-25 command relationships and contingency planning for crisis
authorities, North Atlantic and conflict, 4-67-4-70
chaotic, war is, 1-32
Treaty Organization, B-45– control, operational, B-8–B-9,
characteristics, defense, 6-179 B-50 B-48
offense, 6-222
command structure, control, strategic lines of
warfare, 1-35
combination, B-44 communications and key
China, 6-15–6-23 integrated, B-41 terrain, 6-69–6-74
civil preparation of the lead nation, B-42
control, tactical, B-10, 50
environment, defined, 4-70 multinational, B-38–B-44
conventional, and special
clearing, defined, 6-170 command structures, parallel,
operations forces
B-43
close operations, 3-147–3-151 integration, 2-63–2-65
defined, 3-147 commander, art of command
conventional warfare, 1-37–
during armed conflict, and, 8-1–8-4
1-39
6-240–6-244 commander presence on the defined, 1-37
in maritime environments, battlefield, 8-6–8-12
convergence, 3-12–3-14
7-32
commander’s intent, 8-13–8-14 achieving, 3-22–3-26
combat power, 2-15–2-31 defined, 8-13 defined, 3-12
defined, 2-15
common operational picture, coordinating authority, B-15
combatant command 3-52–3-55
coordination, interagency,
(command authority), B-7 defined, 3-52
4-30–4-35
combatant commander daily communicating with staff and
corps, 2-87–2-88
operational requirements, subordinates, 8-47–8-48
during transition to post-
4-59
competition, activities, 4-36– conflict competition,
combination command 4-54 6-261–6-262
structure, B-44 adversary methods during, roles during competition,
combined arms, 1-50–1-53 4-4–4-11 4-90–4-91
defined, 1-50 below armed conflict, 1-68 roles during crisis, 5-56–
command, B-1 roles of Army echelons 5-60
during, 4-55–4-96
chain of, B-3–B-5 counter air and missile threats,
full, B-46 6-54–6-62 |
3-0 | 269 | Index
Entries are by paragraph number.
countering weapons of mass enemy forces in detail, physical, 1-107–1-100
destruction, 4-53 3-101–3-105
dimensions, 1-106–1-117
countermobility, defined, 6-162 defend and control key terrain,
diplomatic mission, United
countermobility operations, during armed conflict, 6-63– States, 4-32–4-33
6-162–6-164 6-74
direct, 8-33
in maritime environments,
country team, 4-34–4-35
7-37–7-38 direct liaison authorized,
cover, defined, 6-151 defined, B-16
defense, by forward-stationed
create and exploit relative forces, 6-64–6-68 direct support, defined, B-25
physical, information, and characteristics of, 6-179 discipline, 8-17
human advantages in pursuit enemy, 6-223–6-227
disintegrate, 6-121–6-123
of decision dominance, protection support to the,
defined, 3-112
3-69–3-74 7-39–7-47
crisis, 1-69–1-71 purpose and conditions for, disintegration,
adversary methods during, 6-173–6-178 operational-level, 6-124–
5-4–5-8 support of civil authorities, 6-128
Army echelons during, C-42–C-43 tactical-level, 6-129–6-132
5-53–5-63 transition to, 6-252–6-254 dislocate, 6-112–6-116
Army support to the joint defense support of civil defined, 3-110
force during, 5-15–5-19 authorities, homeland division, 2-89, 5-61
contingency planning for, defense and, C-36–C-43 roles during competition,
4-67-4-70 defensive, operational 4-92–4-95
defined, 1-69
framework considerations, divisions during transition to
transition to, 4-101–4-110
6-191–6-217 post-conflict competition,
cyberspace, 2-73–2-74 operations, 6-172–6-219 6-263–6-264
domain, 1-101–1-105
defensive operation, defined, domain, air, 1-93–1-96
cyberspace domain, defined, 1-44 cyberspace, 1-101–1-105
1-101 defensive operations, types of, defined, 1-82
D 6-186–6-190 interdependence, 2-68–
2-76
decisive point, defined, 3-105 degraded communications, land domain, 1-83–1-87
command and control
deep operations, 3-142–3-146 maritime, 1-88–1-92
during, 8-23–8-26
defined, 3-142 space, 1-97–1-100
during defensive denied communications, domains, 1-82–1-105
operations, 6-194–6-198 command and control
during offensive operations, during, 8-23–8-26 driving the operations process,
8-27–8-35
6-235–6-239 deployment, 5-31–5-32
in maritime environments, defined, 5-31 E
7-31
depth, 3-32–3-36 echelons, Army, 2-79–2-94
deep, close, and rear defined, 3-32 integrating, 6-45–6-49
operations, 3-140–3-160
describe, 8-32 economy of force, A-10
command and control of,
3-160–3-162 designate, weight, and sustain electromagnetic
the main effort, 3-91–3-92 reconnaissance, defined,
defeat, components of enemy
designating a joint security 6-143
antiaccess and area denial,
6-75–6-86 area, 7-29 electromagnetic warfare,
defined, 3-101 destroy, 6-108–6-111 defined, 2-40
enemy antiaccess and area defined, 3-109 employment of forces, initial,
denial, 7-52–7-63 determination, conflict type, 5-49
mechanisms, 3-106–3-114 4-103 enable joint offensive
defeat in detail, defined, 3-104 develop, leaders, 4-24 operations, 7-52–7-63
defeat mechanisms, defined, developing, leadership enabling operations, 6-133–
3-106 experience, 8-39–8-43 6-171
applying, 6-106–6-132 teams, 8-49–8-54 end state, defined, 2-55
defeating, antiaccess and area dimension, human, 1-115– endurance, 3-27–3-31
denial approaches, 6-79– 1-117 defined, 3-27
6-86 information, 1-111–1-114 |
3-0 | 270 | Index
Entries are by paragraph number.
enemy antiaccess and area forcible entry operations, 7-55– information collection, defined,
denial, defeat components 7-56 1-80
of, 6-75–6-86 joint, 6-87–6-88
information dimension, 1-111–
enemy antiaccess and area foreign internal defense, 4-47– 1-114
denial, defeat in maritime 4-49 defined, 1-111
environments, 7-52–7-63 defined, 4-47
information warfare, 2-40–2-44
enemy approaches to armed fort to port, C-13–C-21
informational considerations,
conflict, 6-8–6-23
forward passage of lines, defined, 1-119
enemy courses of action defined, 6-159
initial employment, of forces,
unique to the maritime
forward-stationed forces, 5-49
environment, 7-14–7-17
defense by, 6-64–6-68 of forward-stationed forces,
enemy defense, 6-223–6-227 initial employment of, 4-110 4-110
enemy integrated fires fostering shared initiative, 8-15–8-16
command, 6-76–6-78 understanding, 8-44–8-46
instruments of national power,
enemy offense, 6-180–6-185 foundations of operations, 1-1– defined, 1-56
engagement, defined, 1-63 1-119 integrated command structure,
essential element of friendly friendly force information B-41
information, defined, 3-41 requirement, defined, 3-40 integrated fires command,
establish command and full command, B-46 enemy, 6-76–6-78
control, in maritime functional brigades, 2-92–2-94 integrating echelons, 6-45–
environments, 7-36 fundamentals of operations, 6-49
on land, 6-36–6-53
3-1–3-166 integration, 3-15–3-17
establish protected reception, conventional and special
G
staging, onward movement, operations forces, 2-63–
and integration, 7-65–7-69 gap, defined, 6-171 2-65
execute operation plans, general support—reinforcing, defined, 3-15
prepare to, 4-22–4-23 defined, B-28 of forces, 5-45–5-48
exercise command and control generating and applying intelligence preparation of the
over Army forces in the combat power, 2-1–2-94 battlefield, defined, 3-43
theater, 4-64–4-65 guard, defined, 6-152 intelligence warfighting
exploitation, defined, 6-231 function, 2-9–2-10
H defined, 2-9
extended deep area, 3-123–
3-126 homeland defense, C-39–C-41 interagency coordination,
during offensive operations, and defense support of civil 4-30–4-35
6-234 authorities, C-36–C-43 defined, 2-61
extended deep operations, human advantages, 6-32 interdependence, domain,
6-192–6-193 during competition, 4-29 2-64–2-76
during crisis, 5-14 joint, 2-66–2-67
F
human dimension, 1-115– interoperability, 4-18–4-19
field army, 2-84–2-86 1-117 defined, 4-18
defined, 1-115
firepower, 2-19–2-21 interorganizational cooperation,
fires warfighting function, human endeavor, war as, 1-31 defined, 2-62
defined, 2-11 humanitarian assistance, 4-54 irregular warfare, 1-40–1-41
fixing force, defined, 6-188 I defined, 1-40
force posture, Army, 2-77–2-78 isolate, 6-117–6-120
imperatives, 3-37–3-97
defined, 3-111
force projection, 5-20–5-51
implementing dispersion, 3-66–
and threat capabilities, C-1– isolation, 2-50–2-51
3-68
C-12
J
impose multiple dilemmas on
defined, 5-20
the enemy, 3-80–3-84 joint command relationships,
force protection, 4-107
information, 2-22–2-25 B-6–B-16
force tailoring, defined, 4-71
information advantages, 6-31 joint force, considerations in a
forces, initial employment of, during competition, 4-28 maritime environment, 7-11–
5-49 during crisis, 5-13 7-13
forcible entry, defined, 6-81 defined, 2-55 |
3-0 | 271 | Index
Entries are by paragraph number.
