FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-90
340
Chapter 17 Obstacle restricted areas is a command and control measure used to limit the type or number of obstacles within an area (JP 3-15). The commander with emplacement authority uses obstacle restricted areas to restrict obstacle placement. The graphic for obstacle restricted areas depicts the impacted area, the unit imposing the restriction, and the restrictions in effect. (See ATP 3-90.8/MCTP 3-34B for more information on obstacle control measures.) Figure 17-1. Obstacle control measures and intent symbols
3-90
341
Chapter 18 Mobility Mobility is a combined arms activity. This chapter focuses on mobility and the different mission and tasks associated with combined arms mobility. MOBILITY 18-1. Freedom to move and maneuver in an operational area is essential to the application of combat power and mission accomplishment. The operational environment will present numerous challenges to movement and maneuver. Combined arms mobility overcomes these challenges by integrating the framework of assured mobility in support of offensive, defensive, and other enabling operations. 18-2. Mobility is a quality or capability of military forces which permits them to move from place to place while retaining the ability to fulfill their primary mission (JP 3-36). Mobility is necessary for the conduct of successful offensive operations. When discussing Army tactics, mobility includes both movement and maneuver, generally, applying to both collectively unless stated as movement or maneuver. Its major focus is to enable friendly forces to move and maneuver freely on the battlefield or an assigned area. Units require the capability to move, exploit, and pursue the enemy across a wide front. 18-3. When attacking, the commander wants to concentrate the effects of combat power at select locations. This may require the unit to improve or construct combat trails through areas where routes do not exist. The surprise achieved by attacking through an area believed to be impassable may justify the effort expended in constructing these trails. The force bypasses existing obstacles that are identified before starting the offense instead of breaching them, when possible. However, this must be done with caution because it might give the enemy an advantage. Bypassed obstacles are reported to higher headquarters, and they are marked as the situation allows. 18-4. Maintaining the momentum of an offensive operation requires the attacking force to quickly pass through obstacles as it encounters them. This involves a deliberate effort to capture enemy bridges and other enemy reserved obstacles intact. In some cases, using air assault and airborne forces is an effective technique to accomplish this goal. Hasty breaching is the preferred method when time and resources are unavailable to conduct a deliberate breach. The commander plans how and where subordinate forces conduct breaching. 18-5. Rivers and other gaps larger than navigable by mounted and dismounted forces remain major obstacles despite advances in high-mobility vehicles and increased aviation support. Wet-gap crossings are among the most critical, complex, and vulnerable combined arms missions. While units conduct hasty crossings, when possible, they continue the attack with speed. Operational risk is much higher with hasty crossings, and staff planning must still incorporate the breaching tenets and gap crossing fundamentals. The size of the gap and the enemy and friendly situation will dictate the specific tactics, techniques, and procedures used in conducting the crossing. Gap crossing includes the deliberate, hasty, and covert capabilities. Initial combat crossings may be further developed in support of LOCs. MOBILITY TASKS 18-6. Mobility tasks are combined arms activities that mitigates the effects of obstacles to enable freedom of movement and maneuver (ATP 3-90.4/MCTP 3-34A). There are six primary mobility tasks: * Breach. * Gap crossing. * Clear (areas and routes). * Combat roads and trails.
3-90
342
Chapter 18 * Construct and maintain forward airfields and landing zones. * Traffic management and enforcement. Note. Chapter 18 only discusses breaching, gap crossing, and clearing. For additional information on combat roads and trails, forward airfield and landing zones, and traffic management and enforcement, see ATP 3-90.4/MCTP 3-34A. 18-7. Mobility tasks are conducted to enable friendly forces to move and maneuver freely on the battlefield. Mobility tasks depend on information collection and intelligence. Breaching and gap crossing in support of maneuver are primarily conducted using combat engineer units that have, or are augmented by, gap-crossing equipment. Gap-crossing equipment includes the rapidly emplaced bridge system that is organic to the Stryker BCT and the joint assault bridge organic to the armored BCT. Units may also receive gap crossing assets from echelons above brigade such as those typically found in a multi-role bridge company. These echelons above brigade assets may include the dry support bridge fixed bridging for dry-gaps or the improved ribbon bridge, which is also capable of rafting, for wet-gap crossing. 18-8. Typically, BCTs are able to execute breaches, dry-crossing, and wet- gap crossings up to a certain width with little assistance from a division or corps headquarters. Any wet-gap crossing that requires a multi- role bridge company will usually be at least a division level operation and require additional assistance from a corps. Engineers at all echelons and can conduct clearing operations. BREACH 18-9. A successful obstacle breach is a synchronized and rehearsed combined arms activity, under the control of the maneuver unit. Breaching is a mission undertaken to execute a breach. Breaching allows maneuver despite the presence of the enemy reinforcing obstacles with direct and indirect fire. For additional information, see paragraph Chapter 20B-7. 18-10. Breaching begins when friendly forces detect an obstacle and begin to apply the breaching fundamentals. Breaching ends when battle handover occurs between follow-on forces and the unit conducting the breach. A breach includes the reduction of minefields, other explosive hazards, and other obstacles. Generally, breaching requires significant combat engineer support to accomplish. 18-11. Reduction is the creation of lanes through a minefield or obstacle to allow passage of the attacking ground force (JP 3-15). A lane is a route through, over, or around an enemy or friendly obstacle that provides passage of a force (ATP 3-90.4/ MCTP 3-34A). The route may be reduced and proofed as part of breaching, constructed as part of the obstacle, or marked as a bypass. The number and width of lanes vary depending on the enemy situation, size and composition of the assaulting force, and the scheme of movement and maneuver. Proof is the verification that a lane is free of mines or explosive hazards and that the width and trafficability at the point of breach are suitable for the passing force (ATP 3-90.4/ MCTP 3-34A). Proofing can be conducted visually, electronically, or mechanically. Some mines are resistant to reduction assets and may require a combination of breaching techniques; for example, magnetic and double impulse mines may resist a mine clearing line charge blast. Proofing is an important component of breaching considering the wide variety of explosive obstacle threats in use today. Breach Control Measures 18-12. The breach area is a defined area where a breach occurs (ATP 3-90.4/ MCTP 3-34A). It is established and fully defined by the higher headquarters of the unit conducting the breach. Within the breach area is the point of breach, the reduction area, the far side objective, and the point of penetration. Their definitions follow in paragraphs 18-13 through 18-16. 18-13. Point of breach is the location at an obstacle where the creation of a lane is being attempted (ATP 3-90.4/ MCTP 3-34A). Initially, points of breach are planned locations only within the directed breach area. Normally, the breach force determines the actual point of breach during the breach. 18-14. Reduction area is a number of adjacent points of breach that are under the control of the breaching commander (ATP 3-90.4/ MCTP 3-34A). The commander conducting the attack determines the size and
3-90
343
Mobility location of the reduction area that supports the seizure of a point of penetration. The reduction area is indicated by the area located between the arms of the control graphic for breach. As shown in figure 18-1, the length and width of the arms extend to include the entire depth of the area that must be reduced. 18-15. Far side objective is a defined location oriented on the terrain or on an enemy force that an assaulting force seizes to eliminate enemy direct fires to prevent the enemy from interfering with the reduction of the obstacles and allows follow-on forces to move securely through created lanes (ATP 3-90.4/ MCTP 3-34A). A far side objective can be oriented on the terrain or on an enemy force. The higher headquarters assigns the objective; however, the attacking unit normally subdivides the objective into smaller objectives to assign responsibilities and to control and focus the assault of subordinate forces. When breaching as part of a larger force, seizing the far side objective provides the necessary maneuver space for the higher unit follow-on forces to move securely through the lanes, assemble or deploy, and continue the attack without enemy interference. 18-16. Point of penetration is the location, identified on the ground, where the commanders concentrate their efforts at the weakest point of the enemy to seize a foothold on the far side objective (ATP 3-90.4/ MCTP 3-34A). This is achieved along a narrow front through maneuver and direct and indirect fires that are accurately placed against enemy forces. A commander conducting a breach establishes a point of penetration that supports planning locations for the reduction area and the seizure of the far side objective. Figure 18-1. Breach Breach Types 18-17. Breaching activities must be adapted to best exploit the situation. The level and type of planning distinguish which of the three general types of breaching: * Deliberate. * Hasty. * Covert.
