FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-90
30
Chapter 1 operation incorporates some form of fixing an enemy force. For example, in an area defense friendly forces seek to fix enemy forces within engagement areas tied into obstacles to destroy them. In the attack, friendly forces fix an enemy while another force finishes the enemy by massing overwhelming combat power. Finish the Enemy 1-37. While the enemy is fixed, friendly forces maintain momentum and mass overwhelming combat power to assault an objective to destroy enemy forces. An assault is a short and violent well-ordered attack against a local objective. Assaults occur at all tactical echelons. They can range from a squad assaulting a single gun emplacement to a brigade assaulting an enemy strong point. An assault ends when enemy forces are destroyed or have capitulated to friendly forces. Finishing the enemy requires aggressive application of combat power and small unit battle drills supported by all the forms of contact. The main effort of an operation finishes the enemy. Follow Through 1-38. Once an enemy is finished, actions by friendly forces are not complete. Small remaining elements of the enemy may require friendly forces to destroy them in detail. If all enemy forces are not neutralized, friendly forces maintain constant pressure to keep them off balance while capitalizing on successful tactical actions. 1-39. Follow through includes more than destroying remaining enemy forces. It also includes consolidating and reorganizing activities and executing transitions. These actions aid in posturing friendly forces for future operations. 1-40. Besides just consolidating and reorganizing friendly forces also execute a wide variety of activities such as casualty evacuation, detainee operations, and sustainment operations. To maintain momentum and tempo units account for these activities within their concept of operations. However, extensive consolidation or reorganization activities may result in a unit’s culmination and require a transition. 1-41. Transitions occur for a variety of reasons and are not just the result of a unit culminating or a temporary setback. They are a deliberate part of progress towards mission accomplishment, such as changing the phase of an operation or shifting from offensive operations to stability operations. Transitions can be difficult, particularly if they are unanticipated. During planning units identify potential transition points to reduce the increased friction inherent in transitions and maintain an accurate common operational picture to assess the progress of operations. 1-42. Offensive or defensive operations will likely continue unless all enemy forces are destroyed or capitulate. If this is the case, execution of follow through resets the cycle and units begin to find the enemy again. If finishing the enemy results in their total destruction or defeat and the cessation of offensive or defensive operations, friendly forces will likely transition to stability operations. Battle Drill 1-43. In addition to accomplishing the mission, every plan contains options for exploiting success or any advantages that may arise. Units exploit success by aggressively executing their plans, promoting subordinate leader initiative, and rapidly executing battle drills. 1-44. A battle drill is rehearsed and well understood actions made in response to common battlefield occurrences (ADP 3-90). Battle drills are the actions of individual Soldiers and small units, typically when they meet the enemy. They require minimal leader orders to accomplish and are initiated on a cue, such as an enemy action or a leader’s order, and are a trained response to that cue. Battle drills are designed to be quickly executed without the application of a deliberate decision-making process. Examples include “react to indirect fire” or “vehicle recovery.” Although battle drills are commonly initiated when enemy contact is made during close combat, they can also occur within command posts when a specific type of information is received and action needs to be taken to support those units in contact. Leaders develop or use battle drills specific to their capabilities and operations to assist subordinates in execution of common instances during all operations.
3-90
31
Army Tactics Battle Handover 1-45. A battle handover is a coordinated mission between two units that transfers responsibility for fighting an enemy force from one unit to the other. It sustains continuity of the combined arms fight and protects the combat power of both forces involved. Battle handover is usually associated with conducting a passage of lines, a relief in place, and a breakout of an encircled force. Battle handover occurs along a general trace line designated as the battle handover line (BHL), generally a phase line forward of the stationary force. (See appendix A for more information on a battle handover line.) Control Measures 1-46. Coordinating and synchronizing actions requires using control measures. A control measure is a means of regulating forces or warfighting functions (ADP 6-0). Control measures help commanders’ direct actions by establishing responsibilities and limits that prevent subordinate unit actions from impeding one another and prevent fratricide. They also foster coordination and cooperation between forces without unnecessarily restricting freedom of action. Control measures may be detailed (such as an operation order) or simple (such as a checkpoint). Control measures are prescriptive and provide control without requiring detailed explanation. Good control measures foster freedom of action, decision making, initiative, reporting, and prevent fratricide. 1-47. Control measures can be permissive or restrictive. Permissive control measures facilitate action while restrictive control measures limit action. Control measures may be graphical (such as phase lines) or procedural (such as target engagement priorities). Commanders should establish only the minimum control measures necessary to provide essential coordination and deconfliction between units. Restrictive control measures only remain in place as long as required for mission accomplishment. 1-48. Determining what control measures are necessary to adequately command and control operations without overburdening subordinates is a key consideration for every unit. This is particularly important for company and below formations who may not possess the same digital systems or capabilities as their higher headquarters. Graphic Control Measures 1-49. A graphic control measure is a symbol used on maps and displays to regulate forces and warfighting functions (ADP 6-0). Commander’s establish graphic control measures to regulate maneuver, movement, airspace, fires, and other aspects of operations. In general, all graphic control measures should relate to easily identifiable natural or man-made terrain. Regardless of their specific function, each control measure should have a specific purpose: mass the effects of combat power, synchronize subordinate forces’ operations, minimize the possibility of fratricide, or comply with the law of armed conflict. 1-50. At battalion and higher echelons, graphic control measures are initially identified during course of action development and refined throughout the operations process. However, a course of action sketch rarely provides the necessary detail to adequately command and control operations during execution. As plans and orders are refined subordinate echelons will typically add control measures to those from their higher headquarters. For example, a battalion may be tasked to seize an objective during an attack from their BCT headquarters. While the objective is assigned by the BCT, the battalion determines what control measures are necessary within that objective to adequately command and control their forces. When units develop control measures, they share those control measures with their subordinate units, higher headquarters, and adjacent units. Digital and Analog Control Measures 1-51. Digital systems provide leaders numerous benefits to aid in developing, implementing, and modifying control measures. Many of these systems possess the capability to display active and inactive graphic control measure overlays as well as provide notifications for control measure violations even if that control measure is not actively displayed. An advantage of these digital systems is the ability to rapidly share information, such as adjustments to control measures, as well as the ability to maintain a clearer common operational picture within command posts. The disadvantage to these digital systems is that many are not resident at the
3-90
32
Chapter 1 lowest tactical echelons, and they create an electromagnetic signature which can either be jammed or used for targeting purposes. 1-52. Analog control measures are hand-drawn on maps or overlays and are used by every echelon. Generally, battalion and above echelons use paper maps with overlays as a backup to many of their digital systems. Company and below echelons are more likely to use paper maps with overlays containing analog control measures as their primary means of command and control. These overlays consist of graphical control measures that allow the organization to maintain a common operational picture and continue operations within a degraded communications environment. Note. FM 3-90 contains numerous figures containing graphic control measures when describing offensive, defensive, and enabling operations. For clarity, these figures contain only the major applicable graphic control measures. Appendix A contains additional information on each of the control measures discussed in FM 3-90. For a complete listing of all control measures see FM 1-02.2. Terrain Management 1-53. Units manage terrain to coordinate and synchronize their operations with friendly forces. Terrain management is the process of allocating terrain by specifying locations for units and activities to deconflict activities that might interfere with each other. For example, an artillery unit is assigned a position area for artillery (PAA) to provide indirect fires. The PAA frames for the artillery unit the area for executing their fire missions and lets other units know that they need to coordinate with the PAA owner if they need to move through that area. Examples of terrain management include but are not limited to— * Assigned areas including area of operations, zone, and sector. * PAA. * Assembly area. * Battle position. * Route. * Lane. * Axis of advance. 1-54. Assigning areas to subordinates is a key operational framework and terrain management consideration for headquarters at every echelon. When appropriate units may further subdivide their assigned area into assigned areas for their subordinate formations. A higher headquarters remains responsible for any area not assigned to a subordinate unit. A unit moving through or delivering effects into another units assigned area must coordinate with the assigned unit. 1-55. The types of assigned areas include area of operations, zone, and sector. While there are numerous other control measures that enable terrain management only area of operations, zone, and sector are part of the assigned area model. Each assigned area has unique characteristics and employment considerations outlined below. Area of Operations 1-56. An area of operations is an operational area defined by a commander for land and maritime forces that should be large enough to accomplish their missions and protect their forces (JP 3-0). Units can use an area of operations (AO) during offensive, defensive, and stability operations. An AO is defined by boundaries that fully enclose the area. An AO is useful when a higher headquarters requires a greater degree of control. Units assigned an AO must be capable of performing specific responsibilities. These responsibilities include— * Terrain management. * Information collection, integration, and synchronization. * Civil affairs operations. * Movement control.
3-90
33
Army Tactics * Clearance of fires. * Security. * Personnel recovery. * Airspace management. * Minimum-essential stability operations tasks, which are—  Establish civil security.  Provide immediate needs (access to food, water, shelter, and medical treatment). 1-57. Commanders can add, remove, or adjust a subordinate units’ AO responsibilities based on the situation and mission variables. However, when assigning an AO, a higher echelon headquarters must inform the subordinate unit of any changes to the responsibilities listed above. Zone and Sector 1-58. A zone is an operational area assigned to a unit in the offense that only has rear and lateral boundaries (FM 3-0). The non-bounded side of a zone is open towards enemy forces. A higher echelon headquarters uses fire support coordination and maneuver control measures such as a limit of advance and a coordinated fire line to synchronize its deep operations with those of a subordinate unit. Zones allow higher headquarters to adjust deep operations without having to change unit boundaries. This gives greater flexibility to the higher headquarters for controlling deep operations, allowing subordinate units to focus on close and rear operations. A zone is best for front-line units executing high-tempo offensive operations characterized by direct fire contact with the enemy and a fluid forward line of troops (FLOT). Units treat everything behind the forward line of troops as an AO with the associated nine responsibilities. Zone can be further subdivided as needed. (See appendix A for more information on zones.) 1-59. A sector is an operational area assigned to a unit in the defense that has rear and lateral boundaries with interlocking fires (FM 3-0). The non-bounded side is open towards the enemy. A higher echelon headquarters uses fire support coordination and maneuver control measures such as battle positions and trigger lines to synchronize subordinate units. Higher headquarters are responsible for synchronizing operations forward of the main battle and security areas or coordinated fire line. Units use sectors to synchronize and coordinate engagement areas and allow for mutually supporting fields of fire, which do not require coordination between adjacent units. Units treat everything behind the forward line of troops as an AO with the associated nine responsibilities. Sectors can be further subdivided as needed. (See appendix A for more information on sectors.) Forms of Contact 1-60. Contact is an interaction between two forces. There are three possible types of interactions: * Both forces are in contact with each other. * A friendly force is in contact with an enemy force, while the enemy force is out of contact with the friendly force. * A friendly force is out of contact with an enemy force; however, the enemy force is in contact with the friendly force. 1-61. The forms of contact describe the method of interaction that positively identifies the location or activity of a force. The forms of contact also— * Quickly describe to others what is happening. * Describe the method of engagement. * Provide an understanding of a force’s capabilities and ranges. * If a force is in contact, can trigger additional actions, typically in the form of battle drills. 1-62. An exception to these forms of contact are interactions with friendly or neutral entities such as civilians, nongovernmental organizations, or friendly and neutral military forces. This interaction triggers a decision from friendly leaders and are usually categorized as a non-hostile form of contact. 1-63. Whenever a force gains contact with another force, the gaining force can impede the freedom of action of that other force while enhancing their own freedom of action. For example, after gaining visual contact on
3-90
34
Chapter 1 an enemy, friendly forces are able to maneuver—out of enemy contact—to a position to best destroy the enemy force. Ideally, when friendly forces engage enemy forces, they use as many different forms of contact as possible to create a dilemma for the enemy and allow the friendly force to accomplish its mission. 1-64. Leaders always account for how to defend or mitigate against the enemy using these forms of contact. They also make plans on how to use these forms of contact against the enemy. Not every unit or echelon will have all of these capabilities, but they will use as many as they have. 1-65. The nine forms of contact are— * Direct. Interactions from ground-based, line of sight weapons systems (including small arms, tank main guns, and anti-tank missiles). * Indirect. Interactions from non-line of sight weapons systems (including cannon artillery, mortars, and rockets). * Non-hostile. Neutral interactions that may degrade military operations (including civilians on the battlefield, nongovernmental organizations, or neutral forces). * Obstacle. Interactions from natural and manmade obstacles (including rivers and minefields). * Chemical, biological, radiological, and nuclear (CBRN). Interactions from friendly, enemy, and civilian CBRN effects (including chemical attacks, nuclear attacks, industrial accidents, and toxic or hazardous). * Aerial. Interactions from air-based combat platforms (including attack helicopters, armed UAS, and fixed-wing aircraft). * Visual. Interaction from acquisition via the human eye, optical, or electro-optical systems (including ground reconnaissance, telescopic, thermal, and infrared sights on weapons and sensor platforms such as UAS and satellites). * Electromagnetic. Interactions via systems used to acquire, degrade, or destroy using select portions of the electromagnetic spectrum (including radar systems, jamming, cyberspace, and electromagnetic pulse). * Influence. Interactions through the information dimension intended to shape the perceptions, behaviors, and decision making of people relative to a policy or military objective (including through social media, telecommunications, human interaction, and other forms of communication and contact). 1-66. Visual contact allows a force to gain understanding of another other force with or without the other force’s knowledge. With direct, indirect, and aerial forms of contact, visual contact is assumed. For CBRN, obstacle, non-hostile, electromagnetic, and influence contact, visual contact is not assumed and must be confirmed to clearly describe what is happening. For example, an animal could trigger an electronic ground sensor and a unit must confirm with visual contact whether the ground sensor was activated by enemy forces or by an animal. 1-67. When friendly forces are directed to “gain and maintain contact,” units decide which form or forms of contact is best to use for the situation. Ultimately, they are required to understand where the enemy force is and what it is trying to do all while minimizing the forms of contact the enemy has on friendly forces. 1-68. Friendly forces should expect that the enemy always has them under some form of visual, electromagnetic, and influence contact. The proliferation of communication capabilities results in an increasing ability of friendly, neutral, and adversarial actors to influence one another. The increasing use of social media on the battlefield by various actors will drive perceptions of all actors. This should not cause inaction by leaders, but rather encourage disciplined actions that will help to mitigate enemy contact. Activities to mitigate this include, but are not limited to, masking, deception, electromagnetic spectrum discipline, and camouflage. Actions on Contact 1-69. Actions on contact is a process to help leaders understand what is happening and to take action. Actions on contact is not intended to generate a rigid, lockstep response to the enemy. Rather, the goal is to provide an orderly framework that enables leaders to apply sound decision making and timely actions to complete the operation.
3-90
35
Army Tactics 1-70. Actions on contact are applicable to all types of operations. Figure 1-3 is a graphical depiction of actions on contact. They are just as applicable to a squad coming into direct fire contact with an enemy during a movement to contact, an armor company observing enemy in the defense, a signal element ambushed by the enemy, or a division in the attack. This framework is a way for leaders to quickly determine if things are going according to plan and what actions they need to take to either stay on plan or adjust to the new situation. Actions on contact are— * React. * Develop the situation. * Choose an action. * Execute and report. Figure 1-3. Actions on contact 1-71. No matter what a friendly force is or doing, once they make contact with the enemy, they conduct actions on contact. The unit carries out these actions on contact regardless of whether the enemy has detected its presence. Actions on contact are not to be confused with the battle drill of “react to contact” which is a trained response, requires minimal orders to accomplish, and is initiated by an enemy action. Actions on contact can also start with a unit reacting to contact, which simultaneously starts the actions on contact process for different echelons. 1-72. Typically, a unit’s standard operating procedure dictates specific actions, to include battle drills and reports, depending on the type of contact. Additionally, the mission variables, commander’s intent and guidance, and scheme of maneuver guide the actions individual units take when they make contact with enemy forces. 1-73. Leaders understand that at different echelons, actions on contact requires different amount of time to conduct with the biggest discriminator being the time it takes to develop the situation. For companies and below, units can quickly develop the situation and choose an action to execute. For battalions and higher, to synchronize their echelon properly to a new action, it may need to execute the rapid decision-making and synchronization process (known as RDSP) or a hasty military decisionmaking process (MDMP) session. Leaders balance the need to conduct their actions on contact with the need to maintain momentum. React 1-74. If the enemy initiates the contact, the element in contact conducts the react to contact battle drill. Any unengaged portion monitors the situation and prepares to either support the portion of the unit in contact or continue the mission. Simultaneously, the unit in contact reports the contact to their higher headquarters
3-90
36
Chapter 1 which helps them to develop the situation. This also alerts the higher echelon and allows the initiation of necessary actions. 1-75. If friendly forces make contact first without the enemy being aware, they pause and determine if they have been detected, if not they move to a location where they won’t be observed and continue the actions on contact process. One of the tenets of multidomain operations is to make contact with the smallest element possible. This element is the one that reacts to contact, while the rest of the force begins conducting actions on contact at different tempos. Develop the Situation 1-76. The unit in contact develops the situation to define the threat being faced. This helps to develop the situation across the front of the unit and ultimately provides more maneuver space to execute further actions. As the situation develops and the enemy force’s dispositions, strength, and intentions become clearer, the unit in contact submits additional reports. Typical things to consider include, but is not limited to— * Size, activity, location, composition, and orientation of the enemy force. * Impact of obstacles and terrain. * Enemy capabilities. * Probable enemy intentions. * Method of gaining positional advantage over the enemy. * Friendly situation (location, strength, and capabilities). * Possible friendly actions to achieve the specified end state. 1-77. For lower echelons such as companies and below, it will not take long to develop the situation based on their small frontage. Meanwhile for a brigade or division, based on their frontage, it will take longer to develop the situation and determine if the enemy is acting according to the plan before the commander can make an informed decision. Choose an Action 1-78. After the unit makes contact, its leader gathers information to make an assessment based on their understanding of the enemy and friendly forces’ composition and disposition and chooses an action consistent with the higher echelon commander’s intent and within the unit’s capabilities. These actions typically are— * Attack. * Bypass. * Defend. * Delay. * Withdrawal. 1-79. For obstacles covered by fire, the unit can either seek a bypass or conduct breaching operations as part of a hasty attack. For obstacles not covered by fire, the unit can either seek a bypass or create the required number of lanes to support its maneuver or the maneuver of a supported unit. 1-80. Circumstances may dictate that the action requires a higher commander’s approval. Reasons for needing a higher commander’s approval could include— * Action requires additional resources. * Action is not within the commander’s intent. * Action sets conditions for the higher echelon to continue. * Action changes their higher echelon’s scheme of maneuver. 1-81. The leader of the unit in contact must report to the next higher echelon commander for action approval if the circumstances in paragraph 1-80 apply. Higher approval is required since the unit in contact’s actions could change the entire friendly force’s scheme of maneuver. The higher echelon carefully avoids focusing on initial security engagements to the detriment of operations directed against the enemy main body. 1-82. If the action is within the commander’s intent and doesn’t meet any of the criteria in paragraph 1-80 the unit in contact executes the chosen action with no additional approval needed. To avoid delay, unit
3-90
37
Army Tactics standard operating procedures (SOPs) and commander guidance may provide automatic approval of certain actions. The next higher echelon commander always has the option of disapproving the unit in contact’s action based on its impact to the overall mission. Execute and Report 1-83. With the action selected and, if needed, approved by their higher echelon, the unit in contact takes the appropriate actions. The unit initiates direct and indirect fires to gain the initiative if it is appropriate to engage enemy forces. If the action is to attack, the unit in contact immediately attacks if it has sufficient, immediately available combat power to overwhelm the enemy force. If the action is to defend or withdraw the unit in contact does so while maintaining contact and continuing to gain as much information as possible about the enemy forces disposition and positions. If the action is to bypass the enemy, the unit in contact maintains contact and continues their mission. Unless specifically told by their higher headquarters to break contact, the unit in contact will maintain contact no matter which action is chosen. Regardless of the chosen action, reporting to the next higher echelon is required to ensure the unit is staying within the commander’s intent. Tactical Mission Tasks 1-84. A task is a clearly defined action or activity specifically assigned to an individual or organization, or derived during mission analysis, that must be done as it is imposed by an appropriate authority (JP 1, Vol 1). A tactical mission task is the specific activity a unit performs while executing a tactical operation or form of maneuver. Tactical mission tasks are used as components of a mission statement or given as tasks to subordinate units. While all tactical mission tasks are defined, most have a symbol. Appendix B lists tactical mission tasks, their definitions, and shows their associated symbol. 1-85. Tactical mission tasks are essential in the development of a mission statement. A mission statement is a short sentence or paragraph that describes the organization’s essential task(s), purpose, and action containing the elements of who, what, when, where, and why (JP 5-0). The “what” is either a task or a type of operation or both and is expressed in terms of action verbs. For example, a higher headquarters can assign a subordinate unit to conduct an area defense and block the enemy to prevent the enemy from crossing a phase line. The purpose or the why of the mission statement is interconnected to the tactical task. The “why” provides the reason the unit is to execute the task and the method the unit contributes to the higher echelon’s headquarters. The purpose is critical in the formation of the mission statement. (See ATP 5-0.2-2 for an example list of purposes.) Multinational Operations Considerations 1-86. Army forces can expect to operate with multinational partners. Multinational operations is a collective term to describe military actions conducted by forces of two or more nations, usually undertaken within the structure of a coalition or alliance (JP 3-16). Multinational operations present opportunities including— * Providing international legitimacy that helps isolate adversary or enemy forces. * Partners may have different authorities allowing them to employ capabilities in multiple domains. * Providing additional combat forces who may possess capabilities the joint force may lack. 1-87. Multinational operational operations also include numerous challenges including— * Language issues. * National caveats on the use of forces, rules of engagement, authorities, and approval to share information and intelligence. * Interoperability concerns. 1-88. Interoperability is the ability to act together coherently, effectively, and efficiently to achieve tactical, operational, and strategic objectives (JP 3-0). The Army’s approach to interoperability encompasses all components and operational domains. This approach facilitates the ability of Army forces to operate with other unified action partners, including multinational partners. To increase multinational interoperability the Army participates in numerous bilateral and multilateral activities. Some of these activities result in standardization agreements or doctrine. These products serve as a baseline for cooperation among multinational partners. For tactical Army forces, these products can be transparent. For example, Army forces
3-90
38
Chapter 1 operating as part of the multinational North Atlantic Treaty Organization use the same military operational symbols as their multinational partners. These agreements streamline sharing and communicating graphic operational information such as overlays among members. 1-89. Situations may arise where Army forces execute operations with multinational partners without an existing standardization agreement. This is most likely to occur during ad-hoc multinational operations. During these situations units must rely on liaison officers, clear and uncomplicated orders, and sharing sound tactical advice with their partners. Whenever possible, units take advantage of opportunities to train with multinational forces to increase their skills in executing multinational operations. (See FM 3-16 for more information on multinational operations.) MOVEMENT AND MANEUVER WARFIGHTING FUNCTION 1-90. The movement and maneuver warfighting function is the related tasks and systems that move and employ forces to achieve a position of relative advantage over the enemy and other threats (ADP 3-0). Direct fire and close combat are inherent in maneuver. The movement and maneuver warfighting function includes tasks associated with force projection. Movement is necessary to disperse and displace the force as a whole or in part when maneuvering. Maneuver directly gains or exploits positions of relative advantage to accomplish the mission. 1-91. The movement and maneuver warfighting function includes these tasks: * Move. * Maneuver. * Employ direct fires. * Occupy an area. * Conduct mobility and countermobility. * Conduct reconnaissance and surveillance. * Employ battlefield obscuration. Local Security 1-92. Local security is the low-level security activities conducted near a unit to prevent surprise by the enemy (ADP 3-90). It includes any local measure taken by all friendly units against enemy actions to prevent a unit from being surprised and is an important part of maintaining the initiative. It involves avoiding enemy detection or deceiving enemy forces about friendly positions and intentions. It also includes finding any enemy forces in the immediate vicinity and knowing as much as possible about the enemy force’s positions and intentions. Local security prevents a unit from being surprised, and it is an important part of maintaining the initiative. All units perform local security when conducting operations. 1-93. Units use both active and passive measures to provide local security. Active measures include using observation posts and patrols, establishing specific levels of alert in the unit, and establishing SOPs detailing alert procedures. Passive local security measures include using camouflage, movement control, noise and light discipline, electromagnetic protection, and proper communications procedures. They also include employing available sensors, night vision devices, and daylight sights to maintain surveillance over the immediate area. Reserve 1-94. A reserve is that portion of a body of troops that is withheld from action at the beginning of an engagement to be available for a decisive movement (ADP 3-90). Commanders employ their reserves to exploit success or prevent failure. A reserve provides the unit flexibility by responding to unexpected situations and enables friendly forces to exploit or regain the initiative quickly because it is an uncommitted force. Once committed, a reserve’s actions normally become or reinforce the echelon’s main effort. Often a commander’s most difficult and important decision concerns the time, place, and circumstances for committing the reserve. Commanders do not employ their reserve as a follow and support force or a follow and assume force. Other considerations for commanders are not placing artillery and other fire support
3-90
39
Army Tactics systems and reconnaissance assets in reserve. Such systems committed to echelon support operations are not in reserve. 1-95. Units also plan how to reconstitute their reserves after commitment of their original reserves. A higher unit can designate a subordinate unit’s reserves as its new echelon reserve or assign another subordinate unit to assume the mission of the reserve. Units have more flexibility and can take greater risk in employing their reserves if their higher echelon headquarters has not committed its reserve. Units never develop a course of action (COA) that assumes the use of a higher echelons reserve. 1-96. Commander’s generally place their reserve where they can easily reinforce the main effort and whenever possible, beyond the enemy force’s direct fire range. Commanders decide whether to orient their reserves on their most likely mission or their most important mission when deciding where to place their reserves. They generally position their reserves to the rear of their units, in a location that provides maximum protection from enemy observation and fire. Units consider several factors when determining the exact location for their reserves. These factors include: * Orientating on their most likely mission or their most important mission. * Response time to various planning priorities. * Access to main supply routes (MSRs). * Locations of probable enemy penetrations. * Terrain. * Availability of cover and concealment. Initially units may position their reserves in forward locations to deceive enemy forces and obscure subordinate unit boundaries. Obscuring subordinate unit boundaries is especially important for dissimilar units such as armored and dismounted infantry. 1-97. Units can task-organize their reserves into small elements and position them where they can react quickly to local combat developments in restrictive terrain that lacks movement routes. This dispersion provides increased protection, but it reduces the ability of a reserve to mass fires. Units look for the availability of covered lateral and forward high-speed deployment routes for their reserves. These reserves require movement priority along those routes when they are committed. Units ensure the maintenance of communications between these dispersed elements. This may require establishing retransmission nodes for combat net radios. Units maintain centrally located reserves positioned somewhat farther from the FLOT in open terrain. An enemy forces’ potential to employ weapons of mass destruction and conduct air interdiction are other factors commanders consider when deciding where to position their reserves. 1-98. Units position their reserves beyond the enemy force’s direct fire range whenever possible. This is easier to achieve at higher echelons than at lower echelons. Each reserve element takes defensive measures to prevent its acquisition and attack by enemy indirect fire systems. These measures include camouflage, local security, and control of electronic emissions. 1-99. A reserve must be able to move quickly to different locations in response to different contingencies. For example, a quick reaction force is a type of reserve used during stability operations. A quick reaction force is a commander designated force to respond to threat attacks or emergencies. For armored and Stryker reserves, an important consideration is cross-country mobility or road networks. For dismounted infantry forces, the key considerations are the existing road networks, the availability of ground and air transportation, or the availability of pickup and landing zones for use by supporting assets that enable the reserve to conduct air assault operations. This is easier to achieve at higher echelons than at lower echelons. Each reserve element takes defensive measures to prevent its acquisition and attack by enemy indirect fire systems. These measures include camouflage, local security, and control of electromagnetic emissions. 1-100. When issuing orders, commanders assign the reserve the task of “reserve” and assign it priorities for planning, which is unlike other subordinate elements that are assigned a tactical mission task and purpose. Commanders assign no more than three planning priorities based on the probability they could happen and time to prepare. Commitment of the reserve is listed on the commander’s decision support matrix and decision support table.
3-90
40
Chapter 1 Daylight Operations 1-101. Daylight operations allow friendly forces to use their equipment while facilitating control of their maneuver. They are psychologically and physically the least stressful on the units. Also, the unit can control movement more easily when all subordinates can see one another. Two major disadvantages to daylight operations are enemy forces can use their weapon systems more effectively to oppose friendly forces and friendly forces neutralize any technical overmatch they have for operations during limited visibility. Limited-Visibility Operations 1-102. There are two general limited-visibility conditions: those in which technology, such as thermal sights, can overcome or partially overcome, and those that such technology cannot overcome. The first category includes darkness. The second category includes dense battlefield dust, smoke, heavy rain, snow, fog, or any other conditions that artificial illumination, image intensification, radar, or other sensors cannot partially overcome. 1-103. The mission variables normally require an operation conducted during limited visibility to be more deliberate than in daylight operations. The exception is when an attack occurs as part of the follow up to a daylight attack or as part of an exploitation or pursuit. Units planning night attacks consider how limited visibility complicates controlling units, Soldiers, and fires. Limited visibility also complicates identifying and engaging targets; navigating and moving without detection; locating, treating, and evacuating casualties; and locating, bypassing, or breaching obstacles. 1-104. Trained forces equipped for limited-visibility operations have significant advantages over enemy forces that are unprepared for limited-visibility operations. Examples of limited-visibility operations are nighttime, weather (blizzards, sandstorms, and heavy rain), and thick vegetation. When enemy forces have increased their limited-visibility capabilities, friendly forces must emphasize noise and light discipline during limited-visibility operations. For example, Soldiers who leave their laser sights on increase the likelihood of revealing their position and losing the element of surprise. Table 1-1 on page 1-19 outlines the advantages and disadvantages of conducting limited-visibility attacks. 1-105. The organization of forces for a limited-visibility operation is the same during daylight operations. However, changing an existing task organization under limited-visibility conditions typically requires more time and effort than it does during daylight operations. 1-106. Non-illuminated attacks offer the best chance of gaining surprise. However, units plan for illumination for every limited-visibility operation, so that it is readily available if required. Units can choose to conduct a non-illuminated operation until subordinate forces make contact with enemy forces. At that point, they can direct the illumination of the objective. Enemy units can also choose to employ illumination to increase the effectiveness of their efforts. All leaders within an attacking unit must understand the time, conditions, and employment authority for illumination. 1-107. Units plan for limited-visibility operations as they do for daylight operations while emphasizing— * Keeping the plan simple. * Taking additional time for reconnaissance. * Taking advantage of easily identifiable terrain features, such as roads and railroad tracks, when establishing control measures. * Using intermediate objectives as necessary to control and maintain the correct movement direction during the attack. * Concealing preparations. * Scheduling initial rehearsals during daylight, with the final rehearsal at night. * Positioning security elements.