operating as part of the, overcoming challenges, defined, 6-188
6-33–6-105 1-23–1-25
mobility, 2-26–2-28
joint forcible entry operations, levels of warfare, 1-54–1-64 defined, 2-26
6-87–6-88 defined, 1-54
mobility operations, 6-165–
joint interdependence, 2-66– littoral regions, 7-5–7-6 6-171
2-67
lodgment, defined, 6-87 mobility tasks, defined, 6-166
joint operations, and activities,
mobilization, 5-27–5-30
M
2-55–2-57
defined, 5-27
defined, 2-55 main battle area operations,
movement and maneuver
principles of, A-19–A-26 6—206–6-208
warfighting function, 2-6–2-8
joint operations area, assigning main effort, 3-163
defined, 2-6
within an area of defined, 3-91
movement to contact, defined,
responsibility, 7-28 maintain the theater, 4-61–4-62
6-229
joint roles of limited scope and make initial contact with the
multidomain operations, 1-9–
duration, perform, 4-66 smallest element possible,
1-14
joint security area, 3-121– 3-75–3-79
defined, 1-9
3-122 maneuver, A-11–A-12 the Army’s operational
defined, 3-121
maritime, 2-75–2-76 concept, 3-1–3-4
designating a, 7-29
maritime domain, 1-88–1-92 multi-domain task force, 4-86–
joint support relationships,
defined, 1-88 4-87
B-11–B-12
maritime environment, multifunctional brigades, 2-92–
K considerations unique to the, 2-94
key terrain, control, 6-69–6-74 7-10–7-21 multinational, command and
defend and control during enemy courses of action support considerations,
armed conflict, 6-63–6-74 unique to, 7-14–7-17 B-33–B-50
defend and control in a joint force considerations in command structure, B-38–
maritime environment, a, 7-11–7-13 B-44
7-37–7-38 operational considerations operations, 2-58–2-60
for, 7-35–7-79
multinational operations,
L overview of the, 7-1–7-21
defined, 2-58
land areas, assigning, 6-38 physical characteristics of
mutual support, 3-133–3-135
the, 7-2–7-9
land domain, 1-83–1-87 applying, 6-39–6-44
planning and operational
defined, 1-83 defined, 3-133
framework, 7-22–7-33
large-scale combat operations,
planning considerations for N
1-46–1-49
a, 7-23–7-26
conduct, 6-89 national strategic level of
defined, 1-46 maritime environments, Army warfare, defined, 1-56
operations in, 7-1–7-79
preparation for, 4-12–4-24 nature of war, 1-29–1-32
sustain, 6-90–6-97 mass, A-8–A-9
noncombatant evacuation
sustain in maritime mechanisms, defeat and operations, 4-108–4-109
environments, 7-63–7-78 stability, 3-106–3-114
North Atlantic Treaty
lead, 8-34 meeting engagement, defined, Organization command
lead nation command 6-229 relationships and authorities,
structure, B-42 methods of warfare, 1-36–1-41 B-45–B-50
leaders, train and develop, military engagement, 4-39– nuclear deterrence, 4-53
4-24 4-40
O
leadership, 2-17–2-18 defined, 4-39
defined, 2-17 military intelligence objective, A-4–A-5
during operations, 8-1–8-54 brigade-theater, 4-75–4-76 offense, characteristics, 6-222
leadership experience, mission, variables, 1-118– enemy, 6-180–6-185
developing, 8-39–8-43 1-119 purpose and conditions for,
6-221
legitimacy, A-25–A-26 missions, adapting formations
transition to, 6-218–6-219
lethality, defined, 1-23 for, 8-36–8-54
offensive, A-6–A-7
mobile defense, 6-188–6-189 |
3-0 | 272 | Index
Entries are by paragraph number.
operational framework operations, amphibious, 7-58– operations during crisis,
considerations, 6-233– 7-63 5-1–5-3
6-251 Army, 1-1–1-8
P–Q
operations, 6-220–6-267 close, 3-147–3-151
offensive operation, defined, close, during armed conflict, parallel command structures,
1-43 6-240–6-244 B-43
conduct theater passage of lines, 6-159–6-161
offensive operations, types of,
sustainment, 7-67–7-79 defined, 6-159
6-228–6-232
deep, 3-142–3-146
peace operations, defined,
onward movement, 5-43–5-44 deep during defensive
4--102
opening the theater, 5-26 operations, 6-194–6-198
deep during offensive perseverance, A-23–A-24
operating as part of the joint
operations, 6-235–6-239 physical advantages, 6-25–
force, 6-33–6-105
during armed conflict, 6-1– 6-30
operational, variables, 1-118– 6-267 during competition, 4-27
1-119 during competition below during crisis, 5-11–5-12
operational approach, 3-100– armed conflict, 4-1–4-110
physical characteristics of the
3-118 during competition
maritime environment, 7-2–
and operational framework, overview, 4-1–4-3
7-9
3-98–3-166 enabling, 6-133–6-171
defined, 3-100 extended deep, 6-192– physical dimension, 1-107–
6-193 1-110
operational areas, set and
forcible entry, 7-55–7-56 defined, 1-107
support, 4-63
foundations of, 1-1–1-119 planning and operational
operational command, B-47
fundamentals of, 3-1–3-166 framework, maritime
operational concept, joint, 2-55–2-57 environment, 7-22–7-33
multidomain operations, large-scale combat, 1-46–
planning considerations,
3-1–3-4 1-49
support area operations,
operational considerations for a main battle area, 6-206– 3-157–3-158
maritime environment, 7-35– 6-208
political purpose, war, 1-30
7-79 multidomain, 1-9–1-14
multinational, 2-58–2-60 port to port, C-22–C-28
operational control, B-8–B-9
offensive, 6-220–6-267 post-conflict competition,
in North Atlantic Treaty
rear, 3-152–3-159 transition to, 6-255–6-267
Organizations, B-48
rear during defensive
preclusion, 2-48–2-49
operational environment, operations, 6-215–6-217
defined, 1-78 rear during the offense, preparation for large-scale
understand the, 3-47–3-55 6-245–6-251 combat operations, 4-12–
understanding an, 1-78–119 security, 5-9 4-24
operational framework, 3-127– security area, 6-199–6-205 prepare to transition and
3-166 security in maritime execute operation plans,
applying in maritime environments, 7-48–7-51 4-22–4-23
environments, 7-27–7-34 sustain large-scale combat presence on the battlefield,
defined, 3-127 in maritime 8-6–8-12
environments, 7-63–7-78
operational framework principle, defined, A-2
tenets of, 3-6–3-36
considerations, defensive,
principles of joint operations,
6-191–6-217 operations during crisis, 5-1–
A-19–A-26
offensive, 6-233–6-251 5-68
overview of, 5-1–5-3 principles of war, 1-33–1-34,
operational level of warfare,
A-1–A-26
1-58–1-61 operations process, driving the,
defined, 1-58 8-27–8-35 principles of war, traditional,
A-1–A-19
operational reach, defined, opportunities, accepting risk to
3-33 create and exploit, 8-18– priority intelligence
8-22 requirement, defined, 3-44
operational requirements,
combatant commander daily, organic, B-19 protect forward-stationed
4-59 other authorities, B-13–B-16 forces, 4-20–4-21
operational-level disintegration, other relationships, B-29–B-32 protection, during transit, 5-33–
6-124–6-128 5-38
overview, maritime
support to the defense,
environment, 7-1–7-21
7-39–7-47 |
3-0 | 273 | Index
Entries are by paragraph number.