3-90
344
Chapter 18 Deliberate Breach 18-18. A deliberate breach is the systematically planned and executed creation of a lane through a barrier or obstacle (ATP 3-90.4/MCTP 3-34A). Typically, a unit uses a deliberate breach against a strong defense or complex obstacle system. It is characterized by the most planning, preparation, and buildup of combat power on the near side of obstacles. It is similar to a deliberate attack, requiring detailed knowledge of the defense and obstacle systems. Subordinate units are task-organized to accomplish the breach. The breach may require securing the far side of the obstacle with an assault force before or during reduction. Hasty Breach 18-19. A hasty breach is the creation of lanes through enemy minefields by expedient methods such as blasting with demolitions, pushing rollers or disabled vehicles through the minefields when the time factor does not permit detailed reconnaissance, deliberate breaching, or bypassing the obstacle (JP 3-15). A hasty breach is an adaptation to the deliberate breach and is conducted when less time is available. It may be conducted during a deliberate or hasty attack due to lack of clarity on enemy obstacles or changing enemy situations. 18-20. An in-stride breach is a type of hasty breach used to describe the situation when a subordinate unit is expected to be able to organize for a conduct a hasty breach with its organic or task-organized assets, without affecting the higher unit scheme of movement and maneuver or commander’s intent. In-stride breach is generally not used below the company level since a platoon is unable to form effective support, breach, and assault forces with its squads. Covert Breach 18-21. A covert breach is the creation of lanes through minefields or other obstacles that is planned and intended to be executed without detection by an adversary. Its primary purpose is to reduce obstacles in an undetected fashion to facilitate the passage of maneuver forces. A covert breach is conducted when surprise is necessary or desirable and when limited visibility and terrain present the opportunity to reduce enemy obstacles without being seen. Through surprise, the commander conceals their capabilities and intentions and creates the opportunity to position support and assault forces to strike the enemy while unaware or unprepared. The support force does not usually provide suppressive fire until the initiation of the assault or in the event that the breach force is detected. Covert breaches are usually conducted during limited visibility. It uses elements of deliberate and hasty breaching, as required. Breaching Tenets 18-22. Successful breaching missions are characterized by applying breaching tenets. See table 18-1. These tenets are integrated into the planning process. The tenets are— * Intelligence. * Breaching fundamentals (suppress, obscure, secure, reduce, and assault [SOSRA]). * Breaching organization. * Mass. * Synchronization. See ATP 3-90.4/MCTP 3-34A for more information on the breaching tenets. Breach Fundamentals 18-23. Breaching fundamentals are integrated into the planning process and applied when a defended obstacle must be reduced. This includes breaching, gap crossing, and route clearance missions. The fundamentals are described by the memory aid SOSRA: * Suppress. * Obscure. * Secure. * Reduce.
3-90
345
Mobility * Assault. See ATP 3-90.4/MCTP 3-34A for information on breaching. Table 18-1. Breaching tenets Breaching Tenets Actions Intelligence Template enemy obstacles on the SITEMP for each enemy COA during IPB based on— • The enemy ability to emplace obstacles based on its capabilities (manpower, equipment, and materials) and time available. • The effects of terrain and weather. • The range of enemy weapon systems covering obstacles and emplacing scatterable mines. Develop information requirements on enemy engineer units, equipment, activities, and obstacles (location, composition, and mine types). Integrate information requirements and engineer reconnaissance capabilities into the information collection plan. Breaching Implement fire control measures to allow the support force to provide effective fundamentals direct and indirect suppressive fires (suppress). (SOSRA) Determine the placement (wind condition), density, and timing of placing obscurants on enemy positions and placing screening obscuration between the enemy and the reduction area (obscure). Resource the breach force based on the combat power of enemy forces overwatching the obstacle (secure). Determine the number and width of lanes based on the scheme of movement and maneuver (one lane per company and two lanes per battalion), determine reduction methods (explosive, mechanical, or physical), and establish a lane marking system (reduce). Complete the breach by destroying the enemy on the far side of the obstacle (assault). Breaching Suppress enemy direct fire and observed indirect fires on the reduction area organization (support force). Control indirect fires and indirect fire obscuration within the breach area (support force). Prevent the enemy from repositioning or counterattacking to place direct fires on breach force (support force). Create and mark lanes for the breach element (breach force). Secure the obstacle near side and far side for the security element (breach force). Report lane status and location (breach force). Assault through the obstacle and destroy the enemy on the far side (assault force). Mass Mass effects to create enemy weakness at the POB. Prevent enemy from massing effects at the POB. Synchronization Conduct detailed reverse planning. Communicate clear instructions to subordinate units. Provide effective command and control. Perform combined arms rehearsals. COA course of action POB point of breach IPB (Army) intelligence preparation of the SITEMP situation template battlefield SOSRA suppress, obscure, secure, reduce, and assault Suppress 18-24. Suppressive fires in sufficient volume serve to secure the reduction area. The purpose of suppression during breaching is to protect forces reducing obstacles and maneuvering through the reduction area.
3-90
346
Chapter 18 Successful suppression generally triggers the rest of the actions at the POB. Fire control measures ensure that all fires are synchronized with other actions at the POB. The mission of the support force is to suppress the enemy overwatching the obstacle. The breach force also provides additional suppressive fires as the situation dictates; however, it’s primary roles are first, to secure the near side objective, and then to reduce the obstacle. 18-25. In complex or restrictive terrain, effective suppression may have to be achieved through close-in fighting. Defenders will tend to be more fortified when defending in urban terrain and may be more difficult to suppress. Forces tasked with suppressing the enemy may find it necessary to seize terrain at or on the far side of the obstacle to achieve their mission. Fighting to achieve enemy suppression will likely be decentralized, and the ability to use indirect fires will be restricted due to the proximity of friendly and enemy forces and civilians. Obscure 18-26. Breach forces conduct breaching using available natural cover and concealment. They employ battlefield obscuration, which hampers enemy observation and target acquisition of the breach force as it reduces the obstacle and the assault force as it passes through the obstacle. Obscuration requires close coordination, control, and detailed planning to maximize the desired effects on the enemy while not degrading friendly capabilities. This is especially important when conducting breaching in complex or restrictive terrain due to the close-in nature of the fighting. In urban areas, indirect delivered obscuration and suppressive fires will be more restricted. In some situations, using mortars (because of the ability to fire high-level trajectory), smoke pots, and smoke grenades rather than artillery-fired obscurants may be more effective. Planners consider the effects of wind and the time and assets required to build and maintain effective obscuration for the desired duration. Using indirect fire to provide obscuration often competes with other mission requirements and requires priorities to be established. Obscuration employed in multiple locations and at various times can confuse the enemy on the specific location and timing of breaching. (See ATP 3-11.50 for more information on obscuration.) Secure 18-27. Forces conducting a breach secure the reduction area to prevent the enemy from interfering with obstacle reduction and the passage of the assault force through the created lanes. The reduction area must be secured before attempting to reduce the obstacle. The higher headquarters breaching unit is responsible for isolating the breach area by fixing enemy forces in their current positions, attacking enemy reserves in-depth, and providing counterfire. 18-28. Identifying the extent of the enemy defense is critical in selecting the appropriate technique to secure the point of breach. The point of breach is secured before reducing the obstacle. 18-29. The breach force is resourced with sufficient maneuver assets to provide local security against the enemy that the support force cannot adequately engage. Elements within the breach force that secure the reduction area may also be used to suppress the enemy once reduction is complete. Breaching elements prepare their breaching assets for employment throughout the secure phase. Reduce 18-30. Normally, engineers and reduction assets (mobility capabilities) are used to reduce an obstacle. The number and width of lanes needed depend on the enemy situation, terrain, size and composition of the assault force, and scheme of maneuver. The lanes must allow the assault force to pass through the obstacle rapidly. In complex or restrictive terrain, the assault force may be constrained to a single lane and the assault force commander must ensure that the sequencing of forces through the lane is appropriate to achieve the mission. The breach force will reduce, proof, mark, and report lane locations and the lane marking method to higher headquarters. Follow-on units will further reduce or clear the obstacle, as required. Reduction begins when effective suppression and obscuration have been established, the obstacle has been confirmed, and the reduction area is secure.