3-90
41
Army Tactics Table 1-1. Considerations for limited-visibility operations Advantages of limited-visibility operations Disadvantages of limited-visibility operations • Defenses are more susceptible to • Control of maneuver forces in the absence of infiltration. technical means is more difficult. • Darkness can conceal the movement and • Stationary defending forces can react more position of large forces in both offense and easily than attacking forces. defense. Physical and psychological • Extreme weather may degrade or prevent factors favor attacking forces, as shock, aviation support, including unmanned aircraft disorientation, and isolation are easier to systems. achieve. • Attacking forces have increased difficulty • Air assets can operate more easily in determining the limits of obstacle systems. contested airspace because air defenders • Restrictive terrain is more difficult to traverse. with only optical sights have greater difficulty acquiring targets at night. • Light, obscuration, noise, and fires can deceive • The element of surprise may increase attacking and defending forces. because forces are more susceptible to • Attacking forces lose momentum because of the military deception techniques, such as need to conduct attacks at a reduced tempo to decoy fighting positions, decoy equipment, maintain the coherence of the unit. dummy lights, noise, obscuration, and • Land navigation is more difficult at night; units fires. Applies to both offense and defense. may get separated, lose cohesion, and support • Reserves cannot employ as quickly at elements can move to the wrong positions. night as forces can during daylight • Defending forces can reposition or emplace conditions. True for both offense and obstacles during limited visibility to help avoid defense. Defense likely benefits from detection by friendly information collection interior lines when employing the reserve. assets. • Attacking units are easier to ambush at night. • Adjusting indirect fire is difficult, even with night- vision devices or illumination. • Units require significantly larger quantities of signal ammunition such as tracers, flares, and illumination rounds. • Units have more difficulty locating and evacuating casualties. • The risk of fratricide increases. • Effective range of direct fire weapon systems decreases due to visibility, degraded target detection and identification. 1-108. Units establish control measures to facilitate visualizing, describing, and directing subordinate and supporting forces during limited-visibility operations. Units also take advantage of the technical capabilities of advanced equipment as they become available. 1-109. Absent positive information to the contrary, units must assume that enemy forces possess the same limited-visibility observation capabilities as friendly forces when conducting a limited-visibility operations. Using terrain to mask movement and deployment remains critical because limited visibility may create a false sense of protection from enemy observation. During movement, leaders reduce the distances between vehicles or individual Soldiers as necessary to allow one system or Soldier to observe the other. This decreases the time necessary to react to enemy contact. Movement 1-110. In the context of Army tactics, movement is the positioning of combat power to establish the conditions for maneuver (ADP 3-90). The distinction between movement and maneuver is whether or not friendly forces are moving in conjunction with friendly direct or established indirect fire support. A friendly force chooses a movement technique based on the threat prior to enemy contact. To direct movement, Army forces use the movement techniques, movement formations, and battle drills to mitigate the risk of making
3-90
42
Chapter 1 contact with the enemy before maneuvering. (See Chapter 2 for more information on movement techniques and formations.) Employment of Direct Fires 1-111. A field of fire is the area that a weapon or group of weapons may cover effectively from a given position. In selecting a position, a unit must balance how the field of fire will best gain an advantage while simultaneously providing cover and mitigating the effect of the enemy’s weapons systems. 1-112. Fire control measures are the means by which leaders control direct fires. Application of these concepts, procedures, and techniques helps the unit acquire the enemy, focus fires on the enemy, distribute the results of the fires, and prevent fratricide. At the same time, no single measure suffices to control fires effectively. Common fire control measures are— * Target reference point. * Rules of engagement. * Engagement area. * Sector of fire. * Weapons safety posture. * Direction of fire. * Weapons control status. * Terrain-based quadrant. * Engagement priorities. * Friendly-based quadrant. * Trigger. * Maximum engagement line. * Restrictive fire line (RFL). * Final protective line (FPL). * Engagement techniques. * Fire patterns. * Target array. Principles for Direct Fire Planning and Control 1-113. Leaders apply eight fundamental principles during planning, preparing for, and executing direct fires. These principles are not to restrict the actions of subordinates but to facilitate their ability to acquire and to engage with direct fire against the threat. These principles are— * Destroy the greatest threat first. * Mass the effects of direct fire. * Employ the best weapon for the specific target. * Avoid target overkill. * Minimize exposure. * Plan and implement control measures. * Plan for limited-visibility conditions. * Plan for degraded capabilities. Destroy the Greatest Threat First 1-114. The order in which the unit engages enemy forces directly relates to the danger they present and how the engagement will seize the initiative. Leaders should assess the greatest threat not only in terms of capability, but also how a given target nests within the enemy’s capabilities and desired friendly end state. The enemy forces’ threat depends on their weapons, range, and positioning in relation to and comparison to the friendly force. In general, a friendly force, when presented with multiple targets, should initially concentrate fires to destroy the greatest threat, and then distribute fires over the remainder of the enemy force.
3-90
43
Army Tactics At the tactical unit level, the greatest threat may be an enemy command and control system, which directs the fires and maneuver of the enemy force. Mass the Effects of Direct Fire 1-115. Leader’s mass direct fires to achieve decisive results. Massing direct fires entails focusing available direct fires at critical points and distributing the effects. Random application of direct fires is unlikely to have a desired effect on the enemy. Employ the Best Weapon for the Specific Target 1-116. Using the appropriate weapon for the target increases the probability of rapid enemy destruction or suppression while preserving resources. Key factors on determining the employment of weapon and ammunition type are target type, range, exposure, weapons and ammunition availability, and desired targets effects. Units array forces based on the mission variables. Avoid Target Overkill 1-117. Target overkill—the overuse of weapon systems to achieve an effect—wastes ammunition and ties up weapons that are better employed acquiring and engaging other threats. Having every weapon engage a different threat, however, must be tempered by the requirement to destroy the greatest threats first. Commanders use only the amount of fire required to achieve the necessary effects. There may be reasons to demonstrate target overkill as a method directed against enemy morale in specific conditions related to commander’s intent. Minimize Exposure 1-118. The unit increases its survivability by exposing Soldiers to the minimal extent necessary to engage the enemy effectively. Natural or manmade defilades provide the best cover from lethal direct fire munitions. Friendly units minimize exposure by constantly seeking effective available cover, attempting to engage the enemy from the flank, remaining dispersed, firing from multiple positions, and limiting engagement times. Plan and Implement Control Measures 1-119. The unit has numerous tools to assist in the planning and implementation of controlling direct fires. These tools include graphic control measures for friendly forces, engagement criteria, identification training for combat vehicles and aircraft, unit weapons safety posture, weapons control status, recognition markings, and a situational understanding to include range cards, area sketches, and rehearsals. Knowledge and employment of applicable control measures are the primary means of preventing fratricide and noncombatant casualties. Plan for Limited-Visibility Conditions 1-120. Units operating during hours of limited visibility can engage enemy forces at nearly the same range as during daylight hours with limited-visibility fire control equipment. Units should inspect and bring their limited-visibility equipment prior to conducting operations. This prevents Soldiers from becoming unprepared to the changes in the weather and from daylight to nighttime. 1-121. Obscurants such as dense fog, heavy smoke, and blowing sand can reduce the capabilities of thermal and infrared equipment. Although decreased acquisition capabilities have minimal effect on area fire, point target engagements can occur at decreased ranges. The unit develops contingency plans for such extreme limited-visibility conditions, such as establishing listening posts, trigger lines, and target reference points capable of visual contact with thermals. Plan for Degraded Capabilities 1-122. The unit initially develops a plan based on the unit’s maximum effective capabilities. It then makes alternate plans for implementation in the event of casualties, weapon damage, or failure. While units cannot anticipate or plan for every situation, they plan for the most probable occurrences. Building redundancy into
3-90
44
Chapter 1 the plan, such as having two systems observe the same area, is an invaluable asset when the situation (and the number of available systems) permits. Designating alternate sectors of fire provides adjacent elements a means of shifting fires if the enemy knocks one of them out of action. Consolidate 1-123. Consolidate is to organize and strengthen a captured position to use it against the enemy. Units continuously assess their combat power and determine if they are achieving their objectives. At times, they may need to consolidate or reconstitute their forces. Units consolidate to ensure the friendly force maintains its capability and does not lose what it has gained or become disadvantaged. There is a difference between the actions taken to consolidate and to reconstitute. 1-124. Units consolidate on seized positions by repelling enemy forces only if it is tactically necessary or advantageous. Normally, units exploit their successes. However, they may have to take tactical pauses while performing their actions to consolidate, given the existing mission variables. Consolidate may vary from a rapid repositioning of forces and security elements to a reorganization of the friendly force and detailed improvement of the position for defense. Consolidate includes— * Conducting reconnaissance. * Establishing security. * Eliminating enemy pockets of resistance. * Positioning forces to enable them to defend against possible enemy counterattacks. * Adjusting direct and indirect fire planning. * Preparing their units for potential follow-on missions. Chapter 5 discusses consolidate in detail as part of the offense. Reconstitution 1-125. Reconstitution is an operation that commanders plan and implement to restore units to a desired level of combat effectiveness commensurate with mission requirements and available resources (ATP 3-94.4). Reconstitution consists of two major elements: reorganization and regeneration. Reconstitution operations are essential to rebuilding the combat power of a degraded unit. This encompasses more than just accumulating personnel and weapons systems and then projecting them forward. Because of the likely heavy casualties during combat operations, surviving leaders and undamaged equipment are likely to assume new roles in a reconstituted unit. Reorganization 1-126. Reorganization is all measures taken by the commander to maintain unit combat effectiveness or return it to a specified level of combat capability (ATP 3-94.4). Reorganization is the action of expedient cross leveling of internal resources in a degraded unit in place to restore or increase combat effectiveness. Reorganization is an option when the operating tempo is such that the risk for removing a unit from the operation risks the mission. There are two types of reorganization operations, immediate and deliberate. Units base the type of reorganization operation executed on mission variables. These actions include— * Cross-leveling equipment and personnel. * Matching operational weapon systems with crews. * Forming composite units by joining two or more attrited units to form a single mission-capable unit. * Changing task organization in preparation for the next operation. 1-127. Immediate reorganization is the quick and usually temporary restoration of degraded units to minimum levels of effectiveness. Normally, a unit implements immediate reorganization in its current combat position or as close to that site as possible to meet near-term needs. To accomplish this, units use information in orders, unit SOPs (such as battle rosters, redistribution criteria, and contingency manning standards), and immediately available assets.
3-90
45
Army Tactics 1-128. Units conduct deliberate reorganization when they have more time and resources available. It usually occurs farther to the rear than immediate reorganization. Procedures are similar to those for immediate reorganization, but some replacement personnel and equipment may be available, and the unit has additional time to conduct resupply and maintenance activities. 1-129. Reorganization aims to improve a unit’s capability until more extensive efforts can occur if resources, the tactical situation, and time permit. Since reorganization involves activities internal to a unit, it is the most expedient means of maintaining combat power after contact with the enemy. Regeneration 1-130. Regeneration is the rebuilding of a unit through large-scale replacement of personnel, equipment, and supplies, including the reestablishment of essential command and control and the conduct of mission- essential training for the unit (ATP 3-94.4). Regeneration is the deliberate restoration of a unit’s combat power; it is considerably more resource intensive than reorganization. Regeneration is time intensive and requires days to weeks to execute. Because of the intensive nature of regeneration, it occurs at a designated regeneration site after the unit disengages from operations. Commanders normally situate the regeneration site in a relatively secure location. Tactical units only execute and do not plan the regeneration process. INTELLIGENCE WARFIGHTING FUNCTION 1-131. The intelligence warfighting function is the related tasks and systems that facilitate understanding the enemy, terrain, weather, civil considerations, and other significant aspects of the operational environment (ADP 3-0). The intelligence warfighting function fuses the information collected through with primary tactical tasks of reconnaissance, surveillance, security operations, and intelligence operations. 1-132. Intelligence is a product, a process, and a function that enables the Army to conduct operations by supporting the commander and command and control (which is accomplished by supporting the rest of the staff). Commanders and staffs rely on many different types of intelligence products. The intelligence process is continuous and directly supports the operations process by developing information requirements, collecting on those requirements, processing data into information, analyzing information and intelligence from all sources, producing intelligence, and when necessary, developing the situation through operations. 1-133. Intelligence supports decision makers and staffs by providing situational understanding of the threat, terrain and weather, civil considerations, and other aspects of the operational environment. Intelligence supports the commander and staff with analysis and production of effective timely, relevant, accurate, and predictive assessments and products tailored to the commander’s and staff’s specific needs. 1-134. The intelligence warfighting function supports the commander through a broad range of tasks. These tasks are interrelated, require the participation of the commander and staff, and are often conducted simultaneously. The intelligence warfighting function tasks facilitate the commander’s visualization and understanding of the threat and other relevant aspects of the operational environment. The intelligence warfighting function includes the following tasks: * Provide intelligence support to force generation—the task of generating intelligence knowledge concerning an operational environment, facilitating future intelligence operations, and tailoring the force. * Provide support to situational understanding—the task of providing information and intelligence to commanders to assist them in achieving a clear understanding of the force’s current state with relation to the threat and other relevant aspects of the operational environment. * Conduct information collection—the task that synchronizes and integrates the planning and employment of sensors and assets as well as the processing, exploitation, and dissemination systems in direct support of current and future operations. * Provide intelligence support to targeting and information operations—the task of providing the commander information and intelligence support for targeting to achieve lethal and nonlethal effects. Table 1-2 on page 1-24 illustrates how the intelligence warfighting function tasks support the commander. See ADP 2-0 and FM 2-0 for more discussions on intelligence tasks.
3-90
46
Chapter 1 Table 1-2. Intelligence warfighting function tasks that support the commander Intelligence tasks Commander’s focus Commander’s decisions Provide intelligence support to Orient on •Should the unit’s level of readiness be force generation: contingencies. increased? •Provide intelligence readiness. •Should the operation plan be •Establish an intelligence architecture. implemented? •Provide intelligence overwatch. •Generate intelligence knowledge. •Tailor the intelligence force. Provide support to situational •Plan an operation. •Which COA will be implemented? understanding: •Prepare. •Which enemy actions are expected? •Perform IPB. •Execute. •What mitigation strategies should be •Perform situation development. developed and implemented to reduce •Assess. •Provide tactical intelligence the potential impact of operations on the •Secure the force. overwatch. population? •Determine 2nd and •Conduct police intelligence 3rd order effects on operations. operations and the •Provide intelligence support to civil populace. affairs operations. Conduct information collection: •Plan information Which DPs, HPTs, and HVTs are •Collection management. collection for an linked to the threat’s actions? operation, including •Are the assets available and in position •Direct information collection. PED requirements. to collect on the DPs, HPTs, and HVTs? •Execute collection. •Prepare. •Have the assets been repositioned for •Conduct intelligence-related missions •Execute. branches or sequels? and operations. •Assess. Provide intelligence support to •Create lethal or •Are the unit’s lethal and nonlethal targeting and information nonlethal effects actions and maneuver effective? operations: against targets. •Which targets should be re-engaged? •Provide intelligence support to •Destroy, suppress, •Are the unit’s information operations targeting. disrupt, or neutralize effective? •Provide intelligence support to targets. information operations. •Reposition intelligence or attack •Provide intelligence support to combat assessment. assets. COA course of action HVT high-value target DP decision point IPB intelligence preparation of the battlefield HPT high-payoff target PED processing, exploitation, and dissemination FIRES WARFIGHTING FUNCTION 1-135. The fires warfighting function is the related tasks and systems that create and converge effects in all domains against the adversary or enemy to enable operations across the range of military operations (ADP 3- 0). Units must execute and integrate fires, in combination with the other elements of combat power, to create and converge effects and achieve the desired end state. 1-136. The fires warfighting function tasks are— * Execute fires across the five domains and in the information environment, employing—  Surface-to-surface fires.  Air-to-surface fires.  Surface-to-air fires.  Cyberspace operations and electromagnetic warfare.  Space operations.
3-90
47
Army Tactics  Multinational fires.  Special operations.  Information operations. * Integrate Army, multinational, and joint fires through—  Targeting.  Operations process.  Fire support planning.  Airspace planning and management.  Electromagnetic spectrum management.  Multinational integration.  Rehearsals. For additional information on fires tasks see ADP 3-19, FM 3-09, and FM 3-01. 1-137. The military decision-making process (MDMP) synchronizes the unit’s scheme of maneuver with the provision of fire support. The plan must identify critical times and places where units need the maximum effects from their fire support assets. That planning must consider existing limitations on employing fires, such as rules of engagement, presence of friendly forces within the assigned area, desired conditions of subsequent phases, and requirements for collateral damage assessments. Each commander’s guidance gives specified attack criteria for supporting fires assets, thus focusing the staff and unit planning and execution efforts on those critical times and events. Specified attack criteria are a compilation of commander’s guidance, desired effects, and high-payoff targets and attack priorities. The time available to plan operations constrains a commander’s ability to synchronize fire support operations that employ well-matched effects of all available assets against high-payoff targets. 1-138. The integration of indirect fire support is fundamental to the success of a unit’s scheme of maneuver. Indirect fire planning reconciles top-down planning and bottom-up refinement. Indirect fire supports the unit’s maneuver by planning preparation fires, which includes the different types of effects: harassing, interdiction, suppressive, destruction, and deception fires. These fires can be time or event driven. (See FM 3-09 for definition of desired effects.) Fire Support Planning and Coordination 1-139. The unit’s ability to orchestrate and employ all available fire support resources as a system and to integrate and synchronize fire support with the concept of operations results from an established process known as fire support planning and coordination. Fire support planning is the continuous process of analyzing, allocating, integrating, synchronizing, and scheduling fires to describe how the effects of fires facilitate maneuver force actions (FM 3-09). Successful fire support planning is the result of the fire support coordinator’s aggressive contribution to the maneuver commander’s planning and decision-making process. Fire support coordination is the planning and executing of fire so targets are adequately covered by a suitable weapon or group of weapons (JP 3-09). Formal coordination binds fire support resources together to create a unity of effort so that the multiple effects of each fire support asset across all domains are rapidly and continuously integrated and synchronized with the scheme of maneuver. 1-140. Fire supporters utilize the principles of fire support planning and coordination when advising the unit on the execution of fire support. These principles are extensions of the functions of fire support. The fire support planning and coordination principles are–– * Plan early and continuously. * Ensure the continuous flow of targeting information. * Consider the use of all lethal and nonlethal attack capabilities. * Furnish the type of support requested. * Use the most effective fire support attack/delivery system. * Avoid unnecessary duplication. * Consider airspace coordination. * Provide adequate support.
3-90
48
Chapter 1 * Provide for rapid and continuous coordination. * Provide for flexibility. * Use fire support coordination measures. 1-141. During execution, fire supporters use the principles of fire support execution to anticipate the dynamics of combat operations, maintain situational awareness of the operational environment, and leverage interoperable fire support command and control systems and attack and delivery capabilities. The fire support execution principles include–– * Adequate fire support for the committed units. * Weight to the main effort. * Immediately available fire support for the commander to influence the operation. * Facilitate future operations. * Maximize feasible centralized control. * Never place artillery in reserve. 1-142. Units emphasize accomplishing simple and rapidly integrated fire support plans using quick-fire planning techniques and SOPs to focus fires on seizing the initiative. They integrate their fire assets as far forward as possible in their movement formations to facilitate the early emplacement of those assets. One example of this integration is the use of an unmanned aircraft system forward site team from a combat aviation brigade temporarily attached to a field artillery brigade to identify targets for destruction. 1-143. Artillery, mortars, and some electromagnetic attack capabilities must occupy positions that are well forward and still within supporting range of the flanks of maneuver forces to provide responsive indirect and nonlethal fires. Units consider the effect that movement by echelon or battery has on the amount of fire support available. They should support the unit’s main effort with priority of fires. 1-144. Responsiveness can be achieved by the following: * Training, especially digital sustainment training. * Streamlining the call for fire by using digital systems. * Planning fire support requirements in advance. * Establishing a permissive battlefield design, to include airspace. * Establishing permissive fire support coordination measures. * Conducting rehearsals. * Employing time on target. * Continually training observers in all aspects of fire support. * Limiting radio transmissions on fire networks to time-sensitive, mission-essential traffic only. 1-145. The linking of Army forward observers, joint fires observers, and target acquisition assets to quick fire or exclusive networks also provides responsive fires. Responsive fire networks allow the lead observers to communicate directly with specific field artillery and mortar units. These kinds of communications arrangements enhance responsiveness through streamlined net structures and focused priorities. Communications planning should also include the need for communications networks for the clearing of targets for rotary- and fixed-wing attacks. 1-146. Army units focus on integrating and synchronizing lethal and nonlethal activities. To preserve warfighting capabilities, and reduce the capabilities of potential adversaries, units utilize combinations of cyberspace, space operations, information operations, and electromagnetic warfare capabilities to seize, retain, and exploit the initiative. At the BCT level and above, units utilize cyberspace electromagnetic activities sections to assist in requesting cyberspace and electromagnetic warfare capabilities. These include offensive and defensive cyberspace, and Department of Defense information network operations, electromagnetic attack, electromagnetic protection, and electromagnetic warfare support. (For more information on cyberspace and electromagnetic warfare, see FM 3-12).
3-90
49
Army Tactics Airspace Control and Airspace Management 1-147. The joint force commander designates an airspace control authority to develop, coordinate, and publish airspace control procedures for operating the airspace control system in the joint operations area. The airspace control authority establishes an airspace control plan that provides specific planning guidance and procedures for the airspace control system for the joint operations area. The airspace control order is an order implementing the airspace control plan that provides the details of the approved requests for airspace coordinating measures (JP 3-52). 1-148. Airspace control is the exercise of delegated authority over designated airspace and users through control procedures and coordination measures to maximize operational effectiveness (JP 3-52). Airspace control is not synonymous with airspace management. Airspace control is reliant on airspace management capabilities provided by airspace control elements including military, U.S. civil, and host-nation air traffic control. Airspace management is the planning, coordination, integration, and regulation of airspace by airspace control elements in support of airspace control (JP 3-52). Controlling and managing airspace is a requirement to effectively integrate capabilities from multiple domains during military operations. 1-149. Any formation that employs aviation platforms (including UAS), surface-to-surface fires, or surface- to-air fires is an airspace user. Therefore, leaders at all echelons must understand the techniques and procedures used to integrate airspace capabilities into ground schemes of maneuver. At the tactical level, while numerous echelons can perform airspace management tasks, the division is the lowest echelon capable of performing airspace control. At battalion level and above, the U.S. Air Force provides tactical air control parties to assist in airspace management and provide terminal attack control of close air support missions. 1-150. Army units develop unit airspace plans, which consist of airspace coordinating measures (ACMs) that are integrated to support operations. BCT and above headquarters submit their unit airspace plans to their higher headquarters for inclusion into that echelon’s unit airspace plan. Ultimately, the consolidated unit airspace plan reaches the battlefield coordination detachment and these ACMs, which are the Army’s requirements for airspace, are then combined with the other components of the joint force airspace requirements and integrated into the airspace control order produced by the Joint Force Air Component Command. 1-151. ACMs are employed to facilitate the efficient use of airspace to accomplish missions and simultaneously provide safeguards for friendly forces. Airspace elements establish ACMs to accomplish one or more functions: * Establish coordinated airspace for specific airspace users. * Restrict the actions of some airspace users. * Create airspace in which units can use weapons with minimum risk to other friendly forces. * Control actions of specific airspace users. * Require airspace users to accomplish specific actions. See JP 3-52, FM 3-52, ATP 3-52.1/MCRP 3-20F.4 (MCWP 3-25.13)/NTTP 3-56.4/AFTTP 3-2.78, and ATP 3-91.1/AFTTP 3-2.86 for more information on airspace control and airspace management processes, procedures, and control measures. SUSTAINMENT WARFIGHTING FUNCTION 1-152. The sustainment warfighting function is the related tasks and systems that provide support and services to ensure freedom of action, extended operational reach, and prolong endurance (ADP 3-0). Sustainment determines the depth and duration of Army operations. Successful sustainment enables freedom of action by increasing the number of options available to the commander. Sustainment is essential for retaining and exploiting the initiative. The sustainment warfighting function consists of four elements: * Logistics. * Health service support. * Financial management. * Personnel services.
3-90
50
Chapter 1 FM 3-90 focuses on logistics, and medical considerations as they apply to tactical operations. For additional information on the sustainment warfighting function see ADP 4-0. Logistics 1-153. During planning, units assess their basic load to determine its adequacy to support an operation. A basic load is the quantity of supplies required to be on hand within, and moved by a unit formation, expressed according to the wartime organization of the unit or formation and maintained at the prescribed levels (JP 4-09). Units further configure their basic load into combat loads for specific missions. Combat loads are the minimum mission-essential equipment and supplies as determined by the commander responsible for carrying out the mission, required for Soldiers to fight and survive immediate combat operations (FM 4-40). Combat loads are not standardized nor are quantities established since all are mission dependent. 1-154. Units can use logistics packages and throughput distribution of combat configured loads to resupply maneuver units maintaining momentum and tempo. A logistics package is a grouping of multiple classes of supply and supply vehicles under the control of a single convoy commander. Throughput distribution is a method of distribution which bypasses one or more intermediate supply echelons in the supply system to avoid multiple handling. A combat configured load consists of packages of water, Class I, Class III (B), Class IV, Class V, Class VIII, and Class IX constructed to support the type and mission of a maneuver unit. The supporting unit calculates and recommends the composition of combat configured loads based upon the controlled supply rate, forecasting, and historical data. Units determine the amount of cross loading required for supplies to prevent all of one type of supply from loss by the destruction of a single vehicle or aircraft. Units must also anticipate and plan for dynamic changes to task organization to ensure the appropriate ammunition types, repair parts, and petroleum, oil, and lubrications products are packaged and distributed accordingly. 1-155. Logistics units and materiel remain close to the maneuver force to ensure short turnaround time for supplies and services. This includes uploading as much critical materiel (such as ammunition and petroleum, oils, and lubricants) as possible and coordinating to preclude multiple units near each other. Units take into account the risk of enemy detection of logistics preparations for an attack. 1-156. The availability of adequate supplies and transportation to sustain an operation from start to finish is critical to mission success. Sustainment planners must account for logistics requirements during mission analysis to ensure the selected course of action and any potential branch plan is supportable. Based on the type of mission and expected consumption factors, they anticipate requirements and arrange for resupply via multiple means according to the concept of support. Additionally, logistics planners ensure their counterparts at the next higher echelon are fully aware of the sustainment requirements and priorities to aid in adding flexibility to the system (for example, potential need to throughput a class of supply for an urgent requirement, such as ammunition or bulk fuel). Supply lines of communications are strained, and requirements for repair and replacement of weapon systems increase. Requirements for petroleum, oils, and lubricants increase because of the distance combat vehicles are likely to travel. Sustainment units in direct support of maneuver units must be as agile and mobile as the forces they support. One way to provide continuous support is to task-organize sustainment elements with their supported maneuver formations. 1-157. Field maintenance assets move as far forward as possible and as the tactical situation allows to repair and return inoperable and damaged equipment to an operational status. Crews continue to perform their preventive maintenance checks and services in accordance with the operational climate and terrain. Battle damage assessment and repair is critical to sustaining offensive actions. Battle damage assessment is the estimate of damage composed of physical and functional damage assessment, as well as target system assessment, resulting from the application of fires (JP 3-0). Crews as well as maintenance and recovery teams conduct battle damage assessment and repair of disabled equipment by expeditiously fixing, bypassing, or using field expedient components. Battle damage assessment and repair restores the minimum-essential combat capabilities necessary to support a specific combat mission or to enable the equipment to self-recover. 1-158. Establishing aerial resupply and forward logistics bases may be necessary to sustain operations such as exploitation and pursuit conducted at great distances from a unit’s sustaining base. The unit or support activity at an airlift’s point of origin is responsible for obtaining the required packing, shipping, and sling- load equipment. It prepares the load for aerial transport, prepares the pickup zone, and conducts air-loading operations. The unit located at the airlift destination is responsible for preparing the landing zone to
3-90
51
Army Tactics accommodate aerial resupply, preparing to receive the load such as the right material handling equipment, and returning non-expendable equipment such as cargo pallets, sling-load equipment, or containers. Health Service Support 1-159. Health service support encompasses all support and services performed, provided, and arranged by Army Medicine to promote, improve, conserve, or restore the behavioral and physical well-being of personnel by providing direct patient care that includes medical treatment (organic and area support), hospitalization, medical evacuation to include medical regulating, and medical logistics to include blood management (FM 4-02). Health service support also includes the treatment of CBRN patients and as directed, provides support to other Services, agencies, and organizations. (See FM 4-02 for additional information for health service support). Medical Treatment (Organic and Area Support) 1-160. The medical treatment function encompasses Roles 1 and 2 medical treatment support. These roles of care are provided by organic assets (medical platoons in battalions and treatment teams assigned to sustainment units) or on an area support basis from supporting medical companies or detachments. Within the BCTs and echelons above brigade Army Health System units, this support is provided by the medical company (brigade support) and the medical company (area support). The area support mission encompasses routine sick call and support provided by all ten medical functions. (See FM 4-02 for additional information on medical treatment). Hospitalization 1-161. Theater hospitalization provides essential care within the theater evacuation policy to either return a patient to duty or stabilize a patient for evacuation to a definitive care facility outside the AO. A hospital is a medical treatment facility capable of providing inpatient care. The Role 3 hospital centers execute the theater hospitalization mission. The Role 3 medical treatment facilities are appropriately staffed and equipped to provide diagnostic and therapeutic services, as well as the necessary supporting services required to perform its assigned mission and functions. (See ATP 4-02.10 for additional information on hospitalization). Medical Evacuation 1-162. Medical evacuation is the timely and effective movement of the wounded, injured, or ill to and between medical treatment facilities on dedicated and properly marked medical platforms with enroute care provided by medical personnel (ATP 4-02.2). Medical evacuation (MEDEVAC) refers to both ground and air evacuation of casualties and joint or partnered air evacuation elements. Air MEDEVAC employs air assets from the air ambulance companies assigned to the combat aviation brigade to evacuate casualties. Leaders must consider the basic tenets that influence the employment of MEDEVAC assets. These factors include the— * Patient’s medical condition. * Forces employment. * Enemy’s anticipated course of action and air defense capabilities. * Anticipated patient load. * Expected areas of patient density. * Availability of MEDEVAC resources to include ground and air crews. * Availability, location, and type of supporting medical treatment facilities. * Adherence to the protections afforded to medical personnel, patients, medical units, and medical transports under the provisions of the Geneva Conventions. * Unit airspace plan. * Obstacle plans. * Fire support plan (to ensure MEDEVAC assets are not dispatched onto routes and at the times affected by the fire support mission). * Road network or dedicated MEDEVAC routes (contaminated and clean).