protection warfighting function, retrograde, defined, 6-190 simplicity, A-19
2-14
risk, 3-115–3-118 simultaneity, defined, 3-20
defined, 2-14
accepting to create and situational understanding,
provide theater air and missile exploit opportunities, defined, 3-49
defense, 7-53–7-54 8-18–8-22
space, 2-71–2-72
purpose, for the defense, roles of Army echelons during
space domain, 1-97–1-100
6-173–6-178 competition, 4-55–4-96
defined, 1-97
for the offense, 6-221
route reconnaissance, defined,
special operations forces, and
pursuit, defined, 6-232 6-139
conventional forces
R Russia, 6-9–6-14 integration, 2-63–2-65
rear operations, 3-152–3-159 S special reconnaissance,
defined, 3-152 sanctuary, 2-52–2-53 defined, 6-141
during defensive stability, transition to, 6-252–
screen, defined, 6-153
operations, 6-215–6-217 6-254
during the offense, 6-245– sector, defined, 3-131
stability mechanism, defined,
6-251 security, A-15–A-16
3-114
in maritime environments,
security area operations,
7-33–7-34 stability mechanisms, 3-106–
6-199–6-205
3-114
rearward passage of lines,
security assistance, 4-44
defined, 6-159 stability operation, defined,
security cooperation, 4-41– 1-45
reception, 5-40–5-41
4-52
defined, 5-40 staff, communicating with,
defined, 4-41
8-47–8-48
reception, staging, onward
security force assistance,
movement, and integration, staging, defined, 5-42
4-45–4-46
5-39–5-48 strategic contexts, Army, 1-65–
defined, 4-45
reception, staging, onward 1-77
security force assistance
movement, and integration, strategic environment, 2-32–
brigades, 4-88–4-89
during contested 2-53
deployments, C-29–C-35 security forces, defined, 4-45
strategic framework, 3-119–
reception, staging, onward security operations, 6-147– 3-126
movement, and integration, 6-156
strategic lines of
establish protected, 7-64– defined, 6-149
communications, control,
7-68 in maritime environments,
6-69–6-74
7-48–7-51
reconnaissance, 6-134–6-146
strategic signal brigade, 4-79–
defined, 6-134 security sector reform, defined,
4-80
4-50
reconnaissance in force,
support to, 4-50–4-52 strategic support area, 3-120
defined, 6-140
see the enemy, 3-43–3-46 striking force, defined, 6-188
reconstitution, defined, 6-95
see yourself, 3-40–3-42 subordinates, communicating
redeployment, defined, 5-51
with, 8-47–8-48
see yourself, see the enemy,
reinforcing, defined, B-27
and understand the support area operations,
relative advantage, defined, operational environment, 3-156–3-157
1-12 3-38–3-55 defined, 3-156
relative advantages, 5-10–5-14 set, and maintain the theater, planning considerations,
during armed conflict, 6-24– 4-61–4-62 3-158–3-159
6-32 operational areas, 4-63 support operational areas, 4-63
during competition, 4-25–4- the theater, 4-13–4-15 support relationships, B-2
29
setting the theater, defined, Army, B-23–B-28
relief in place, defined, 6-158 4-13 joint, B-11–B-12
reserve, 3-165–3-166 shared understanding, 3-50– support to security sector
defined, 3-165 3-51 reform, 4-50–4-52
during armed conflict, fostering, 8-44–8-46 supporting distance, defined,
6-209–6-214
signal command (theater), 3-135
restraint, A-21–A-22 4-79–4-80 |
3-0 | 274 | Index
Entries are by paragraph number.
supporting effort, defined, theater sustainment command, U
3-164 4-73–4-74
uncertain, war, 1-32
surprise, A-17–A-18 theater sustainment
understand, 8-29–8-30
survivability, 2-29–2-31 operations, conduct, 7-69– and manage the effects of
defined, 2-29 7-79 operations on units and
sustain large-scale combat threat capabilities, and force soldiers, 3-96–3-97
operations, 6-90–6-97 projection, C-1–C-12 the operational
in maritime environments, threat methods, 2-39–2-53 environment, 3-47–3-55
7-63–7-78 threats, 2-35–2-38 understanding, an operational
sustainment, defined, 5-50 environment, 1-76–117
traditional principles of war,
defined, 3-48
sustainment warfighting A-1–A-19
function, 2-12–2-13 unified action, and Army
train, leaders, 4-24
defined, 2-12 forces, 2-54–2-94
training, and preparation defined, 2-54
synchronization, 3-18–3-21
considerations, C-44
defined, 3-18 United States diplomatic
and readiness authority,
mission, 4-32–4-33
systems warfare, 2-45–2-47 B-31
and readiness oversight, unity of command, A-13–A-14
T
B-30 unity of effort, defined, 2-54
tactical command, B-49
transit, protection during, 5-33–
V
tactical control, B-10 5-38
in the North Atlantic Treaty variables, mission, 1-118–
transition, prepare to, 4-22–
Organization, B-50 1-119
4-23
operational, 1-118–1-119
tactical level of warfare, 1-62– back to competition, 5-65–
1-64 5-67 visualize, 8-31
defined, 1-62 to armed conflict, 5-68
W
tactical-level disintegration, to competition or armed
6-129–6-132 conflict, 5-64–5-68 war, and warfare, 1-26–1-77
to crisis and armed conflict, human endeavor, 1-31
tactics, defined, 1-62 4-103–4-110 inherently chaotic, 1-32
task-organizing, 6-50–6-53 to defense and stability, nature of, 1-29–1-32
defined, 6-50 6-252–6-254 political purpose, 1-30
teams, developing, 8-49–8-54 to offense, 6-218–6-219 principles of, 1-33–1-34
to post-conflict competition, principles of, A-1–A-26
tempo, defined, 3-11
6-255–6-267 uncertain, 1-32
tenets, of operations, 3-6–3-36
transition to post-conflict warfare, and war, 1-26–1-77
tenets and imperatives, 3-5– competition, brigades during, characteristics of, 1-35
3-97 6-265–6-267 conventional, 1-37–1-39
theater, opening the, 5-26 transition to post-conflict information, 2-40–2-44
set and maintain, 4-61–4-62 competition, corps during, irregular, 1-40–1-41
levels of, 1-54–1-64
theater armies during transition 6-261–6-262
methods of, 1-36–1-41
to post-conflict competition, transition to post-conflict national strategic level of,
6-257–6-260 competition, divisions during, 1-56
theater army, 2-83 6-263–6-264 operational level of, 1-58–
assigned forces, 4-72-4-89 transition to post-conflict 1-61
theater army roles, during competition, theater armies systems, 2-45–2-47
competition, 4-56–4-58 during, 6-257–6-260 tactical level of, 1-62–1-64
theater strategic level of,
theater army roles, during transitions, adapting formations
1-57
crisis, 5-53–5-55 for, 8-36–8-54
warfighting function, command
theater aviation elements, 4-77 troop movement, defined,
and control, 2-3–2-5
6-157
theater engineer command,
defined, 2-1
4-81 types, of offensive operations,
fires, 2-11
theater fires command or 6-228–6-232 intelligence, 2-9–2-10
of defensive operations,
element, 4-84 movement and maneuver,
6-186–6-190
theater strategic level of 2-6–2-8
warfare, theater strategic protection, 2-14
level of warfare, 1-57 sustainment, 2-12–2-13 |
3-0 | 275 | Index
Entries are by paragraph number.