3-90
347
Mobility Assault 18-31. A breach is complete when the attacking force has assaulted through the obstacle, seized the far side objective, eliminated enemy direct and observed indirect fires on the reduction area and, if planned, the battle handover with follow-on forces. Engineers support the flow of combat forces through the lanes or bridges to build combat power quickly on the far side. These forces may entail follow-on breakout forces if the initial assault forces culminate or establishes defensive areas to manage operational reach and sustainment for future operations. Breach Organization 18-32. Units organize into the following three forces to conduct a breach: * Support. * Breach. * Assault. Establishing the breach organization facilitates the application of the breaching fundamentals. Table 18-2 shows the responsibilities of the support, breach, and assault forces. Table 18-2. Support, breach, and assault force responsibilities Breach Responsibilities Organization Suppress an enemy capable of placing direct fires on the reduction area to protect the breach force as it reduces the obstacle and the assault force as it passes through the created lane. Support force Fix enemy forces to isolate the reduction area. Control obscuration. Control other suppressive effects such as electromagnetic warfare and air and missile defense. Reduce, proof, and mark the necessary number of lanes through the obstacle. Report the status and location of created lanes. Provide local security on the near side and far side of the obstacle. Breach force Provide additional suppression of enemy overwatching the obstacle. Provide additional obscuration in the reduction area. Assist the passage of the assault force through created lanes. Seize the far side objective. Reduce the enemy protective obstacles. Provide clear routes from the reduction area to the battle handover line for follow-on forces. Prevent the enemy from placing direct fires on follow-on forces as they pass through the Assault force created lanes. Conduct battle handover with follow-on forces. Provide reinforcing fires for the support force. Destroy the enemy on the obstacle far side that is capable of placing direct fires on the reduction area. Planning a Breach 18-33. Units use the reverse planning process when planning a breach. The reverse planning process begins with actions on the objective and moves backward to the LD, since seizing an objective is typically the decisive point at the tactical level and directly tied to mission accomplishment. Maneuver planners use reverse planning and force ratios to determine the size and composition of the maneuver forces that will perform the tasks that support the main and supporting effort for each COA. Actions on the objective drive the size and composition of the force that conducts the final assault onto the objective as part of an attack, which dictates lane requirements (the number and location of required lanes). Lane requirements and the
3-90
348
Chapter 18 composition of obstacles drive the amount and type of reduction assets needed by the breach force. The engineer staff officer and other planners use reverse planning to determine how best to allocate mobility assets within the arrayed forces to facilitate the scheme of movement and maneuver for each COA. The engineer staff officer focuses on the allocation of reduction assets. The situational template depicting enemy direct- and indirect fire coverage of template enemy obstacles determines the size and composition of the support force. Reverse planning for breaching is performed using the following steps: * Step 1. Identify available reduction assets. * Step 2. Template enemy obstacles. * Step 3. Understand the scheme of movement and maneuver. * Step 4. Identify the number of required breach lanes. * Step 5. Identify the assets required to reduce, proof, and mark lanes. * Step 6. Task-organize reduction assets within the maneuver force. See ATP 3-90.4/MCTP 3-34A for more information on the reverse planning process for a breach. 18-34. Successful breaching depends on preparation and planning. During preparation, units continue to review IPB products against the current situation and redirect information collection assets to focus on the most important requirements remaining, while emphasizing the commander’s critical information requirements. Plans are continuously refined based on IPB updates and reporting from information collection assets. 18-35. Key preparation activities for breaching include— * Planning refinement based on IPB updates and reporting from information collection assets, to include adjustments to the breach organization (support, breach, and assault forces), the scheme of movement and maneuver, and the fire support plan. * Implementing the task organization (breach organization), to include coordinating the linkup of breaching assets (units and equipment) with the supported unit to allow combined arms breaching rehearsals to be conducted. * Performing pre-combat checks and inspections. * Rehearsals with key breaching assets. * Position and staging of breaching assets. 18-36. A breaching rehearsal site should reflect the actual obstacle system in as much detail as possible based on obstacle intelligence. At a minimum, rehearsals should include a leader and key personnel walk- through and individual rehearsals by support, breach, and assault forces. As time permits, full-scale rehearsals should be conducted. When possible, friendly forces rehearse the mission under the same conditions (obscuration and darkness) expected during the actual mission. Rehearsals should also include contingencies such as enemy counterattacks and attacks by enemy indirect-fire systems, attack helicopters, other air assets, and enemy use of CBRN material. If updates become available after the last possible rehearsal, the information should be immediately passed on to affected elements. A key output of rehearsals is that all participants understand unit-specific brevity codes, and signals associated with the breach. 18-37. Executing task organization changes of critical reduction assets during mission execution may be required. This situation presents even more challenges, especially with regard to terrain management, because unit positions and fire control measures may have shifted. War gaming these actions during mission planning and rehearsals, implementing the necessary control measures, and coordinating instructions are critical to avoid fratricide.
3-90
349
Mobility Execution 18-38. Execution involves monitoring the situation, assessing the mission, and adjusting the order as needed. When the situation deviates from the order, commanders direct adjustments to exploit opportunities and counter threats. Adjustments that may be necessary during breaching might include— * Allocating additional assets to the support, breach, or assault force due to attrition. * Changing the location of the POB or point of penetration. * Modifying the scheme of movement and maneuver and changing the order of the units passing through the created lane. 18-39. For breaching, the commander focuses on monitoring, assessing, and adjusting the critical events of a breach that were rehearsed. The critical events that are generally associated with a breach are— * Occupying support by fire positions. * Suppressing the far side objective. * Employing obscuration. * Reducing the obstacle. * Assaulting the far side objective. * Consolidating on the far side objective. * Passage of follow-on forces. GAP CROSSING 18-40. A gap is a ravine, mountain pass, river, or other terrain feature that presents an obstacle that may be bridged (ATP 3-90.4/MCTP 3-34A). Gap crossing in support of maneuver is similar to a breach in that the force is vulnerable while moving through a lane or across a gap. Maneuver units are forced to break movement formations, concentrate within lanes or at crossing points, and reform on the far side before continuing to maneuver. While much of the terminology and planning associated with gap crossing is the same as that used in a breach, gap crossing and breach differ in scope. The amount and type of assets involved also differ. Combined arms breaching sometimes includes gap crossings as a reduction method. Since the primary focus of planning and preparation is on the breach, they are typically discussed as a subordinate part of the breach rather than as a separate gap crossing. 18-41. Gaps will exist in the operational environment and present a significant challenge to movement and maneuver. A gap crossing is the projection of combat power across a linear obstacle (wet or dry gap) (ATP 3-90.4/MCTP 3-34A). Historically, gap crossings were described only in the context of crossing rivers. A river crossing is a special type of gap crossing required before ground combat power can be projected and sustained across a water obstacle. A centrally planned and controlled offensive mission requires the allocation of specialized crossing resources and a force dedicated to the security of the bridgehead. While river crossing is still considered one of the most challenging of gap crossings, a river is only one type of gap that can obstruct freedom of mobility. The fundamentals of crossing any type of gap are essentially the same as those fundamentals that have been associated with river crossing. River crossings are simply one focused set of challenges among all of the possible types of gap crossings. A gap crossing encompasses wet or dry gaps in any type of environment or uses organic and augmenting engineer (and other) elements best suited to accomplish the mission. Types of Gap Crossing 18-42. The gap crossing types are― * Deliberate. * Hasty. * Covert. 18-43. Each gap crossing type has a general list of conditions that help define the category. The planning requirements for each type of gap crossing are similar. However, the required degree of detail and necessary conditions for a high degree of success will vary based on the type and the unique features associated with a crossing mission. In all cases, the ability to conduct any type of crossing begins by providing a crossing force
3-90
350
Chapter 18 with the necessary gap-crossing means and control elements and identifying those requirements early during planning. Note. A retrograde gap crossing is not a fourth type of gap crossing. In reality, it is merely a variation of a deliberate or hasty gap crossing, and it is typically performed as a deliberate gap crossing. It may be performed with or without enemy pressure on the crossing force. Clearly, it is more difficult when performed under enemy pressure. Deliberate Gap Crossing 18-44. A deliberate crossing is the crossing of an inland water obstacle or other gap that requires extensive planning and detailed preparations (ATP 3-90.4/MCTP 3-34A). A deliberate gap crossing is classified as wet or dry, and it is usually accomplished with one or more bridge companies in support of combat maneuver. It is normally accomplished when a hasty crossing is not feasible or has failed. Any deliberate crossing requires detailed reconnaissance, detailed planning, coordination of fire plans, extensive preparations and rehearsals, and significant engineer assets. While a BCT is capable of making a deliberate crossing, this type of crossing normally requires a higher headquarters to assist in planning and command and control since it generally involves more than one BCT. Deliberate crossings can involve general and combat engineering elements. Some additional considerations for conducting deliberate gap crossings include the— * Complexity and the assets required to accomplish the crossing. * Opposition from a defending enemy and obstacle severity. * Necessity to clear entry and exit crossing points of enemy forces. 18-45. Normally, deliberate crossings involve gaps that are greater than 65 feet (20 meters). A gap of this length limits the effectiveness of tactical bridging assets, and the gap will typically require other bridging assets. Crossing gaps of this magnitude normally require support bridging in the form of float bridging (wet- gap) or other types of standard bridging (dry-gap). Deliberate Wet-Gap Crossing 18-46. The deliberate wet-gap crossing is one that requires the use of rafting (non-bridging) and bridging assets. The use of assault craft (boats and helicopters), rafting, or ferries and the emplacement of bridging assets may occur sequentially or concurrently. The objective in deliberate wet-gap crossings is to project combat power to the exit bank of a river or other type of significant water obstacle at a faster rate than the enemy can concentrate forces for a counterattack. Typically, wet-gap crossings are one of the most difficult types. They generally require significant augmentation of mobility support assets. Deliberate Dry-Gap Crossing 18-47. Deliberate dry-gap crossings are usually determined by the strength of the enemy defense and the magnitude of the gap. These assets are labor intensive and expose personnel to enemy fire during construction, while providing stable gap-crossing support for continuous mobility. Hasty Gap Crossing 18-48. A hasty crossing is the crossing of an inland water obstacle or other gap using the crossing means on hand or those readily available and made without pausing for elaborate preparations (ATP 3-90.4/MCTP 3-34A). Hasty gap crossings are usually focused on a combined arms activity to project combat power across a terrain feature (wet or dry) that can be overcome by self-bridging assets within the BCT. These assets may be organic, provided to the BCT as augmentation, or found as expedient crossing materials within the assigned area. Typically, a hasty gap crossing is a gap that is under 20 meters (65 feet) or less in width. They are normally accomplished with tactical bridging assets. 18-49. Hasty gap crossings are most often used when enemy resistance is weak, and the gap is not a severe obstacle. Hasty gap crossings also feature decentralized control at the BCT level and below, using a task- organized mobility augmentation company, organic assets, or expedient crossing means at multiple sites along a broad front. Due to the limited organic crossing assets, additional support from echelons above the
3-90
351
Mobility BCT is often necessary. That support is only available when those headquarters have taken purposeful action to position the assets at the right time and place and to integrate them with the maneuver force to make a hasty gap crossing feasible. Coordination for these assets must be made early in the planning phase. Some additional considerations for conducting hasty gap crossings include the— * Size of the gaps in the maneuver area. * Availability of existing bridges, fords, bypasses, or expedient crossing materials. * Recovery of assets. * Aviation (rotary-wing) asset availability. 18-50. A hasty crossing is conducted in an effort to maintain the momentum of the maneuver force by quickly massing combat power on the far side of the gap with no intentional pause. This promotes speed, facilitates surprise, and provides a continuation of maneuver momentum. The planning process is critical to identify gap locations and their dimensions and request or allocate the necessary assets to ensure unimpeded movement. 18-51. Hasty crossings are planned, organized, and executed much like a hasty breach. The unit must consider the integration of the crossing assets in its movement formation, redundancy in crossing means, traffic flow across the gap, and the recovery of the crossing assets. Units task-organize their force in a manner that supports the overall mission and facilitates a successful gap crossing followed by a quick recovery. To accomplish gap crossing efficiently, bridging assets should be in a position within the maneuver formation where positive control can be maintained. This is an important consideration, as all gap-crossing equipment does not have the necessary communications means to maneuver effectively as maneuver formations. Additionally, some of the gap-crossing equipment is less maneuverable and slower than the combat vehicles support and it is also less survivable in some cases. This may slow down the movement speed for the maneuver elements. In spite of these challenges, proper planning and command and control can minimize these negative impacts. 18-52. Two other considerations are the desirability for redundancy of crossing equipment and the capability to rapidly recover the crossing means. Tactical bridging is designed with these considerations in mind. Commanders should plan on the use of multiple crossing means, depending on the criticality of the crossing and the time available. The terrain, transporter, and bridge maintenance, as well as crew training, rehearsals, and experience can impact bridge launch and recovery. 18-53. The recovery of crossing assets and transition after the crossing is important for units to sustain their momentum. Typically, units can expect crossing assets to recover and join the maneuver force on the far side of the gap. The units have at least two options: * The unit can halt movement on the far side of the gap and wait for the crossing asset to recover the bridge. * The unit can continue movement and leave an adequate security force during the recovery, which can also assist the crossing asset in rejoining the maneuver force. If the assets are intended to stay with the unit, consideration must be given to follow-on support or LOC bridging assets to ensure that support or follow-on forces can adequately continue to follow the maneuver force. The higher headquarters may direct the unit to keep its crossing assets in place for follow-on forces to use, which will degrade or eliminate that unit’s ability to cross any subsequent gaps unless it has been resourced with sufficient tactical bridging. If the higher headquarters intends for tactical bridging to remain in place, it must augment the unit with sufficient assets to accomplish this task while retaining sufficient tactical gap-crossing capability to facilitate continued maneuver and movement. 18-54. Because a gap crossing constricts and splits the maneuver force at the crossing site, the plan must be flexible enough for the commanders or their designated representative to execute decisions based on acceptable opportunity and threat variances. The unit’s command post can assist the command group by controlling the execution of the crossing and maintaining a status of the location and operational readiness of the crossing assets.