3-90
52
Chapter 1 * Weather conditions. Medical Logistics 1-163. FM 3-90 does not discuss medical logistics. (See FM 4-02 and ATP 4-02.1 for more information on medical logistics.) Additional Medical Considerations 1-164. Tactical combat casualty care and casualty evacuation are not medical support functions. However, these are vital concepts for leaders to understand and implement during tactical operations. Tactical Combat Casualty Care 1-165. Tactical combat casualty care is divided into the three phases: care under fire, tactical field care, and tactical evacuation care. Tactical combat casualty care occurs during a combat mission and is the military counterpart to prehospital emergency medical treatment. Tactical combat casualty care in the military is most commonly provided by enlisted personnel and includes self-aid and buddy aid (first aid), combat lifesaver (enhanced first aid), Army combat medics and critical care flight paramedics, corpsmen from the Navy and Marine Corps and the U.S. Coast Guard, and both medics and pararescuemen in the U.S. Air Force. 1-166. In the care under fire phase, combat medical personnel and their units are under effective hostile fire and are very limited in the care they can provide. During this phase, only those lifesaving interventions that must be performed immediately are undertaken. Soldiers mainly focus on stabilizing the casualties to transport them to the next higher medical facility. 1-167. During the tactical field care phase, medical personnel and their patients are no longer under effective hostile fire and medical personnel can provide more extensive patient care. In this phase, interventions directed at other life-threatening conditions, as well as resuscitation and other measures to increase the comfort of the patient may be performed. During tactical field care, personnel must be prepared to transition back to care under fire, or to prepare the casualty for tactical evacuation, as the tactical situation changes. 1-168. In the tactical evacuation care phase, casualties are transported from the battlefield to medical treatment facilities. Evacuation can be by either MEDEVAC or casualty evacuation. (See FM 4-02 for more information on tactical combat casualty care). Casualty Evacuation 1-169. If MEDEVAC platforms are available, casualties should be evacuated on these platforms to ensure that they receive proper enroute medical care. However, if dedicated medical evacuation assets are unavailable, units use non-dedicated vehicles to transport causalities. Casualty evacuation is the movement of casualties aboard nonmedical vehicles or aircraft without enroute medical care (FM 4-02). Casualty evacuation (CASEVAC) involves the unregulated movement of casualties using tactical or logistic aircraft and vehicles. These vehicles or aircraft are not staffed with medical personnel for enroute care (unless augmentation is planned for in the operation plan). These vehicles and aircraft do not have organic medical equipment. If the combat medic is not available to provide care enroute, the combat lifesaver may accompany the casualties to monitor their conditions. 1-170. Combat operations place a significant burden on medical resources due to the magnitude and lethality of the forces involved. Medical units must anticipate large numbers of casualties in a short period due to the capabilities of modern conventional weapons and the possible employment of weapons of mass destruction. These mass casualty situations can rapidly exceed the capabilities of medical assets. Mass casualty refers to any number of human casualties produced across a period of time that exceeds available medical support capabilities (JP 4-02). Careful planning and coordination are necessary to minimize the extent to which medical capabilities are overwhelmed. CASEVAC must occur concurrently with operations. Units that cease aggressive maneuver to evacuate casualties while in enemy contact are likely to both suffer additional casualties while stationary and fail their mission. Effective management of mass casualty situations
3-90
53
Army Tactics depends on established and rehearsed unit-level mass casualty plans. There are a number of other variables which can ensure the success of a unit's mass casualty response. These include, but are not limited to— * Coordination of additional medical support and augmentation of medical evacuation support, forward resuscitative and surgical detachments, combat support and field hospitals, casualty collection points, ambulance exchange points, and established Class VIII resupply. * Rapid clearance of casualties from the battlefield (independent of MEDEVAC). * Providing effective tactical combat casualty care for the injured. * Continuous flow of casualties to the medical treatment facilities at the next higher role of care. * Use of alternative assets when the number of casualties overwhelms the capacity of available medical evacuation systems. PROTECTION WARFIGHTING FUNCTION 1-171. The protection warfighting function is the related tasks, systems, and methods that prevent or mitigate detection, threat effects, and hazards to preserve combat power and enable freedom of action (FM 3-0). Protection encompasses everything that makes the Army forces hard to detect and hard to destroy. Protection requires units to understand and visualize threats and hazards in an operational environment. This understanding allows units to prioritize their requirements and commit capabilities and resources according to those priorities. The protection warfighting function is the responsibility of all unit types and echelons in order to maintain the force’s integrity and combat power. 1-172. The protection warfighting function includes these tasks: * Conduct survivability operations. * Coordinate air and missile defense support. * Conduct populace and resources control. * Conduct electromagnetic protection. * Perform cyberspace security and defense. * Provide force health protection. * Conduct CBRN operations. * Provide explosive ordnance disposal support. * Conduct personnel recovery. * Conduct detention operations. * Conduct risk management. * Implement physical security procedures. * Apply antiterrorism measures. * Conduct police operations. * Conduct area security. * Implement operations security. Survivability Operations 1-173. Survivability is a quality or capability of military forces which permits them to avoid or withstand hostile actions or environmental conditions while retaining the ability to fulfill their primary mission (ATP 3-37.34/MCTP 3-34C). Survivability operations are those protection activities that alter the physical environment by providing or improving cover, camouflage, and concealment (ATP 3-37.34/MCTP 3-34C). Units exploit existing terrain features to enhance their survivability by altering the physical environment to provide or improve their cover and concealment. Likewise, units can use natural or manmade materials as camouflage to confuse, mislead, or evade the enemy to enhance their survivability. 1-174. All units conduct survivability operations within the limits of their capabilities. These include camouflaging their positions and constructing individual or crew served fighting positions. Engineers and CBRN units possess additional capabilities to assist survivability operations. These include hardening structures and positions and the reconnaissance, surveillance, and decontamination of CBRN hazards.
3-90
54
Chapter 1 1-175. Survivability operations enhance the ability to avoid or withstand hostile actions by altering the physical environment. They accomplish this through four tasks: * Constructing fighting positions. * Constructing protective positions. * Hardening facilities. * Employing camouflage and concealment. The first three tasks focus on providing cover, while the fourth task focuses on providing protection from observation and surveillance. These four tasks often have the added benefit of providing some degree of shelter or protection from the elements. All four tasks are often addressed in combination. For example, constructing fighting positions and protective positions usually also requires employing camouflage and concealment. Employing camouflage and concealment often accompanies activities to harden facilities. Air and Missile Defense 1-176. Army air defense artillery forces provide low-to-high altitude air and missile defense (AMD), and contribute to situational understanding, airspace management, freedom of movement, freedom from aerial attack, and early warning. These capabilities deter or defeat enemy aerial threats, protect the friendly force and high-value assets, and enable the friendly force’s freedom to operate. Enemy air threats include but are not limited to rockets, missiles, unmanned aircraft, and manned rotary- and fixed-wing aircraft. Counterair is a mission at the theater level that integrates offensive and defensive operations to attain and maintain a desired degree of control of the air and protection by neutralizing or destroying enemy aircraft and missiles, both before and after launch (JP 3-01). Counterair, from the active air defense perspective is a joint responsibility and will vary based on assets available and priorities. The area air defense commander through the area air defense plan executes this mission for a theater and provides the required integration and close coordination between Army air defense artillery forces and other counterair forces. Short-range air defense (known as SHORAD) assets may be attached or in direct support of corps and divisions. 1-177. Units employ both active and passive methods of air defense to include air defense artillery systems, direct fire weapons systems, and air guards. Active AMD are direct defensive actions taken to destroy, nullify, or reduce the effectiveness of hostile air and missile threats against friendly forces and assets. It includes the use of aircraft, air defense weapons, electromagnetic warfare, and other available weapons. Active missile defense requires early detection of missiles in flight to permit cueing, acquisition, tracking, classification, identification, and destruction as soon as possible after launch. Passive AMD are all measures, other than active air defenses, taken to minimize the effects of hostile air and missile threats against friendly forces and assets. All units conduct passive actions to reduce the effectiveness of the enemy air threat. These measures include camouflage, concealment, military deception, dispersion, reconstitution, redundancy, detection and warning systems, and the use of protective construction. Passive actions are a unit’s first line of defense and improve survivability by reducing the likelihood of being detected and targeted from the air and by mitigating the potential effects of air surveillance and attack. Passive missile defense measures include detecting air and missile launches, predicting impact points, providing threat identification, and disseminating early warning. It includes measures initiated to reduce vulnerability and to minimize the effect of damage caused by missile attack. 1-178. Generally, the joint force uses both offensive and defensive counterair operations to dominate enemy airspace and prevent the launch of threats. Offensive counterair operations include the suppression of enemy air defenses. Defensive counterair operations defeat enemy air and missile threats attempting to penetrate or attack through friendly airspace. Units integrate joint forces to exploit the mutually beneficial effects of offensive and defensive actions to destroy, neutralize, or minimize air and missile threats. 1-179. Units coordinate and clear air and missile defense fires on the ground and through the airspace to enable rapid and timely engagement of threats while preventing fratricide. However, the ground force executing the defense ensures that as much as possible of their defended asset list is in range of these air and missile defense systems. Units take both active and passive air defense measures to protect themselves from aerial attack. 1-180. A ground force’s organic weapons are its primary defense against short-range air threats. Units weigh the air threat with their ability to mitigate the threat when considering options for operations. Units
3-90
55
Army Tactics position available organic or supporting radars in locations to best support the operation. The selection of those positions reflects a risk assessment designed to preclude their early loss to enemy action. Units establish air defense priorities based on the concept of operations, scheme of maneuver, air situation, and the air defense priorities. Friendly air defense communicates weapon status to friendly assets, balances protection of ground units, and prevents fratricide of friendly air assets. Populace and Resources Control 1-181. Units include populace and resources control measures in their planning and execution of all operations. Ensuring proper implementation of populace and resources controls can keep civilians from potentially getting harmed by or disrupting military operations, increase OPSEC by limiting their access to sensitive areas, and disrupt illegal activities that can affect military logistics. During the conduct of large- scale combat operations, an indigenous civil government will probably not be able to define, enact, and enforce populace and resources control measures. (See FM 3-57, ATP 3-39.30, and ATP 3-57.10 for additional information on the conduct of populace and resource control.) Electromagnetic Protection 1-182. Many Army capabilities—including communications, cyberspace operations, information collection, space capabilities, target detection, and precision guided munitions—depend on assured access to the electromagnetic spectrum. The tasks to protect Army access to the electromagnetic spectrum are— * Conduct electromagnetic protection actions. * Conduct electromagnetic spectrum operations. * Conduct defensive electromagnetic attack. For more information on electromagnetic protection, see JP 3-85. Conduct Electromagnetic Protection Actions 1-183. Electromagnetic protection is a division of electromagnetic warfare involving actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability (JP 3-85). This includes actions taken to ensure friendly use of the electromagnetic spectrum, such as frequency agility in a radio or variable pulse repetition frequency in radar. Electromagnetic protection protects U.S. and allied systems from the effects of friendly and enemy electromagnetic attack and electromagnetic interference. 1-184. Electromagnetic protection actions include— * Electromagnetic compatibility. * Electromagnetic hardening. * Electronic masking. * Emission control. * Wartime reserve modes. Conduct Electromagnetic Spectrum Operations 1-185. Electromagnetic spectrum operations is coordinated military actions to exploit, attack, protect, and manage the electromagnetic environment (JP 3-85). Electromagnetic spectrum operations enable electromagnetic systems to perform their functions in the intended environment without causing or suffering unacceptable interference. Conduct Defensive Electromagnetic Attack 1-186. Defensive electromagnetic attack primarily protects friendly personnel and equipment or platforms against lethal attacks by denying enemy use of the electromagnetic spectrum to guide or trigger weapons. Defensive electromagnetic attack uses the electromagnetic spectrum to protect personnel, facilities, capabilities, and equipment. Examples of self-protection and other protection measures include the use of expendables (flares and active decoys), jammers, towed decoys, directed-energy infrared countermeasures, and counter radio-controlled improvised explosive device systems.
3-90
56
Chapter 1 Perform Cyberspace Security and Cyberspace Defense 1-187. The Army secures and defends the network through a defense-in-depth approach, incorporating layered security and defenses. The tasks to secure and defend cyberspace are— * Perform cybersecurity activities. * Conduct defensive cyberspace operations-internal defensive measures. 1-188. Cyberspace security are actions taken within protected cyberspace to prevent unauthorized access to, an exploitation of, or damage to computers and networks, including platform information technology (JP 3-12). Cyberspace security is not specific to an enemy or adversary. Cyberspace security actions protect the networks and systems through all phases of network planning and implementation. Cyberspace security activities include vulnerability assessment and analysis, vulnerability management, incident handling, continuous monitoring, and detection and restoration capabilities to shield and preserve information and information systems. 1-189. Cyberspace defense are actions taken within protected cyberspace to defeat specific threats that have breached or are threatening to breach cyberspace security measures (JP 3-12). The purpose of cyberspace defense includes actions to protect, detect, characterize, counter, and mitigate threats. Such defensive actions are usually created by the joint force command or Service that owns or operates the network, except in cases where these defensive actions would affect the operations of networks outside the responsibility of the respective joint force command or Service. Force Health Protection 1-190. Force health protection are measures that promote, improve, or conserve the behavioral and physical well-being of Soldiers comprised of preventive and treatment aspects of medical functions that include combat and operational stress control, dental services, veterinary services, operational public health, and laboratory services. Enabling a healthy and fit force, prevent injury and illness, and protect the force from health hazards (FM 4-02). (See FM 4-02 for additional information on force health protection). Chemical, Biological, Radiological, and Nuclear 1-191. CBRN support to operations include the simultaneous application of the assess, protect, and mitigate functions guided by hazard awareness and understanding. CBRN units enable movement and maneuver of supported units in accordance with the concept of operations and scheme of maneuver. 1-192. CBRN staff assess potential CBRN threats and hazards and recommend mitigation measures to protect the force while minimizing degradation of units, personnel, equipment, and facilities from effects that would hinder operations. CBRN staffs advise units on risks and friendly vulnerabilities through their understanding of the operational environment and the enemy’s capabilities. Measures to protect against and mitigate CBRN effects include proper protective equipment, exposure guidance, and alarm conditions. 1-193. CBRN operations include active measures to gain information on CBRN threats, enabling units to mitigate these threats and limit vulnerabilities while continuing operations. CBRN defense measures include individual, crew, and collective tasks. Units conduct CBRN reconnaissance and surveillance operations as complementary operations to facilitate maneuver by understanding the CBRN hazards. The time, techniques, and CBRN assets required to achieve reconnaissance objectives are determined by the intelligence requirements and mission variables. CBRN protection and mitigation measures increase the ability of the force to operate under CBRN conditions but may decrease operational tempo and increase sustainment requirements. (See FM 3-11 for more information on CBRN operations). Personnel Recovery 1-194. Soldiers have an increased likelihood of becoming isolated during offensive operations. Units must train both the individual and staff on how to react when an isolating event occurs. Army personnel recovery is the military efforts taken to prepare for and execute the recovery and reintegration of isolated personnel (FM 3-50). Training includes the personnel recovery tasks of report, locate, support, recover, and reintegrate as well as the Code of Conduct and individual isolation tasks (survive, resist, escape, evade).
3-90
57
Army Tactics Detention Operations 1-195. Detention involves the detainment of a population or group that poses some level of threat to military operations. Unit staffs consider detention operations when developing plans. Detainee planning enables providing necessary resources to construct and operate detention facilities for the projected number of detainees. Units monitor the actual number of detainees closely to avoid devoting too many or too few resources to detention operations. It is essential to address all aspects of detainee operations while planning for the supported offensive operation. To ensure that units are prepared to incorporate detainee operations during planning, units establish mechanisms that ensure effective consideration of potential detainee operations and their supporting activities. 1-196. Detainee operations begin at the point of capture—the point at which a Soldier has the custody of, and is responsible for safeguarding, a detainee. Soldiers must be prepared to process and safeguard detainees. Actions at the point of capture—the point at which a Soldier has the custody of, and is responsible for safeguarding, a detainee—can directly affect mission success and could have a lasting impact on U.S. tactical, operational, and strategic military objectives. All Soldiers must be prepared to process and safeguard detainees. Upon capture, Soldiers must use the five Ss and T technique (short for search, silence, segregate, safeguard, speed, and tag) to process detainees. This technique provides a structure with which to guide Soldiers in conducting detainee operations until custody of the detainee transfers to another authority or location. (See FM 3-63 for additional details on detainee operations). 1-197. During the conduct of operations, Soldiers may capture enemy prisoners of war (EPWs). At the point of capture, the detainees and EPWs share the same five Ss and T technique. However, the legal framework is different. The local nation has the legal authority for procedures for civilian detentions. However, Soldiers must handle EPWs in accordance with international law and treat them humanely; Soldiers must not abuse EPWs physically or mentally. EPWs must be allowed to keep their personal protective equipment. The unit is responsible for their care. If a unit cannot evacuate EPWs in a reasonable time, they must give EPWs food, water, and first aid. Soldiers should not give EPWs comfort items such as cigarettes or candy. Risk Management 1-198. Leaders must assume risk in knowing that subordinate leaders will not only accept, but also take risks to achieve mission success. Leaders identify and refine controls through continual dialogue with subordinate leaders to ensure their understanding of the commander’s intent. Time is a key factor in assessing and understanding risks that could impact successful operations. Reduced time impacts the tempo of operations as well as compresses planning timelines and asset requests. Such impacts can have significant downward implications to units on the ground. A compressed timeline can add additional risk to operations with the following: * Lack of implementing and resourcing potential deception activities. * Rushed planning methodologies leading to incomplete plans. * Confusing or unclear operation orders that lead to multiple fragmentary orders or verbal orders that can be misunderstood. * An inability to request or use information collection assets resulting in ambiguity before operations. * Lack of necessary rehearsals depending on the complexity and number of forces involved. * An inability to provide necessary information for protection-related mitigation efforts in a CBRN environment such as mission-oriented protective posture, known as MOPP, or operational exposure guidance, known as OEG. * Link-up procedures between organic and external forces. * Lack of competing courses of action (COAs) resulting in an unnecessary limiting of options. 1-199. When planning operations, leaders need to thoroughly understand the potential enemy formations they may encounter. This is achieved through a solid understanding of intelligence preparation of the battlefield and the threat template and situational template to ensure that friendly forces have the appropriate force ratio to execute both offensive and defensive operations. If the force ratio is not a preferred one, the unit assumes risk to the force and accomplishing directed mission objectives. This is also important for when units have to assume risk when planning branches, sequels, and follow-on operations.
3-90
58
Chapter 1 1-200. Maintaining an awareness of the common operational picture (COP) as an operation progresses is another key risk reduction technique. To aid leaders and Soldiers in this process, units develop and employ effective techniques and standard operating procedures, including— * Monitoring the next higher echelon’s radio network. * Having communication between units. * Providing COP updates. * Including accurate position reporting. * Training and using liaison officers. * Overseeing local security. For more information on risk management see ATP 5-19. Antiterrorism 1-201. Antiterrorism consists of defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, including limited response and containment by local military and civilian forces (JP 3-26). Antiterrorism is always a consideration for all forces. (See ATP 3-37.2 for additional information on antiterrorism operations). Police Operations 1-202. Police operations encompass two tasks—law enforcement and policing. These two tasks are complementary and interdependent but are conducted with a different intent. Law enforcement is conducted for the purpose of enforcing laws, investigating crimes, and apprehending (when warranted) persons for adjudication within the appropriate judicial system. Policing is the application of control measures within an area of operation to maintain law and order, safety, and other matters affecting the general welfare of the population (FM 3-39). Policing focuses on maintaining order and establishing security—not the enforcement of laws on the population or to compelling compliance at the risk of legal penalties. The relative emphasis given to policing and law enforcement tasks is based on the operational and mission variables, including the presence of the applicable rule of law. An operational environment characterized by general war will require police operations heavily weighted toward policing tasks, with minimal emphasis on law enforcement. Operational environments characterized by relative stability and governance under the rule of law will require much more law enforcement activity and less focus on policing tasks. (See ATP 3-39.10 for additional information on police operations). Area Security 1-203. Area security is a type of security operation conducted to protect friendly forces, lines of communications, and activities within a specific area. Area security operations occur regardless of which operation is currently dominant. Area security is conducted through the following five variations— * Site security. A unit conducting site security may protect locations such as base/base camps, tactical assembly areas, critical assets, port areas and piers. * Line of communication and route security * Convoy security. * Response force operations. Types of response forces include a mobile security force, such as a military police unit, and a tactical combat force, such as a combined arms battalion. * Area damage control. 1-204. Operations in noncontiguous assigned areas require units to emphasize area security. During offensive and retrograde operations, the speed at which the main body moves provides some measure of security. Rapidly moving units in open terrain will deploy a forward security force to provide advance warning of enemy forces. Technical assets can be used when no security force is assigned. In restrictive terrain, security forces focus on key terrain such as potential choke points. 1-205. Commanders execute echelon support area and base security as part of an echelon’s sustaining operations responsibilities. Area security is normally an economy of force measure ensuring the continued conduct of sustaining operations to support the echelon’s main and supporting efforts. All area security
3-90
59
Army Tactics operations take advantage of the local security measures performed by all units regardless of their location in the assigned area. (See ADP 3-37 for more information on the variations of area security.) 1-206. A unit develops specific rules of engagement when conducting area security, particularly when civilians are present. However, commanders remain responsible for protecting the force, and they consider this responsibility when establishing rules of engagement. They explain restrictions on conducting operations to ensure everyone understands those restrictions. Soldiers must understand that their actions may have far- reaching positive or negative effects. Commanders iterate that media and adversaries can quickly exploit their Soldiers’ actions, especially the way they treat civilians. 1-207. Sometimes area security forces must retain readiness over long periods without contact with enemy forces. This occurs most often when the enemy special purpose forces or insurgents are overmatched. Forces conducting area security should not develop a sense of complacency, even if the enemy force appears to have ceased operations in the secured area. Additionally, friendly forces should be mindful of mines and booby traps in these situations. Successful units assume that the enemy force regularly observes friendly operations to identify routines, weak points, and lax security for the opportunity to strike with minimum risk. This requires leaders to maintain vigilance and discipline in their Soldiers to preclude that opportunity from developing. Operations Security 1-208. Operations security is a capability that identifies and controls critical information, indicators of friendly force actions attendant to military operations, and incorporates countermeasures to reduce the risk of an adversary exploiting vulnerabilities (JP 3-13.3). Operations security (OPSEC) is applied throughout all operations to protect any information or activities of friendly elements. The practice of OPSEC denies the enemy of information that it may use to disrupt or defeat actions by friendly forces. 1-209. OPSEC is not only concerned with protecting planning and preparation activities, but also encompasses applying effective field craft, camouflage, concealment, and masking. These techniques deny and disrupt the enemy’s ability to gain information through reconnaissance and surveillance. It includes explaining to Soldiers methods the enemy uses to find and target their cell phones, gather geo-location tags from personal photos, and collect information from posts to social media. Other examples include how all lead-up activities—to include pre-combat checks and pre-combat inspections, vehicle loading, and modifications—can indicate future movements or operations and can provide enemy forces with an initial understanding of friendly force activities. 1-210. A units OPSEC program and any deception or survivability efforts should conceal the location of the friendly objective, the main effort, the disposition of forces, and the timing of the offense from enemy forces or mislead them regarding this information. These measures prevent enemy forces from launching effective spoiling attacks.
3-90
61
Chapter 2 Movement and Forms of Maneuver This chapter discusses movement formations, movement techniques, and the five forms of maneuver. MOVEMENT FORMATIONS 2-1. A movement formation is an ordered arrangement of forces for a specific purpose and describes the general configuration of a unit on the ground (ADP 3-90). Movement formations allow a unit to move on the battlefield based on the terrain and enemy threat. Terrain characteristics and visibility determine the actual arrangement and location of the unit’s personnel and vehicles within a given formation. There are seven different movement formations: * Column. * Line. * Wedge. * Echelon (left or right). * Vee. * Diamond. * Box. 2-2. Each movement formation has its advantages and disadvantages. A unit may employ a series of movement formations during a movement or maneuver based on changing terrain or threat. Commanders consider the advantages and disadvantages that each formation has in the areas of command and control, firepower orientation, ability to mass fires, and flexibility. The use of standard formations allows units to transition from one formation to another, giving additional flexibility when adjusting to changes in the mission variables. Movement formations describe how combat or security elements maneuver in relation to each other and the main body. By designating the movement formation planned for use, units— * Establish the geographic relationship between units. * Indicate probable reactions once an enemy force makes contact with the formation. * Indicate the level of security desired. * Establish the preponderant orientation of subordinate weapon systems. * Posture friendly forces for the attack. COLUMN FORMATION 2-3. The column formation is a movement formation with elements arranged one behind another. A unit moves in column formation when the unit does not anticipate early contact, the objective is distant, and speed and control are critical. Figure 2-1 on page 2-2 depicts a column formation. The location of direct fire systems within the column reflects the column’s length and the range fans of those systems. Normally, the lead element uses a traveling overwatch technique while the following units are in traveling formation. A column formation— * Provides the best formation to move large forces quickly, especially with limited routes and limited visibility. * Makes enemy contact with a small part of the total force while facilitating control and allowing the unit to quickly mass forces. * Provides a base for easy transition to other formations. * Works in restricted terrain.
3-90
62
Chapter 2 2-4. There are also disadvantages to using a column formation. These include— * Units can only immediately apply the majority of the column’s firepower on the column’s flanks. * The length of the column affects movement and terrain management. * Possibly inadvertently bypassing enemy units or positions and exposing the unit’s flanks. * Running head-on into an enemy deployed perpendicular to the column’s direction of movement. Restricted terrain may limit the ability of friendly forces to maneuver if contact is made to the front of the formation. Figure 2-1. Column formation LINE FORMATION 2-5. A line formation is a movement formation in which elements move abreast of each other. A unit typically employs this formation when assaulting an objective because it concentrates firepower to the front in the direction of movement. Figure 2-2 depicts a line formation. A line formation also— * Facilitates speed and shock in closing with an enemy force. * Allows the coverage of wide frontages. * Facilitates the occupation of attack by fire or support by fire positions. 2-6. There are also disadvantages of a line formation: * Provides less flexibility of maneuver than other formations since it does not distribute units in depth. * Linear deployment allows a unit deployed on line to bring only limited firepower to bear on either flank. * Provides limited or no reserve. * Limits overwatch forces. * Limits control of a unit using a line formation in restricted terrain or under conditions of limited visibility.
3-90
63
Movement and Forms of Maneuver Figure 2-2. Line formation WEDGE FORMATION 2-7. The wedge formation is a movement formation with one lead element and the trail elements are paired off abreast of each other on the flanks. Units use this formation to attack an enemy appearing to the front and flanks. Figure 2-3 on page 2-4 depicts a wedge formation. Any unit can conduct a wedge formation; if there are an even number of maneuver elements, one side will be longer that the other. Leaders designate which side they want longer by directing a “heavy side.” For example, if a leader said they wanted the unit in a “wedge formation—heavy left,” then the left side of the unit would have more elements than the right side of the element. A unit uses the wedge when contact with an enemy force is possible or expected, but the enemy force’s location and dispositions are vague. It is the preferred formation for a movement to contact in an organization with three subordinate maneuver units because it initiates contact with one unit while retaining two other subordinate uncommitted units positioned to maneuver and further develop the situation. Within the wedge, subordinate units employ the formation best suited to the terrain, visibility, and likelihood of contact. Employing a wedge formation— * Provides maximum firepower forward and allows units to use a large portion of their firepower on the flanks. * Allows rapid crossing of open terrain when enemy contact is not expected. * Facilitates control. * Allows for rapid changes in the direction of movement. * Facilitates the rapid change to other movement formations. 2-8. The primary disadvantages to the wedge formation are that it— * Requires sufficient maneuver space or multiple routes for dispersion laterally and in depth. * Lacks ease of control in restricted terrain or poor visibility.
3-90
64
Chapter 2 Figure 2-3. Wedge formation ECHELON FORMATION 2-9. An echelon formation is a movement formation with elements arranged on an angle to the left or to the right of the direction of attack (echelon left, echelon right). This formation provides focused firepower forward and to the flank of the direction of the echelon. It facilitates control in open areas. It provides minimal security to the opposite flank in the direction of the echeloning. A unit with knowledge of potential enemy locations can use an echelon formation to deploy subordinate ground elements diagonally left or right or as a way to work within a higher echelon movement formation. Figure 2-4 depicts an echelon left formation and figure 2-5 depicts an echelon right formation. Units operating on the flank of a larger formation commonly use this formation. An echelon formation— * Facilitates control in open terrain. * Allows the concentration of the unit’s firepower forward and to the flank in the direction of the echelon. * Allows forces not in contact to maneuver against known enemy forces because all elements will not simultaneously make contact. 2-10. The primary disadvantages of this formation are— * Difficult to maintain control over the unit in restricted terrain. * Lacks security or firepower on the opposite side of the echelon.