warfighting functions, 2-1–2-14 X–Y–Z zone reconnaissance, defined,
weapons of mass destruction, zone, defined, 3-130 6-137
countering, 4-53 |
3-0 | 277 | FM 3-0
01 October 2022
By Order of the Secretary of the Army:
JAMES C. MCCONVILLE
General, United States Army
Chief of Staff
Official:
MARK F. AVERILL
Administrative Assistant
to the Secretary of the Army
2224402
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve. To be distributed in |
3-98 | 1 | FM 3-98
RECONNAISSANCE AND
SECURITY OPERATIONS
JANUARY 2023
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
This publication supersedes FM 3-98, dated 1 July 2015. |
3-98 | 2 | This publication is available at the Army Publishing Directorate site
(https://armypubs.army.mil), and the Central Army Registry site |
3-98 | 3 | *FM 3-98
Field Manual Headquarters
No. 3-98 Department of the Army
Washington, D.C., 10 January 2023
RECONNAISSANCE AND SECURITY OPERATIONS
Contents
Page
PREFACE................................................................................................................... vii
INTRODUCTION ......................................................................................................... ix
Chapter 1 CAVALRY ORGANIZATIONS AND THE OPERATIONAL ENVIRONMENT .......... 1-1
Section I – Operational Overview .......................................................................... 1-1
Historical Roles of Cavalry Units ............................................................................... 1-1
Current Role .............................................................................................................. 1-3
Section II – Understanding the Operational Environment .................................. 1-6
Section III – Shape the Operational Environment ................................................ 1-7
Section IV – Cavalry Employment in Large Scale Combat Operations ......................... 1-8
BCT Planning Considerations for the Cavalry Units ................................................. 1-9
General Employment of Cavalry Units .................................................................... 1-10
Brigade Operations Officer and Squadron Employment ........................................... 1-11
Section V – Organizations .................................................................................... 1-18
Brigade Combat Team ............................................................................................ 1-18
Cavalry Squadrons .................................................................................................. 1-21
Air Cavalry Squadron .............................................................................................. 1-21
Air Cavalry Troop ..................................................................................................... 1-22
Cavalry Troops ........................................................................................................ 1-22
Armored Company .................................................................................................. 1-24
Weapons Troop ....................................................................................................... 1-24
Scout Platoon .......................................................................................................... 1-25
CBRN Reconnaissance and Surveillance Platoon .................................................. 1-25
Chapter 2 THREATS .................................................................................................................. 2-1
Section I − Understanding the Threat.................................................................... 2-1
Irregular Forces ......................................................................................................... 2-2
State and Nonstate Threats....................................................................................... 2-3
Section II − Threat Capabilities, Tactics, and Techniques .................................. 2-4
Physical Dimension ................................................................................................... 2-5
Cognitive and Informational Dimension ..................................................................... 2-5
Countering Adaptations and Retaining the Initiative ................................................. 2-5
Section III − Reconnaissance Disruption, Tactics, and Techniques ...................... 2-5
Overview Enemy Reconnaissance and Security Operations ............................................. 2-7
Counterreconnaissance ............................................................................................. 2-7
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
*This publication supersedes FM 3-98, dated 1 July 2015. |
3-98 | 4 | Contents
Understand Being Matched ...................................................................................... 2-8
Chapter 3 MISSION COMMAND ............................................................................................... 3-1
Section I – Mission Command for Reconnaissance and Security ..................... 3-1
Principles of Mission Command ................................................................................ 3-1
Exercise of Command and Control ........................................................................... 3-2
Section II – Command and Control ....................................................................... 3-4
Operations Process................................................................................................... 3-4
Commanders and Staffs Collaborate to Plan, Prepare, Execute, and Assess ....... 3-16
Section III – Integrating Processes ..................................................................... 3-27
Intelligence Preparation of the Battlefield ............................................................... 3-27
Targeting ................................................................................................................. 3-27
Timely Reporting and Assessment ......................................................................... 3-28
Update the Collection Plan ..................................................................................... 3-29
Screen Reports ....................................................................................................... 3-30
Correlate Reports to Requirements ........................................................................ 3-30
Assessments ........................................................................................................... 3-30
Chapter 4 RECONNAISSANCE OPERATIONS ....................................................................... 4-1
Section I – Reconnaissance Fundamentals, Methods, Management .................... 4-1
Reconnaissance Fundamentals ................................................................................ 4-1
Commander’s Reconnaissance Guidance ............................................................... 4-3
Reconnaissance Techniques .................................................................................... 4-3
Reconnaissance Methods ......................................................................................... 4-4
Reconnaissance Management ................................................................................. 4-6
Reconnaissance Assets and Capabilities ................................................................. 4-6
Surveillance ............................................................................................................... 4-7
Section II – Reconnaissance Types ...................................................................... 4-8
Zone Reconnaissance .............................................................................................. 4-9
Area Reconnaissance ............................................................................................. 4-13
Route Reconnaissance ........................................................................................... 4-15
Reconnaissance in Force ....................................................................................... 4-18
Special Reconnaissance ......................................................................................... 4-18
Section III – Reconnaissance Handover ............................................................. 4-19
Planning Considerations ......................................................................................... 4-19
Execution and Tasks ............................................................................................... 4-20
Special Operations Forces Reconnaissance Handover ......................................... 4-23
Chapter 5 SECURITY OPERATIONS ....................................................................................... 5-1
Section I – Security Basics .................................................................................... 5-1
Security ..................................................................................................................... 5-1
Security Fundamentals ............................................................................................. 5-2
Commander’s Security Guidance ............................................................................. 5-4
Section II – Counterreconnaissance ..................................................................... 5-4
Section III – Security Types ................................................................................... 5-5
Screen ....................................................................................................................... 5-7
Guard ...................................................................................................................... 5-12
Cover ....................................................................................................................... 5-28
Area Security ........................................................................................................... 5-36
Section IV – Transition Planning ......................................................................... 5-41
Battle Handover ...................................................................................................... 5-41
Passage of Lines (Forward and Rearward) ............................................................ 5-43
Relief in Place ......................................................................................................... 5-47 |
3-98 | 5 | Contents
Change of Mission ................................................................................................... 5-48
Chapter 6 STABILITY ................................................................................................................ 6-1
Section I – Principles and Framework ................................................................... 6-1
Conflict Transformation ............................................................................................. 6-1
Unity of Effort ............................................................................................................. 6-1
Legitimacy and Host-Nation Ownership .................................................................... 6-2
Building Partner Capacity .......................................................................................... 6-2
Stability Framework ................................................................................................... 6-2
Section II – Operations During Stability Tasks..................................................... 6-3
Cavalry Unit’s Role .................................................................................................... 6-5
Support During Stability Tasks .................................................................................. 6-5
Sustainment ............................................................................................................... 6-8
Interdependent Capabilities ....................................................................................... 6-8
Section III – Army Stability Operations Tasks .................................................... 6-10
Reconnaissance and Security Stability Tasks......................................................... 6-10
Support to Economic and Infrastructure Development ............................................... 6-13
Chapter 7 SUSTAINMENT ......................................................................................................... 7-1
Section I – Overview ................................................................................................ 7-1
Section II – Planning ............................................................................................... 7-1
Planning Fundamentals and Procedures .................................................................. 7-2
Logistics ..................................................................................................................... 7-3
Personnel Services .................................................................................................... 7-4
Support Areas ............................................................................................................ 7-7