3-90
352
Chapter 18 Hasty Wet-Gap Crossing 18-55. The depth and width of the wet gap, bank conditions, and the current velocity are major factors that impact the ability of a maneuver unit to conduct a hasty wet-gap crossing. These factors will determine if the maneuver force can cross by fording, if expedient materials can be used, or if specific bridging assets are required. Identifying wet gaps early and deploying the required resources allow hasty crossings of known or anticipated gaps to occur. Hasty Dry-Gap Crossing 18-56. An antivehicle ditch, crater, dry riverbed, partially blown bridge, or similar obstacle is normally what maneuver forces encounter as a dry-gap crossing obstacle. Maneuver forces can use equipment to push down the sides of ditches or fill in craters. Substantial fill material placed in the dry gaps allows the passage of combat tracked vehicles. The crossing site can be improved and maintained for wheeled traffic use by follow-on forces. In-Stride Gap Crossing 18-57. The in-stride gap crossing is a variant of the hasty gap (wet or dry) crossing that consists of a rapid gap-crossing adaptation conducted by forces organic to (or task-organized with) the attacking force. It consists of preplanned, well-trained, and well-rehearsed gap-crossing battle drills and the use of the unit SOPs. The in-stride gap crossing takes advantage of surprise and momentum to bridge or defeat gaps and relies on good and timely reconnaissance for its success as well. The force uses the in-stride gap crossing against weak defenders or very simple gaps and executes the battle drills on the move. Attacking maneuver forces generally move configured to be able to execute an in-stride gap crossing, except when a deliberate gap crossing is planned. In-stride gap crossings may occur when a gap is not the same as the unit planned or anticipated. To conduct an in-stride crossing, the unit must be well trained, have established SOPs, and be task-organized with the necessary tactical bridging assets and capabilities. 18-58. Generally, the battalion is the principal unit to plan, coordinate, and control an in-stride gap crossing; but a company will normally conduct the actual crossing. The battalion will normally designate specific support forces, and it is responsible for synchronizing the breaching fundamentals as they apply to a gap crossing through detailed planning and well-rehearsed immediate action drills. (See paragraph 18-23 for breaching fundamentals.) 18-59. The commander planning for an in-stride gap crossing must also plan for a transition to a deliberate gap crossing should an in-stride gap crossing be unsuccessful. An unclear situation (enemy and exact gap dimensions and conditions) will make it necessary for several lead company-sized units to be capable of conducting an independent gap crossing. Accurate and timely reconnaissance of the gap (obstacle) and the enemy force that defend the gap set the conditions for properly focusing the location of the in-stride gap crossing. Covert Gap Crossing 18-60. A covert crossing is a planned crossing of an inland water obstacle or other gap in which the crossing is intended to be undetected (ATP 3-90.4/MCTP 3-34A). The primary purpose of the covert crossing is to facilitate undetected infiltration of the far side of a gap. Battalion and smaller forces normally conduct a covert crossing. It is used when surprise is essential to infiltrate over a gap and when limited visibility and terrain present the opportunity to reduce or defeat the enemy obstacle (gap) without being seen. Through surprise, the commander conceals capabilities and intentions and creates the opportunity to position support and assault forces to strike the enemy unaware or unprepared. Like a covert breach, it is normally conducted by a battalion or smaller unit (dismounted or in wheeled vehicles). A BCT is typically too large to maintain the level of stealth necessary to conduct a successful covert gap crossing. A covert gap crossing requires a level of detailed planning, information collection, and command and control that is normally beyond the capability of a company. 18-61. A covert gap crossing can be used in a variety of situations to support various missions but should be considered (as opposed to deliberate or hasty) only when there is a need or opportunity to cross a gap without being discovered. The covert crossing can be used to cross forces that will support a follow-on
3-90
353
Mobility crossing of a larger or similar size element; however, it is planned and conducted as a separate mission. If conducted as a mission that does not involve crossing additional elements, planning and consideration should be given to the recovery of the crossing assets. If the crossing is a precursor to a larger, follow-on crossing, recovery of the crossing assets may be accomplished as part of that follow-on task. If the covert gap crossing is being used as a precursor to a deliberate crossing and is detected by the enemy, the higher headquarters may need to reevaluate other potential crossing sites before conducting the deliberate crossing. A contingency plan must always be included in the planning of covert missions in the event that the mission is compromised. A covert crossing should not be confused with the assault phase of a deliberate gap crossing. Gap Fundamentals 18-62. Successful gap crossing is characterized by applying gap-crossing fundamentals. These fundamentals are applied when a gap is encountered in the operational area. These fundamentals are— * Surprise. * Extensive preparation (less for hasty crossing). * Flexible planning. * Traffic management. * Organization. * Speed. See ATP 3-90.4/MCTP 3-34A for more information on gap fundamentals. Task Organization for Gap Crossing 18-63. Units use the same organic command and control nodes for gap crossings as they do for other missions. These nodes, however, take on additional functions in deliberate gap crossings. For this reason, commanders specify which nodes and staff positions have specific planning and control duties for the crossing. Typically, units designate a crossing area commander, engineer, and headquarters to focus specifically on the efforts needed to cross the gap. Additional engineer units may also provide additional command and control nodes depending on the size and complexity of the gap crossing. This may require some temporary co-location of headquarters cells (or individual augmentation) and an increase in communication means. Units conducting a deliberate gap crossing organize into the following groups: * Assault force. * Assured mobility units. * Bridgehead force. * Breakout forces. Assault Force 18-64. Assault forces seize the far side objective to eliminate direct fire on the crossing sites. Assault forces may cross by any means to include rubber pneumatic boats, air assault, or the use of civilian boats if available. The assault force may also be the unit that first secured terrain on the near side and identified if existing bridges were operational and where enemy forces are fighting or defending. The assault force normally crosses in waves, as sufficient boats are seldom available to carry the entire force across at once. It is a very complex operation, requiring synchronization, training and extensive rehearsals. Assured Mobility 18-65. Mobility support forces (such as combat engineer companies, multi role bridge companies, and military police units) provide crossing means, traffic control, and other critical tasks supporting the crossing site. These supporting units are task-organized to perform specific tasks and are controlled using specified procedures that are clear, simple, and rehearsed by all elements to ensure responsive support of the plan and unity of command and effort.