3-90
65
Movement and Forms of Maneuver Figure 2-4. Echelon left formation Figure 2-5. Echelon right formation
3-90
66
Chapter 2 VEE FORMATION 2-11. A vee formation is a movement formation with two elements abreast and one or more elements trailing. If there are more elements after the trail element in the vee formation, the trail elements can be in front or behind the main body. This arrangement is suited for an advance against a known threat to the front. Figure 2-6 depicts a vee formation. Units use this formation when they know the enemy force’s location and disposition and expect enemy contact. It— * Provides maximum firepower forward and good firepower to the flanks, but the firepower on the flanks is less than that provided by the wedge. * Facilitates a continued maneuver after making contact and a rapid transition to the assault. * Allows a unit to change quickly to a line, wedge, or column formation. 2-12. The primary disadvantages to this formation include: * Reorientation in the direction of movement, such as a 90-degree turn, are more difficult than using the wedge. * Control is difficult in restricted terrain and under limited-visibility conditions. * Lead element masks fires of the trail element. * Requires sufficient maneuver space for dispersion laterally and in depth. Figure 2-6. Vee formation
3-90
67
Movement and Forms of Maneuver DIAMOND FORMATION 2-13. A diamond formation is a movement formation with one element leading, one element positioned on each flank, and the remaining elements to the rear. The non-security units of the diamond usually move in a column formation inside of the diamond. It is most effective during approach marches, exploitations, or pursuits when the unit has only general knowledge about the enemy. Figure 2-7 depicts a diamond formation. Advantages of employing a diamond formation include— * Allowing units to maneuver to either flank immediately, regardless of which subordinate element makes enemy contact. * Facilitates making enemy contact with the smallest possible force yet provides all around security. * Provides firepower to the front and flanks. * Changes easily and quickly to another formation. * Facilitates speed of movement while remaining easy to control. * Provides an uncommitted force for use as a reserve. 2-14. The primary disadvantages of this formation are that it— * Requires sufficient maneuver space or multiple routes for dispersion laterally and in depth. * Requires four subordinate maneuver elements. Figure 2-7. Diamond formation
3-90
68
Chapter 2 BOX FORMATION 2-15. The box formation is a movement formation with elements arranged in a box or square, or two elements up and two elements back. This formation is only used when the unit has four security or combat elements. It is a flexible formation providing equal firepower in all directions. This formation can cause up to 50 percent of the force becoming decisively engaged simultaneously, thereby limiting the combat power available to maneuver against an enemy force. The box formation arranges the unit with two forward and two trail maneuver elements. Figure 2-8 on page 2-8 depicts a box formation. Units with only three subordinate maneuver elements cannot adopt the box formation unless reinforced with an additional maneuver element. The subordinate elements of the box usually move in a column formation within the box formation. Units often use this formation when executing an approach march, exploitation, or pursuit when they have only general knowledge about the enemy. Employing a box formation— * Allows a unit to change quickly and easily to any other formation. * Facilitates rapid movement yet still provides all around security. * Provides firepower to the front and flanks. * Maintains control more easily than a line formation. 2-16. Using the box formation also has disadvantages. These include— * The requirement for sufficient maneuver space or multiple routes for dispersion. * At battalion and company echelons, the possibility exists of enemy units massing on one element at a time as the presence of other friendly forces can mask other element’s direct fires. Figure 2-8. Box formation
3-90
69
Movement and Forms of Maneuver MOVEMENT TECHNIQUES 2-17. Units use the movement formations in conjunction with three movement techniques: traveling, traveling overwatch, and bounding overwatch. Movement techniques limit the unit’s exposure to enemy fire and position the unit to react to enemy contact. Units select the appropriate movement technique based on the chance of enemy contact. Figure 2-9 illustrates when a unit is most likely to use each technique. While moving, individual Soldiers and vehicles use the terrain to protect themselves when enemy contact is possible or expected. They use natural cover and concealment to avoid enemy fires. Soldiers and vehicle crews— * Take active countermeasures, such as using obscuration and direct and indirect fire, to suppress or obscure suspected enemy positions. * Cross open areas quickly and avoid large open areas, especially areas surrounded by high ground or terrain that can cover and conceal enemy forces. * Avoid possible kill zones because it is easier to cross difficult terrain than to fight enemy forces on unfavorable terms. * Do not silhouette themselves against the skyline. * Do not move directly forward from a concealed firing position. Figure 2-9. Movement techniques usages in relation to enemy contact
3-90
70
Chapter 2 TRAVELING 2-18. Traveling is a movement technique used when speed is necessary and contact with enemy forces is not likely. All elements of the unit move simultaneously. Commanders or small-unit leaders are located where they can best control the situation. Trailing elements may move in parallel columns to shorten the column and reaction time. Figure 2-10 depicts the traveling movement technique. Figure 2-10. Traveling movement technique TRAVELING OVERWATCH 2-19. Traveling overwatch is a movement technique used when contact with enemy forces is possible. A short distance, which varies with the terrain, separates the lead element and trailing element. The trailing element moves at variable speeds and may pause for short periods to overwatch the lead element. It controls its movement based on the terrain and the lead element. The rear element overwatches at such a distance that if enemy forces engage the lead element, it will not prevent the rear element from firing or moving to support the lead element. Figure 2-11 depicts this technique and shows how the overwatch can simultaneously occur at multiple echelons.
3-90
71
Movement and Forms of Maneuver Figure 2-11. Traveling overwatch movement technique BOUNDING OVERWATCH 2-20. Bounding overwatch is a movement technique used when contact with enemy forces is expected. The unit moves by bounds. One element always halts in position to overwatch another element while it moves. The overwatching element positions to support the moving unit by fire or maneuver. Units use the bounding overwatch movement technique when expecting to make contact with enemy forces. There are two variations of this technique: alternating bounds and successive bounds. 2-21. In both cases, the overwatching elements cover the bounding elements from covered or concealed positions with good observation and fields of fire against possible enemy positions. The support by fire positions also offer protection for stationary weapons platforms. They can immediately support the bounding elements with fires or maneuver against the enemy if the bounding elements make contact. Unless they make contact en-route, the bounding elements move via covered and concealed routes into the next set of support by fire positions. Leaders base the length of a bound on the terrain and the range of overwatching weapons. They can use the uncommitted part of their forces whenever needed as part of an immediate and controlled reaction to any threat to the bounding force. 2-22. If the unit uses alternate bounds, the bounding element moves forward, halts, and occupies a support by fire position. The stationary element always covers the bounding element’s movement, halt, and occupation of the bounding element’s support by fire position. The bounding element advances past the stationary element, takes an overwatch position, and becomes the new forward element. The former stationary element now becomes the bounding element, advances past the stationary element, and occupies a new support by fire position. This method is usually more rapid than successive bounds. Figure 2-12 on page 2-12 illustrates a bounding overwatch using alternating bounds. 2-23. As depicted in figure 2-13 on page 2-12, if the unit uses successive bounds, the lead element, covered by the trail element, advances and occupies a support by fire position. The rear element advances to a support by fire position abreast of the lead element and halts. The lead element moves to the next position and the move continues. Only one element moves at a time, and the rear element avoids advancing beyond the lead element.
3-90
72
Chapter 2 Figure 2-12. Bounding overwatch movement technique (alternating bounds) Figure 2-13. Bounding overwatch movement technique (successive bounds) FIVE FORMS OF MANEUVER 2-24. Forms of maneuver are distinct tactical combinations of fire and movement with a unique set of doctrinal characteristics that differ primarily in the relationship between the maneuvering force and the enemy (ADP 3-90). A form is a broad way of describing a scheme of maneuver. Units generally use the types of offensive and defensive operations to explain the overarching operation whereas the forms of maneuver are the basis for courses of action. Table 2-1 lists and illustrates the symbols for the five forms of maneuver.
3-90
73
Movement and Forms of Maneuver Table 2-1. Forms of maneuver and planning symbols Form of maneuver Planning symbol Frontal attack Penetration Envelopment Turning movement Infiltration 2-25. Combined arms organizations accomplish their mission by synchronizing the warfighting functions to execute these forms of maneuver. Combined arms is the synchronized and simultaneous application of arms to achieve an effect greater than if each element was used separately or sequentially. Understanding the characteristics of an assigned area and the enemy’s dispositions helps units determine the best form of maneuver. 2-26. A single operation may contain multiple forms of maneuver, such as a frontal attack to clear a security area followed by a penetration to create a gap in enemy defenses. A form of maneuver can also be used in the defense. For example, in a mobile defense the striking force conducts an envelopment to destroy the enemy. Typically, a higher headquarters does not dictate what form of maneuver a subordinate should use, but if the situation warrants, a higher echelon may constrain a subordinate force to a specific form of maneuver. The successful execution of any forms of maneuver requires trained forces capable of shifting their formations quickly in response to a changing enemy situation. FRONTAL ATTACK 2-27. A frontal attack is a form of maneuver in which an attacking force seeks to destroy a weaker enemy force or fix a larger enemy force in place over a broad front. As depicted in figure 2-14 on page 2-14 an attacking force uses a frontal attack to overrun a weak enemy force. They normally employ a frontal attack to—
3-90
74
Chapter 2 * Clear enemy security forces. * Overwhelm a shattered enemy force during an exploitation or pursuit. * Fix enemy forces in place as part of another operation. * Conduct a reconnaissance in force. Figure 2-14. Frontal attack 2-28. A frontal attack is necessary when assailable flanks do not exist. Frontal attack maintain continuous pressure along the entire front until a breach occurs or the attacking forces succeed in pushing the enemy forces back. Consequently, units rarely conduct frontal attack when they lack overwhelming combat power unless fixing the enemy is vital to a larger operation’s success. Organization of Forces 2-29. There is no unique organization of forces associated with a frontal attack. Units executing a frontal attack organize into a security force, a main body, and a reserve. The mission variables dictate the specific task organization of a unit. Control Measures 2-30. Units conducting a frontal attack may not require any additional control measures beyond those established to control the overall mission. This includes at a minimum an assigned area and an objective. Units can also use any other control measure necessary to control the frontal attack, including— * Attack positions. * Lines of departure. * Phase lines. * Assault positions.
3-90
75
Movement and Forms of Maneuver * Limits of advance. * Directions of attack or axes of advance for every maneuver unit. Planning a Frontal Attack 2-31. It is seldom possible for a unit to exert sufficient pressure to overwhelm an enemy force using a frontal attack, since it strikes the enemy force along a significant portion of the enemy’s front. There are many considerations for a force to execute a frontal attack. These considerations can include— * A friendly force tasked to fix the enemy force in place. * Terrain that dictates the unit cannot execute another form of maneuver. * Friendly forces have overwhelming combat power to quickly finish the enemy in position. 2-32. A unit’s planning efforts should reflect these considerations. When considering employing a frontal attack as a shaping operation, units also consider other means for fixing the enemy force in position, such as feints or demonstrations, and employing indirect fires to mitigate risk. Executing a Frontal Attack 2-33. Units conducting frontal attack advance on a broad front, normally with their subordinate ground maneuver elements abreast (except for the reserve). The security force clears enemy reconnaissance, surveillance, and target acquisition assets while the main body advances. An attacking force seeks to fix enemy forces and gain positional advantage to destroy them using maneuver. 2-34. If an attacking unit discovers a gap in the enemy force’s defenses, friendly units seek to exploit that weakness and disrupt the integrity of the enemy force’s defense. Units assess the situation to ensure that enemy forces are not luring them into an engagement area. Units synchronize the exploitation to prevent counterattacking enemy forces from isolating and destroying successful subordinate elements of the attacking friendly force. 2-35. When units conducting a frontal attack can no longer advance, they transition to a defensive posture. Once set in the defense, they continue to perform reconnaissance of enemy positions to locate gaps or assailable flanks and may assist the forward passage of lines of follow-on forces. PENETRATION 2-36. A penetration is a form of maneuver in which a force attacks on a narrow front. Destroying the continuity of a defense enables the enemy force’s subsequent isolation and defeat in detail. The penetration extends from the enemy force’s disruption zone through the battle zone into the enemy support zone. Units employ a penetration when— * Weak spots are identified in enemy defenses through reconnaissance, surveillance, and security operations. * Conditions do not permit an envelopment, such as the enemy having no assailable flank. Organization of Forces 2-37. Penetrating a defensive position requires overwhelming combat power at the point of penetration and combat superiority to continue the momentum of the attack. Units allocate combat power and designate control measures to fix enemy reserves and long-range weapons in their current locations and to isolate enemy forces within the area selected for penetration. Penetrations organize into a breach force, support force, assault force, and a reserve. These elements exist for each location the force is required to penetrate. Units should not withhold combat power from the initial penetration to conduct additional penetrations unless there is sufficient combat power to ensure the success of the initial penetration. Breach Force 2-38. The breach force is responsible for executing the initial penetration of the enemy’s defense. The breach force. The breach force is typically the main effort until the breach is complete. Depending on the situation the breach force may also be responsible for widening the gaps of the initial penetration.
3-90
76
Chapter 2 Support Force 2-39. The support force is responsible for fixing defending enemy forces along a broad front to allow the breach and assault forces to penetrate along a narrow front. The support force is a supporting effort to the breach and assault forces. Assault Force 2-40. The assault force is responsible for seizing the penetration objectives on the far side of the penetration. It is typically the main effort. Depending on the situation the assault force may have a follow-and-support mission to the breach force. Reserve 2-41. The use of the reserve avoids diverting the assault element from attacking the final objective of the penetration. Units assign subordinate units the tactical mission tasks of follow-and-support or follow-and- assume to ensure rapid exploitation of initial success. See paragraphs 2-51 through 2-57 for how these forces execute a penetration. Control Measures 2-42. A unit conducting a penetration normally has a narrower assigned area than a unit conducting a frontal attack. The minimum control measures for a penetration are— * An assigned area to every maneuver unit. * Axis of advance or a direction of attack. * A line of departure (LD) or line of contact (LC). * The time of the attack or time of assault. * Phase lines. * An objective. * Limits of advance (LOAs) to control and synchronize attacks. (Units can use BHLs instead of LOAs if they know where they will likely commit their follow and assume forces.) * Checkpoints. * Graphic control measures associated with breaching operations, such as points of breach and lanes. * Probable lines of deployment. * Support by fire positions and attack by fire positions. * Fire support coordination measures. 2-43. The lateral boundaries of a unit or units assigned the main effort are narrow to help maintain the mass necessary at the area of penetration. Units locate LOAs far enough beyond the enemy’s main defensive positions to complete their breach of those positions. They adjust existing boundaries to accommodate the new situation if operations result in opportunities to exploit success and pursue retreating enemy forces or expand the penetration. Planning a Penetration 2-44. The success of a penetration depends primarily on a coordinated and synchronized plan executed at a high tempo against comparatively weak enemy defenses. The terrain behind an area selected to penetrate must allow follow-on forces to proceed from the breach to a deeper objective. 2-45. The depth of an enemy position and the relative strength of attacking echelons determine the width of a penetration. The availability of artillery, air support, and other combat enablers for an attacking force helps units determine relative combat power. A wider gap allows friendly forces to pass through more quickly and in large-sized formations, making it more difficult for enemy forces to close the gap. The deeper a penetration, the easier it is to expose an enemy force’s flanks by the breach, and the less likely it is that an enemy force will be in a position to restore its front by falling back.
3-90
77
Movement and Forms of Maneuver 2-46. Plans for penetrating a defensive position include isolating, suppressing, and destroying by fire enemy forces in an area selected for the penetration. These plans should also address how to isolate the area of penetration from support or reinforcement by enemy forces located outside the area. A critical part of a plan is positioning friendly assets so that units can mass the effects of their combat power to accomplish these results without giving away the location of the penetration. 2-47. The majority of units and assets are in positions where the effects of their combat power apply to the area selected for penetration. Plans for the penetration normally have three phases: * Breaching the enemy force’s main defensive positions. * Widening the gap created to secure the penetration’s flanks. * Seizing an objective and subsequently exploiting the success of the penetration. 2-48. Planning the sequence of these phases depends on the situation. In some situations, if there are weaknesses or gaps in an enemy force’s front, it is possible for armored forces to breach the enemy force’s defenses and proceed straight to an objective. Simultaneously, infantry units could conduct local envelopment and exploitation operations. 2-49. Supporting efforts for outside the area of penetration are normally to isolate enemy forces on the flanks of the penetration. Synchronizing the effects of rotary- and fixed-wing aircraft, artillery fires, and obscuration to delay or disrupt repositioning forces are examples of supporting efforts. Units usually attempt to penetrate the enemy’s defensive positions along a boundary between two enemy units because defenses tend to be less effective along a boundary. 2-50. Units plan penetrating through the enemy force’s defensive positions in enough depth so enemy forces cannot reestablish a viable defense in rearward positions. Units do not divert the strength of attacking forces to widening the gap to secure the flanks of the penetration until the forces achieve sufficient depth. However, plans should address contingencies, such as enemy counterattacks against the penetration’s flanks, if the unit culminates at any point during the operation or actions to take if the penetration is unsuccessful. Plans provide for uninterrupted support to attacking elements as they close with the enemy and accomplish their mission. Executing a Penetration 2-51. After the initial breach of the enemy force’s defense, the situation determines the sequence of the remaining two phases. If enemy forces are in a weak position, it may be possible for the lead attacking force to seize the penetration’s final objective while simultaneously widening the initial breach. (See discussion beginning in paragraph 18-9 for more information on breaching.) Breaching the Enemy’s Main Defensive Positions 2-52. The support force fixes the enemy along a broad front to allow the breach and assault forces to penetrate on a relatively narrow front. The support force can accomplish this by adjusting its lateral boundaries to the point or points of penetration or by extending its boundaries to fix the enemy on a broader front. This allows the force conducting the penetration to focus overwhelming combat power at that location. The support force locates where it can suppress the enemy for the breaching and the assaulting forces. The breach force establishes a lane or lanes to facilitate the assault force operation. The breach force can also be assigned near objectives to prepare the passing of the assault force. Figure 2-15 on page 2-18 depicts a penetration with two support forces fixing enemy forces on a broad front and the breach and assault forces executing the penetration.
3-90
78
Chapter 2 Figure 2-15. Penetration 2-53. Supporting efforts focus on the remainder of the enemy forces in their current positions and isolate the objective from enemy forces. These operations prevent enemy forces from disengaging to reinforce enemy units opposing the main effort. Units track the battle’s progress to ensure that subordinate forces penetrate entirely through the enemy force’s main defensive positions and not just the enemy force’s disruption zone. 2-54. Enemy forces normally try to slow down or stop a breach to gain time to react to the changing situation. The attacking unit must rapidly exploit and reinforce success. The attacker masses resources and additional units as necessary to ensure completing the penetration through the enemy force’s defensive positions. Widening the Gap to Secure the Penetration’s Flanks 2-55. Once the attacking force penetrates the main defenses, it begins to widen the penetration of the enemy force’s defensive positions by conducting a series of shallow envelopments or attacks by fire. The task of widening the gap of the penetration is normally assigned to a follow-and-support force. Commanders also have the option of committing their reserve to accomplish that task. If the reserve is committed, the commander must designate another reserve, or the unit will not have the forces available to commit a reserve to another operation. Units plan to meet enemy counterattacks by shifting fires or committing reserves or follow and assume forces. They can use obstacles on the flanks of the penetration as a combat multiplier to assist in defeating any local enemy counterattacks and to maintain the force’s tempo. Seizing an Objective and Subsequent Exploitation 2-56. The assault force attacks objectives to destroy the continuity of the enemy’s defensive position. Frequently, that objective is so far from the area of penetration that the unit or units initially conducting the penetration cannot seize it without pausing. In that event, units plan to commit the reserve or attack with the assault force through the breaching force early. Exploitation beyond the objective tends to be executed by divisions and corps. The exact force mix depends on the mission variables, while the armored, Stryker, and aviation forces are generally suited for subsequent exploitation.
3-90
79
Movement and Forms of Maneuver 2-57. Divisions and corps may initiate an attack by simultaneously launching two or more convergent penetrations against weak locations on the enemy front. Often this method of attack helps isolate an extremely strong enemy defense. Units assign supporting efforts to contain any enemy positions that may influence the penetration. ENVELOPMENT 2-58. Envelopment is a form of maneuver in which an attacking force avoids an enemy’s principal defense by attacking along an assailable flank. An envelopment avoids the enemy force’s strength—the enemy’s front—where the effects of enemy fires and obstacles are generally the greatest and attacks the enemy to the flank or rear. Envelopments force the enemy to fight in two or more directions simultaneously to meet the converging efforts of an attack. Envelopments focus either on seizing terrain, destroying enemy forces, or interdicting enemy withdrawal routes. Units prefer to conduct an envelopment instead of a penetration or a frontal attack because generally the flanks of the defending forces are weaker and provide the attacking forces the most opportunities to destroy the enemy force. The main effort focuses on attacking an assailable flank. If no assailable flank is available, the attacking force creates one through the conduct of a penetration. The three variations of the envelopment are— * Single envelopment. * Double envelopment. * Vertical envelopment. 2-59. A single envelopment is a variation of envelopment where a force attacks along one flank of an enemy force. A single envelopment is generally easier to control and does not require a significant number of forces. See figure 2-16 on page 2-20 for an illustration of a single envelopment. 2-60. A double envelopment is a variation of envelopment where forces simultaneously attack along both flanks of an enemy force. A force seeking to execute a double envelopment must also have a substantial mobility advantage over defending forces. A unit performs a double envelopment by conducting a frontal attack to fix enemy forces in place while enveloping both of the enemy force’s flanks. A double envelopment generally requires more forces than a single envelopment and are more difficult to control. 2-61. A vertical envelopment is a variation of envelopment where air-dropped or airlanded troops attack an enemy forces’ rear, flank, or both. A force seeking to execute a vertical envelopment requires the necessary vertical lift capability and indirect fire assets to suppress enemy air defense capability. Because of the forces required, normally only divisions and larger organizations can conduct double and vertical envelopments, since these organizations have the resources and the capability to control these envelopments. A vertical envelopment, by either airborne assault or air assault, allows the commander to— * Overcome distances quickly, overfly barriers, and bypass enemy defenses. * Extend the area over which the commander can exert influence. * Leaves the enemy defenses more vulnerable to attack from the main body. * Disperse reserve forces widely for survivability reasons while maintaining their capability for effective and rapid response. * Exploit combat power by increasing tactical mobility. * Seize key terrain to deny the enemy’s use.
3-90
80
Chapter 2 Figure 2-16. Single envelopment Organization of Forces 2-62. During a single or double envelopment units organize their forces to perform two primary tasks: fixing the enemy force and executing the envelopment. Units conducting an envelopment task organize forces into a fixing force, enveloping force, security force, and a reserve. The only organizational difference between a single envelopment and double envelopment is that a double envelopment consists of two enveloping forces. The fixing force normally conducts a frontal attack to fix enemy forces in their current positions to prevent their escape and reduce their capability to react against the enveloping force. The fixing force should use the minimal amount of combat power to fix the enemy while ensuring the majority of combat power is in the enveloping force. During a double envelopment, commanders typically designate the most likely to succeed of the two envelopment operations as the main effort for resources. The enveloping force maneuvers behind the enemy’s battle zone to defeat enemy forces in their positions, but from an unexpected direction. The security force prevents the enemy from discovering friendly dispositions, capabilities, and intentions, or hindering the envelopment. 2-63. Units executing a vertical envelopment organize friendly forces into an air assault task force or an airborne task force. The air assault task force is a temporary group of integrated forces tailored to a specific mission under the command of a single headquarters. The air assault task force consists of an air assault force and the ground assault force. The ground assault force is task-organized with enough combat power to seize or fix the objective or enemy force. The airborne task force is organized by an assault echelon, follow-on echelon, and rear echelon. The assault echelon is task-organized with enough combat power to seize or fix the objective or enemy force. (See FM 3-99 for more information on airborne and air assault operations.) Control Measures 2-64. At a minimum, commanders assign an area for each unit participating in an envelopment. They also designate phase lines, support by fire and attack by fire positions, contact points, and appropriate fire coordination measures, such as a RFL or boundary between converging forces, and any other control measures necessary to control the envelopment. Figure 2-17 is an example of control measures used when conducting an envelopment.
3-90
81
Movement and Forms of Maneuver Figure 2-17. Envelopment control measures. Planning an Envelopment 2-65. Successful envelopment planning requires knowing and understanding enemy forces and their capabilities. Units seek to maneuver the enveloping force around or over the enemy force’s main defenses to secure objectives on the enemy force’s flank or rear. From those objectives, the enveloping force can use its positional advantage to employ superior combat power against a defending enemy force oriented in the wrong direction. A unit uses information collection assets to determine the disposition and capabilities of enemy forces to detect and react to their operations. 2-66. Units plan for the force conducting the envelopment to remain within supporting distance of the fixing force. Supporting distance is the distance between two units that can be traveled in time for one to come to the aid of the other and prevent its defeat by an enemy or ensure it regains control of a civil situation (ADP 3-0). Sustaining the enveloping force requires deliberate planning because only intermittent ground lines of communications (LOCs) between the echelon support area and the enveloping force may exist. 2-67. Units develop branch and sequel plans to the envelopment operation to exploit the envelopment’s success. These plans consider the transition to a pursuit in order to complete the destruction of the enemy force or to halt and pass forward the reserve or follow and support forces. Executing an Envelopment 2-68. A successful envelopment depends largely on the degree of surprise units achieve against enemy forces or the use of overwhelming combat power. The envelopment’s probability of success also increases when an enveloping force has superior mobility and intelligence, possesses air superiority, and has supporting efforts that fix the bulk of the enemy’s forces in their current positions. 2-69. Normally, units orient the majority of their combat power toward where they expect to engage enemy forces, while assuming risk by placing less combat power on their own flanks. The attacking unit creates an assailable enemy flank using whatever means necessary. The enveloping force then moves rapidly to exploit
3-90
82
Chapter 2 the situation before enemy forces strengthen an assailable flank by preparing positions in depth or by engaging their reserve. Rapid movement around the enemy force’s flank is essential to prevent enemy forces from occupying previously prepared positions. Higher headquarters’ supporting efforts attempt to prevent the enemy from reconstituting reserves from other portions of the enemy front. 2-70. After the initial envelopment of one flank, which places enemy forces at a disadvantage, units have many options. They may choose to exploit success by generating additional combat power along the same axis. Units can destroy or defeat the enveloped enemy force in place, or transition to another type of operation, such as an exploitation, pursuit, or encirclement. TURNING MOVEMENT 2-71. A turning movement is a form of maneuver in which the attacking force seeks to avoid the enemy’s principal defensive positions by attacking to the rear of their current positions forcing them to move or divert forces to meet the threat. A turning movement differs from an envelopment because the force conducting a turning movement seeks to make enemy forces displace from their current locations, whereas an enveloping force seeks to engage enemy forces in their current locations from an unexpected direction. It can also be conducted using waterborne or amphibious means. Figure 2-18 graphically depicts a turning movement. Units frequently transition this form of offensive maneuver from the attack into an exploitation or pursuit. The turning force must also be capable of operating outside supporting distances for a set time. Only divisions and above can execute a turning movement. This is due to these echelons possessing the organic resources to organize a turning force that can operate outside the supporting distance of the main body and force enemy units out of their current positions. execute a turning movement. Figure 2-18. Turning movement
3-90
83
Movement and Forms of Maneuver Organization of Forces 2-72. The task organization for a turning movement are the following: * Security force. * Diversion force. * Turning force. * Reserve. 2-73. The security force performs security and reconnaissance tasks as part of its enabling operations. A diversion force is task-organized to ensure the success of the turning force. The diversion force conducts operations, such as attacks designed to divert the enemy force’s attention away from the turning force. The force conducting the turning movement is the turning force. The turning force conducts the echelon’s main effort and is resourced appropriately. The reserve is positioned to support the turning force. However, the reserve can support the security or diversion force if required. Control Measures 2-74. Units designate control measures as necessary to synchronize subordinate force’s operations. These control measures include— * Phase lines. * Contact points. * Objectives. * Limits of advance. * Appropriate fire control measures. Planning a Turning Movement 2-75. Selecting the right terrain-oriented objective of a turning movement is of major importance to the success of the operation. This causes the enemy forces to relocate from their current position to meet the friendly force in a position away from their previous occupied position or risk catastrophic defeat. The unit’s scheme of maneuver in a turning movement may vary depending on the specific situation and mission variables. In addition to common offensive planning considerations, units conducting a turning movement pay special attention to planning branches and sequels to the turning movement, including— * Transitioning to an exploitation or pursuit. * Transitioning to a defense. * Linking up the turning force and diversion force. * Retrograding the turning force. 2-76. After developing the tactical plan, units plan how the turning force maneuvers to its objective. They develop the turning force’s movement, loading, and staging plans if they require outside transportation assets. Units plan to occupy key terrain that threatens the enemy force’s survival or remain mobile and seek ways to exploit the turning force’s success. 2-77. If there is an early linkup with the main body during a turning movement, the turning force normally plans to defend the terrain required to protect itself. Once reinforcement or linkup with the main body occurs, units plan how to use the turning force to continue the attack or relieve the main body so it can prepare for subsequent missions. 2-78. The distances between forces and the existence of intermittent LOCs magnify the problems inherent in providing sustainment to a maneuver force during a turning movement. Therefore, when planning a turning movement, units describe the sustainment conditions required or acceptable for the operation. 2-79. Units consider the provision of all supplies and equipment required for mission accomplishment as an integral part of tactical planning. They plan and organize unit sustainment operations to support a rapid tempo of highly mobile and widely dispersed operations. Turning movements tend to have greater supporting distances and responsibilities. Sustainment planners recognize this and adjust their plans using available
3-90
84
Chapter 2 resources. Subordinate units carry only those supplies required to meet their immediate needs into the operation. Executing a Turning Movement 2-80. Successful turning movements threaten the enemy force into a dilemma. First, enemy forces must move from their original positions to meet the threat presented by the turning force. Often enemy forces must commit available reserves against this new threat, which exposes their reserves to friendly fires. After the turning movement, enemy forces must engage the friendly force on ground that they have not chosen or prepared. The other option for enemy forces is to continue to hold the terrain they occupy at the risk of becoming enveloped and potentially encircled by friendly forces. Whenever possible, units conducting a turning movement try to reach the terrain-oriented objective that compels enemy forces to reposition prior to encountering them. Friendly forces finding their way into the enemy force’s rear area to rapidly exploit the situation seek to achieve their objectives before the enemy can react. Rapid movement is essential to prevent enemy forces from occupying previously prepared positions in the enemy force’s rear. 2-81. The maneuver of the turning force is what causes enemy forces to leave their positions. A turning force normally conducts most of its operations outside the supporting range of the diversion force and possibly outside its supporting distance. The turning force must contain sufficient maneuver, functional, and multifunctional capabilities to operate independently for a specified period. Units organize the reserve to exploit success by using either the turning force or the diversion force. INFILTRATION 2-82. An infiltration is a form of maneuver in which an attacking force conducts undetected movement through or into an area occupied by enemy forces. Infiltration is also a march technique used well before encountering enemy forces to avoid enemy information collection assets. Infiltration occurs by land, water, air, or a combination of means. Moving and assembling forces covertly through enemy positions takes a lot of time. A successful infiltration requires the infiltrating force to avoid detection and engagement by enemy forces. Since this requirement limits the size and strength of the infiltrating force, and infiltrated forces alone can rarely defeat an enemy force, units use infiltration in conjunction with and in support of other forms of offensive maneuver. Figure 2-19 depicts an infiltration.