Echelons Above Brigade Sustainment Support ........................................................ 7-8
Section III – Considerations ................................................................................... 7-9
Sustainment of Reconnaissance Operations ............................................................ 7-9
Sustainment of Security Operations ........................................................................ 7-10
Stability Operations ................................................................................................. 7-11
Section IV – Special Considerations ................................................................... 7-11
Attachments ............................................................................................................. 7-11
Detachments ........................................................................................................... 7-11
Appendix A ECHELONS ABOVE BRIGADE CONSIDERATIONS ............................................ A-1
Appendix B ANNEX L (INFORMATION COLLECTION) FORMAT AND INSTRUCTIONS ....... B-1
GLOSSARY ................................................................................................ Glossary-1
REFERENCES ........................................................................................ References-1
INDEX ................................................................................................................ Index-1
Figures
Figure 1-1. Reconnaissance and security in offensive, defensive, and stability operations .......... 1-9
Figure 1-2. Brigade reconnaissance cell ...................................................................................... 1-12
Figure 1-3. Squadron in its own area of operations ..................................................................... 1-13
Figure 1-4. Squadron in BCT deep area of operations ................................................................ 1-14
Figure 1-5. Squadron operating across another battalion’s area of operations ........................... 1-15
Figure 1-6. Squadron conducting reconnaissance in the brigade area of operations ................. 1-17
Figure 1-7. ABCT Cavalry units and enablers (shaded) .............................................................. 1-19 |
3-98 | 6 | Contents
Figure 1-8. IBCT Cavalry units and enablers (shaded) ............................................................... 1-20
Figure 1-9. SBCT Cavalry units (shaded) .................................................................................... 1-20
Figure 1-10. Air Cavalry squadron ............................................................................................... 1-22
Figure 3-1. CCIR and EEFI breakdown ......................................................................................... 3-7
Figure 3-2. Reconnaissance tempo ............................................................................................. 3-11
Figure 3-3. Development of guidance for reconnaissance and security tasks ............................ 3-15
Figure 3-4. BCT information collection timeline ........................................................................... 3-18
Figure 3-5. Priority intelligence requirement breakdown ............................................................. 3-20
Figure 4-1. IBCT zone reconnaissance graphics ........................................................................ 4-12
Figure 4-2. SBCT area reconnaissance ...................................................................................... 4-15
Figure 4-3. SBCT route reconnaissance mission ........................................................................ 4-17
Figure 4-4. Reconnaissance handover ........................................................................................ 4-21
Figure 4-5. Reconnaissance handover between squadron and combat aviation brigade .......... 4-22
Figure 4-6. Reconnaissance handover, follow-on battalion continues mission ........................... 4-23
Figure 5-1. SBCT stationary screen mission ............................................................................... 5-10
Figure 5-2. ABCT advance guard mission ................................................................................... 5-15
Figure 5-3. IBCT Cavalry squadron stationary flank guard ......................................................... 5-17
Figure 5-4. Moving flank guard mission ....................................................................................... 5-19
Figure 5-5. 4-10 Cavalry task organization .................................................................................. 5-20
Figure 5-6. Moving flank guard, simultaneous deployment into zone ......................................... 5-21
Figure 5-7. Squadron guard operation on phase line New York ................................................. 5-22
Figure 5-8. Visual contact during moving flank guard operation ................................................. 5-23
Figure 5-9. Security force crossing the LD separately to establish a flank screen ...................... 5-25
Figure 5-10. Security force continuing to cross LD separately to establish a flank screen ......... 5-26
Figure 5-11. Movement to contact technique during moving flank security mission ................... 5-27
Figure 5-12. Zone reconnaissance technique during moving flank security mission .................. 5-28
Figure 5-13. Reinforced SBCT performing advanced cover ........................................................ 5-31
Figure 5-14. Reinforced ABCT performing flank cover ................................................................ 5-32
Figure 5-15. Reinforced ABCT performing defensive cover ........................................................ 5-35
Figure 5-16. Cavalry squadron conducting area security ............................................................ 5-37
Figure 5-17. Convoy security organization .................................................................................. 5-39
Figure 5-18. Forward passage of lines ........................................................................................ 5-44
Figure 5-19. Rearward passage of lines ...................................................................................... 5-45
Figure 6-1. Stability tasks............................................................................................................. 6-11
Figure 7-1. Process for evacuation of the wounded ...................................................................... 7-6
Tables
Table 1-1. Squadron employment comparisons .......................................................................... 1-16
Table 3-1. Available reconnaissance and security information collection capabilities ................ 3-22
Table 4-1. Dedicated reconnaissance units and types of reconnaissance operations ................. 4-9 |
3-98 | 7 | Contents
Table 5-1. Typical echelon of security forces for a given operation at echelon ............................. 5-7
Table 5-2. Moving flank guard movement method comparison ................................................... 5-18
Table 5-3. Typical command and support relationships for cover operations ............................. 5-29 |
3-98 | 9 | Preface
FM 3-98 provides doctrinal guidance and direction for Cavalry organizations and reconnaissance and security
organizations. This field manual establishes the foundation for the development of tactics and procedures in
subordinate doctrine publications. This publication applies across the range of military operations. The focus
of this field manual is Cavalry formations within the units listed below; however, all maneuver formations
must be able to conduct reconnaissance and security operations.
* Armored brigade combat team Cavalry squadron (ABCT).
* Infantry brigade combat team Cavalry squadron (IBCT).
* Stryker brigade combat team Cavalry squadron (SBCT).
* Battalion scout platoons.
* Combat aviation brigade air Cavalry squadron.
* Chemical, biological, radiological, and nuclear reconnaissance platoons.
* Engineer reconnaissance platoons.
The principal audiences for FM 3-98 are commanders, leaders, and staffs responsible for the planning,
execution, or support of reconnaissance and security operations as well as instructors charged with teaching
reconnaissance and security operations.
Commanders ensure that their decisions and the actions of their units comply with applicable United States,
international, and host-nation laws and regulations. Commanders ensure that their Soldiers operate according
to the law of land warfare and the rules of engagement. (Refer to FM 6-27 for more information.)
FM 3-98 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the
glossary and the text. Terms for which FM 3-98 is the proponent publication (the authority) are marked with
an asterisk (*) in the glossary. Terms and definitions for which FM 3-98 is the proponent publication are
boldfaced in the text. For definitions shown in the text, the term is italicized and the number of the proponent
publication follows the definition.
FM 3-98 applies to the Active Army, Army National Guard/Army National Guard of the United States, and
United States Army Reserve unless otherwise stated.
The proponent of FM 3-98 is the United States Army Maneuver Center of Excellence. The preparing agency
is the Doctrine and Collective Training Division, United States Army Maneuver Center of Excellence. Send
your comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank
Forms) to Commander, Maneuver Center of Excellence, Directorate of Training and Doctrine, Doctrine and
Collective Training Division, ATTN: ATZK-TDD, 1 Karker Street, Fort Benning, GA 31905-5410; by email
to [email protected]; or submit an electronic DA Form 2028. |
3-98 | 11 | Introduction
FM 3-98 provides the commander and staff of Cavalry formations with doctrine relevant to Army and joint
operations. This publication explains how effective reconnaissance and security operations generate depth,
allow commanders reaction time and maneuver space, fight for information and collect information through
stealth, protect forces against surprise, ease the forward movement of follow-on forces, and provide
commanders with flexibility and adaptability. The doctrine in this publication is applicable across offensive,
defensive, and stability operations. This publication provides doctrinal guidance for all formations assigned
to the Armored brigade combat team, the Infantry brigade combat team, and the Stryker brigade combat
team. The following is a summarization of each chapter of this manual:
* Chapter 1 addresses the role of Cavalry in offensive, defensive, and stability operations and
Cavalry organizations.
* Chapter 2 addresses peer and near peer threats, threat reconnaissance, and security tactics.
* Chapter 3 discusses the updated concepts of command and control relating to commanders’
reconnaissance and security guidance, the operations process, an understanding of the threat,
potential threat groups, and threat characteristics.
* Chapter 4 discusses the fundamentals of reconnaissance, types of reconnaissance operations, and
a reconnaissance handover.
* Chapter 5 discusses the fundamentals of security operations, counterreconnaissance, and the types
of security operations.
* Chapter 6 discusses reconnaissance and security stability planning, stability principles and
frameworks, and stability tasks.
* Chapter 7 describes considerations for planning and executing sustainment operations.
To comprehend FM 3-98, the reader must understand the operational art, the principles of war, and the links
between the operational and tactical levels of war described in JP 1, Volume 2, JP 3-0, and ADP 3-0. The
reader should understand how the offensive, defensive, stability, and defense support of civil authorities’
tasks describe carry over and affect the conduct described by each task (in ADPs 3-07, 3-28, and 3-90).
Readers should understand the operations process (plan, prepare, execute, and assess) and how that process
relates to the Army’s military decision-making process and troop leading procedures described in ADP 5-0.
The reader must also comprehend the concepts associated with mission command and command and control
as described in ADP 6-0. Reviewing these publications assists the reader in understanding FM 3-98.
While doctrine provides leaders at all echelons with authoritative principles to consider before, during, and
after execution of reconnaissance and security operations, FM 3-98 is not a substitute for common sense,
professional military judgment, and leaders’ imperatives to act aggressively. As in any combat operation,
success during offensive, defensive, and stability operations depends mainly on leaders and Soldiers who are
tough, disciplined, and competent and who take the initiative consistent with the mission, commander’s
intent, and the principles outlined within this manual. |
3-98 | 13 | Chapter 1
Cavalry Organizations and the Operational Environment
Reconnaissance and security operations are essential to the execution of offensive,
defensive, and stability operations. Brigade combat teams (BCTs) conduct
reconnaissance and security operations to develop the situation and identify, create, and
preserve options to seize, retain, and exploit the initiative.