3-90
354
Chapter 18 Bridgehead Force 18-66. A bridgehead force is a force that assaults across a gap, after the crossing is established, to secure the enemy side (the bridgehead) to allow the buildup and passage of a breakout force during gap crossing (ATP 3-90.4/MCTP 3-34A). The bridgehead is an area on the enemy side of the linear obstacle that is large enough to accommodate the majority of the crossing force, has adequate terrain to permit defense of the crossing sites, provides security of crossing forces from enemy direct fire, and provides a base for continuing the attack (ATP 3-90.4/MCTP 3-34A). The bridgehead line is the limit of the objective area in the development of the bridgehead (ATP 3-90.4/MCTP 3-34A). Breakout Force 18-67. Breakout forces attack to seize objectives beyond the bridgehead as a continuation of the offense. (See ATP 3-90.4/MCTP 3-34A for more information on gap organization.) Gap Crossing Planning 18-68. The discussion on planning mobility applies to gap crossing in ATP 3-90.4/MCTP 3-34A; however, force allocation against enemy units has an added dimension of time that is affected by the crossing rate. Friendly forces can only arrive at the crossing site at the rate at which they can cross the gap. This rate will change at various times throughout the crossing. The rate at which combat forces need to cross will directly affect the number of crossing sites. 18-69. A major control mechanism category is graphic control measures. The unit uses graphic control measures to delineate areas of responsibility for subordinates and to ease traffic control. (See ATP 3-90.4/ MCTP 3-34A for more information on graphic control measures for a gap crossing.) Gap Crossing Execution 18-70. A deliberate river crossing is costly in terms of manpower, equipment, and time. Generally, units conduct it against a well-organized defense when a hasty river crossing is not possible or when one has failed. A deliberate river crossing requires the concentration of combat power on a narrow front, capitalizing on the element of surprise. 18-71. A division or corps deliberate river crossing is an operation conducted as part of an offensive operation. A division is normally the smallest organization that can conduct a deliberate wet-gap crossing. It is usually an implied task in a larger mission given by the corps. A gap crossing is usually not the final objective; however, units must quickly cross a river and rapidly secure the bridgehead line to support follow- on offensive action against the enemy. The enemy will normally use the gap as a tactical obstacle system to slow and gain positional advantage against the division advance. The intent of the division is to maintain its momentum through the crossing. 18-72. A deliberate wet-gap crossing has six phases. They are distinct phases for planning, but there is no pause between them in execution. See table 18-3 for the phases. Table 18-3. Deliberate wet-gap crossing phases Phase Description Set the Conditions The planning and continued targeting operations in the deep, close, and support areas to defeat enemy forces deep as well as close to synchronize one or more gap crossing operations with all warfighting function capabilities in five domains against an adaptive enemy force. Advance to the gap The attack to seize objectives that secure the near side terrain, which offers favorable crossing sites and road networks and provides enough area to stage crossing forces while preventing congestion and an undesirable massing of assets. Assault across the gap The units assaulting across the gap to seize the far side objective, eliminating direct fire into the crossing sites.
3-90
355
Mobility Advance from the far side The attack to secure the exit bank and intermediate objectives that eliminates direct and observed indirect fires into the crossing area. Secure the bridgehead line The tasks necessary to secure bridgehead objectives, defeating any enemy counterattacks. This gains the necessary time and space for the buildup of forces for the attack out of the bridgehead. Continue the attack The attack out of the bridgehead to defeat the enemy at a subsequent or final objective. It is considered as a phase of the gap crossing because the timing and initiation of this phase are typically dependent on the success of the other four phases of the gap crossing. CLEAR 18-73. Clear is both a tactical mobility task and a mobility task. The mobility task involves the total elimination of an obstacle that is usually performed by follow-on engineers and explosive ordnance disposal units. It is not normally performed under the threat of direct or indirect fire. Clearing is conducted to eliminate tactical and protective obstacles affecting the operational area. Units may order clearing to facilitate movement within an assigned area based on the mission variables. They may also order a critical route or area cleared of obstacles. The task is conducted as a single mission to open or reopen routes not under persistent surveillance or it may be conducted on a recurring basis in support of movement along routes here a sustained threat exists along critical routes. (See ATP 3-90.4/MCTP 3-34A for more information on clearing.)
3-90
357
Chapter 19 Tactical Deception This chapter addresses those considerations unique to tactical deception operations. It provides an overview of tactical deception, principles, types, means, and variations. It then discusses tactical deception planning, tactical deception in offensive and defensive operations, and risk. OVERVIEW OF DECEPTION 19-1. As a principle of war surprise is a combat multiplier that amplifies the effects of the other principles of war. Its effective use allows friendly units to strike at a time and place or in a manner that the enemy is unprepared for, which induces shock and causes hesitation. Every echelon works to achieve surprise in an operation and only by multiple echelons working together is surprise achieved. 19-2. The easiest way to achieve surprise is to use deception. Units throughout history have used deception to their advantage. It is an effective way to cause the enemy to dissipate their efforts and resources. Deception enhances the conditions that allow friendly units to concentrate forces at decisive times and locations. Executing tactical deception comes with costs. These costs include time, material, and risk. However, history shows that executing deception at any scale and echelon is almost always worth the costs. 19-3. The enemy commander is the focus of tactical deception, but the enemy can delegate command authority to an alternate decision maker. This means that someone other than the commander needs to be deceived. Therefore, this chapter will refer to the enemy decision maker or commander as the deception target. The deception target is the adversary decision maker with the authority to make the decision that will achieve the deception objective (JP 3-13.4). 19-4. Well planned and executed deception, not luck, achieves surprise and its benefits—in both the offense and defense. Deception can be as simple as using camouflage to conceal friendly forces’ locations, capabilities, or intent. It could be the use of decoys to create false data for the deception target to deal with. Or it could be as complicated as a multi-phase and echelon operation that works in accordance to a larger deception operation. To understand this better, there are two types of deception—military deception and tactical deception. MILITARY DECEPTION 19-5. Military deception is actions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission. (JP 3-13.4). Military deception is typically executed at the combatant command level and requires planning, approval, and execution to adhere to theater-level instructions and AR 525-21. Additionally, information pertaining to tactical deception (TAC-D) executed in support of a military deception, to include operations, training, and exercises are generally classified at the Secret or higher level. The rest of this chapter is focused on tactical deception and the principles, types, means, and variations used. (See FM 3-13.4 for more information and details on military deception planning.) TACTICAL DECEPTION 19-6. Tactical deception concepts do not tie into an overall military deception operation. Units must understand that when executing TAC-D, they are not executing military deception at the tactical level. Tactical deception is a friendly activity that causes enemy commanders to take action or cause inaction
3-90
358
Chapter 19 detrimental to their objectives. Tactical deception operations are designed to support the commander’s plan by enhancing the probability of mission success. It allows units to create windows of opportunity by causing the target to react or falsely interpret friendly operations. The purpose of TAC-D is to— * Gain the initiative. * Reduce overall operational risk. * Preserve combat power. 19-7. Properly planned and executed deception operations will make it possible for units to “hide the real” and “display the false.” Units use all available types, means, and variations of tactical deception to conceal friendly locations, capability, or intent until a time and place of the friendly commander’s choosing. 19-8. TAC-D by itself is never decisive, although it may be a main effort at some point during the operation. This distinguishes TAC-D from offensive, defensive, or stability operations and solidifies it as an enabling operation. As with all enabling operations, units use TAC-D operations to complement current operations; transition between phases; transition between offense, defense, or stability; or set conditions for future operations. 19-9. Tactical deception is an effective way to cause the enemy to squander time and resources on irrelevant objectives. Leaders conduct TAC-D at every echelon with either the resources they have or with assistance from their higher echelon. Integrating deception between echelons can be a useful tool in altering how the enemy views, analyzes, decides, and acts in response to friendly operations. 19-10. If the deception effect would affect the friendly force scheme of maneuver outside the echelon’s assigned area, it needs to be approved by the commander two echelons above the executing unit. For example, by using decoys in the defense to make friendly forces look three times bigger than it is and cause the enemy to attack elsewhere needs to be coordinated and approved by higher echelon commanders. If a unit is directly told to execute a deception action by their higher headquarters, the assumption is the higher headquarters has already received approval for that order. 19-11. TAC-D is a commander driven activity that is structured around principles, types, means, and variations used to set favorable conditions to achieve friendly objectives. Commanders decide the location and time to employ deception in support of operations. The principles of tactical deception provide subordinates fundamental guidance during the planning of all tactical deception operations. The desired effect describes the level of uncertainty that the friendly commander wants to achieve against an enemy decision maker. The means are the tools that friendly commanders use to accomplish tactical deception. Typically, the means are found in either the coordinating instructions of an order or through commander’s guidance. Variations of tactical deception are missions that a higher headquarters can assign to a subordinate unit. Vital to the unit’s ability to execute tactical deception is through maintaining operational security and ensuring the realism. PRINCIPLES OF TACTICAL DECEPTION 19-12. Just as the principles of war provide general guidance for the conduct of military operations, the six principles of tactical deception provide guidance to planning deception. The principles of deception are— * Centralized planning and control. * Focus. * Integration. * Objective. * Security. * Timing. CENTRALIZED PLANNING AND CONTROL 19-13. A centralized approach is necessary to provide clarity and to ensure various elements portray the same story and do not conflict with other objectives or evolving conditions in an operational environment. Execution of tactical deception may be decentralized as long as all participating organizations adhere to a single plan. Once the commander approves the deception plan, the designated operational element monitors