3-90
85
Movement and Forms of Maneuver Figure 2-19. Infiltration 2-83. Units conduct infiltration to move all or a portion of a unit through gaps in the enemy force’s defenses to— * Reconnoiter known or templated enemy positions and conduct surveillance of named areas of interest and targeted areas of interest. * Attack enemy-held positions from an unexpected direction. * Occupy a support by fire position to support the main effort. * Secure key terrain. * Conduct ambushes and raids to destroy vital facilities and disrupt the enemy force’s defensive structure by attacking enemy reserves, fire support and air defense systems, communications nodes, and sustainment elements. * Conduct a covert breach of an obstacle or obstacle complex. 2-84. Special operations forces and dismounted infantry units up to brigade size are best suited to conduct an infiltration. In some circumstances, armored- and Stryker-equipped forces operating in small units can conduct an infiltration when the terrain can mask their force’s movement signature. The proliferation of technology leads to increased situational understanding for both friendly and enemy forces as well as an increased chance of detecting units conducting an infiltration. Understanding the capabilities of these technologies informs the decision as to whether an infiltration is feasible.
3-90
86
Chapter 2 Organization of Forces 2-85. Infiltrating units generally organize into a security force and a main body. Normally, to be successful, an infiltrating force must avoid detection until it reaches its objective rally point. The infiltrating unit organizes the main body into one or more infiltrating elements. These elements are the largest size element possible that meet requirements for stealth and ease of movement. This organization increases control and the speed of the infiltration while providing responsive combat power. Units determine the exact size and number of infiltrating elements based on the situation. 2-86. Units consider the following factors when determining how to organize available forces. Smaller infiltrating elements are not as easy to detect as larger elements and can get through smaller defensive gaps. Even the detection of one or two small elements by enemy forces may not prevent an infiltrating unit from accomplishing its mission. Larger infiltrating elements are easier to detect, and their discovery is more apt to endanger the success of the mission but if compromised are better equipped to react. A unit with many smaller infiltrating elements requires more time to complete the infiltration and needs more linkup points than a similar sized unit with only a few and larger infiltrating elements. Many smaller infiltrating elements are also harder to control than fewer, larger elements. 2-87. If resources allow, units designate security forces that move ahead of, to the flanks of, and to the rear of each infiltrating element’s main body. These security forces may be assigned either screen or guard missions. They determine the sizes and orientation of security elements based on the situation. Each infiltrating element is responsible for its own reconnaissance effort. 2-88. Sustainment of an infiltrating force normally depends on the force’s basic load of supplies and those medical and maintenance assets accompanying the infiltrating force. After completing the mission, units reopen LOCs to conduct normal sustainment operations. Control Measures 2-89. Control measures for an infiltration include, at a minimum— * One or more infiltration lanes. * A LD or point of departure (PD). * Movement routes with associated start points (SPs) and release points (RPs), or a direction or axis of attack. * Linkup or rally points, including objective rally points. * Assault positions. * One or more objectives. * A limit of advance. * Phase lines. * Checkpoints. * Attack position. If it is not necessary for the entire infiltrating unit to reassemble to accomplish its mission, the objective may be broken into smaller objectives. Each infiltrating element would then move directly to its objective to conduct its mission. Planning an Infiltration 2-90. The activities and functions associated with the process of planning an infiltration are the same as with any other offensive operation. That planning takes advantage of that unit’s ability to surprise enemy forces. The planning process synchronizes the warfighting functions that support the infiltrating unit, especially precise information collection. Without precise, detailed intelligence, infiltration maneuvers become high- risk probing operations that can be costly and time consuming. Careful planning, full information collection integration, detailed analysis, and OPSEC enable an infiltrating force to avoid an enemy force. This minimizes direct contact and maximizes surprise. 2-91. Sustaining infiltrations requires detailed planning with regard to medical evacuation, maintenance support, and resupply classes of supply for the infiltrating unit. Unlike the other forms of maneuver,
3-90
87
Movement and Forms of Maneuver infiltration purposely maneuvers units out of sustainment range for longer periods to surprise the enemy. The prolonged time away from medical evacuation, maintenance, and resupply of classes of supply increases the risk to the infiltrating unit, which requires detailed planning to mitigate. After identifying gaps or weaknesses in the enemy force’s defensive positions, units assign infiltration lanes, contact points, and objectives to subordinate units. These objectives afford the infiltrating force positions of advantage over enemy forces (the objectives are not required to be to the rear of the enemy force). Each subordinate unit picks one or more routes within the assigned lane and establishes additional contact points, rally points, assault points, and other control measures as required. 2-92. Units require routes within an infiltration lane to be far enough apart to prevent an infiltrating element on one route from seeing other infiltrating elements, but close enough so that an infiltrating element could switch quickly to another route if the situation requires it. They may use single or multiple infiltration lanes depending on the infiltrating force’s size, the amount of detailed information on enemy dispositions, terrain, time allowed, and number of lanes available. Units require each route to provide infiltrating elements cover and concealment while avoiding known enemy and civilian locations and movement routes as much as possible. If possible, the subordinate unit selects the exact routes during the preparation phase after reconnoitering each infiltration lane. That subordinate decides whether the unit infiltrates as a whole or as smaller elements, depending on the enemy force’s density and strength. 2-93. A single infiltration lane— * Facilitates navigation, control, and reassembly. * Requires the existence or creation of only one gap in the enemy force’s position. * Reduces the area for which detailed intelligence is required. 2-94. Multiple infiltration lanes— * Require the existence or creation of more gaps in the enemy force’s security area. * Reduce the possibility of compromising the entire force. * Increase difficulty with maintaining control. 2-95. The sizes and numbers of infiltrating elements are major considerations for units when deciding whether to use a single lane or multiple infiltration lanes. If the infiltration takes place using multiple elements, contingency plans must address the following situations: * A lead element, possibly the security force, makes contact, but the trail elements have not started infiltrating. * A lead element infiltrates successfully but compromises one or more trailing elements. * A linkup point is compromised. * An element is isolated by the enemy. 2-96. The infiltration plan also addresses the following considerations: * Availability of supporting fires throughout the operation. * Linkup or extraction of the infiltrating unit after mission completion. * Sustainment of the infiltrating force during the operation, including casualty evacuation. * Tactical deception operations. * Linkup of various infiltrating elements. * Command and control of forces. * Positioning of combat vehicles to support the infiltrating elements. * Use of limited visibility and rough terrain to mask movement and reduce possible detection. * Infiltration of the largest elements possible to maintain speed and control. * Rehearsals. * Abort criteria. * Critical friendly zones. 2-97. Planned recognition signals and linkup procedures for the infiltration should be simple and quick. If there have not been any firing or other noises, users of signals should consider the probability of detection. However, if there have already been assaults, artillery, and small arms fire, stealth is less of a concern. A lack
3-90
88
Chapter 2 of time and the short distance involved in many infiltration operations may make conducting formal linkup procedures unnecessary. Preparing an Infiltration 2-98. Once the objective, infiltration lanes, and linkup or rally points are selected, commanders’ direct information collection operations to update and confirm intelligence requirements. Friendly information collection operations identify enemy sensors and surveillance systems. Units then revise the plan to reflect current conditions in the assigned area. Executing an Infiltration 2-99. Moving undetected during an infiltration requires a considerable amount of time. The infiltrating unit moves from its assembly area or current position through the start point and then continues moving along the infiltration route to a release point. If small elements are conducting the infiltration, the unit uses a series of linkup points to reassemble into a coherent unit. 2-100. If the complete unit is conducting the infiltration, the forward security force begins its movement first and the main body follows. The distance between the forward security force and the main body depends on the mission variables. The security force must be far enough ahead of the main body so that it can either deploy or move to another route if the forward security force discovers enemy forces. The forward security force in an infiltration needs enough time to move in a stealthy and secure manner. Enemy units should not be able to move undetected between the forward security force and the main body. 2-101. As the infiltrating unit moves, the security force reports the cover and concealment of each route, enemy activity, location of danger areas and linkup points, enemy activity on the objective, and other combat information. The unit attempts to avoid enemy and civilian contact; however, contact does not always mean the mission is compromised. The infiltrating unit engages targets first with indirect fires to avoid revealing its presence and exact location. 2-102. If necessary, the forward security force conducts actions on contact while the main body moves to another route, reconstitutes a forward security force, and continues the mission. If the main body makes contact unexpectedly, it either bypasses the encountered enemy force or attacks the enemy force if the enemy has little combat power or cannot be bypassed. During an infiltration, the forward security force ignores ineffective enemy fire and continues to move. 2-103. The infiltrating unit’s elements move to an assembly area or an objective rally point to consolidate and reorganize their combat power, refine the plan, and conduct any last-minute coordination before continuing the mission. The unit then conducts those tasks needed to accomplish its mission, which could be an attack, raid, ambush, seizing key terrain, or information collection. 2-104. Units may need to abort an infiltration operation if the mission variables change during the infiltration, creating a condition where units can no longer accomplish the infiltration. Examples of changes that might trigger such an action include— * Significant portions of the infiltrating force’s combat power are lost through navigation errors, enemy action, accidents, or maintenance failures. * Movement or significant reinforcement of a force-oriented objective. * Detection of the infiltration by enemy forces. * Changes in the tactical situation that make the mission no longer appropriate. Units develop criteria for aborting the infiltration as part of the planning process. They transmit the decision to abort the infiltration to all appropriate headquarters for action and information.
3-90
89
PART TWO Offensive Operations Commanders use offensive operations to defeat and destroy enemy forces as well as to seize terrain, resources, and population centers. Part Two consists of five chapters that describe the fundamentals of the offense and the four types of offensive operations—movement to contact, attack, exploitation, and pursuit. Chapter 3 The Offense Offensive actions are combat operations conducted to defeat and destroy forces and seize terrain, resources, and population centers. They impose the commander’s will on the enemy. The basics discussed in this chapter apply to the conduct of all types of offensive operations. PURPOSES OF THE OFFENSE 3-1. The offense is the decisive form of war. The offense is the ultimate means commanders have of imposing their will on enemy forces. The main purposes of the offense are to defeat enemy forces, destroy enemy forces, and gain control of terrain, resources, and population centers. Additionally, units conduct the offense to— * Secure decisive terrain. * Deprive the enemy of resources. * Gain information. * Fix an enemy force in position. * Disrupt an enemy force’s attack. * Set the conditions for successful future operations. CHARACTERISTICS OF THE OFFENSE 3-2. Successful offenses share these characteristics: * Audacity. * Concentration. * Surprise. * Tempo. See ADP 3-90 for more information on the purposes and characteristics of the offense.
3-90
90
Chapter 3 TYPES OF OFFENSIVE OPERATIONS 3-3. The types of offensive operations describe the general sequence of the offense and recommended formations. The purpose of the operation discriminates one from another. The four types of offensive operations are— * Movement to contact. * Attack. * Exploitation. * Pursuit. Table 3-1 contains the planning symbols associated with movement to contact, exploitation, and pursuit. Table 3-1. Types of the offensive operations and planning symbols Type Planning Symbol Movement to contact Exploitation Pursuit Note. Attack does not have a planning symbol. Unless a commander deems it is necessary to constrain their subordinates the default type of offensive operation is an attack and graphic control measures such as an axis of advance or direction of attack can be used to convey the commander’s intent. Additionally, exploitations and pursuits are generally a branch or sequel to a successful attack. Movement to Contact 3-4. Movement to contact is a type of offensive operation designed to establish or regain contact to develop the situation. It creates favorable conditions for subsequent tactical actions. Units conduct a movement to contact when the enemy situation is vague or not specific enough to conduct an attack. Forces conducting a movement to contact seek to make contact using the smallest friendly force feasible. If friendly forces make contact with an enemy, they have five options: attack, defend, bypass, delay, or withdraw. There are two variations of movement to contact: * Search and attack. * Cordon and search. See Chapter 4 for more information on movement to contact.
3-90
91
The Offense Attack 3-5. An attack is a type of offensive operation that defeats enemy forces, seizes terrain or secures terrain. Attacks incorporate coordinated maneuver. An attack differs from a movement to contact since knowledge of the enemy’s disposition enables units to synchronize and employ combat power more effectively. There are four variations of an attack: * Ambush. * Counterattack. * Raid. * Spoiling attacks. See Chapter 5 for more information on attack. Exploitation 3-6. An exploitation is a type of offensive operation following a successful attack to disorganize the enemy in depth. Exploitations seek to disintegrate enemy forces to the extent that they have no alternative but surrender or retreat. Exploitations take advantage of tactical opportunities. Division and higher echelon headquarters normally plan exploitations as branches or sequels to current operations. See chapter 6 for more information on exploitation. Pursuit 3-7. A pursuit is a type of offensive operation to catch or cut off a disorganized hostile force attempting to escape, with the aim of destroying it. Pursuits entail rapid movement and decentralized control. Pursuits require the pursuing force to retain more mobility than the enemy force. Any offensive operation can transition into a pursuit if enemy resistance breaks down and enemy forces flee. Pursuits generally follow successful exploitations with the purpose of completing the destruction of enemy forces before they can reorganize. There are two variations of pursuits: * Frontal. * Combination. See Chapter 7 for more information on pursuit. COMMON OFFENSIVE PLANNING CONSIDERATIONS 3-8. The widespread application of highly accurate and lethal weapons, the high degree of tactical mobility, ever-present sensors, and a complex operational environment all characterize contemporary combined arms warfare. Units have a higher probability of tactical success when they can first visualize the battlefield, understand the implications of existing friendly and enemy dispositions, and take effective action to impose their will on the situation. The planning considerations for the offense also apply to the defense with situationally appropriate modifications. 3-9. Only a determined offense, conducted at a high tempo and to great depth, attains the enemy force’s destruction. The attacker’s principal advantage is that it possesses the initiative. Maintaining the initiative allows units to engage the enemy at the time, and in a manner of their choosing. Attacking units have the time and opportunity to develop a plan and to concentrate the effects of subordinate forces and combat enablers to create conditions for success. Units strike the enemy in unexpected ways at unexpected times and places. They focus on attacking the right combination of targets, not necessarily the biggest or the closest. These attacks are rapidly and violently executed, unpredictable, and seek to disorient enemy forces. 3-10. Attacking units maintain tempo by rapidly following up on attacks throughout the depth of the battlefield to keep enemy forces off-balance and deny them the ability to recover. Friendly forces develop flexible plans that allow them to take advantage of opportunities to maintain the initiative and dictate the tempo of operations against the enemy. Due to the intensity and high pace of offensive operations, units take proactive measures to prevent early culmination prior to accomplishing their assigned mission. The tempo of friendly operations must be fast enough to prevent effective counteraction and attacking units change their means and methods before enemy forces can adapt to them.
3-90
92
Chapter 3 3-11. Table 3-2 illustrates some of the common control measures used during offensive operations. Additionally, paragraphs A-6 through A-61 define and discuss common offensive control measures used to synchronize the effects of combat power. Units use the minimum control measures required to complete their missions while providing subordinates the flexibility needed to respond to changes in the situation while preventing fratricide. Table 3-2. Common offensive control measures Common offensive control measures Assault positions Checkpoints Probable line of contact Assault time Direction of attack Probable line of deployment Assembly areas Final coordination line Objectives Attack by fire positions Limit of advance Objective rally point Attack position Line of departure Support by fire position Axis of advance Phase lines Time of attack Battle handover line Point of departure Zone 3-12. Line of sight overlays help protect the force by identifying intervisibility lines, where units cannot make visual and direct fire contact. An enemy force will have difficulty engaging friendly forces with direct fire weapons without line of sight. Situation templates also help protect the force. If units know how fast an enemy force can respond to their actions, they can sequence operations so they occur at times and places where an enemy force cannot respond effectively. Units calculate enemy response times by determining enemy artillery range fans, movement times between enemy reserve assembly area locations and advancing friendly forces, and other related intelligence items. COMMAND AND CONTROL WARFIGHTING FUNCTION 3-13. Synchronizing the six warfighting functions through planning and preparation increases a unit’s effectiveness when executing operations. However, the fluid nature of combat requires leaders to orchestrate the actions of subordinates during the execution phase. Leaders determine where they can best affect the flow of operations and influence critical events by redirecting the effects of committed forces, changing priorities of support, or employing echelon reserves. This redirection normally means that units are well forward in the echelon’s formation, usually with the force designated to conduct the main effort or at a location where a key decision or task must be accomplished to enable the success of the main effort. Examples of key tasks or decisions can include the execution of a forward passage of lines or a wet-gap crossing. Once the unit conducting the main effort makes contact with the enemy, friendly forces quickly move to where they best can assess the situation and direct the continuation of offensive operations. 3-14. At battalion and above, units anticipate requirements to shift the main effort during an offense to press the battle and keep enemy forces off balance. They develop decision points to support these changes using both human and technical means to validate decision points. 3-15. In addition to assigning objectives and identifying decision points, leaders at all echelons consider how to exploit advantages that arise during operations and the seizure of intermediate and final objectives. Leaders exploit success by aggressively executing the plan, taking advantage of subordinate initiative, and employing trained units capable of rapidly executing standard drills. The echelon reserve also provides a flexible capability to exploit unforeseen advantages. 3-16. Units maintain communications and comprehensive throughput of information among all units throughout the offense. They plan how to position and reposition command and control systems to help control operations. Units plan how to expand the communications coverage to accommodate increased distances and enemy efforts to deny friendly communications systems as the unit advances. Units provide for redundant communication means. 3-17. A unit maintains its common operating picture throughout an operation. For a common operating picture to aid a unit in maintaining situational awareness, the unit requires timely and frequent updates of relevant information. All echelons report information on the disposition and activities of friendly and enemy forces.
3-90
93
The Offense 3-18. A well-trained unit with rehearsed standard operating procedures, augmented with digital systems, enjoys reduced engagement times and an enhanced planning process. This enhances its ability to control the tempo of the battle and stay ahead of the enemy’s decision cycle. Greatly improved knowledge of enemy and friendly situations facilitates the employment of fires and maneuver at extended ranges. Such knowledge also enhances friendly forces’ freedom to move to those battlefield locations that best enable their ability to influence the battle or engagement at the critical time and place. MOVEMENT AND MANEUVER WARFIGHTING FUNCTION 3-19. Attacking units maneuver to avoid enemy strengths and to seek positions of relative advantage that they can exploit to accomplish their mission. They seek to overwhelm enemy forces with one or more unexpected attacks before enemy forces have time to react in an organized fashion. Echelon security forces prevent an enemy force from discovering friendly dispositions, capabilities, and intentions, or from interfering with the preparations for the attack. Finally, units maneuver to close with and destroy enemy forces by close combat and shock effect. Close combat is warfare carried out on land in a direct-fire fight, supported by direct and indirect fires and other assets (ADP 3-0). Close combat encompasses all actions that place friendly forces in immediate contact with enemy forces where units use direct fire and movement in combination to defeat or destroy enemy forces or to seize and retain ground. 3-20. The forward movement of subordinate units is critical to the unit maintaining the initiative necessary for successful offensive actions. By maintaining a high tempo, units deny enemy forces a chance to plan, prepare, and execute an effective response to friendly offensive actions. This is a key way to ensure the survivability of the force. Techniques for maintaining a high offensive tempo include using multiple routes, dispersion, highly mobile forces, piecemeal destruction of isolated enemy forces, scheduled rotation and relief of forces before they culminate, and the wise use of terrain. The exact techniques employed in a specific situation must address the mission variables. 3-21. Units can overwhelm an enemy force by seizing and retaining key and decisive terrain early. Key terrain is an identifiable characteristic whose seizure or retention affords a marked advantage to either combatant (ADP 3-90). When present, decisive terrain is key terrain whose seizure and retention is mandatory for successful mission accomplishment (ADP 3-90). If decisive terrain is present, commanders designate it to communicate its importance to their concept of operations. A friendly force must control decisive terrain to accomplish its mission. (See ADP 3-90 and ATP 2-01.3 for more information on key terrain.) INTELLIGENCE WARFIGHTING FUNCTION 3-22. Units use available information collection assets to study the terrain and confirm or deny the enemy force’s strengths, dispositions, and likely intentions, especially where and in what strength the enemy force defends. Indications of the location and composition of obstacles and the positioning of engineer assets may be key in determining where and when an enemy force defends. These assets also gather information concerning the civilian population within an assigned area to confirm or deny their numbers, locations, and likely intentions, especially with regard to staying in shelters or fleeing from combat operations. 3-23. By studying the terrain, units try to determine the principal mounted and dismounted avenues of approach to their objectives. They also try to determine the most advantageous areas for the enemy’s main defense, routes that enemy forces may use to conduct counterattacks, and other factors, such as observation and fields of fire, avenues of approach, key terrain, obstacles, and cover and concealment (known as OAKOC). Attacking units continuously conduct information collection (reconnaissance, surveillance, intelligence operations, and security operations) during their offensive actions because it is unlikely that they have complete knowledge of the enemy force’s intentions and actions. 3-24. Commander’s critical information requirements in the offense commonly include three to five focuses such as— * Locations, composition, equipment, strengths, and weaknesses of the enemy force, to include high-value targets and enemy reconnaissance and surveillance capabilities. * Location of unmanned aircraft system ground control stations and launch and recovery sites. * Probable locations of enemy reconnaissance objectives.
3-90
94
Chapter 3 * Locations of possible enemy assembly areas. * Locations of enemy indirect fire weapons systems and units. * Locations of gaps, assailable flanks, and other enemy weaknesses. * Locations of areas for friendly and enemy air assault and parachute assault operations. * Locations of enemy air defense gun and missile units and air defense radars. * Locations of enemy electromagnetic warfare units. * Effects of weather and terrain on current and projected operations. * Information related to areas, structures, capabilities, organizations, people, and events (known as ASCOPE) about civilians located within the unit’s assigned area. * Likely withdrawal routes for enemy forces. * Anticipated timetable schedules for the enemy force’s most likely course of action and other probable courses of action. * Locations of enemy command and control and intelligence nodes, reconnaissance and surveillance systems, and the frequencies used by the information systems linking these systems. * Locations of enemy sustainment assets. * Location of reserves, reserves movement routes, indications of enemy main effort, and indicators driving friendly force commander’s decisions. 3-25. If friendly information collection assets cannot answer the commander’s information requirements, units can commit additional internal resources, decide to execute the offense with the current information, or request additional information collection support from information to higher echelon and adjacent units. 3-26. The intelligence preparation of the battlefield process assists the units in the offense with— * Identification of key terrain features, and manmade and natural obstacles. * Trafficability and cross-country mobility analysis. * Line of sight overlays. * Situation templates. FIRES WARFIGHTING FUNCTION 3-27. The coordinated use of indirect fires and joint fires enable units to gain and maintain fire superiority throughout all offensive actions. Units use various methods and assets to achieve the desired effects on targeted enemy forces and thereby enable friendly maneuver. This includes Army indirect systems and joint fires. Army Fire Support 3-28. Indirect fire assets provide units with options for gaining and maintaining fire superiority. Fire superiority are the dominating fires of one force over another force that permits that force to maneuver at a given time and place without prohibitive interference by the other. They use long-range artillery systems (both cannon and rocket) along with rotary- and fixed-wing aircraft to engage enemy forces throughout the depth of the enemy’s positions. 3-29. Fire support planning is the continuing process of analyzing, allocating, and scheduling fires. It determines how fires are used, what types of targets to attack, what collection assets units use to acquire and track those targets, what assets they use to attack targets, and what assets verify effects on these targets. This planning does not stop at the objective or the limit of advance. Units give attention to flanks and potential enemy hide positions. Coordination among echelon fire cells and the proper use of fire support coordination measures are critical to prevent fratricide. Units plan to employ available fires to delay or neutralize repositioning enemy forces to include enemy reserves. They also use fires to suppress, neutralize, or destroy those enemy forces and systems that can most affect their units’ closure on their objectives. Units establish triggers for the initiation, shifting, and lifting of fires based on the mission variables. 3-30. The fire support coordinator (known as FSCOORD), or chief of fires depending on the echelon, integrates fires into the unit’s scheme of maneuver. Fire support coordinators plan the appropriate fire support for their unit. These fires can be time or event driven. The fire support coordinator plans fires on known and
3-90
95
The Offense likely enemy positions, which may include templated enemy positions. Successful massing of indirect fires and fixed-wing attacks requires a fire cell that can proficiently track friendly indirect fire asset positions and movements and that knows the various systems effective fire ranges. It also requires a tactical air control party proficient in the timely execution of close air support. 3-31. Units must weigh the probable effects of preparation fires against achieving a greater degree of surprise against enemy forces. Friendly fires always run the risk of receiving counter fires. Units balance this risk with the requirements of the mission to determine whether to employ preparation fires. They may decide to employ terminally guided munitions to destroy select high-payoff targets or use these munitions in mass against part of the enemy defense to facilitate a breach and negate the requirement for long-duration preparation fires by using area fire munitions. 3-32. Units may choose to make an initial assault without using preparation fires to achieve tactical surprise. However, they always plan fires to support their units’ operations so that they are available if needed. Preparation fires are normally high-volume fires delivered over a short period to maximize surprise and shock effect. These preparation fires also include the conduct of electromagnetic warfare and cyber operations. Preparation fires can continue while ground maneuver elements are moving. This consideration applies to the conduct of all offensive operations. 3-33. Artillery and mortars must occupy positions that are well forward and still within supporting range of the flanks of maneuver forces to provide responsive indirect fires. Units consider the effect that movement by echelon or battery has on the amount of fire support available. They should support the unit’s main effort with priority of fires. If the operation contains phases, the main effort generally has priority of fires. Units place coordinated fire lines (CFLs) as close as possible to friendly maneuver forces and plan on-order CFLs on phase lines so that those CFLs can quickly shift as their forces advance. This allows the rapid engagement of targets beyond the CFL by the maximum number of available systems. Units establish critical friendly zones to protect critical actions, such as support-by-fire positions and breaching efforts. 3-34. Linking Army forward observers, joint fires observers, and target acquisition assets to quick fire or exclusive networks also provides responsive fires. Responsive fire networks allow the lead observers to communicate directly with specific field artillery or mortar fire units. These kinds of communication arrangements enhance responsiveness through streamlined network structures and focused priorities. Communications planning should also include the need for communications networks for the clearing of targets for rotary- and fixed-wing attacks. 3-35. Units employ information capabilities to support the offense. As friendly forces move through the enemy force’s disruption zone and close into the enemy’s main battle zone, electromagnetic warfare jamming resources concentrate on neutralizing enemy fire control, target acquisition, unmanned systems control nodes, and information collection systems. They use military deception to prevent the enemy force from determining the location and objective of the friendly main effort. In addition, intelligence sensors continue to provide combat information and guidance to both friendly jammers and lethal indirect fire weapon systems, so attacking units can destroy enemy command and control nodes, reconnaissance and surveillance assets, artillery, and other high-payoff targets. Units synchronize the timing and conduct of these offensive actions, so they achieve maximum effectiveness. Joint Fires 3-36. Joint fires assist ground forces in shaping operations. Joint fires are fires delivered during the employment of forces from two or more components in coordinated action to produce desired effects in support of a common objective (JP 3-0). The principles in the application of joint fires are generally the same between offensive, defensive, and enabling operations. Joint surface-to-surface fires include— * Army indirect fire, cyber, and electromagnetic warfare assets tasked with supporting Air Force, Navy, or Marine Corps operations. * Navy missile and naval gun fire, cyber, and electromagnetic warfare assets supporting Army units. * Marine Corps indirect fire assets supporting Army units.