Reconnaissance and security operations allow BCTs to achieve positions of relative
advantage. Effective reconnaissance and security operations confirm or deny the
commander’s and staff’s initial understanding and visualization of the tactical and
operational situation. Reconnaissance and security operations develop the intelligence
picture for the BCT so the commander can describe, direct, lead, and make effective decisions.
Reconnaissance and security operations provide a continuous flow of combat
information and intelligence that assist commanders with uncertainty, make contact
under favorable conditions, identify opportunities, prevent surprise, and make timely
decisions. Reconnaissance and security operations provide BCT commanders with
freedom of movement and action to create advantageous conditions for future
operations to seize, retain, and exploit initiative.
SECTION I – OPERATIONAL OVERVIEW
1-1. Reconnaissance operations allow commanders to understand the situation, visualize the battle, and
make decisions. Security operations provide commanders with reaction time and maneuver space to make
decisions and protect the force from anticipated and unanticipated dangers. Reconnaissance and security
operations answer commander’s critical information requirements (CCIRs), mitigate risk, identify enemy
weaknesses, and isolate the enemy from sources of strength.
1-2. Cavalry units conduct reconnaissance and security operations in close contact with enemy
organizations and civilian populations. Cavalry organizations employ appropriate combinations of mounted
and dismounted tactics and to fight for information and develop the situation based upon the mission variables
of METT-TC (I): mission, enemy, terrain and weather, troops and support available, time available, civil
considerations, and informational considerations.
HISTORICAL ROLES OF CAVALRY UNITS
1-3. Armies have used Cavalry forces to capitalize upon their significant advantage in mobility, making
them well suited for long-range reconnaissance and security operations. The Cavalry forces’ fighting ability
make them well suited for shaping subsequent fights and giving the commander time to make decisions.
Reconnaissance and security operations provide commanders the ability to concentrate forces at decisive
points while protecting against surprise. A decisive point is key terrain, key event, critical factor, or function
that, when acted upon, enables commanders to gain a marked advantage over an enemy or contribute
materially to achieving success (JP 5-0). Cavalry continues to play key roles, such as—
* Conducting reconnaissance operations to detect enemy weaknesses and strengths.
* Conducting security operations to provide early warning and maneuver space.
* Covering retreats.
* Countering enemy reconnaissance forces. |
3-98 | 14 | Chapter 1
* Counterattacking enemy infantry attacks.
* Administering the decisive blow through isolation and pursuit.
1-4. For example, the operations of the newly organized Cavalry Corps of the Army of the Potomac during
the Gettysburg campaign were an essential factor in the Union’s success in that pivotal battle. At Gettysburg,
the Union Army employed an effective Cavalry force that worked directly for the commanding General of
the Army. Below is information that highlights an example of a historical role that Cavalry units have played
on the battlefield.
Shaping the Battlefield with Cavalry: Gettysburg, the First Day
In June 1863, as General Robert E. Lee led his Army of Northern Virginia through the
Shenandoah Valley into Maryland and Pennsylvania, almost one half of the confederate
cavalry forces under Major General J.E.B. Stuart were conducting independent
operations. The absence of Stuart and his reconnaissance and security force would
disadvantage Lee as he concentrated his forces in south central Pennsylvania near the
town of Gettysburg.
The Union Army of the Potomac moved north in several columns, screened by its cavalry.
The westernmost column benefited from the protection of Brigadier General John Buford’s
Cavalry division, a combined arms force. On 29 June, this formation moved to a nexus of
roads near Gettysburg, leaving one of its brigades to cover the Catoctin Mountain passes
to protect the army’s flank. After a brief encounter with Confederate forces, Buford led his
remaining two brigades and one battery of artillery into Gettysburg the following day. He
bypassed initial contact to focus on his reconnaissance objective—the location and actions
of Lee’s army.
Aware of a Confederate concentration of forces to his west but lacking detailed
information, Buford dispatched scouts to conduct area reconnaissance west and north of
Gettysburg. They reported completely and accurately the locations and lines of march for
all three corps of Lee’s army. Buford immediately transmitted the collected information to
General Meade and made recommendations to the Union Army commander. Buford’s
reports allowed Meade to understand and visualize the terrain surrounding Gettysburg
before occupation. Based on his scouts’ reports, Buford deployed his division to cover the
primary approaches to the town from the north and west. He also ensured local security
by implementing martial law, the arrest of a suspected spy, and the prohibition of alcohol
sales to his soldiers. Buford understood his mission to delay the Confederates and deny
them access to the heights overlooking the town so the Army of the Potomac could occupy
that position.
Having pinpointed and identified their lines of march and probable objective (Gettysburg),
Buford undertook preparations to delay the Confederate forces (after identifying their
advance) as long as possible. He prepared his two brigades to cover a seven-mile arc
outside the town stretching from the west to the northeast. His main effort focused on the
Chambersburg Pike that reached Gettysburg from the west where the closest Confederate
forces were encamped. A series of ridgelines crossed the road, and Buford used these to
add depth to his position. His main position lay upon McPherson Ridge, where he deployed
much of one brigade, which he supported with his artillery battery. A series of picket lines
and small four- to five-man patrols occupied the ridgelines forward of this position to a
depth of nearly two miles. At their most advanced point along Whistler’s Ridge, Buford’s
pickets laid only a half mile from their Confederate counterparts. In Gettysburg’s
Lutheran Seminary, Buford established his signals officer in the high cupola, which
permitted observation of the town and its surroundings.
Buford’s operations lay in complete contrast to those undertaken by the Confederates.
When a North Carolina brigade approached Gettysburg and discovered the Union
Cavalry in the town, its commander withdrew and reported the contact to his division and
corps commanders. Neither officer considered the enemy’s presence in Gettysburg to be |
3-98 | 15 | Cavalry Organizations and
the Operational Environment
significant and determined to evict them the following day. They lacked detailed
information of Buford’s force, and they were under orders not to trigger a general
engagement before the arrival of the rest of Lee’s army. A thorough reconnaissance of
Gettysburg might have provided a more realistic assessment of the Union position. With
much of the Confederate Cavalry on detached service, they were not available to locate
and track the movements of the Army of the Potomac, much less conduct a deliberate
reconnaissance of Gettysburg thus depriving Lee of vital information.
In the early hours of 1 July, Confederate Major General Henry Heth led elements of his
division down the Chambersburg Pike toward Gettysburg. Heth’s forces quickly
encountered Buford’s forward picket line. Large numbers of Confederate skirmishers
deployed to engage the pickets, while an artillery battery provided fire support. Buford’s
pickets withdrew slowly, keeping the enemy engaged and unable to make a rapid advance.
Buford reinforced his forward lines causing further delays for the Confederate advance.
Buford’s actions caused the Confederates to deploy their brigades prematurely to prepare
for a general assault and commence an artillery bombardment of the Union positions.
Confederate deployment allowed the Army of the Potomac the opportunity to gain
positions of tactical advantage and retain initiative.
Buford and his division set conditions for Meade’s success. As more U.S. formations
arrived on the field, other Union forces relieved Buford’s division. Buford’s actions
ensured that the Army of the Potomac secured the high ground. Over the next two days,
General Lee’s army would shatter itself in repeated attacks upon these heights.
Reconnaissance operations to identify Confederate forces and key terrain, along with
security operations delaying Confederate advances and protecting the main body, proved
decisive at The Battle of Gettysburg.
CURRENT ROLE
1-5. The fundamental purpose of the U.S. Army’s Cavalry is to set conditions for successful operations of
their higher headquarters. These roles are not necessarily missions themselves but translate into mission
statements. Cavalry units conduct the following to set conditions for successful operations:
* Enable combat operations.
* Provide accurate and timely information to the operations process.
* Operate as combined arms air-ground teams.
* Provide reaction time and maneuver space.
* Preserve combat power and achieve economy of force.
* Facilitate movement and transitions.
* Fight for information.
ENABLE COMBAT OPERATIONS
1-6. Reconnaissance and security operations are essential to all successful operations. BCTs conduct
continuous reconnaissance and security operations mainly through their organic Cavalry organizations. BCTs
must defeat adaptive and determined enemies as well as consolidate tactical gains. Effective reconnaissance
and security operations improve situational understanding and enable commanders to—
* Identify or create options to seize, retain, and exploit the initiative.
* Achieve situational understanding.
* Visualize operations in the context of mission variables of METT-TC (I).
* Develop the situation through action in close contact with enemy and civilian populations.