3-90
359
Tactical Deception the situation and its effects on the target, as well as friendly and partnered forces to ensure synchronization, deconfliction, and OPSEC. FOCUS 19-14. The deception plan should focus on the thought process of the deception target since they have the authority and capability of triggering the desired actions. The enemy’s intelligence, surveillance, and reconnaissance assets are normally targeted. The nine forms of contact are the primary conduit used in the deception plan to convey selected information to the deception target. Focused deception must cause the enemy force to commit an action or inaction. See discussion beginning in paragraph 1-60 for the nine forms of contact. INTEGRATION 19-15. Units should integrate deception throughout the planning process at all levels since deception is an integral part of any operation. This integration includes developing a concept for deception that supports the overall mission as part of COA development. An integration of the deception operation throughout all phases of the operation begins with planning, continues through execution, and concludes with the termination of the deception. OBJECTIVE 19-16. Deception plans focus actions and resources that motivate an enemy to cause desired actions or inactions. The plan cannot focus solely on motivating the deception target to believe certain things. It must lead to the deception target taking a specific course of action, known as the objective of the deception. SECURITY 19-17. Successful deception requires strict security that begins before execution with measures to deny the enemy knowledge of the friendly force’s intent to deceive. Successful deceptions apply strict need to know criteria to each aspect of the plan. Maintaining this operational security means limiting the number of planners and participants to those needed. TIMING 19-18. Critical to deception planning is proper synchronization with the commander’s intent and maintaining synchronization during execution. Timing in deception operations is crucial. The challenge is to get the deception target to act in accordance with the deception plan within the timelines required by the friendly operation. Planners should conduct a thorough analysis to understand the amount of time required for an effect to pass through the forms of contact before reaching a deception target. Friendly deception executions must be completed in a manner that accounts for the time consumed by the enemy’s intelligence collection and analysis process. The enemy’s decision-making process and current activity is what must be exploited by friendly forces. TYPES OF TACTICAL DECEPTION 19-19. All deception aims to either increase or decrease the level of uncertainty in the mind of the deception target. This dilemma has the potential to compel the deception target to mistakenly perceive friendly motives, intentions, capabilities, and vulnerabilities thereby altering the enemy’s assessment and ultimately their actions. Two generally recognized types of deception are— * Ambiguity-increasing (confusion effect). * Ambiguity-decreasing (confirmation effect). AMBIGUITY-INCREASING DECEPTION (CONFUSION EFFECT) 19-20. Ambiguity-increasing deception provides the presentation of excessive true and false information to confuse the deception target and create internal conflict. This provides the enemy with many plausible
3-90
360
Chapter 19 friendly courses of action through evidence of intentions and capabilities that the friendly force does not possess. Critical to the confusion effect is that the evidence presented must be doctrinally feasible. The desired outcome would be action or inaction from the enemy that would lead to a tactical advantage for the friendly force. These actions could include a delay of a specific decision, operational paralysis, or the distribution of enemy forces to locations that cannot influence friendly efforts. This effect is best used when the deception target tends to be indecisive or risk adverse. AMBIGUITY-DECREASING DECEPTION (CONFIRMATION EFFECT) 19-21. Ambiguity-decreasing deception exploits deception targets’ pre-existing beliefs by confirming their desired expectations. This is provided to them through conditioning and diversion of intentional observations that convinces the enemy to be at the wrong place, at the wrong time, and under equipped. The intent is to hide the real friendly intentions and current capabilities from the enemy through a vigorous defense of friendly force information requirements. This information, if uncovered, would be detrimental to the accomplishment of the mission for the friendly unit. The confirmation effect is best employed when deception targets tend to accept higher levels of risk with their force and are resolute in their decision making. 19-22. Both types are applied by using the deception principles. These principles can be best employed when the friendly unit has a reliable understanding of the current situation because desired effects of tactical deception provide a foundation to build their deception plan on in the planning process. TACTICAL DECEPTION MEANS 19-23. Deceptions means are applied to observables to increase the probability of being accepted by the deception target. Deception means are methods, resources, and techniques that can be used to convey information to the deception target (JP 3-13.4). There are two tactical deception means categories: physical and technical. Planners normally employ deception plans to supplement several means that aim to mislead multiple types of enemy sensors. This increases credibility and the likelihood of deceiving the deception target. Tactical deception means provide the signatures, associations, and profiles of friendly alleged activities to the enemy. Units employ as many means as possible within their capabilities to support tactical deception during all types of operations. PHYSICAL MEANS 19-24. Physical means are resources, methods, and techniques used to convey information normally derived from direct observation or active sensors by the deception target. Most physical means also have technical signatures visible to sensors that collect scientifically or electronically. Planners typically evaluate physical means using characteristics such as shape, size, function, quantity, movement pattern, location, activity, and association with the surroundings. Examples might include— * Movement of forces. * Decoy equipment and devices. * Security measures, such as camouflage and concealment. * Tactical actions, such as feints and demonstrations. * Reconnaissance, security, and surveillance activities. Movement of Forces 19-25. Units frequently reposition forces to increase ambiguity to ongoing or planned operations. They also do this to hide the main effort. This repositioning is not limited to only maneuver forces but can also apply to command and control nodes, fires, and sustainment assets. This frequent repositioning requires detailed terrain management and coordination across all echelons to prevent inadvertent concentration of forces, unnecessary congestion of routes, and reduce the likelihood of the repositioning creating unanticipated seams and gaps between units.
3-90
361
Tactical Deception Decoy Equipment and Devices 19-26. Within their capabilities units use decoys to mislead enemy intelligence collection and direct the enemy’s attention away from actual forces. These actions can include creating artificial pieces of equipment to constructing false battle positions that include appropriate cover and concealment. These include using devices that create false electromagnetic signatures. Security Measures 19-27. Units employ OPSEC and execute survivability operations to protect friendly forces from enemy detection. Camouflage blends friendly actions and capabilities with their surroundings while concealment makes those actions and capabilities unobservable to the enemy. When used in conjunction with other physical and technical means, camouflage and concealment aid in protecting friendly forces while simultaneously seeking to deceive an enemy. OPSEC includes denying the enemy access to information on friendly forces. From a physical means perspective examples include but are not limited to denying personnel access to friendly bases and locations and establishing blocking positions to hinder an enemy’s ability to obtain visual contact on unit assembly areas by establishing checkpoints along routes. Tactical Actions 19-28. Units can employ any number of actions to support tactical deception. These can range from larger scale actions, such as feints and demonstrations, to small unit actions such as frequent repositioning of forces. Commanders at all levels ensure their units incorporate tactical deception within their plans. Reconnaissance, Security Operations, and Surveillance 19-29. As the enemy begins to lose its active intelligence collection capability, its ability to detect the friendly force’s deception becomes progressively more difficult. Established procedures and doctrine make friendly deception operations easier to conduct. These procedures result in distinct and recognizable offensive patterns. Many units have enhanced their offensive capabilities by applying deception variations. 19-30. Increasing patrol and reconnaissance activities in areas away from the main attack may confuse the enemy. However, friendly activities should not vary with normal procedures to the extent that they reveal friendly forces who are engaged in deception. For example, a friendly commander may conduct reconnaissance in an area away from the main effort’s objective, potentially causing the enemy to shift focus away from the friendly force’s main effort. TECHNICAL MEANS 19-31. Technical means are resources, methods, and techniques used to convey or deny selected information or signatures. Often technical means use technical equipment, to or from the deception target, by manipulating electromagnetic, acoustic, or other forms of energy, or through smell. Technical means may be applied with corresponding physical means or alone to replicate something physical that is absent from visual contact. Planners integrate technical means with other technical activities of the operation. Higher headquarters may impose restrictions and limitations on the use of specific technical means for TAC-D. This is because they might interfere with an ongoing military deception or the effects of the technical means might extend into another friendly units assigned area. Examples of technical means might include— * The establishment of communications networks and interactive transmissions that replicate a specific unit type, size, or activity. * Emission or suppression of chemical or biological odors associated with a specific capability or activity. * Organic capabilities that disrupt an enemy sensor or affect data transmission. Table 19-1 on page 19-6 describes how both physical and technical means enable techniques to provide deception.