3-90
96
Chapter 3 Joint air-to-surface fires include— * Army rotary-wing or UAS supporting Air Force, Navy or Marine Corps operations. * Navy and Air Force fixed-wing, and electromagnetic warfare assets. * Marine Corps fixed- or rotary-wing or UAS supporting Army units. See JP 3-09, ADP 3-19, FM 3-09, and ATP 3-09.32/MCRP 3-31.6/NTTP 3-09.2/AFTTP 3-2.6 for information on joint fires. SUSTAINMENT WARFIGHTING FUNCTION 3-37. Offensive operations will require more reinforcements, fuel, medical, equipment, and materiel compared to defensive and enabling operations. Also, offensive operations increase the likelihood of generating mass casualties and replacing personnel and equipment. Offensive operations require greater precision in sustainment and will be executed at a higher operating tempo than other types of operations. This requires a flexible and adaptable sustainment structure to meet the demands of offensive operations. In the offense, the sustainment focus is on logistics and health service support. Proper echeloning of logistics and medical assets are key to maintaining tempo and minimizing risk in offensive operations. Logistics 3-38. Logistic units and material remain close to the maneuver force to ensure short turnaround time for supplies and services. This includes uploading as much critical materiel, such as ammunition and petroleum, oils, and lubricants, as possible and coordinating to preclude attempted occupation of a logistics release point by more than one unit at a time. This allows units to reduce risk by lowering their physical and electronic signature during resupply operations. Units make decisions regarding the risk of enemy detection of logistics preparations for an attack. 3-39. Responsive sustainment of the offense begins during mission analysis and continues throughout the operation based on the expertise of the planners and the preparation and agility of the sustainment units during execution as the potential for supplies to not be available increases as the operation progresses. Logisticians must assist with the development of feasible courses of action during planning and anticipate changes of requirements during execution. They must consider alternative routes and different means to accomplish the timely delivery of the required support and they must provide their leaders with options to overcome whatever obstacles appear. The laws of physics constrain the art of the possible, but ingenuity and innovation can deliver solutions to problems that appear insurmountable. 3-40. The variety and complexity of offensive actions requires that units establish flexible and tailorable transportation systems. There may be a wide dispersion of forces and lengthening of lines of communication. Required capabilities include movement control, terminal operations, and mode operations. 3-41. Units need to closely monitor emerging resupply and rearm requirements in conjunction with ongoing operations. The prioritization of the requirements must be thought out and appropriate for the units with follow-on missions, rather than units that are most depleted in conjunction with the potential shift in mission priorities as the operation progresses. Health Service Support 3-42. The burden on medical resources increases due to the intensity of offensive actions and the increased distances over which support is required as a force advances. The unit re-allocates medical resources as the tactical situation changes. Medical units can anticipate large numbers of casualties in a short period due to destructive capabilities of modern conventional weapons and the employment of weapons of mass destruction. These mass casualty situations can exceed the capabilities of organic and direct support medical assets to treat the numbers of casualties sustained. To prevent this from occurring, planners anticipate this possibility and coordinate with area support medical units to help absorb a rise in battlefield injuries. Careful planning and coordination avoid compromising the standard of medical care for injured Soldiers. Effective management of mass casualty situations depends on established and rehearsed mass casualty plans and
3-90
97
The Offense detailed medical planning. Units consider several other variables that ensure the success of mass casualty response plans. These include, but are not limited to— * The coordination and synchronization of additional medical support or augmentation, such as medical evacuation support, forward resuscitative surgical intervention provided by forward resuscitative and surgical detachments, combat support and field hospitals, casualty collection points, ambulance exchange points, and established Class VIII resupply. * Quick location and evacuation of injured personnel from the battlefield. * Providing effective tactical combat casualty care and emergency medical treatment for injured personnel. * Continuous flow of casualties to medical treatment facilities at the next higher role of care. * Use of casualty evacuation assets when the number of casualties overwhelms the capacity of the medical evacuation system. * Accurate triage and rapid medical evacuation of injured personnel to medical treatment facilities at the next higher role of care. * Planning of MEDEVAC routes (ground and air) along with contingencies during times of hazardous trafficability. * MEDAVAC capacity is rarely sufficient, and units must designate casualty evacuation capability within their formations. PROTECTION WARFIGHTING FUNCTION 3-43. Protection prevents or mitigates detection, threat effects, and hazards to preserve combat power and enable freedom of action. To help preserve the force, units ensure they address all protection tasks during the unit’s planning, preparation, and execution, while also constantly assessing the effectiveness of those protection tasks. In the offense, protection is applied carefully and selectively to ensure that it does not hinder a unit’s freedom of action. This is accomplished through protection integration and synchronization where and when significant threats and hazards are projected in the offensive plan. The fluidity and rapid tempo of the offense poses challenges when protecting friendly assets to deny enemy forces the ability to interfere with friendly force operations. 3-44. Protection is a key consideration at every echelon and all military activities have some inherent or organic protection capability (such as survivability, antiterrorism measures, local security). Higher echelons employ protection systems to enable lower echelon maneuver and deny enemy forces the ability to interfere with subordinate forces’ ongoing operations. Lower echelons use reconnaissance and security forces to protect forward maneuver forces and exposed flanks. At the lowest tactical levels, units use deception, cover, concealment, and dispersion to counter threat capabilities and preserve critical capabilities, assets, and activities. (See ADP 3-37 for information on protection tasks). Air and Missile Defense 3-45. A ground force’s primary air defense systems are its organic weapons to defend against short-range air threats, supported by joint fighter aircraft conducting offensive and defensive counterair operations. The joint force may not have air superiority or even air parity. Units weigh the air threat with their ability to mitigate the threat when considering options for offensive operations. During offensive actions, units direct the positioning of available organic or supporting radars in those locations where they can best initially support the unit’s attack. The selection of those positions reflects a risk assessment designed to preclude their early loss to enemy action. The air defense airspace management (known as ADAM) cell in the echelon staff communicates with the appropriate air and missile defense (AMD) command post. That AMD command post provides additional information to the supported unit to expand the fidelity of the air picture, including information on engaged air threats by the joint force air component unit, Army Patriot air defense systems, and short-range air defense. The attacking unit concentrates on conducting passive protection measures during its offensive actions. If attacked by enemy aerial systems in assembly areas, attack positions, or while moving, the unit disperses and conducts small-arms air defense. Units at each echelon establish air defense priorities based on the concept of operations, scheme of maneuver, air situation, and air defense priorities established by higher headquarters. If units have Army air defense systems supporting their attack, they generally weight that coverage toward their main efforts and establish protective corridors over terrain
3-90
98
Chapter 3 traversed by subordinate units conducting that operation. Command of all air defense assets requires complete and timely communications to ensure proper weapon status for the protection of friendly air support assets. 3-46. Protection measures are an essential part of air and missile defense planning at all levels. All units conduct passive actions in conjunction with their missions. Passive actions reduce the effectiveness of the enemy air threat. 3-47. Tactical air defense support focuses on— * Enemy UAS. * Enemy rotary-wing aircraft. * Enemy fixed-wing aircraft. Survivability 3-48. All units have an inherent responsibility to improve their positions and take proactive measures to protect their forces, whether they are in an assembly area or maneuvering. Survivability operations consist of three areas designed to focus efforts on mitigating friendly losses to hostile actions or environments: providing or improving cover, concealment, and camouflage. Units normally consider the impact of constructing protective emplacements for artillery and sustainment concentrations as part of the planning process. Units do not employ protective positions in the offense as extensively as they do in the defense. Such terrain modifications may require significant amounts of time, making them impractical for protecting assets that must frequently move to keep pace with operations. However, units may require the hardening of key command and control facilities, especially those with detectable electronic signatures. Maneuver units construct hasty fighting positions as soon as possible when they halt or pause during the conduct of offensive operations. Forces conducting offensive actions continue to use camouflage, cover, concealment, survivability moves, maximum existing terrain, obscuration, and deception. Explosive Ordnance Disposal 3-49. Explosive ordnance disposal units assess and render safe hazards to protect the force. These elements can dispose of all explosive hazards to include foreign or U.S. ammunition, unexploded ordnance, mines, and CBRN munitions. Engineers identify, breach, and clear minefields. Explosive ordinance disposal forces render safe explosive hazards that restrict unit freedom of movement or deny access to or threaten critical assets or operations. (See ATP 4-32 for more information on explosive ordinance disposal operations.) Coordinate Air and Missile Defense 3-50. Air and missile defense assets during an offensive operation can provide vital protection from air threats and contribute to the freedom of maneuver by friendly forces. Units coordinate and synchronize air and missile defense assets for coverage over maneuver forces and their critical assets, to include denying surveillance by threat aerial platforms. Air and missile defense assets also protect forward-based infrastructure—such as lines of communications and command nodes—from aerial attack, determine and predict reporting ballistic missile launch points and impact points, and provide early warning and surveillance. 3-51. Unit protection cell planners coordinate with the unit air and defense airspace management cell for AMD to protect the unit’s prioritized protection list, ensuring the protection of critical assets and forces from enemy air attack, missile attack, and surveillance. 3-52. AMD assets integrate protective systems by using the six employment guidelines—mutual support, overlapping fires, balanced fires, weighted coverage, early engagement, and defense in depth—and additional considerations necessary to mass and mix AMD capabilities. These employment guidelines enable air defense artillery forces to successfully accomplish combat missions and support overall force objectives. Risk Management 3-53. The likelihood of fratricide increases during offensive operations compared to defensive operations. During offensive operations, friendly forces maneuver towards enemy forces, while another friendly force
3-90
99
The Offense gains fire superiority. The convergence of friendly forces at the decisive point is the riskiest part of any offensive operation. 3-54. During offensive operations, various briefs and rehearsals are the primary tools for reducing risk identified during planning and preparation. The types of risks identified assist in determining the type of rehearsal conducted. Rehearsals should extend to all levels of command and involve all key players. 3-55. Risk management considerations during offensive operations include— * Confirmation briefs to ensure leaders understand their assigned mission and key tasks. * Backbriefs to ensure subordinates’ course of actions meets their higher echelons commander’s intent. * Rehearsals to ensure shared understanding between units and refine applicable control measures to synchronize operations. 3-56. The following factors may reveal risks during rehearsals: * Types of rehearsals such as combined arms or fires rehearsals. * Training and proficiency levels of units and individuals. * The habitual relationships between units conducting the offensive operation. * The physical readiness of the troops conducting the offensive operation. Area Security 3-57. Area security operations typically support offensive operations by ensuring the continual conduct of sustainment operations that generate and maintain combat power to maintain tempo and extend operational reach. Additionally, area security operations allow units to provide protection to critical assets without a significant diversion of combat power. During the offense, various military organizations may be involved in conducting area security operations in an economy-of-force role to protect lines of communications, convoys, or critical fixed sites and radars. Bases and base camps employ local security measures (including explosive ordnance disposal, assessments and recommendations, random antiterrorism measures, and increased force protection conditions) but may be vulnerable to enemy or adversary remnant forces requiring a response that is beyond base camp capabilities. In support areas, units conduct area damage control to prevent and respond to the negative effects of enemy or adversary action that can diminish combat power. TRANSITIONS 3-58. Units transition from offensive operations only when they result in complete victory and the end of hostilities, reach a culminating point, or receive a change in mission from a higher unit. Generally, units in the offense transition to the defense or stability. All offensive actions that do not achieve complete victory reach a culminating point for a variety of reasons, such as when— * Initiative shifts from the attacking force to the enemy. * Friendly forces encounter heavily defended areas that they cannot bypass. * Fuel, ammunition, and other supplies fail to keep up with expenditures. * Soldiers become physically exhausted. * Casualties and equipment losses become too much for an organization to handle. * Repairs and replacements do not keep pace with damage and losses. * Reserves or follow-on forces are not available to continue the advance. * Enemy reinforcements attack, or the defender counterattacks with fresh troops. Several of these causes may combine to halt an offense. In some cases, the unit can regain its momentum, but this only happens after difficult fighting or an operational pause. 3-59. Transitions do not just occur between offense, defense, and stability operations. During offensive operations it may be necessary, or planned, for units to execute a short halt to operations without necessarily executing a transition. An example would be a unit executing a short halt in an assault position prior to maneuvering during an attack. The halt, or tactical pause, should be as brief as possible to ensure the unit does not lose momentum.
3-90
100
Chapter 3 3-60. Units anticipate the reasons listed in paragraph 3-58, plan a pause to replenish combat power, and phase their operations accordingly before subordinate forces reach their culminating points. Simultaneously, units attempt to prevent enemy forces from knowing when friendly forces become overextended. TRANSITION TO DEFENSIVE OPERATIONS 3-61. Once offensive actions begin, the attacking unit tries to sense when subordinates reach, or are about to reach, their culminating points. Before they reach them, units transition to a focus on defensive operations. They have more freedom to choose where and when to halt an attack if they sense that subordinate forces are approaching culmination. Units plan future activities to aid the defense, minimize vulnerability to attack, and facilitate renewal of the offense as the force transitions to branches or sequels of ongoing operations. For example, to prevent overburdening the extended LOCs that units should manage when and how they begin to transition to prevent a LOC bottleneck. 3-62. Units anticipate the ending of unit offensive actions by preparing branches and sequels and transmitting them to subordinates via orders. These orders include the time or circumstances under which the current offense transitions to a defensive operation, the missions and locations of subordinate units, and control measures. As units transition from an offensive focus to a defensive focus, they— * Maintain contact and surveillance of enemy forces by combining reconnaissance units and surveillance assets to develop the information required to plan future actions. * Establish a security area and local security measures. * Position artillery assets to ensure the support of security forces. * Position forces for probable future employment. * Maintain or regain contact with adjacent friendly units in a contiguous assigned area and ensure that units remain capable of mutual support in a noncontiguous assigned area. * Transition engineer effort by shifting emphasis from mobility to countermobility and survivability. * Consolidate and reorganize. * Explain the rationale for transitioning from the offense to their Soldiers. * Emplace protective obstacles. * Resupply with fuel and ammunition. * Occupy defensible terrain. 3-63. Units reorganize and resupply during transitions. This requires a transition in the sustainment effort with a shift in emphasis from ensuring the force’s ability to move forward to ensuring the force’s ability to defend on its chosen location (by increasing forward stocks of construction, barrier, and obstacle material and ammunition). A transition is often a time when units can perform equipment maintenance. Additional assets may also be available for casualty evacuation and medical treatment because of a reduced tempo of operations. 3-64. Units should not wait too long to transition from the offense to the defense as subordinate forces approach their culminating points. Without prior planning, transitioning to defensive actions after reaching a culminating point is extremely difficult. There are several reasons for this: * Defensive preparations are hasty, and forces are not adequately disposed for the defense. * Defensive reorganization requires more time than an enemy force may allow. * Usually attacking forces approaching culmination find themselves dispersed across the width and depth of their assigned areas with reduced combat power. * The shift to the defense requires a psychological adjustment. Soldiers who have become accustomed to advancing must now halt and operate defensively on new and often unfavorable terms. 3-65. Units can use two techniques when transitioning to a defensive operation. The first technique is for the leading elements to commit forces and push forward to claim enough ground to establish a security area anchored on defensible terrain. A security area is that area occupied by a unit’s security elements and includes the areas of influence of those security elements (ADP 3-90). The main force moves forward or rearward as necessary to occupy key terrain and institutes a hasty defense that progresses into a deliberate defense as time
3-90
101
The Offense and resources allow. The second technique is to establish a security area generally along the unit’s final positions, moving the main body rearward to defensible terrain. The security force thins out and the remaining force deploys to organize the defense. In both methods, the unit keeps the security area with the appropriate depth to enable dispersion and minimize early threat acquisition of friendly positions. 3-66. In the first technique, the security area often lacks depth because the force lacks sufficient combat power to seize required terrain. In the second technique, enemy forces may accurately template the forward trace of friendly units and engage with artillery and other fire support systems. These actions often result in the loss of additional friendly Soldiers and equipment and expend more resources. 3-67. If units determine the necessity of terminating an offense and conducting a retrograde, typically subordinate units initially conduct an area defense from their current locations. This lasts until their units can synchronize their activities to conduct retrograde operations. The amount of effort expended in establishing an area defense depends on the mission variables. TRANSITION TO STABILITY 3-68. The end of focused offensive operations may not be the decisive act. The successful performance of stability tasks may be the main effort in a major operation or campaign. Units and staffs plan the transition to focus on the conduct of stability tasks from the conduct of offensive operations. To assist in this transition to stability-focused operations, units continuously consolidate gains. Units consider activities necessary to consolidate gains while seeking to achieve their end state. It is the final exploitation of tactical success.
3-90
103
Chapter 4 Movement to Contact This chapter discusses movement to contact beginning with its general considerations. It then discusses organization, control measures, and conducting a movement to contact. It then discusses two variations of a movement to contact: search and attack and cordon and search. Lastly, it talks about transitioning from a movement to contact to another type of offensive or defensive operation. GENERAL CONSIDERATIONS FOR A MOVEMENT TO CONTACT 4-1. A movement to contact is a type of offensive operation designed to establish or regain contact to develop the situation. Units perform a movement to contact when the tactical situation is unclear, or the enemy force succeeds in breaking contact with friendly forces. A properly executed movement to contact develops the situation and maintains the unit’s freedom of action after establishing contact with the enemy. This is essential in maintaining the initiative and achieving a position of advantage. Movement to contact allows units to create conditions for subsequent operations. Once contact is made with an enemy force, the friendly force quickly transitions either to an attack, a hasty defense, or bypasses enroute to their objective. 4-2. An enemy force’s use of terrain, operations security, and military deception operations can degrade the friendly forces situational understanding and require small tactical units to conduct movements to contact. A movement to contact employs purposeful and aggressive movement, decentralized control, and the hasty deployment of combined arms formations from the march. The fundamentals of a movement to contact are— * Focus all efforts on finding enemy forces. * The initial contact force should be small, mobile, self-contained, and avoid becoming decisively engaged by the enemy’s main body. * Task-organize the force and use movement formations and battle drills to deploy and attack rapidly in any direction. * Keep subordinate forces within supporting distances to facilitate gaining and maintaining contact. * Upon gaining contact, maintain that contact regardless of the course of action (COA) adopted. * Close air support, air interdiction, and counterair operations are essential to the success of large- scale movements to contact. Local air superiority or, at a minimum, air parity is vital to the operation’s success. 4-3. A movement to contact increases the odds of a unit executing a meeting engagement. A meeting engagement is a combat action that occurs when a moving force engages an enemy at an unexpected time and place. The enemy force encountered may be either stationary or moving. A meeting engagement does not require both forces to be surprised. The force making unexpected contact is the one conducting a meeting engagement. Such encounters often occur in small-unit operations when reconnaissance has been ineffective. The force that reacts first to the unexpected contact generally gains an advantage over its enemy. 4-4. A meeting engagement may also occur when opponents are aware of each other, and both decide to attack to obtain a tactical advantage. Additionally, a meeting engagement may occur when one force attempts to deploy into a hasty defense while the other force attacks before its opponent can organize an effective defense. No matter how the force makes contact, seizing the initiative is the overriding imperative. Prompt execution of battle drills at platoon level and below, and standard actions on contact for larger units, can give that initiative to the friendly force.
3-90
104
Chapter 4 ORGANIZATION OF FORCES FOR A MOVEMENT TO CONTACT 4-5. At a minimum, a movement to contact is organized with forward security forces—either a covering force or an advance guard—and a main body. The reserve, fires, engineer, and sustainment assets are included in the main body. Based on the mission variables, commanders may increase their unit’s security by resourcing an offensive covering force and an advance guard for each column, as well as flank and rear security. Figure 4-1 depicts a generic organization of forces for a movement to contact. Figure 4-1. Organization of forces for a movement to contact 4-6. Initiating a movement to contact requires units to be out of contact with the enemy main body. However, units may have enough information to target enemy reconnaissance assets, uncommitted forces, reserves, or sustaining operations activities. Commanders normally designate forces, such as long-range artillery systems and fixed-wing aircraft to engage known enemy elements within their assigned area. The forward security element is critical to the protection of the main body and enables units to make contact on their terms. FORWARD SECURITY FORCES 4-7. Units conducting a movement to contact can organize their security force as an advance guard force, a covering force, or both. This provides the main body with early warning, protects the movement of the main body, and develops the situation before committing the main body. A guard force is a force that contains sufficient combat power to defeat, cause the withdrawal of, or fix the lead elements of an enemy ground force before it can engage the main body with direct fire. A covering force is a self-contained force capable of operating independently of the main body, unlike a guard force to conduct the cover task. This covering force accomplishes the same effect as a guard and reports directly to the establishing commander. 4-8. Each element of the force synchronizes its actions with adjacent and supporting units, maintaining contact and coordination as prescribed in orders and unit SOPs. The lead elements of the main body maintain contact with the security force. The rear and flank security elements maintain contact with and orient on the main body’s movement. These security forces prevent unnecessary delay in the movement and premature
3-90
105
Movement to Contact deployment of the main body as long as possible. Commanders may instruct the advance guard to eliminate small pockets of resistance bypassed by the covering force (if both are used). The conduct of the security forces in the movement to contact are the same as those for security operations. (See Chapter 13 for additional information on security operations.) MAIN BODY 4-9. A main body consists of forces not assigned to security duties. It normally includes the maneuver forces conducting the main effort once contact is made with the enemy as well as fires, engineer, and sustainment assets to support the operation The combat elements of the main body prepare to respond to enemy contact that the unit’s security forces make. If the situation allows, commanders can assign a follow and support mission to a subordinate maneuver unit. This allows that subordinate unit to relieve security forces and perform tasks such as containing bypassed enemy forces, handling dislocated civilians, and clearing routes. Security forces can then continue their primary mission. 4-10. Units frequently find that their main supply routes (MSRs) become extended as operations proceed. Aerial resupply may be necessary to support large-scale movement to contacts or to maintain the momentum of the main body. Combat trains containing fuel, ammunition, medical assets, and maintenance assets move with their supported battalion or company team. Fuel and ammunition stocks remain loaded on tactical vehicles in the combat trains so they can quickly move when necessary. Battalion field trains move with a higher support echelon, such as the brigade support battalion, in the main body of each BCT. Aviation units use forward arming and refuel points (known as FARPs) to reduce aircraft turnaround time. RESERVE 4-11. Commanders designate a portion of the main body for use as the reserve. The mission variables determine the size of the reserve, and the more unknown the enemy situation, the larger the size of the reserve. On contact with enemy forces, a reserve provides flexibility to react to unforeseen circumstances and allows a unit to resume its movement. See paragraphs 1-94 through 1-100 for more information on the reserve. COMMON CONTROL MEASURES FOR A MOVEMENT TO CONTACT 4-12. Units use the minimal number and type of control measures possible in a movement to contact because of the uncertain enemy situation. These measures include designation of an assigned area with left, right, front, and rear boundaries, or a separate assigned area bounded by a continuous boundary in noncontiguous operations. Commanders further divide their assigned area into subordinate unit assigned areas to facilitate subordinate unit actions. 4-13. A movement to contact usually starts from a LD at the time specified in the operation order. Commanders control a movement to contact by using phase lines, contact points, and checkpoints as required. They also control the depth of the movement to contact by using a LOA or a forward boundary. Figure 4-2 on page 4-4 depicts example common movement to contact control measures and also depicts a limit of advance and not a forward boundary. Commanders can designate one or more objectives to limit the extent of a movement to contact and orient the force. However, these are often terrain oriented and used only to guide movement. Although a movement to contact may result in taking a terrain objective, the primary focus should be on gaining contact with enemy forces and developing the situation. If a unit has enough information to locate significant enemy forces, then it should plan an attack. 4-14. Commanders use boundaries to separate the various organizational elements and clearly establish responsibilities between different organizations. They synchronize the movement to contact with control measures, battle drills, and formation discipline.
3-90
106
Chapter 4 Figure 4-2. Example movement to contact control measures 4-15. Commanders designate a series of phase lines that can successively become the new rear boundary of the forward security elements as that force advances. Each security area rear boundary becomes the forward boundary of the main body and shifts as the security force moves forward. The rear boundary of the main body designates the limit of responsibility of the rear security element. This line also shifts as the main body moves forward. Units may use an axis of advance to control movement. However, there is the risk that their forces may not detect and may inadvertently bypass enemy forces outside the axis. PLANNING A MOVEMENT TO CONTACT 4-16. Planning for a movement to contact requires units to balance competing requirements in the allocation of combat power. The first requirement is to determine an enemy force’s location and intent. The second requirement is to execute security operations to protect the main body. The main body focuses its planning and preparation on the conduct of hasty attacks, bypassing forces, and hasty defenses. The plan must address actions anticipated by the unit based on available information and anticipated times and locations of meeting engagements. Commanders also task their forward security forces with conducting route reconnaissance of routes the main body traverses. 4-17. Units seek to gain contact by using the smallest elements possible. These elements are normally ground or aerial units performing reconnaissance but may include UAS or other collection assets. Units may task- organize their reconnaissance assets with additional combat power to allow them to develop the situation. The movement formation of the main body should also make initial contact with the smallest force possible. It should provide for efficient movement of the force and adequate reserves. Commanders choose to have all, or part of the main body conduct an approach march as part of the movement to contact to provide efficiency and freedom of action to the main body. (See Chapter 14 for additional information on troop movement.) 4-18. The frontage assigned to a unit in a movement to contact must allow it to apply sufficient combat power to maintain the momentum of the operation. Reducing the frontage normally gives a unit more combat power to develop the situation upon contact while maintaining the required momentum. The forward security force should have uncommitted forces available to develop the situation without requiring the deployment of the main body. The benefits of a wider frontage include increasing the likelihood of making contact with the enemy and reducing the potential of inadvertently bypassing enemy formations.
3-90
107
Movement to Contact 4-19. Units primarily rely on fires assets to weight the lead element’s combat power, but they also provide the lead element with the additional combat enablers needed to accomplish the mission. Indirect fires system support maneuver forces to get within direct fire range and engage enemy forces. 4-20. The reconnaissance effort may proceed faster in a movement to contact than in a zone reconnaissance because the emphasis is on making contact with enemy forces. However, commanders must recognize that there is an increased risk in bypassing enemy units when increasing the speed of the reconnaissance effort. 4-21. Based on mission variables, commanders clearly state bypass criteria. For example, an armored or Stryker BCT commander in an open desert environment could state that the bypass criteria is an enemy- mounted force smaller than a platoon. The BCT clears all enemy forces larger than a mounted platoon from that brigade’s axis of advance. Any force that bypassed an enemy unit must maintain contact with it until handing it off to another friendly element, usually a force assigned a follow and support mission. See paragraph 12-27 for a discussion on bypass criteria. 4-22. The intelligence officer, assisted by engineer and air defense staff representatives, carefully analyzes the terrain, including air avenues of approach. At a minimum, the intelligence staff identifies the enemy force’s most dangerous and most likely COA in the mission analysis portion during the MDMP. Because of the force’s vulnerability, the intelligence officer must not underestimate enemy forces during a movement to contact. A thorough intelligence preparation of the battlefield (IPB) process—a modified combined obstacle overlay that includes intervisibility overlays, threat courses of action, and event templates—enhances the force’s security by indicating danger areas where the force is most likely to make contact with enemy forces. It also helps to determine movement times between phase lines and other locations. Potential danger areas are likely enemy defensive locations, engagement areas, observation posts, and obstacles. The fires system targets these areas. They become on-order priority targets placed into effect or cancelled as the lead element can confirm or deny enemy force presence. The information collection annex of the movement to contact order must address coverage of these danger areas. If reconnaissance forces cannot clear these areas, more deliberate movement techniques are required. These areas and resource shortages should be identified during the MDMP process. Resources should be reallocated, or maneuver adjusted based on the results of COA analysis. 4-23. Commanders develop decision points to support changes in the force’s movement technique or movement formation. Using human and technical means to validate decision points, commanders determine the acceptable degree of risk based on the mission. The commander’s confidence in the products of the IPB process and the acceptable risk determine the unit’s movement formation and scheme of maneuver. In a high- risk environment, it is usually better to increase the distance between forward elements and the main body than to slow the speed of advance. 4-24. Higher headquarters execute supporting operations in support of their subordinates as part of a movement to contact. This occurs when the information regarding the enemy reserves and follow-on forces is available, but information regarding enemy forces in proximity to the friendly force is not available. As in any other type of operation, units plan to focus operations on finding enemy forces and then delaying, disrupting, or destroying each enemy force before it arrives in direct fire range. This allows maneuver forces to prepare to engage enemy units on their arrival. 4-25. Commanders can opt not to designate a main effort until forces make contact with enemy forces, unless there is a specific reason to designate one. They retain resources under direct control to reinforce the main effort. Commanders may designate the main effort during the initial stages of a movement to contact because of the presence of a key piece of terrain or an avenue of approach. PREPARING A MOVEMENT TO CONTACT 4-26. The preparations for conducting a movement to contact are the same as those for an attack. (See paragraphs 5-32 through 5-46 for additional information on preparation for attacks.) The only difference is the focus on battle drills since the location and disposition of the enemy is unknown.