* Execute operations with higher degrees of flexibility, adaptability, synchronization, and integration.
* Understand the tactical, human, and political dynamics within an area of operations. |
3-98 | 16 | Chapter 1
PROVIDE ACCURATE AND TIMELY INFORMATION TO THE OPERATIONS PROCESS
1-7. Accurate and timely reporting allows the BCT to seize and retain the initiative and to concentrate
combat power at the right time and place. The BCT commander requires accurate and timely information on
enemy, terrain, and the civilian population as they affect the mission. To understand, visualize, describe,
direct, lead, and assess combat operations, the BCT commander relies on information collection units and
capabilities, including national intelligence sources, military intelligence units, special purpose
reconnaissance, unmanned aircraft systems (UASs), aviation, electromagnetic warfare, cyberspace operation
platforms, and any unit in contact. These units and capabilities support intelligence preparation of the
battlefield (IPB), the operations process, and adjustments during operations. During IPB, the staff considers
how the adversary or enemy utilizes cyberspace and the electromagnetic spectrum (EMS) to achieve their
objective. The commander and staff’s best means of visualizing and understanding their area of operations,
if battlefield circulation is not possible, is through reconnaissance operations.
1-8. Commanders require timely and accurate information during the execution of operations to maneuver
and direct combat operations against the enemy. The primary source of information for the commander
during battle is the reconnaissance and security organization—the Cavalry.
1-9. Cavalry units—
* Detect and counter enemy tactical deception efforts.
* Provide a capable means of assessing terrain.
* Operate actively not passively. Cavalry not only finds the enemy but can also develop the situation
and force the enemy to reveal more information including enemy intentions and fighting ability.
* Disseminate relevant information immediately to commanders.
* Develop recommendations to seize, retain, and exploit the initiative.
* Answer priority intelligence requirements (PIRs).
* Shape the battlefield.
1-10. A key task for the Cavalry is to shape the battlefield. In this context, shaping is to set conditions for
the success of the supported commander’s plan through effects on the enemy, other actors, and the terrain.
Shaping occurs in all domains and can have physical, cognitive, and informational effects. For example, in
security operations the Cavalry may vary the engagement and disengagement criteria of their battle positions
to shape an advancing enemy formation into the supported commander’s chosen engagement area. In
reconnaissance operations, the Cavalry may use different levels of aggressiveness on different avenues of
approach to shape the enemy’s decision-making regarding where to array their defense. Shaping the
battlefield is rarely a specified task but is an implied task that occurs during all operations. Cavalry
commanders must balance the implied shaping effect with the achievement of specified reconnaissance and
security tasks.
1-11. To shape the battlefield, the Cavalry commander must understand the supported commander’s scheme
of maneuver and decision points. However, the supported commander may not have completed their plan
before the Cavalry commences their reconnaissance or security operation. Therefore, the Cavalry commander
must be prepared to extrapolate the desired shaping effect from the available information, as well as be
prepared to adapt their plan during execution.
1-12. The desired shaping effect may change which type of reconnaissance or security the commander
selects. For example, a Cavalry commander may elect to conduct a guard rather than a screen to maximize
their ability to shape the enemy’s avenue of approach. Commanders must also consider the shaping effect
when creating reconnaissance and security guidance. In particular, varying engagement and disengagement
criteria is key to shaping enemy maneuver effectively.
OPERATE AS COMBINED ARMS AIR-GROUND TEAMS
1-13. Cavalry organizations are combined arms teams that, when paired with aviation units, form air-ground
maneuver teams that utilize appropriate combinations of mounted, dismounted, and aerial operations to
accomplish their mission. Air-ground operations are the simultaneous or synchronized employment of
ground forces with aviation maneuver and fires to seize, retain, and exploit the initiative. The organization is
equipped, organized, and trained to identify enemy locations to improve the BCT’s situational awareness and |
3-98 | 17 | Cavalry Organizations and
the Operational Environment
to provide the BCT with security. Cavalry units must move continually and at times rapidly to positions of
relative advantage to observe and fight. Cavalry units require organized, integrated, and synchronized support
from all warfighting functions to ensure effective reconnaissance and security operations.
1-14. Cavalry units employ all available combat power to answer the commander’s PIRs. While the enemy
seeks to protect or conceal vital information and key assets, Cavalry units overcome these efforts and fight
for information within their capabilities to develop the situation rapidly and report the specific details of the
tactical situation accurately. Air-ground teams allow reconnaissance efforts to develop the situation in
multiple domains to maximize information collection and assist the commander in visualizing and
understanding the area of operations. Combined arms air-ground operations answer PIR, create options, and
develop the situation to set conditions for a reconnaissance handover or decisive engagement.
1-15. Effective air-ground operations are built upon relationships, mutual trust, and a common understanding
of the operational environment, operation, and mission. Air-ground operations require detailed planning,
coordination, and synchronized employment of ground, air maneuver, and fire to achieve the commander’s
objectives to ensure freedom of movement and action.
1-16. Aviation assets are an integral member of the combined arms team that significantly increases the
relative combat strength of Cavalry squadrons. These limited assets must be utilized effectively to help
achieve the commander’s intent. BCTs must know their capabilities, employ them appropriately, and
synchronize their operation to accomplish the mission.
PROVIDE REACTION TIME AND MANEUVER SPACE
1-17. The BCT’s Cavalry squadron develops the situation by fighting for information to buy the time and
space required for an effective response to enemy actions. The Cavalry squadron conducts reconnaissance
operations to develop the situation forward or to the flanks of the main body to prevent the BCT commander
from fighting at a disadvantage. The Cavalry squadron conducts security operations to provide the
commander with maneuver space so they can respond to unanticipated enemy actions or developments within
the BCT’s area of operations. Security operations provide the commander with time to assess the situation,
determine a course of action, issue orders, make continuous assessments, issue additional fragmentary orders,
and maneuver.
PRESERVE COMBAT POWER AND ACHIEVE ECONOMY OF FORCE
1-18. Cavalry organizations provide security for the BCT main body to protect and preserve the combat
power of the BCT. In offensive operations, effective Cavalry operations prevent the premature deployment
and loss of critical combat power. In defensive operations, an effective Cavalry operation provides early
warning, destroys enemy reconnaissance forces, and fixes the lead elements of enemy organizations within
the capabilities of the respective Cavalry organization.
1-19. Economy of force is the employment and distribution of forces to allocate the maximum possible
combat power on primary efforts (JP 3-0). The Cavalry’s flexible capabilities allow the commander to
conserve their BCT’s combat power to use at a time and place of their choosing. Based on METT-TC (I),
when augmented with additional combat power, the BCT’s Cavalry organizations can provide the BCT with
a critical capability based on the economy of force principle of joint operations.
FACILITATE MOVEMENT AND TRANSITIONS
1-20. Cavalry units assist movement and transitions by executing reconnaissance and facilitating
coordination and contact between units. Scout platoons occupy contact points, passage points, and coordinate
with higher and adjacent units to ensure seamless transitions and cross-unit coordination.
1-21. Effective reconnaissance operations ease transitions in plans, phases, and priorities of effort for the
BCT and mitigate information gaps between units. Reconnaissance operations assist commanders in
employing the most appropriate forms of maneuver to envelop, turn, dislocate, and ultimately defeat enemy forces.
1-22. Transitions mark a change of focus and priorities between phases or between the ongoing operation
and execution of a branch or sequel. The shift in priority between offense, defense, and stability operations |
3-98 | 18 | Chapter 1
involves a transition. Cavalry units are instrumental in providing the commander with information to make
transitions as seamless as possible. They provide protection for the main body transitioning from offense to
defense. However, Cavalry units are vulnerable to enemy threats, unanticipated changes to the situation, and
the danger of relaxing discipline and safety standards during their own and higher transitions. As a result,
commanders should establish clear conditions for mission execution.
FIGHT FOR INFORMATION
1-23. The information friendly forces seek is generally of equal importance to the enemy who will act to
protect the vital information. In addition, Cavalry units can satisfy some threat-based intelligence
requirements only by learning from the enemy’s reactions. While preserving their freedom of maneuver,
Cavalry units overcome these efforts and fight for information within their capabilities to develop the
situation rapidly and to report accurately the specific details of the tactical situation.