3-90
362
Chapter 19 Table 19-1. Sample deception techniques Technique Deception created Example Amplifying To make a force appear larger and more Increase radio traffic through signatures capable or to simulate the deployment of critical the use of scripts. capabilities. Suppressing To make a force appear smaller and less Radio silence and signatures capable or to conceal the deployment of critical communication windows. capabilities. Overloading enemy To confuse or corrupt their collection assets by Use of decoys to portray a sensors providing multiple false indicators and displays. larger force. Repackaging known To generate new or deceptive profiles that Movement of critical assets organizational or increase or decrease the ambiguity of friendly to mislead organizational capability signatures activity or intent. size. Conditioning the To desensitize to particular patterns of friendly Increased targeting of enemy behavior and to induce enemy perceptions that enemy observation points to are exploitable at the time of friendly choosing. delude their threat template. Reinforcing the To mislead by portraying one course of action Suppression fires at a false impression when actually taking a different one. breach. Conditioning the To believe that an apparently standard routine Increased reconnaissance target by repetition will be pursued while in fact preparing a quite on the most favorable different course of action. friendly avenue of approach. Leading the enemy To believe that nothing has changed by covertly Using unfavorable weather by substitution substituting the false for the real, and vice conditions (limited visibility) versa. to replace a real force with a decoy force. Leading the enemy To believe that valuable information has come Leaving a partially by mistake into their possession through a breach of deconstructed terrain model security, negligence, or inefficiency. for enemy recon to find. VARIATIONS OF TACTICAL DECEPTION 19-32. Tactical deception variations are operational constructs that encompass a broad range of deceptive activity and information integrated as a component of the overall plan. A unit may be told to conduct one of the two variations of TAC-D: feints and demonstrations. These variations are often best employed in TAC- D to support the commander’s objectives. These variations should not be confused with the tactical deception means; they are deliberate operations that require higher echelons approval. The selected variation and its use depend on the planners’ understanding of the current situation as well as the commander’s desired end state. All other deception guidance should be issued in the coordinating instructions or done to accomplish the commander’s intent. 19-33. Units should consider cost of tactical deception in terms of resource expenditure. For tactical deception to appear real, units must dedicate adequate resources. Units should also measure costs in risk and flexibility. For example, it may be very risky for the success of a unit’s main effort to rely solely on the success of a planned demonstration. Should the demonstration not produce the expected enemy reaction, it could cause the main effort to fail. Flexibility is built into the plan by using branches, sequels, or executable deceptions. 19-34. While feints and demonstrations are specific tactical deception operations, they are not the sole way a unit should use tactical deception. Units can use many of the variations of offensive and defensive operations to deceive an enemy. For example, units can incorporate a retrograde that forces the enemy into an engagement area. Units use their collective creativity, within the time, resources, and authorities allowed to develop plans that achieve the commander’s end state. 19-35. Whenever units determine to use feints, demonstrations, or another variation of offensive or defensive operations as a means of deception they are required to gain approval. This approval comes from the commander that is two echelons higher than the requesting units, for example a corps commander is the
3-90
363
Tactical Deception approval authority for a brigade commander requesting to execute a feint or demonstration as part of their plan, 19-36. Units have two options to disseminate the tactical deception plan to their subordinates. It is imperative that the unit maintains operational security for the success of the operation. The first option is for the unit’s leaders to know the true task and purpose of the organization, subordinates may receive a different task and purpose in order to maintain operational security. The second option is for the unit to provide complete briefings to their subordinates. In both options, caution must be exercised to ensure that deception details are not mentioned in their operation orders. OPSEC must be recognized as a vital element of the variation of the tactical deception. FEINT 19-37. A feint is a variation of tactical deception that makes contact solely to deceive the adversary as to the location, time of attack, or both. The feint leads the enemy into erroneous conclusions about friendly dispositions. Feints are usually offensive in nature and closely resemble an attack; however, they can be executed during other operations. A feint requires engagement with the enemy to give the appearance of the main attack. See table 19-2 on page 19-9 for the tactical planning symbol. 19-38. The principal difference between a feint and an attack is that friendly forces assign their troops an objective limited in size, scope, or some other measure. It should contribute to the overall accomplishment of the mission and deceive the enemy. Forces conducting feints make direct fire contact with enemy forces and potentially decisively engage to draw resources from the enemy to enable the success of the friendly force’s main effort. Several purposes for feints include causing the deception target to— * Employ their second-echelon forces other than intended. * Move away from the main attack toward the feint or to hold the enemy’s second echelon force in its current location. * Shift its supporting fires from the friendly main attack to the feint. * Reveal enemy defensive fires and capabilities. 19-39. A single event feint might not always deliver the desired effect. Instead, a series of recurring feints might be necessary to deceive the enemy decision maker. For example, repeated raids may condition the enemy to confirm the commander’s perception that the friendly commander lacks the combat power to conduct a main attack. The enemy may become so accustomed to the pattern of raids that it takes little or no action when the friendly main attack actually occurs. The enemy will consider it as another raid. 19-40. Another important consideration for the execution of a feint is the location. Observing the terrain and enemy disposition, the commander or staff considers— * The enemy’s area of interest. The deception target may not react as desired to the presented threat because it is of little value to the enemy. * Whether or not the enemy may displace its force if the feint is deployed beyond the range of its direct and indirect fires, based on its current positions. * An assigned area that is sufficient for the successful execution of the feint without interfering with the main attack. 19-41. Units conduct feints before or during the main attack. Therefore, planners consider the timing of the main attack in determining the time for the feint. The estimated time necessary for the enemy to react in the desired manner also influences the timing of the tactical deception. A feint before a main attack usually requires carefully determined lead time. 19-42. The precise time a feint occurs will vary depending on the commander’s intent. Moving additional forces will require more time than shifting fires. For example, if the intent is to move the second echelon forces, the feint has to be initiated well ahead of the main effort. 19-43. A feint conducted simultaneously with the main attack may cause the enemy to divert its attention and possibly a portion of its forces and supporting fires. A feint conducted after the main attack is launched can hold the enemy’s uncommitted forces in its present location. Faced with a new threat, the enemy becomes uncertain about the location of the main effort.
3-90
364
Chapter 19 19-44. Friendly forces consider the pattern of previous operations. For example, if friendly forces have regularly made attacks two hours before daylight, it may be desirable to conduct a feint at this time. Although the timing of a feint is influenced by such factors, the timing of the main effort would most likely be the main consideration. DEMONSTRATION 19-45. A demonstration is a variation of tactical deception used as a show of force in an area where a unit does not seek a decision and attempts to mislead an adversary. It is similar to a feint, but direct or indirect contact with the adversary is not intended. A demonstration may be conducted for the purpose of deceiving the enemy by visual contact with the expectation of luring them into a COA favorable to friendly lines of operation. While a demonstration has certain advantages over the feint, it lacks the realism. Paragraphs 19-46 and 19-47 lists some advantages and disadvantages of using a demonstration. See table 19-2 for the tactical planning symbol. 19-46. The advantages of a demonstration are— * Absence of direct and indirect contact with the enemy facilitates subsequent employment of the demonstration force elsewhere. * A full force is not always necessary because no contact is made with the enemy. It is essential that a demonstration is combined with real capabilities to provide a creditable threat. * It permits the use of simulation devices, when available, in place of real items to deceive the enemy’s information collection. 19-47. The disadvantages of a demonstration are— * It is more difficult to validate the threat to the enemy without direct or indirect contact. * It is more likely that a demonstration will be identified as a deception earlier in the operation than a feint. 19-48. A demonstration can be used successfully when there is time and distance between the enemy positions and the demonstration force that makes the lack of contact appear realistic to enemy forces. In essence, a demonstration attempts to gain enemy response in an area where a friendly force is displayed. However, as the enemy reacts the friendly force withdraws without engagement. 19-49. The direct exposure of sustainment operations can illustrate a demonstration. Many times, sustainment operations are much more visible than combat preparations and become a key indicator of location, type, and time for when combat operations will be conducted. Sustainment operations used in support of tactical deception seek to confirm the deception target’s perceptions as to where friendly forces will commit their main efforts. 19-50. After the unit determines what variation of tactical deception it wants to use to enable its operation, the unit determines its observables. Observables are often made up of executions, which can include events, activities, or elements of information that must be seen or sensed by the target to form the desired perceptions.
3-90
365
Tactical Deception Table 19-2. Forms of tactical deception and planning symbols Forms of Tactical Deception Tactical Symbol Feint Demonstration TACTICAL DECEPTION PLANNING 19-51. Units should consider deception in all activities of the operations process. It is unlikely that an under resourced and nonintegrated tactical deception will succeed, and the longer tactical deception is not accounted for in the operations process, the more probability it will fail. Tactical deception can be used to support a range of missions and to prevent duplication of deception efforts; therefore, leaders should coordinate tactical deceptions both laterally and vertically. Preparing and executing a tactical deception requires the same considerations as any operation but has some key additions in the planning phase. 19-52. Tactical deception is integrated early during the planning process to increase its effectiveness in causing the enemy to act or react in a desired manner. Prior to the integration of deception, commanders must determine the desired effects on the enemy. Tactical deception focuses on the enemy’s decision-making process. Tactical deception must end in an enemy decision to act or not act in a way that supports an operation. The enemy decision-making process occurs in the see-think-do planning methodology: * See: What significant physical and technical indicators can the enemy see, sense, or detect? * Think: Do these indicators lead the enemy to believe what it sees, senses, or detects? * Do: Has the enemy decided on an action or inaction based on what it believes? 19-53. Planners use the see-think-do planning methodology in reverse to guide deception planning, execution, and assessment. Planners begin by identifying what they want the enemy to do, then determining what the enemy must think in order to act as desired, and finally establishing what the deception target must see to encourage thinking that way. Successful deception operations are those that do more than make the target believe or think the deception is true. The deception target must make a decision to act or not act in a way that favors friendly operations. 19-54. Deception planners use this planning methodology to ensure that each tactical deception is properly constructed. They develop courses of action based on the tactical plan. They integrate any revised commander’s guidance and updated intelligence analysis to refine and complete their deception plan using the six-step deception planning process. (See FM 3-13.4 for more detail on tactical deception planning process.) TACTICAL DECEPTION IN OFFENSIVE OPERATIONS 19-55. The intent of TAC-D in the offense is to enhance the friendly force’s course of action by avoiding the enemy’s strengths, striking their weaknesses, and gaining overall surprise. An important consideration in tactical deception is that the unit must be able to exercise some influence over its assigned area. The unit needs to influence through some offensive action and not merely react to the enemy’s defensive actions.