3-90
108
Chapter 4 EXECUTING A MOVEMENT TO CONTACT 4-27. The commander of the forward security force chooses a movement formation (based on the mission variables) and makes contact with the smallest possible force while providing flexibility for maneuver. Whatever formation the unit chooses, it must be able to deploy appropriately once it determines an enemy force’s location. The unit ensures that the route or axis of advance traveled by the main body is free of enemy forces. The main body may move continuously (using traveling and traveling overwatch) or by bounds (using bounding overwatch). It moves by bounds when contact with an enemy force is expected and the terrain is favorable. The overall commander may position some indirect fire assets, such as a mortar platoon or artillery battery and forward observers, with the forward security force. These forward observers can help overwatch the forward security force movement while indirect fires focus on suppressing enemy weapons, obscuring enemy observation posts, and screening friendly movement. 4-28. Behind the forward security force, the main body advances over multiple parallel routes with numerous lateral branches to remain flexible and reduce the time needed to initiate maneuver. (While it is preferred for a battalion to use multiple routes, battalions and smaller units can move on a singular route.) In a movement to contact, the main body’s march disposition must allow maximum flexibility for maneuvering during movement and when establishing contact with an enemy force. 4-29. The main body keeps enough distance between itself and its forward security force to maintain flexibility for maneuver. This distance varies with the echelon of command, the terrain, and the availability of information about enemy forces. The main body may execute a tactical movement for all or part of the movement to contact to use the available road network efficiently or reduce the time needed to move from one location to another. Command posts and supply trains seek routes that allow them to remain responsive throughout an assigned area and occupy hasty positions as necessary. 4-30. Fire support systems should focus on suppression missions to disrupt enemy forward security elements as they make contact and focus on obscuration of enemy forces missions or screen exposed friendly forces when conducting a movement to contact. They schedule synchronized movements of fire support systems with the movement of the rest of the force. Fire support systems that cannot match the cross-country mobility of ground maneuver units may cause them to slow their rate of advance. If these units do not slow down, they run the risk of outrunning their fire support. Units synchronize the employment of close air support to prevent enemy forces from regaining balance while ground fire support assets are repositioning. The main body updates the high-payoff target list during a movement to contact operation as necessary. 4-31. Similar considerations apply to air and missile defense when enemy forces possess these capabilities. A unit conducting a movement to contact remains aware of the air and missile defense umbrella provided by radars, air defense systems, and the joint combat air patrol. 4-32. The unit’s tempo, momentum, tactical dispersal, and attention to electromagnetic emission control complicate an enemy force’s ability to detect and target the main body prior to making contact. Once a friendly force makes contact and masses against detected enemy forces, it becomes vulnerable to strikes by enemy conventional weapons and weapons of mass destruction. A friendly force must mass effects rapidly in a meeting engagement and disperse again as soon as it overcomes resistance to avoid enemy counteractions. 4-33. Movement should be as rapid as the terrain, the mobility of the force, and the enemy situation permits. Open terrain provides maneuver space on either side of the line of march and facilitates high-speed movement. It also allows for greater dispersal and usually permits more separation between forward security elements and the main body than restricted terrain allows. Units should never commit their main bodies to canalizing terrain before forward security elements have ensured the main bodies can maintain freedom of movement within that terrain. Enemy forces may have established fire support control measures that allow enemy forces to employ non-observed harassing and interdiction fires on friendly forces traversing these choke points. Units may shorten the distance between elements to decrease reaction time or deploy their force to prepare for contact as the enemy situation develops. 4-34. At battalion and company echelons, a force moves along covered or concealed positions along routes using terrain to minimize its vulnerability to enemy weapons. Further, an overwatching force should cover
3-90
109
Movement to Contact the moving force. Regardless of the specific movement technique employed, subordinate elements need to provide mutual support and be knowledgeable of each other’s sectors of fire. 4-35. The moving force must attempt to cross any obstacles it encounters without loss of momentum by conducting hasty (in stride) breaches. Units use forward security forces in an attempt to seize intact bridges whenever possible. Lead security elements bypass or breach obstacles as quickly as possible to maintain the momentum of the movement. If lead security elements cannot overcome obstacles, commanders direct subsequent elements of the main body to breach the obstacle site. Following forces can also reduce obstacles and improve routes that hinder the unit’s sustainment flow. Find the Enemy 4-36. Units gain and maintain enemy contact to further shape operations for a movement to contact. All information collection assets focus on determining an enemy force’s disposition and providing units with current intelligence and relevant combat information; this ensures that they can commit friendly forces under optimal conditions. Units use all available sources of combat information to find an enemy force’s location and disposition. Corps and divisions leverage collection assets from organic, attached, and direct support units; special operations forces; and joint and multinational assets to gain contact with enemy forces. BCTs and their subordinate battalions use their organic reconnaissance assets to gain contact. This contact may be in any of eight forms (see paragraphs 1-60 through 1-68 for a discussion on the nine forms of contact). Units use information collection systems to cue aerial and ground reconnaissance by their attached BCTs and combat aviation brigades. 4-37. The enemy situation becomes clearer as the unit’s forward security elements conduct actions on contact to develop the situation in accordance with their commander’s intent and plan. By determining the strength, location, and disposition of enemy forces, these security elements allow units to focus the effects of the main body’s combat power against the enemy main body. The overall force must remain flexible to exploit both intelligence and combat information. The security force should not allow an enemy force to break contact unless it receives an order from the friendly force commander. When a strong covering force has not preceded the advance guard, the advance guard should seize terrain that offers essential observation. 4-38. The unit’s security force often gains a tactical advantage over an enemy force by using tempo and initiative to conduct actions on contact, allowing it to gain and maintain contact without becoming decisively engaged. Decisively engaged is when a fully committed force or unit cannot maneuver or extricate itself. Once the lead elements of a force conducting a movement to contact encounter an enemy force, they conduct actions on contact. The unit treats obstacles like any other form of enemy contact, since it assumes that the enemy force has covered these obstacles by fire. The unit carries out actions on contact regardless of whether the enemy force has detected its presence. How quickly the unit develops the situation is directly related to its security. This tempo is directly related to the unit’s previous training to execute SOPs and drills. Fix the Enemy 4-39. On contact, the main body brings overwhelming fires on enemy forces to prevent the enemy forces from conducting either a spoiling attack, organizing a coherent defense, or withdrawing. With the enemy fixed, the security force maneuvers quickly to find gaps in the enemy force’s defenses. Units use information collection assets to gain as much information as possible about the enemy force’s dispositions, strengths, capabilities, and intentions. As more intelligence becomes available, the main body attacks to destroy the enemy. The higher headquarters of the unit conducting the movement to contact conducts countermobility operations to prevent enemy reserves from moving to counter the unit’s actions. 4-40. The security force does not allow enemy security and main body forces to maneuver against the friendly main body. The security force’s organization, size, and combat power are major factors that determine the size of the enemy force it can defeat or fix in place without deploying the main body. 4-41. Units use aerial maneuver and fire support assets to fix enemy forces in their current positions by directly attacking enemy maneuver elements and command and control systems and emplacing situational obstacles. The typical priorities are to attack— * Enemy forces in contact. * Enemy command and control (C2) and fire direction control facilities.
3-90
110
Chapter 4 * Enemy fire support assets. * Moving enemy forces not yet in contact, such as follow-on forces and reserves. 4-42. Attack priorities vary with mission variables. Attack rotary- and fixed-wing aircraft can engage enemy forces throughout the depth of an assigned area (if the suppression of enemy air defenses can reduce the risk to aircraft to an acceptable degree). 4-43. The techniques units employ to fix enemy forces when both forces are moving differ from those employed when enemy forces are stationary during a meeting engagement. In both situations, when the security force cannot overrun enemy forces by conducting a hasty frontal attack, units deploy a portion of their main body. When this occurs, the unit transitions to an attack and is no longer conducting a movement to contact. Finish the Enemy 4-44. If possible, friendly security forces overwhelm enemy security forces by executing a frontal attack to make contact with the enemy main body. If this is not possible, friendly security forces fix enemy security forces and the main body conducts a penetration or envelopment of the enemy security forces. This makes the main body the main effort of the movement to contact and is a key reason why units ensure that their main bodies avoid enemy engagement until a time and place of their choosing. They maneuver their main bodies at a tempo the enemy force cannot match. They do this to overwhelm the enemy before it can react effectively or reinforce. Units attempt to defeat the enemy security force in detail while still maintaining the momentum of the advance, until the unit makes contact with the enemy main body. 4-45. If the main body initiates a frontal attack, it deploys rapidly to the vicinity of the line of contact. Commanders of maneuvering units coordinate forward passage through friendly forces in contact as required. The intent is to deliver the assault before the enemy force can deploy or reinforce its engaged forces. Commanders may order an attack from a march column. They can also wait to attack until they can deploy forward the bulk of their main body. They avoid piecemeal commitment, except when rapid action is essential, their units have combat superiority and can maintain that superiority throughout their attacks, or when the terrain forces that COA. 4-46. Units attempting an envelopment focus on attacking the enemy force’s flanks and rear before the enemy force can prepare to counter these actions. They use security forces to fix enemy forces while their main bodies maneuver to look for an assailable flank. Alternatively, they use their main body to fix the enemy force while their reserve finds an assailable flank. 4-47. If the enemy force is not rapidly defeated, commanders have three options: bypass, transition to a deliberate attack, or conduct a defense. In all cases, they make every effort to retain the initiative by conducting violent and resolute attacks and preventing enemy forces from countering them. Simultaneously, units maintain momentum by synchronizing the actions of friendly maneuver, functional and multifunctional support, and sustainment elements. Follow Through 4-48. After a successful attack, friendly forces either continue movement to their final objective or they conduct a hasty defense to consolidate and reorganize before continuing. If the location of the enemy main body is still unclear and friendly forces have not reached their limit of advance, the unit resumes their movement to contact. VARIATIONS FOR A MOVEMENT TO CONTACT 4-49. Movement to contact has two variations: search and attack and cordon and search. Paragraphs 4-50 through 4-82 further discuss these variations. SEARCH AND ATTACK 4-50. Search and attack is a variation of a movement to contact where a friendly force conducts coordinated attacks to defeat a distributed enemy force. Units employ this variation of a movement to
3-90
111
Movement to Contact contact when enemy forces are operating as small, dispersed elements, and the units cannot target them by any methods other than a physical search. Units may also use a search and attack when the task is to deny enemy forces the ability to move within a given area. Primarily, dismounted infantry forces conduct a search and attack. Armored, mechanized, and Stryker-equipped forces often support dismounted infantry performing this task. A search and attack often occurs during the conduct of irregular warfare. However, it may also be necessary when conducting noncontiguous operations during combat operations and consolidating gains. 4-51. All echelons can conduct search and attack operations. However, a division rarely conducts search and attack operations simultaneously throughout its assigned area. BCTs, maneuver battalions, and companies normally conduct search and attack operations. BCTs assist their subordinate maneuver battalions conducting a search and attack by ensuring the availability of indirect fires and other support. Organization of Forces for a Search and Attack 4-52. Commander’s task-organize into reconnaissance, fixing, and finishing forces, each with a specific task and purpose. Alternatively, all units can be involved in the reconnaissance effort with individual subordinate elements performing the fixing and finishing functions based on the situation. 4-53. Commanders base the size of their reconnaissance forces on available information about the size of enemy forces in their assigned areas, and the size of these assigned areas in terms of the geography and the size of the civilian population. The more uncertainty that exists within a situation, the larger the reconnaissance force. A reconnaissance force typically consists of scout, infantry, aviation, and electromagnetic warfare assets. A fixing force must have enough combat power to isolate enemy forces once the reconnaissance force finds them. The finishing force is normally the main body of that echelon. It must have enough combat power to defeat the enemy forces expected within its assigned area. Commanders can direct subordinate units to retain their own finishing force, or they can retain direct control of the finishing force. Units may also rotate subordinate elements through the reconnaissance, fixing, and finishing roles. However, rotating roles may require a change in task organization and additional time for training and rehearsal. Control Measures for a Search and Attack 4-54. Units establish control measures that allow decentralized action and small-unit initiative to the greatest extent possible. Figure 4-3 on page 4-10 depicts the minimum control measures for a search and attack which include an assigned area, target reference points (TRPs), objectives, checkpoints, and contact points. The use of target reference points facilitates responsive fire support upon making contact with enemy forces. They use objectives and checkpoints to guide the movement of subordinate elements. They use other control measures, such as phase lines and named areas of interest (NAIs), as necessary. (Appendix A discusses these common control measures.)
3-90
112
Chapter 4 Figure 4-3. Search and attack control measures Planning a Search and Attack 4-55. Units conduct a search and attack for one or more of the following purposes: * Destroy enemy forces: render enemy forces in an assigned area combat ineffective. * Deny the area: prevent enemy forces from operating unhindered in a given area, for example, in any area that the enemy is using for a base camp or for logistics support. * Protect the force: prevent enemy forces from massing to disrupt or destroy friendly military or civilian operations, equipment, property, and facilities. * Collect information: gain information about enemy forces and the terrain to confirm the enemy COA predicted by the IPB process. The products of the IPB process are critical to conducting a search and attack. They focus the force’s reconnaissance efforts on likely enemy locations. 4-56. The search and attack plan places the finishing force, as the main effort, where it can best maneuver to destroy enemy forces or essential facilities once located by reconnaissance assets. Typically, the finishing force occupies a central location in an assigned area. However, the terrain may allow units to position their finishing forces outside search and attack areas. Commanders weight their main effort by using priority of fires and assigning priorities of support to available combat enablers, such as engineer elements and helicopter lift support. Units establish control measures as necessary to consolidate and reorganize and concentrate the combat power of the force before the attack. Once a reconnaissance force locates an enemy force, fixing and finishing forces can destroy it. Units also develop contingency plans in the event of the compromise of their reconnaissance force. 4-57. Fire support plans must provide flexible and rapidly delivered fires to achieve their commander’s desired effects throughout an assigned area. Units position fire support assets so they can support subordinate elements throughout their assigned areas. They must establish procedures for rapidly clearing fires. To clear
3-90
113
Movement to Contact fires rapidly, command posts and small-unit commanders track and report the locations of all subordinate elements. Because of the uncertain enemy situation, units assign clear fire support relationships. Executing a Search and Attack 4-58. Each subordinate element operating in its own assigned area searches for and attacks enemy forces within its capability. Units may enter an assigned area by infiltrating as an entire unit and then splitting out or by infiltrating as smaller units via ground, air, or water. Units should use previously established control measures and communications means between any closing elements to prevent fratricide and friendly fire incidents. The reconnaissance force conducts an area reconnaissance to reconnoiter identified named areas of interests. 4-59. Once the reconnaissance force finds enemy forces, the fixing force develops the situation and executes one of two options based on the commander’s guidance and the mission variables. The first option is to block identified routes that the detected enemy forces can use to escape or employ reinforcements. The fixing force maintains contact with enemy forces and positions to isolate and fix enemy forces before the finishing force attacks. The second option is to conduct an attack to fix enemy forces in their current positions until the finishing force arrives. The fixing force attacks if it meets the commander’s intent and if it can generate sufficient combat power against detected enemy forces. Units may need to position the fixing force before the reconnaissance force enters an assigned area, depending on the enemy force’s mobility and the probability of the compromise of the reconnaissance force. 4-60. BCTs (and possibly battalions) may establish fire support bases to provide fire support coverage throughout an assigned area during search and attack operations in complex terrain. These positions should be mutually supporting and prepared for all around defense. Fire support bases are also located in positions that facilitate aerial resupply. The development of these positions depends on the mission variables because their establishment requires diverting combat power to protect assets in these fire support bases. 4-61. If conditions are not right to use the finishing force or main body to attack detected enemy forces, the reconnaissance or the fixing force can continue to conduct reconnaissance and surveillance activities to develop the situation further. Whenever this occurs, the force maintaining surveillance must be careful to avoid detection and possible enemy ambushes. 4-62. The finishing force or main body may move behind the reconnaissance and fixing forces, or it may locate at a pickup zone and conduct air assault movement into a landing zone near enemy forces, once enemy forces are located. The finishing force or main body must be responsive enough to engage enemy forces before they can break contact with the reconnaissance force or the fixing force. The echelon intelligence officer provides the commander with an estimate of the time it takes enemy forces to displace from their locations. The commander provides additional mobility assets, so the finishing force or main body can respond within that timeframe. 4-63. Units use their finishing force or main body to destroy detected and fixed enemy forces during a search and attack by conducting hasty or deliberate attacks. One unit maneuvers to block enemy escape routes while another unit conducts the attack, or units employ indirect fire or close air support to destroy enemy forces. Units may have the finishing force or main body establish area ambushes and use the reconnaissance and fixing forces to drive enemy forces into the ambushes. CORDON AND SEARCH 4-64. The second variation to conduct a movement to contact is cordon and search. Cordon and search is a variation of movement to contact where a friendly force isolates and searches a target area. Typically, units execute cordon and searches to capture or destroy possible enemy forces and contraband. Cordon and search operations take place throughout the range of military operations. Generally, cordon and search are conducted during stability operations or situations where the likelihood of large-scale organized violence is unlikely. Units conducting a cordon and search organize their subordinate units into four elements— command, security, search or assault, and support. The security element must be large enough to establish both an inner and an outer cordon around the target area of the search. In that regard, cordon and search operations are similar to encirclements. Maneuver battalions and lower echelons normally conduct cordons and searches.
3-90
114
Chapter 4 4-65. Cordon and search operations occur in five phases: reconnaissance, movement to the objective, cordon establishment, search, and retrograde. These phases are descriptive of a cordon and search and are not prescriptive. 4-66. The reconnaissance phase is initiated upon receipt of mission and continues throughout the planning process. Planners conduct intelligence preparation of the battlefield, develop a scheme of maneuver, and refine the plan. The friendly force performs the necessary reconnaissance to gain information and complete the plan. A complete order is issued, allowing time for leaders to develop subordinate plans and conduct rehearsals. The planning phase ends when rehearsals, pre-combat checks, and inspections are complete, and the unit crosses the LD. 4-67. Movement to the objective area occurs as a single unit or in separate serials sequenced along differing routes. Leaders consider terrain and threat assessments to determine appropriate movement formations and techniques. The movement phase ends when the security element reaches its release point and begins establishing the cordon. 4-68. Establishing a cordon entails emplacing an outer and inner cordon, simultaneously or sequentially. The cordon is considered established when the objective area is isolated, and it continues until the force commences retrograde. Leaders consider allocating priority of intelligence, reconnaissance, surveillance, fires, and nonlethal assets to the cordon element once the cordon is established. 4-69. Clearing the objective area and searching target areas occur once the objective area is isolated. Forces may undertake additional activity after the objective is clear, including tactical questioning, site exploitation, providing medical attention to local nationals, communicating with local leaders, and conducting other influence activities. The amount of time spent at an objective area depends on factors including the size of the objective, the number of adversaries to vet, the amount of material of likely intelligence-value present, the presence of explosive hazards, and the size and augmentation of the search element. 4-70. The enemy may force cordon and search operations, or a unit may execute them voluntarily. A retrograde is a transitional operation; it is not conducted in isolation. Stay-behind reconnaissance forces may be employed to observe activity for a period after the cordon and search force departs the objective area. Retrograde is not complete until all personnel, including stay-behind forces, arrive in the designated assembly area. Retrograde is the most vulnerable phase of cordon and search operations, possibly rife with personnel accountability issues and interdiction by enemy forces along anticipated retrograde routes. Leaders strongly consider using intelligence, surveillance, and reconnaissance and joint fires assets to support the retrograde. (See Chapter 11 for additional information on retrograde operations.) Principles for a Cordon and Search 4-71. The principles of cordon and search are comprehensive and fundamental rules to guide battalions. The principles are not a checklist. While the commander considers these principles, they do not apply in the same way to every situation. Instead, the principles summarize characteristics of successful cordon and search operations. For the unit, the value in these principles lies in analyzing a pending operation while synchronizing efforts and determining if or when to deviate from the principles based on the current situation. The nine principles of cordon and search are— * Speed. * Surprise. * Isolation. * Proper target identification. * Timeliness. * Accountability. * Minimization of collateral damage. * Detailed search. * Legitimacy.
3-90
115
Movement to Contact Methods of Cordon and Search 4-72. Units have two methods for conducting a cordon and search: cordon and knock and cordon and enter. The primary difference in methods is the level of force required to gain access to the target. In a cordon and knock, the search element requests or demands access to the target. In a cordon and enter, the search element accesses the target by force. Regardless of the method, search elements must be prepared to escalate force appropriately to gain access to the target. Leaders consider the terminal effects of fires and ensure friendly location awareness to prevent fratricide and limit collateral damage to the greatest extent possible. Control Measures for Cordon and Search 4-73. Control measures useful for conducting cordon and search include— * Assembly area. * Line of departure. * Checkpoints. * Contact points. * Objectives. * Rally points. * Phase lines. * Routes. * Restricted fire line. Planning a Cordon and Search 4-74. During planning (includes preparation) and reconnaissance, mission analysis is conducted through either the MDMP or troop leading procedures process, focusing on the task and purpose, intelligence preparation of the battlefield (identification of target and target areas), and tentative scheme of maneuver. Detailed direct fire plans serve as risk mitigation measures to prevent fratricide between clearing elements and the cordon. Support forces external to the battalion are task-organized and warning orders are issued. As planning serves to focus the information collection effort by identifying what to look for and where to look for it, reconnaissance helps to refine the planning process by answering through collection, information requirements, and priority intelligence requirements. Although the plan is continually updated with reconnaissance and surveillance throughout the operation, this phase ends with the unit issuing the completed order, conducting final rehearsals and inspections, and crossing the LD. Preparing a Cordon and Search 4-75. The level of rehearsal and extent of participation depend upon the time available and the physical location of participants. Rehearsals may be full or reduced force. Multiple rehearsal types and techniques may be used in preparation for a mission. For example, confirmation briefs and backbriefs may be required following the issuance of an operation order, and a map rehearsal may be conducted via remote communications equipment or in person once subordinate elements have completed their plans. 4-76. Rehearsals should address non-mission-specific tasks and mission-specific execution details and be more than a mere discussion of what is supposed to happen. Effective rehearsals test subordinate understanding of key activities, including the spatial relationships and timing of key actions; contingencies; communication; and purpose, priorities, allocation, and resourcing of support. Leaders normally issue rehearsal guidance via published warning orders. 4-77. Non-mission-specific task rehearsals might include— * Battle drills and other standard operating procedures, such as assaulting a building or reacting to enemy contact. * Breaching obstacles and doorways. * Search techniques (such as individual, vehicle, and room). * Detainee and captured materiel handling and processing. * Tactical callout.
3-90
116
Chapter 4 4-78. Mission-specific execution activity rehearsals might include— * Emplacing inner and outer cordons. * Target area clearance. * Retrograde from the objective area. Executing a Cordon and Search 4-79. The execution of the cordon may be executed sequentially or simultaneously using single or multidirectional ingress routes. The methods may be used alone or combined. For example, the outer cordon position may be occupied sequentially via a single ingress route followed by a sequential occupation of the inner cordon positions via a single ingress route. Figure 4-4 depicts the symbol for a cordon and search. 4-80. The search element prepares to move to the target area during cordon emplacement. The search and assault element movement to the target area may be simultaneous, nearly simultaneous, or sequential in relation to the cordon emplacement. Figure 4-4. Cordon and search symbol 4-81. When combined, the outer cordon positions may be occupied simultaneously from multidirectional ingress routes, followed by a sequential occupation of the inner cordon positions via a single ingress route. Figure 4-5 depicts inner and outer cordons for a battalion level cordon and search.
3-90
117
Movement to Contact Figure 4-5. Example inner and outer cordons 4-82. Considerations for each cordon and search technique follow: * In a sequential occupation, the security element successively occupies inner and outer cordon positions. This occupation allows for ease of control and simplicity of maneuver but accepts the risk that an alert adversary may have an opportunity to react or escape the target area. * In a simultaneous occupation, the security element occupies cordon positions simultaneously (or near simultaneously). This occupation achieves tactical surprise in the objective and target areas and reduces the opportunity for an adversary to react or escape the target area. * Using a single ingress route, the cordon and search force moves to the objective area in a column along a single route or from a single landing zone until elements reach designated release points. Using a single ingress route maximizes control but increases the time required to isolate the objective area and offers an adversary the opportunity to more easily delay joint force access to the objective area. * Using multidirectional ingress routes, the cordon and search force moves to the objective area from multiple directions using multiple routes or landing zones. Using multidirectional ingress routes enables simultaneous occupation of outer cordon positions and rapid isolation of the objective area. However, this technique requires detailed time and distance analysis to synchronize cordon and search force arrival in the objective area; increases C2 complexity; and dilutes concentration of combat power during movement to the objective area. TRANSITIONS 4-83. If the enemy force is not rapidly defeated, commanders have three options: bypass, transition to a deliberate attack, or conduct a defense. In all cases, commanders make every effort to retain the initiative by conducting violent and resolute attacks and preventing enemy forces from countering them. Simultaneously,
3-90
118
Chapter 4 units maintain momentum by synchronizing the actions of friendly maneuver, functional and multifunctional support, and sustainment elements. TRANSITION TO AN ATTACK 4-84. The decision to conduct a hasty or deliberate operation is based on the commander’s current knowledge of the enemy situation and assessment of whether the assets available (to include time) and the means to coordinate and synchronize those assets are adequate to accomplish the mission. If assets and means are lacking, the unit takes additional time to plan and prepare for the operation or bring additional forces to bear on the problem. The commander makes that choice in an environment of uncertainty, which always entails some risk. Ongoing improvements in command and control systems continue to assist in the development of a common operational picture of friendly and enemy forces while facilitating decision making and communicating decisions to friendly forces. TRANSITION TO A DEFENSE 4-85. Some transitions require friendly forces to transition into a defense. If the movement to contact does not defeat the enemy force or the friendly force has lost, then friendly forces get a different momentum. This changed momentum may dictate the transition into the defense. Friendly forces may lose their momentum and transition from a movement to contact to a defense for several reasons: * The size, location, and composition of the enemy is significantly different than what was templated, and the friendly force risks destruction if they continue the movement to contact. * If directed by their higher headquarters during planning. For example, if the unit was directed to conduct a movement to contact to a specified phase line and arrive without meeting the enemy then a hasty defense is needed to hold the terrain gained until directed to move on. * Friendly forces outrun their logistics and risk culmination. * Friendly combat losses prevent the unit from continuing to advance. * The loss of external assets within range to support the continued advance of friendly forces. 4-86. If friendly forces lose momentum, the commander decides when to transition to a defense. The commander must utilize all information available; especially combat power against combat ratios to make this decision. See Part Three for execution of the defense.
3-90
119
Chapter 5 Attack This chapter addresses those considerations unique to an attack. The general offensive considerations discussed in chapter 3 continue to apply. This chapter addresses the general considerations, organization of forces, common control measures, planning, preparation, execution considerations, and the four variations of an attack. GENERAL CONSIDERATIONS FOR THE ATTACK 5-1. An attack is a type of offensive operation that defeats enemy forces, seizes terrain, or secures terrain. An attack masses the effects of overwhelming combat power against selected portions of an enemy force with a tempo and intensity that the enemy force cannot match. Attacking units seek positions of advantage and deliberately synchronize their combined arms teams. ORGANIZATION OF FORCES FOR AN ATTACK 5-2. Commander’s task-organize their forces to give each unit enough combat power to accomplish its mission once the commander determines their schemes of maneuver. Units normally organize their forces into a security force, a main body, and a reserve, all supported by sustainment organizations. The best place and time for an attacking force to task-organize is when it is in an assembly area. This allows units to complete any changes in task organization in time to conduct rehearsals with their attached and supporting elements. FORWARD SECURITY FORCE 5-3. While planning and preparing for operations, units have a security force to their front. Upon initiating movement toward their objective, they place a reconnaissance and security force to their front to identify enemy locations, dispositions, and strengths. These forces also confirm trafficability of axes of advance and cross-mobility corridors. They also destroy (within capabilities) as much of the enemy in the disruption zone as possible, enabling the main body to focus on the enemy in the battle zone. Units only resource dedicated flank or rear security forces during an attack if the attack uncovers one or more flank or the rear of the attacking force as they advance. Commanders designate flank or rear security forces and assign them a guard or screen mission, depending on the mission variables. Attacking forces should maintain a forward security element. The size of the forward security element is based upon if the friendly force has gained and maintained visual contact of the enemy. MAIN BODY 5-4. Units organize their main bodies into combined arms formations to conduct their main and supporting efforts. They aim their main effort towards decisive points. Decisive points can consist of the immediate destruction of selected enemy forces, the enemy force’s capability to resist, seizure of terrain objectives, or the defeat of the enemy force’s plan. Units’ schemes of maneuver identify the focus of their main effort. All their forces’ available resources operate in concert to ensure the success of the main effort. The subordinate unit or units designated to conduct the main effort can change during the course of the attacks. Units designate assault, breach, and support forces if they expect to conduct breaching operations during their attack. 5-5. Units retain flexibility by arranging their forces in depth, retaining strong reserves, and maintaining centralized control of long-range fire support systems. Units focus their available resources to support their main efforts achievement of its objective. Units cannot allow enemy actions, minor changes in the situation, or the lack of success by other supporting efforts to divert combat power from the main effort.
3-90
120
Chapter 5 5-6. Commanders may need to designate one or more of their units to conduct supporting efforts to create windows of opportunity for executing their main effort. They use the minimal combat power necessary to accomplish their missions, since overwhelming combat power cannot be employed everywhere. Units conducting supporting efforts usually have a wider assigned area than those conducting the main effort. Commanders can assign the tasks of follow and assume or follow and support to subordinate units. RESERVE 5-7. The strength and composition of the reserve vary with the mission variables, the form of maneuver, and the risk accepted. In an attack, the combat power allocated to the reserve depends primarily on the level of uncertainty about enemy forces, especially the strength of any expected enemy counterattacks. For example, in a hasty attack a reserve can contain up to one third of a force’s combat power. Alternatively, units size their reserve to defeat their enemy’s projected available counterattack forces in deliberate attacks. They should not constitute their reserves by weakening their main effort. A reserve requires mobility equal to or greater than the most dangerous enemy ground threat, and it should be able to counter that threat. See paragraphs 1-94 through 1-100 more information on a reserve. COMMON CONTROL MEASURES ASSOCIATED WITH AN ATTACK 5-8. A higher echelon commander assigns the area to units conducting offensive actions within which they operate. Within these assigned areas, units at a minimum designate these control measures: * A phase line as the LD, which may also be the line of contact (LC). * The time to initiate the operation. * The objective. If necessary, a commander can assign an area (zone or area of operations) or use axis of advance, direction of attack, routes, or additional phase lines to further control maneuver forces. Figure 5-1 depicts common control measures associated with an attack. Figure 5-1. Example of attack control measures 5-9. Units can use any other control measures necessary to control an attack. Short of the LD, units may designate assembly areas and attack positions where they prepare for offensive actions or wait for established required conditions to initiate the attack. Beyond the LD, units may designate checkpoints, PLs, probable
3-90
121
Attack lines of deployment (PLDs), assault positions, direct fire control measures, and indirect fire support coordination measures (FSCMs). Between the PLD and the objective, units can use a final coordination line (FCL), assault positions, support by fire and attack by fire positions, and a time of assault to further control the final stage of their attacks. Beyond the objective, commanders can impose a LOA if they do not want their units to conduct exploitation or a pursuit or template where they want their forces to position after the completion of the attack such as a battle position or blocking position. 5-10. Units increase control over the movement of all attacking elements in attacks during limited visibility conditions. Typically, they impose additional control measures beyond those used in daylight attacks. These additional measures may include using a PD and a direction of attack. PLANNING FOR AN ATTACK 5-11. In an attack, units seek to keep enemy forces off balance while continually reducing the enemy force’s options. Friendly forces seek to place enemy forces into a position where they can easily be defeated or destroyed. Friendly forces focus effects on enemy forces that seek to prevent the unit from accomplishing its mission and seizing its objective. Planning helps commanders synchronize the effects of combat power through the MDMP and troop leading procedures. 5-12. Units focus the effects of friendly systems to achieve fire superiority and allow their maneuver forces to breach enemy defensive networks. A friendly force must gain and maintain fire superiority at critical points during an attack. The unit uses long-range artillery systems (cannon and rockets) and air support (rotary- and fixed-wing) to engage the enemy throughout the depth of the enemy’s defensive positions. The warfighting functions provide a model of how units organize and employ the force to ensure all capabilities of the force are synchronized in time and maneuver space during an attack. COMMAND AND CONTROL 5-13. Commanders assign subordinate units their missions and use control measures necessary to synchronize and maintain control over the operation. Units plan to control the attack by determining the methods through command posts and signal assets and use graphic control measures (such as probable line of contact and enemy trigger lines) to manage the attack. They also control the attack by stating the desired effect of fires on the enemy weapons system such as suppression or destruction using previously developed enemy situational and weapons templates. Units match friendly weapon systems against selected enemy systems to determine the PLD as they array subordinate elements to shape the battlefield. They determine how long it takes subordinates to move from the LD to the PLD and any required support by fire positions once they determine their respective PLDs. They establish when and where their forces must maneuver into enemy direct fire range. 5-14. In addition to accomplishing the mission, every attack plan contains provisions for exploiting success or any advantages that may arise during the operation. Units exploit success by aggressively executing their plans, promoting subordinate leader initiative, and rapidly executing battle drills. 5-15. Information systems offer ways that units can gain and maintain enemy contact. Units enhance shared situational understanding by developing SOPs that govern the COP. Information systems improve the rapid, clear communication of orders and commander’s intent, thereby reducing the confusion and friction of battle. This is especially true when the lowest tactical echelons can rapidly update the data on the information systems providing that common operational picture. The disposition and activities of friendly and enemy forces and third-party agencies are important elements of information. Service and joint intelligence systems feeding those information systems enable commanders and echelon staffs to detect and track enemy forces without having subordinate forces make physical contact with enemy forces. The ability to see and understand the situation before enemy forces do allows friendly forces to act first and maneuver out of direct contact with enemy forces at a high tempo. These abilities allow units to position their subordinate forces where those forces can overwhelm selected elements of the enemy force. This disrupts and destroys the enemy’s combined arms team. Such attacks—delivered simultaneously with precision by air, land, maritime, space, and cyberspace systems throughout the width, height, and depth of the battlefield—can stun enemy forces and rapidly lead to their defeat.