SECTION II – UNDERSTANDING THE OPERATIONAL ENVIRONMENT
1-24. BCTs develop an understanding of operational variables (political, military, economic, social,
information, infrastructure, physical environment, and time [PMESII-PT], and mission variables of
METT-TC (I) through reconnaissance and information collection to enhance situational awareness and an
understanding of competing interests. The G-2 or S2 is responsible for defining the cyberspace and the
electromagnetic operational environment (EMOE), which enables the BCT commander and staff to visualize
both friendly and enemy cyberspace and EW assets through the three layers of cyberspace and the EMS.
Understanding competing interests within the area of operations allows the commander and staff to frame
specific problems. BCTs seek to understand motivations and to recognize that each interest has multiple
perspectives. To operate effectively under conditions of complexity and in close contact with enemies and
populations, BCTs consider political interests from multiple perspectives.
1-25. Understanding interests requires analysis of the operational (PMESII-PT) and mission variables of
METT-TC (I) within a particular region. To communicate effectively, BCTs must develop an understanding
of the local audience’s cultural communication techniques. BCTs must understand the most important aspect
of cultural communication is how the population receives the information rather than how the unit transmits
the information. Determination of valued interests within an area provides options for BCTs to establish
programs that incentivize cooperation leading to mission accomplishment. Comprehension of interests allows
for understanding to implement disincentives that seek to coerce and persuade adversaries, enemies, and
neutral parties who have interests counter to the objectives of the brigade and higher. The understanding and
acknowledgement of interests frame information operations in future operations.
1-26. Efforts to understand interests begin before deployment. Country studies, analysis of the social
demographics, constructs of local, sub-national, and national governance, and understanding of key
personalities and organizations within a brigade’s future area of operation provide a baseline knowledge to
increase situational awareness and identify potential areas of friction before a brigade deploys. BCTs consider
the elements of PMESII-PT within their area of operations to gain understanding of the interests and
motivations particular to enhance situational awareness. Unified action partners, Army Special Operations
Forces (SOF), and other joint, interagency, intergovernmental, and multinational organizations are key
resources all units use to develop situational understanding during shaping efforts leading to a sustainable
security environment. The military information support operations assets organic and attached to the BCT
can assist in conducting adversary, information message analysis, and exploitation. The military information
support operations staff planner can obtain division or higher-level military information support operations
support to counter the adversary information activities as necessary. Analysis of these considerations allows
informed leaders to identify information gaps and develop courses of action that increase situational
understanding within their area of operation.
1-27. BCTs conduct information collection through reconnaissance operations focused on information
requirements to bridge information gaps. Gaps identified during IPB develop into information requirements
through continuous reconnaissance. BCTs define and collect information requirements that develop
situational understanding of the interests within a particular area by focusing civil considerations within the
construct of areas, structures, capabilities, organizations, people, and events. BCTs employ a range of |
3-98 | 19 | Cavalry Organizations and
the Operational Environment
integrated capabilities to understand the cultural implications of conducting military operations among
indigenous populations and institutions. The BCT or brigade civil affairs operations staff officer (S-9)
develops plans, policies, and programs to further the relationship between the BCT and the civil component
in the assigned area of operations. The S-9 provides a mechanism for civil-military coordination,
collaboration, and communication within the BCT area of operations. Chemical, biological, radiological, and
nuclear (CBRN) staff elements work with the brigade intelligence staff officer (S-2) to analyze the CBRN
threat in the operational environment. The BCT may meet gaps in understanding the CBRN threat with
taskings to the CBRN reconnaissance and surveillance platoon.
1-28. Commanders and staffs consider culture and pillar organizations that influence the civil considerations
of the operational environment. Culture is the shared beliefs, values, customs, behaviors, and artifacts
members of a society use to cope with the world and each other. Pillar organizations are organizations or
systems on which the populace depends for support, security, strength, and direction. Examination of culture
provides insight to the motivations and interests of people and organizations. Consideration of culture is
imperative to successful shaping operations that set conditions for future success. A thorough understanding
of group and individual interests allow for informed and viable courses of action that seek to shape the
environment favorably and contribute to positive outcomes and objectives within the brigade’s area of operations.
1-29. Host-nation security organizations and political partners provide invaluable insight into values, beliefs,
and interests. These organizations are composed of the people they secure and govern; their native fluency
in the customs, courtesies, cultures, beliefs, interests, and ideals provide the partnering BCT with cultural
perspective and intelligence that develops their understanding of the operational environment. Close, positive
relationships with host-nation partners breed trust, which lead to an understanding of the operational environment.
SECTION III – SHAPE THE OPERATIONAL ENVIRONMENT
1-30. Commanders and staffs consider the competitive environment of their area of operations in order to
seize, retain, and exploit the initiative and set conditions for future success. Different political entities and
personalities, tribal dynamics, religious interests, economic motivations, sources of security, and potential
havens of refuge for adversaries contribute to the competitive nature of the operational environment.
Furthermore, not all interests are parallel and mutually supportive of the objectives and end state for a
particular region. Shaping the environment requires BCTs to develop situational understanding and influence
personalities and organizations through engagement to achieve specific objectives. BCTs also persuade and
empower other personalities and organizations to modify behaviors and actions consistent with friendly
forces’ intent and objectives, and conduct limited offensive operations to maintain initiative. Shaping is an
enduring process throughout all operations and is not separated by phases.
1-31. Commanders actively seek to understand the competitive interests within their area of operations and
to understand how local interests influence desired outcomes and objectives. Some interests and motivations
support the BCT’s objectives and others conflict, counter, and disrupt supportive efforts to the desired end
state. BCTs must have a thorough understanding of the threat to identify conflicting interests and information
collection requirements developed through reconnaissance and security operations. BCTs actively seek
answers to information gaps through the development of information requirements that are satisfied through
active reconnaissance operations within a given area. Through information collection and analysis, staffs
develop options for the commander to inform the population, influence various actors, seize opportunities,
and maintain initiative.
1-32. Analysis of the motivations and interests of personalities and organizations provide insight to future
psychological operations activities seeking to modify behaviors counter to friendly force objectives.
Supporting efforts empower key influencers and organizations and persuade neutral audiences to bolster
legitimacy and secure vital interests and objectives. BCTs use coercive efforts to counter adversary and
enemy information activities and isolate adversaries from their support base to begin the psychological
breakdown of enemy organizations. BCTs shape conditions for objectives that are in line with host-nation
government interests.
1-33. The BCT’s shaping activities derive success from how effectively they persuade the populace and
empower the host-nation government. All efforts focus on bolstering the legitimacy of the rule of law and
the host nation’s ability to provide for effective governance. Persuasion and empowerment demand |
3-98 | 20 | Chapter 1
engagement strategies that deliver connections and relationships with pillar organizations and individuals
who control and influence the local community. Engagements secure common and clearly defined goals and
ideals that provide a common reference point for future engagements and activities. Engagements seek to
reinforce the authority of legitimate leaders and pillars and restore or solidify confidence in host-nation
security forces, governance, and the rule of law. Persuasive efforts utilize a compelling narrative that justifies
and explains friendly actions while delegitimizing motivations and behaviors of adversaries and those entities
opposing positive gains within the area of operations. Additionally, persuasive efforts specifically target
neutral or fringe entities with the goal of tipping neutrality to a favorable alliance.
1-34. Shaping the operational environment requires understanding the competing dynamics within the
BCT’s area of operations. Commanders and staffs gain an understanding through analysis of mission and
operational variables enhanced and developed through information collection and both reconnaissance and
security operations. Understanding and analysis are continuous tasks not bound by phase or operation.
SECTION IV – CAVALRY EMPLOYMENT IN LARGE SCALE COMBAT OPERATIONS
1-35. Commanders and staffs at the BCT, division, and corps level determine the reconnaissance
requirements for the operation. The commander issues reconnaissance-planning guidance early to ensure that
reconnaissance operations can precede the mission and identify options to seize, retain, and exploit the
initiative. Reconnaissance operations often begin before the course of action analysis completion so that the
Cavalry unit can inform the planning effort. For division Cavalry operations at echelons above brigade
(EAB), refer to appendix A.
1-36. Reconnaissance and security are vital operations performed in conjunction with other operations
during offensive, defensive, and stability operations. Not only reserved for the Cavalry squadron, the BCT
should incorporate reconnaissance and security into all aspects of operations. Figure 1-1 illustrates how
reconnaissance and security is fundamental to all aspects of decisive operations. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.