3-90
122
Chapter 5 MOVEMENT AND MANEUVER 5-16. Units seek to surprise enemy forces through movement and maneuver by choosing an unexpected direction, time, type, or strength for the attack. Surprise delays enemy reactions, overloads and confuses enemy command and control systems, induces psychological shock in enemy forces, and reduces the coherence of the enemy defense. Units can achieve tactical surprise by attacking in bad weather and over seemingly impassible terrain, conducting feints and demonstrations, and maintaining a high tempo, thereby destroying enemy forces. All of which is enhanced by the effective employment of OPSEC. For example, a unit in extremely hilly or mountainous terrain may consider transporting dismounted infantry forces to the heights and have them maneuver down the terrain. Units may plan different attack times for their main and supporting efforts to mislead enemy forces and allow the shifting of supporting fires to successive attacking echelons. However, simultaneous attacks provide a means to maximize the effects of mass in the initial assault. Simultaneous attacks also prevent enemy forces from concentrating defensive fires against successive attacks. 5-17. Commanders and their subordinate leaders focus on the routes and formations their units use to traverse the terrain from the LD or PD to the objective during the planning process. Some locations may require attacking units to change formation, direction of movement, or movement technique when they reach those locations. Units designate contact points at critical locations to ensure coordination between adjacent units. 5-18. Units attack targets throughout the depth of the enemy’s defense to keep the enemy force off balance and limit enemy freedom of action. However, for the main effort, units concentrate the effects of overwhelming combat power to shatter the cohesion of the enemy force’s defense. Units accomplish this by applying combat power against enemy forces at a level of violence and in a manner that enemy forces cannot match. For example, a battalion commander can mass an Army combined arms battalion’s firepower and rapid advancement against an enemy rifle company’s hastily prepared defensive position. INTELLIGENCE 5-19. Commanders require information on an enemy force’s organization, equipment, and tactics to determine the appropriate employment of unit and system capabilities and tactics. They need to understand an enemy force’s strengths and weaknesses. Units develop threat courses of action and enemy situational templates based on analysis of all available combat information and intelligence. These products address both conventional and unconventional threats and are useful in determining the feasibility of available COAs. Ideally, this knowledge is available early in the planning phase. 5-20. Units conduct information collection activities before they attack. Information requirements can include— * The location and depth of enemy reserves. * The location and extent of obstacles, potential breach sites, enemy engagement areas, and contaminated areas. * The location of areas where attacking units can become disoriented, such as rough or restrictive terrain. * The most favorable routes of approach to the attack objective. * Areas that attack forces can use for flanking fire and maneuver, such as support by fire and attack by fire positions. * Suitability of planned friendly assault, artillery, and sustainment positions. * Enemy deception operations. * Current and future weather impacts to operations. * Anything that requires a commander’s decision. Commanders and leaders at all echelons personally participate in this process. 5-21. Units take every opportunity to gain and refine combat information regarding enemy forces. They employ information collection assets to gather combat information and process it into intelligence. Information gathered during the planning phase is especially useful in determining the viability of each COA developed. Generally, units cannot conduct deliberate attacks if they do not know the location of most of the
3-90
123
Attack defending enemy force’s units and systems. If that is the case, units must conduct a movement to contact or spend more time collecting information. 5-22. Units collect information through reconnaissance; this information is analyzed and combined with other available information to become intelligence. Units employ reconnaissance over a broad area that allows their reconnaissance elements to identify enemy weaknesses to exploit and identify enemy strengths to avoid. Units exploit the situation by choosing COAs that allow their main effort to attack enemy weaknesses and penetrate identified gaps in an enemy force’s defense. Commanders can then commit their forces to widen the gap and envelop enemy forces. Their reconnaissance elements continue to move, seeking paths of least resistance and pulling their main bodies deep into the enemy force’s rear. 5-23. Once friendly reconnaissance elements gain contact with enemy forces, they develop the situation. If the objective is an enemy force, the reconnaissance element orients on it to maintain contact and determine as much as possible about its dispositions. 5-24. Units ensure reconnaissance and surveillance of enemy defensive positions and terrain critical to their schemes of maneuver continue throughout their attacks. Reconnaissance and surveillance assets can detect attempts by enemy forces to modify their defenses. In turn, this allows units to adjust their schemes of maneuver as the enemy situation becomes clearer. They can use human and technological means, acting separately or in combination, to provide the required degree of reconnaissance and surveillance. FIRES 5-25. The planning process synchronizes the unit’s maneuver with the provision of fire support. It must identify critical times and places where units need the maximum effects from their fire support assets. This planning considers existing limitations on employing fires, such as weapon ranges, presence of friendly forces within the assigned area, desired conditions of subsequent phases, rules of engagement and positive identification requirements, and requirements for collateral damage assessments. Units combine movement with fires to mass effects, achieve surprise, destroy enemy forces, and obtain decisive results. Each commander’s guidance identifies fire support tasks that supporting fires organizations must accomplish to support the scheme of maneuver. Throughout planning, units develop various targeting products to support fire support execution. These include a high-payoff target list, target selection standards, and an attack guidance matrix. The purpose of these products is to ensure the efficient and effective application of fire support that supports the scheme of maneuver. (See FM 3-09 for more information on fire support task development and targeting products.) 5-26. Units emphasize accomplishing simple and rapidly integrated fire support plans using quick fire planning techniques and SOPs. They integrate their fire assets as far forward as possible in unit movement formations to facilitate the early emplacement of those assets. Friendly forces concentrate fires on forward enemy elements to enable maneuver efforts to close with enemy positions. Fires can isolate forward enemy elements by using long-range fires, air support, and electromagnetic warfare. 5-27. Fire support facilitates the attacking units’ maneuver by destroying or neutralizing strong enemy forces and positions. Fire support systems take full advantage of available preparation time to achieve these demanding effects criteria. Fire plans feature the following characteristics: * Target locations confirmed or denied by information collection efforts. * Designation of target sensor to shooter communication links. * Possible use of preparation and deception fires to shape an enemy force’s defense. * Air support to destroy high-payoff targets. * Proactive suppression of enemy air defense efforts. * Preparation fires that shift just as the maneuver force arrives on the objective. * A suppression and obscuration fire plan to support operations. * Pre-positioned ammunition backed by prepackaged munitions stocks capable of rapid delivery. * Integration of nonlethal effects, such as electromagnetic attack and military information support operations, into the attack guidance matrix. * Integration of primary and backup observers to engage high-payoff targets.
3-90
124
Chapter 5 * FSCMs—accounting for danger close and other technical constraints—allow maneuver forces to get as close as possible to the objective before lifting fires. * Signals for lifting and shifting fires on the objective. * Do not dilute fire support capabilities to the extent they are unable to concentrate in support of the main effort. * Plan for echelonment of fires. * Maximize use of organic fires. SUSTAINMENT 5-28. Units prioritize their sustainment operations to support their attacking forces. They prioritize sustainment support by designating who has priority for resupply combined with task-organizing capabilities (for example, shifting fuel tankers and operators from one unit to another). Prioritization weights the main effort by ensuring the right forces have the required supplies and equipment to accomplish the most important tasks. 5-29. Lines of communication typically increase during attacks. Therefore, units consider forward positioning sustainment assets to increase their operational reach and flexibility. Units also consider the availability and feasibility of using aerial assets to augment ground-based sustainment operations. This includes the ability to execute aerial resupply and aerial medical evacuation. Units must not assume the friendly forces possess air supremacy or air superiority which may preclude the use of aerial assets to execute sustainment operations. 5-30. Units must balance positioning supporting sustainment assets forward to support the attacking force with maintaining force protection. Forward positioning sustainment assets can create a risk. If the enemy is able to target and destroy these assets, then they may force the culmination of friendly operations prior to their success. Commanders need to balance account for this risk when considering the placement of sustainment assets during an attack. From these forward locations, units can sustain attacking forces and when applicable, shift priority of support to the units conducting the main effort. As attacking forces advance, their supporting sustainment units and capabilities displace forward as required to shorten supply lines, using displacement techniques designed to ensure uninterrupted support to maneuver units. PROTECTION 5-31. Prioritization of protection tasks is vital to supporting an attack, however the prioritization will vary by echelon based on the resources and capabilities available. The mission variables guide the priorities or protection tasks and resources. Protections tasks that support the attack include but are not limited to: OPSEC, detention operations, CBRN operations, survivability operations, area security, and air and missile defense. PREPARING FOR AN ATTACK 5-32. Even in fluid situations, attacks are best organized and coordinated in assembly areas. Units may opt not to use assembly areas if they determine that rapid action is essential to retain tactical advantages. Detailed advance planning—combined with digital communications, SOPs, and battle drills—may reduce negative impacts of such a decision. 5-33. Attacking units move into their assembly areas during the preparation phase unless they are already located in their assembly area. They move with as much secrecy as possible, normally at night and along routes that prevent or degrade an enemy force’s capabilities to observe or detect their movement. They avoid congesting their assembly areas and occupy those areas for the minimum possible time. Units are responsible for their own protection activities, such as local ground security, while in their assembly areas. 5-34. Attacking units continue priorities of work to the extent the situation and mission allow before moving to attack positions. Preparations include but are not necessarily limited to— * Protecting the force. * Task-organizing. * Performing reconnaissance.
3-90
125
Attack * Refining the plan. * Briefing the troops. * Pre-combat checks. * Pre-combat inspections. * Moving logistics and medical support forward. * Conducting rehearsals. * Promoting adequate rest for both leaders and Soldiers. * Positioning the force for subsequent action. 5-35. Leaders at all levels conduct a reconnaissance of the actual terrain when this does not compromise OPSEC or result in excessive risk. In some areas, geospatial intelligence databases can enable leaders to conduct a virtual reconnaissance when a physical reconnaissance is not practical. Leaders should also reconnoiter the terrain at night when preparing for a limited-visibility attack. 5-36. A thorough reconnaissance of the objective, its foreground, and other enemy positions is a critical part of attack preparation. Units exploit all available information collection assets to provide commanders necessary information. This includes requesting joint surveillance feeds of enemy movements from higher echelons or imagery of enemy obstacles. 5-37. Reconnaissance forces infiltrate through the enemy disruption zone to conduct a zone or area reconnaissance. They can employ precision munitions and conventional indirect fires to destroy detected enemy outposts while remaining undetected. They locate and attempt to infiltrate the enemy’s main defensive positions to confirm enemy unit dispositions. When properly task-organized, units may also give forces conducting reconnaissance the mission to conduct covert breaches in the enemy force’s obstacle complexes to facilitate rapid movement of their parent units’ decisive or shaping operations. 5-38. Units exercise and refine their schemes of maneuver and fires during rehearsals. These rehearsals are an important part of ensuring their plans’ coordination and synchronization. Commanders review the anticipated battle sequence with subordinate leaders to ensure all units understand the plan, the relationship between fire and movement, and the synchronization of critical events as part of their rehearsal process. Sample critical events to focus on at rehearsals include— * Execution triggers. * Moving from assembly areas to individual unit LDs. * Maneuvering from the LD to the PLD. * Occupying support by fire positions. * Conducting a breach or gap crossing (as appropriate). * Assaulting the objective. * Consolidating on the objective. * Exploiting success or pursuing a withdrawing enemy. * Actions of echelon reserves. Units must also conduct separate, stand-alone warfighting function rehearsals such as sustainment, fires, and C2 as necessary. The rehearsals should account any adverse conditions that are possible which would provide time to identify and prepare them to cope with problems. These rehearsals include battle drills, such as breaching minefields at lower tactical echelons. 5-39. From their assembly areas, attacking units move to their attack positions. (See figure 5-2 on page 5-8.) Units move from assembly areas to the attack positions in the same way as for any other tactical movement. The number of columns each unit employs in its movement depends on the availability of suitable routes and the friendly and enemy situation. The tactical situation and the order in which commanders want subordinate units to arrive at their attack positions governs the march formation. The LD facilitates the simultaneous initiation of the attack at the prescribed time by all attacking units.
3-90
126
Chapter 5 Figure 5-2. Example control measures for movement from assembly area to attack position 5-40. Dismounted infantry units move by tactical vehicles to the maximum extent possible prior to the arrival of identified dismount points to avoid prematurely exhausting their Soldiers. However, dismounted infantry forces should not travel too far forward in tactical vehicles. Enemy forces can detect the noise and other battlefield signatures associated with using tactical vehicles at a greater distance than they can detect dismounted infantry Soldiers. An enemy force will probably respond to friendly tactical vehicles with direct and indirect fire systems. Units weigh the need for security against the time required to conduct a foot march and its resulting effects on their Soldiers’ physical stamina. 5-41. Units move rapidly through their attack positions and across LDs controlled by friendly forces. Units use their designated attack positions only as needed. For example, it is a place they refuel before crossing the LD to ensure sufficient fuel to reach the objective. Units use attack positions when friendly conditions have not yet been set. Units should minimize the time they remain stationary in their attack positions. Generally, units should initiate actions to protect themselves and increase their survivability every 10 to 15 minutes. This includes such things as deploying local security, deploying camouflage nets, and starting the construction of fighting and survivability positions. Units can use quartering parties to assist in occupying their attack positions. 5-42. Commanders may designate points of departure for their attacking units instead of an LD for units attacking on foot using infiltration and stealth. Armored and Stryker units normally use gaps or lanes through friendly positions to allow them to deploy into movement formations before they cross the LD. 5-43. Preliminary operations for an attack may include using preparation fire and the relief of units in contact by executing a relief in place or a forward passage of lines. The relief of units may be desirable to continue the momentum of the attack with fresh troops, change the direction of the attack, exploit a weakness in the enemy position with reserves, or initiate an offensive on a stabilized front. 5-44. Tactical commanders use artillery, mortar, fixed and rotary wing aircraft, electromagnetic warfare, and military information support operations to conduct preparation fire. They develop their preparation fire from the top down, with bottom-up refinement. Those subordinate units most affected by the effects of these preparation fires must strongly emphasize the bottom-up refinement process. Preparation fire can— * Destroy enemy forces. * Suppress, neutralize, or disrupt high-value or high-payoff targets.
3-90
127
Attack * Gain fire superiority. * Suppress enemy forces in their defensive positions. * Facilitate the attacking force’s maneuver. * Deceive enemy forces. * Isolate enemy forces. 5-45. These preparation fires may initially destroy or disrupt only the enemy’s reconnaissance and security forces and their positions if attacking forces are in contact with the enemy’s disruption zone. In either case, counterfires conducted as part of preparation fire can degrade the enemy’s fire support systems and assist in achieving fire superiority. 5-46. Commanders ensure that attacking maneuver forces have the functional and multifunctional support and sustainment assets necessary to conduct the operation and maintain the momentum of their attacks as part of the preparation process. That support and sustainment effort must anticipate future maneuvers to ensure the uninterrupted advance of maneuver forces. EXECUTING AN ATTACK 5-47. An attack consists of a series of advances and assaults by attacking units until they accomplish their mission. Commanders at all echelons use their initiative to shift their main effort among units as necessary to take advantage of opportunities and momentum to ensure the enemy force’s rapid destruction. Attacking units move as quickly as possible, following reconnaissance elements through gaps in the enemy force’s defenses. Units shift their efforts to reinforce success and carry the battle deep into the enemy force’s rear. Commanders do not delay their attacks to preserve the alignment of subordinate units or adhere too closely to their preconceived plans. 5-48. Units strive to retain their freedom of action while protecting their forces. They continually seek opportunities to defeat, destroy, or reduce the enemy force’s combat power or shatter the enemy force’s cohesion and capability to fight even if those opportunities deviate from their previous detailed plans for defeating the enemy force. Units avoid strict adherence to plans no longer appropriate to battlefield conditions. 5-49. Commanders avoid becoming so committed to their initial plan that they neglect opportunities. They remain mentally prepared to abandon failed attacks and exploit unanticipated successes or enemy errors by designating other units to conduct their main effort in response to changing situations. Commanders follow the tactical framework when attacking. FIND THE ENEMY 5-50. Gaining and maintaining contact with an enemy force, who is determined to break contact, is vital to the success of offensive actions. A defending enemy force generally establishes a disruption zone around those forces occupying the main line of defense to make early contact with attacking forces to determine their capabilities, intent, COA, and to disrupt their approach. An enemy unit uses that disruption zone to defeat friendly reconnaissance forces and hide enemy dispositions, capabilities, and intent. An enemy commander’s goal is to compel the attacking force to conduct a movement to contact against defending enemy forces that know the exact location of the attacking force. 5-51. Units employ their combat power to overwhelm enemy forces based on their situational understanding. However, echelons below division do not normally have the detection, tracking, and weapon systems necessary to conduct supporting efforts directed against enemy forces not currently committed to close combat. The way a unit gains and maintains contact depends on whether the unit is in contact with the enemy’s disruption zone or the enemy’s battle zone. It also depends on the echelon of the unit in the nested layers of reconnaissance and security. For example, the intent of a corps’ reconnaissance effort is to determine the dispositions, composition, direction of movement, and rate of movement of a defending enemy’s significant forces. A reinforced armored BCT, task-organized as a covering force or advance guard, can fight through most disruption zones, develop the situation, confirm information provided by technical means, and force enemy forces to reveal additional information prior to divisions executing close operations. This additional information often includes locating the enemy’s tactical and possibly operational reserves. At a
3-90
128
Chapter 5 lower echelon, a maneuver battalion constituting the advance guard of the main body of a BCT can use its scout platoon to conduct a zone reconnaissance that focuses on acquiring enemy positions and obstacles. 5-52. The ability of units to anticipate an enemy force’s actions by gaining and maintaining contact with all significant parts of their opposing enemy forces—to include tracking enemy reserves, fire support, and follow-on forces—increases the security of attacking forces. Units seek to detect enemy attempts to shift major elements of defending enemy forces or launch a counterattack. They can prevent enemy reconnaissance assets from detecting major friendly force attacking movements by sending out a force to conduct zone reconnaissance with an on-order security mission. The risks to an enemy force increase when friendly forces impede or deny success to enemy collection assets. These factors result in providing attacking units with additional time to take advantage of changing situations. Moving within an enemy force’s decision cycle allows friendly units to take advantage of successes by transitioning to the tasks of exploitation and pursuit and to complete the enemy’s destruction. FIX THE ENEMY 5-53. The purpose of fixing enemy forces is to prevent the enemy from repositioning within their battle zone. Every friendly move causes the enemy force to react. An enemy commander opposes friendly units attempting to fix enemy’s forces. Friendly units do everything possible to limit the options available to enemy forces. Fixing an enemy into a given position or COA and controlling the enemy force’s movements limit enemy options and reduce the amount of battlefield uncertainty and associated risk. 5-54. Units seek to fix enemy forces with the minimum amount of combat power. Commanders normally allocate the bulk of their friendly combat power to forces conducting their main effort. Thus, fixing operations are supporting efforts. Therefore, units carefully consider which enemy elements to fix and target only those that can significantly affect the outcome of their operations. The longer the requirement to fix these forces, the more resources units need to accomplish the mission. Generally, the support force engages enemy forces so they cannot respond to the friendly main effort. This may require units to slow the rate of movement of selected enemy units to prevent them from influencing the outcome of the operation. 5-55. Reducing uncertainty allows friendly forces to maneuver to mass the effects of overwhelming combat power against a portion of an enemy force. It gives units more time to modify their attack plan as necessary and synchronize their employment of friendly forces. It allows units to mass forces in one place by using economy of force measures in other areas. Units may also try to fix selected enemy units, such as the enemy reserve or follow-on force, to prevent them from repositioning or maneuvering against friendly forces conducting the main effort. 5-56. Severing enemy lines of communications and main supply routes over prolonged periods by using interdiction measures is another way to fix enemy forces. These measures can range from air interdiction that destroys bridges and rail switching yards to ambushes of enemy resupply convoys conducted by infiltrating combat patrols. 5-57. Another method of fixing enemy forces is to tie obstacles into the existing terrain to further canalize and slow the movement of enemy reserves. At lower tactical echelons, scatterable minefields can isolate objectives from possible enemy reinforcement or counterattacks and block or disrupt enemy actions to the flanks. Units can use tactical deception operations and activities, such as demonstrations and false preparation fires, to fix enemy forces. Using extensive obscuration and vehicle mockups in a tactical deception effort can also assist in fixing targeted enemy forces. 5-58. Another method of isolating the objective is to use lethal and nonlethal effects. Lethal effects may range from sniper fire to a joint fire plan designed to destroy a selected portion of an enemy force. Nonlethal effects, such as electromagnetic warfare, can prevent enemy forces from receiving orders or vital intelligence and information or disrupt enemy fire control systems. FINISH THE ENEMY 5-59. With the enemy force found and fixed, commanders maneuver subordinate forces to accomplish the mission. Units seek to avoid an enemy’s defensive strength by attacking through a point of relative weakness, such as a flank or rear.
3-90
129
Attack 5-60. The key to success is to strike hard and fast, overwhelm a portion of the enemy force, and then quickly transition to the next objective or phase. This maintains the momentum of the attack without reducing the pressure on enemy forces. Additionally, units make every effort to locate and track enemy reserves and follow-on forces to prevent friendly forces from unexpected attack by significant enemy forces. It also allows units time to delay, disrupt, or destroy these enemy forces before they can interfere with their attacks. 5-61. The rest of this section shows an example of how a friendly force would finish the enemy. It includes actions to disrupt the enemy; movement from the line of departure; actions at the probable line of deployment, assault position, final coordination line; and actions on the objective–both mounted and dismounted. Disrupting the Enemy 5-62. As part of finishing the enemy, friendly units disrupt the enemy force to increase the likelihood of success during the attack. Disrupting one or more parts of the enemy combined arms team creates multiple dilemmas for the enemy, weakens the entire enemy force, and allows friendly units to attack selected portions of the remaining enemy force. This disruption effort usually occurs at echelons above brigade because lower echelons lack the necessary reconnaissance, target acquisition, intelligence analysis, cyber and electromagnetic warfare, and target attack assets to engage enemy forces not committed to close combat. Their assessment and decisions regarding what to disrupt, when to disrupt, and for what purpose are critical Creating multiple dilemmas synchronized to deliver effects at the most opportune time overwhelms the enemy’s ability to command and control their forces and respond effectively. 5-63. For example, the goal of disrupting an enemy fire support system is to allow friendly forces to maneuver and mass the effects of their weapon systems against the enemy without the enemy’s indirect fire weapons being able to engage friendly forces. Attacking forces can accomplish this by attacking enemy forward observers, fire direction centers, command posts, artillery and rocket systems, or ammunition storage areas. Each set of targets requires a different amount of resources. The probability of success, the effectiveness of the attack, and the time necessary to achieve the desired target effects varies with each set of targets. Timing is also important. If units execute their associated supporting efforts too early, an enemy force may have time to recover and respond before friendly forces conducting their main effort can complete their maneuver. 5-64. Units seek to use the element of surprise to conduct operations that strike at enemy forces upon making any type of contact with enemy forces. This surprise denies enemy forces the opportunity to focus and synchronize combat power against attacking friendly forces. It prevents enemy forces from massing defending enemy forces or fires at critical times and locations. Surprise can produce confusion, fear, and piecemeal resistance. These operations disrupt both the enemy’s combined arms team and the enemy commander’s ability to plan operations and control enemy forces. These operations, once initiated, continue throughout their attacks. Units use any existing advantages over enemy forces in these areas to aid their disruption process through lethal and nonlethal effects. Movement from the Line of Departure 5-65. Units transition from movement to maneuver once they cross their LDs. If circumstances dictate crossing the LD not in their proper movement formation they establish a probable line of deployment to indicate where they will transition to their appropriate movement formation. They move aggressively and as quickly as the terrain and enemy situation allows. They move forward using appropriate movement techniques assisted by the fires of supporting units. Fire and movement are closely integrated and coordinated. Effective suppressive fires facilitate friendly movement, and friendly movement facilitates effective fires. Attacking units use avenues of approach that avoid strong enemy defensive positions, take advantage of all available cover and concealment, and maneuver forces to positions of advantage against the defending enemy forces. Units use obscurants to conceal their movement where cover and concealment are not available. Any delays in establishing obscuration and suppressive fires before crossing their LDs may require attacking units to occupy their assault positions. 5-66. Artillery and other ground-based fires assets move as necessary to ensure that attacking units remain within supporting range. Units analyze the time it takes maneuver units to move from their LDs to their PLDs and the distances involved. This analysis provides the data that units use to ensure supporting systems can
3-90
130
Chapter 5 provide the necessary fire support before their supported maneuver units move inside the effective range of enemy direct fire weapon systems. Units use fires delivered from fixed- and rotary-wing systems and the autonomous operation capabilities of artillery systems to help counter enemy artillery range advantages. 5-67. Units deploy to maintain maximum firepower against known enemy positions when they expect to make contact at or shortly beyond their LDs. Commanders select the formation that best balances firepower, tempo, security, and control for the specific situation. They have the option of deploying a security force in front of their attacking units. Units may also employ flank or rear security forces if required by the enemy situation. They may not want to change formations during the attack because of potential loss of momentum resulting from such changes. Attacking forces transition to the bounding overwatch movement technique when they expect enemy contact. See paragraphs 2-20 through 2-23 for more information on the bounding overwatch movement technique. 5-68. Between the LD and the PLD, attackers seize intermediate objectives only to eliminate enemy positions or apply additional suppressive fires. Artillery, rocket, electromagnetic warfare, and aerial assets engage targets of opportunity and enemy security forces. They direct subordinate forces to occupy predesignated support by fire positions as their units approach suspected enemy positions or danger areas. Lethal fires, suppression, and obscuration enable attacking forces to occupy these support by fire positions. Units use direct fires from these positions to suppress enemy forces while the rest of their formation continues to advance toward their objectives. 5-69. Units engage known enemy forces with the maximum combat power to overwhelm them as quickly as possible. Attacking units that encounter a small enemy unit on the way to their objectives either quickly overrun or bypass that small enemy unit if it meets the bypass criteria. Actions at the Probable Line of Deployment, Assault Position, or Final Coordination Line 5-70. Attacking units maintain their pace of advance as they approach their PLDs. Commanders divide their attacking units into one or more assault and support forces either before or on reaching the PLD. Infantry Soldiers dismount from their combat vehicles at their PLD, if necessary. All forces supporting the assault force are in their support by fire positions before the assault force crosses the PLD. Units synchronize the occupation of support by fire positions with the maneuver of their supported attacking units to limit the vulnerability of the forces occupying these positions. They use unit tactical SOPs, battle drills, prearranged signals, EAs, and target reference points (TRPs) to control the direct fires from these supporting positions. Units normally employ RFLs between converging forces. 5-71. Figure 5-3 shows that the PLD can be co-located or near the assault position. Units ensure that the final preparations of their breach forces in assault positions do not delay maneuver to breach points as soon as conditions are set. Whenever possible, assault forces rapidly pass through their assault positions. They may have to halt in their assault positions while supporting and suppressive fires lift and shift. In this case, if the defending enemy force anticipates the assault, assault forces deploy into covered positions, and obscure their positions with smoke. Support forces continue their suppressive fires on the objective for as long as assault forces remain in their assault positions.
3-90
131
Attack Figure 5-3. Example of a probable line of deployment and assault position 5-72. Once support forces create the conditions, breach forces reduce, proof, and mark the required number of lanes through the enemy force’s tactical obstacles to support the maneuver of assault forces. Commanders clearly identify conditions that allow their breach forces to proceed to avoid confusion. From their probable lines of deployment, assault forces maneuver against or around enemy forces to take advantage of support forces’ efforts to suppress targeted enemy positions. Support forces employ direct and indirect fires against selected enemy positions to destroy, suppress, obscure, or neutralize enemy weapons and cover the assault forces’ maneuver. Assault forces closely follow these supporting fires to accomplish their mission. Actions on the Objective 5-73. Units employ overwhelming and simultaneous fire, movement, and violence during their final assaults to finish the enemy. These violent assaults destroy, defeat, or drive enemy forces from their objective areas. Small units conduct the final assault while operating under the control of the appropriate echelon command post. Armored forces have the option of conducting this final assault in either a mounted or dismounted configuration. Stryker forces typically conduct the assault with their dismounted forces with support from their vehicles. 5-74. The key to forward movement when assault forces are under enemy direct fire is to return effective fire. Destructive or suppressive fires are most effective when fired by stationary support forces. These fires prevent enemy forces from firing effectively at moving assault forces. Support forces place a heavy volume of fires on enemy forces to destroy, neutralize, or suppress them once they are in position and assault forces are prepared to move. The ability of support forces to move to advantageous terrain is critical to ensuring success. They reduce their rate of fire to sustainable levels to conserve ammunition as assault forces close on their objectives once they suppress the enemy’s positions. This ensures that they have enough ammunition to support the assault. Support forces increase their rate of fire to ensure continued suppression when assault forces near their objectives. This allows assault forces to assault enemy positions before the enemy can react. Commanders provide specific signals for support forces to ceasefire, shift their fire to another target area, or walk their fire across the objective in front of the assault force. Alternatively, these later actions may occur when the assault begins.