3-90
366
Chapter 19 Showing the enemy multiple observables of a particular intention is the most convincing way to sell the tactical deception. 19-56. The unit’s tactical deception should be employed in an environment in which the unit has more options available than the enemy has combat power to cover. If the enemy can effectively defend against all avenues of approach, then deceiving it as to the friendly choice becomes much less significant. As influence over the assigned area begins to increase, the unit’s options and, therefore, its opportunity for deception begin to increase. As the enemy’s influence begins to diminish, its intelligence collection capability becomes more degraded by increasing friendly control of the assigned area. Consequently, the enemy’s ability to assess friendly capabilities and probable intentions shifts to an environment of relative uncertainty. The opportunities for deception continue to increase. The enemy is required to make more tactical decisions based on the remaining, often uncorroborated, intelligence. 19-57. Deception operations induce the enemy decision maker to view the operation from multiple courses of action. This provides friendly commanders the ability to develop favorable and exploitable courses of action. Because of induced misperceptions of the battlefield, the enemy in defense is not given time to identify the composition, location, and time of the friendly force’s attack. 19-58. As the enemy begins to lose its active intelligence collection capability, its ability to detect the friendly force’s deception becomes progressively more difficult. Established procedures and doctrine make friendly deception operations easier to conduct. These procedures result in distinct and recognizable offensive patterns. Many units have enhanced their offensive capabilities by applying deception variations. 19-59. Increasing patrol and reconnaissance activities in areas away from the main attack may confuse the enemy. However, friendly activities should not vary with normal procedures to the extent that they reveal friendly forces who are engaged in deception. For example, a friendly commander may conduct reconnaissance in an area away from the main effort’s objective, potentially causing the enemy to shift focus away from the friendly force’s main effort. TACTICAL DECEPTION IN DEFENSIVE OPERATIONS 19-60. Due to the relatively static nature of defensive operations at the lower tactical levels, tactical deception takes on an increased importance. Tactical deception is used in the defense to preserve combat power by hiding the location of friendly forces in the main battle area, the main effort, and friendly reserves. By concealing friendly defensive positions, this preserves combat power and improves survivability. This causes the enemy to expend combat power and exhaust intelligence efforts and resources unprofitably. Creating false targets to cause the enemy to misuse reconnaissance efforts and firepower is a concurrent, coordinated activity during all phases of the defense to cause the enemy to pursue a COA favorable to friendly operations. 19-61. At the point of the attack, the enemy has decided on its course of action. It is easier to convince the enemy to continue that course rather than alter its plans or tactics. A successful tactical deception operation conducted by a defender can result in the inappropriate deployment of attacking enemy forces. Maintaining that tactical deception can result in the continued commitment of enemy forces at a time and location least advantageous to the enemy. 19-62. In the defense, operational security is an ally of tactical deception. For example, the enemy has decided on a course of action, it is easier to convince them to continue their course of action than alter their plan. A successful deception in the defense can result in the inappropriate deployment of attacking enemy forces. The far easier task of maintaining that deception can result in the continued commitment of enemy forces at a time and location least advantageous to them. RISK TO TACTICAL DECEPTION 19-63. Tactical deception, by its very nature, implies taking calculated risks to gain the tactical advantage over the enemy. Planned deceptions allow friendly forces to sequence the presentation of the battlefield to the enemy in the manner in which friendly forces allows the enemy to view the battlefield.
3-90
367
Tactical Deception 19-64. Units should be aware that deceptions may produce unintended and unwanted consequences. Believing that a threat is real, an enemy can act unpredictably. Proper planning and coordination and knowing the enemy can reduce the chance that deceptions will result in unfavorable action. Friendly forces consider second- and third-order effects of the deception plan to mitigate unintended consequences. The possibility of failure stems from the uncertainties surrounding how the target receives and interprets information intended for the target and, eventually, how it affects the target’s desired perceptions. If discovered, resources used for the deception may be in jeopardy. As with any military operation that puts forces at risk, leaders decide to use deception after a deliberate assessment that weighs opportunity against need and cost against benefit.
3-90
369
Chapter 20 Linkup This chapter addresses those considerations unique to a linkup. This chapter addresses the general considerations for a linkup, planning and preparing a linkup, and types of linkup. LINKUP OPERATIONS 20-1. A linkup is a type of enabling operation that involves the meeting of friendly ground forces, which occurs in a variety of circumstances. For example, when converging maneuver forces meet, when an advancing force reaches an objective area previously seized by an airborne or air assault force, when an encircled force breaks out to rejoin friendly forces, and when a force comes to the relief of an encircled force. During optimal linkup conditions, there is a stationary force and a linkup force. However, both forces may be moving toward each other simultaneously. Whenever possible, the joining forces exchange as much information as possible prior to starting the linkup. PLANNING A LINKUP 20-2. A linkup is a complex operation that requires detailed planning and coordination. Planning for a linkup is coordinated as far in advance as possible to allow coordination between the two or more friendly units. Commanders and staffs coordinate responsibilities to preventing fratricide and ensure mission success. Command and Control 20-3. The headquarters directing the linkup operation must establish command relationships and responsibilities of the forces involved. Both the linkup force and the force with which linkup is to be made can remain under control of the directing headquarters. The communications plan includes the channels for radio communications between the two forces. It must prescribe day and night identification procedures, including primary and alternate means. Aircraft can extend communications range. Units can use visual signals such as flares or panels during daylight and flashlights or infrared devices during darkness. To prevent friendly troops from exchanging fires, recognition signals must be established and communicated between the linkup forces. They may be pyrotechnics, armbands, vehicle markings, panels, colored smoke, distinctive light patterns, and passwords. 20-4. The headquarters ordering the linkup establishes— * A common operational picture using available command and control systems, ideally both digitally and analog. * Command relationship and responsibilities of each force before, during, and after linkup. * Coordination of fire support before, during, and after linkup, including control measures. * A linkup method. * Recognition signals (near and far) and communication procedures, such as pyrotechnics, vehicle markings, gun tube orientation, panels, colored smoke, lights, and challenge and passwords. * Operations to conduct following linkup. Intelligence 20-5. The linkup force will begin the IPB process in preparation for the operation essentially as for any offensive or defensive operation. The significant difference is that the commander and staff will have to consider the location and effect of other friendly forces on the enemy forces within the assigned area. As a
3-90
370
Chapter 20 result, the probable enemy course of action, situation template, and event template must include both the stationary and maneuvering forces perspective of the operation. Movement and Maneuver 20-6. Linkup operations of two or more friendly forces are conducted to— * Complete the encirclement of an enemy force. * Assist the breakout of an encircled friendly force. * Join an attacking force with a force operating adjacent to it. * Join an attacking force with airborne or air assault elements following a vertical envelopment. 20-7. The two forces carefully define and coordinate their schemes of maneuver, placing particular attention to graphic control measures and the subsequent mission to be performed by each force after linkup is complete. A linkup point is normally positioned behind or along one flank of the enemy’s positions. 20-8. A linkup point is a designated place where two forces are scheduled to meet. This point should be large enough for all forces to assemble and it should offer cover and concealment for these forces. When planning a linkup point, the staff should look for an easily identifiable point on the ground. The staff should position linkup points on defensible terrain located away from normal enemy movement routes. Planned alternate linkup points provide needed flexibility. A liaison is normally established during planning and continues throughout the operation to facilitate coordination between the two forces. See paragraph A-27 for definition and symbol. 20-9. Units carefully coordinate linkup operations with forces of other nations. This is especially true if the two forces are not both members of an alliance with established internationally standardized procedures, or if the forces involved have not previously established the necessary procedures. In such situations, extensive use of liaison is necessary to ensure understanding and synchronization of operations. Additional rehearsals may be necessary to ensure maneuver forces clearly understand the operation or to ensure no hostile actions affect the stationary force. Aircraft can improve and expedite this coordination. 20-10. The engineers will be task-organized to conduct mobility operations. The speed of the operation will be essential, whether it is designed to assist in the movement towards the linkup point with an encircled force or to complete the encirclement of the enemy. Fires 20-11. When a division or corps directs a linkup operation, they normally establish fire support coordination measures for both forces. Fire support coordination measures are adjusted as one force moves toward the other. A restricted fire line is established between the forces when necessary, usually at the point where the two forces plan to establish contact. During linkup operations, particularly with airborne or air assault forces, indirect fire support becomes extremely important. The division artillery headquarters must ensure timely dissemination of information and coordination so that fires do not engage friendly aircraft supporting the airborne or air assault forces. Sustainment 20-12. Sustainment support requirements may be greater during linkup operations than during other operations. Additional considerations for planning logistics support in linkup operations include— * Distance to the objective area. * Duration to hold the objective area. * Planned operations or movement out of the objective area. * Resupply of the stationary force. * Movement of drop zones and landing zones of airborne or air assault forces involved in the linkup. * LOCs secured by follow-on forces. 20-13. Supply requirements for a linkup operation may exceed the transportation capability of the unit conducting the linkup. The sustainment elements may have to request additional vehicles or resupply by air. In linkup operations with airborne and air assault forces, priority for supply by air is given to the forces
3-90
371
Linkup assaulting the objective area. Supplies for the linkup forces normally move by land transportation. However, when the objective area is to be defended jointly by the linkup and airborne or air assault force, supplies for the linkup force maybe flown into the objective area and stockpiled. 20-14. Evacuation of equipment and wounded may create major problems for a linkup force. If supply routes are open, the normal evacuation procedures apply. When ground routes are not secure, helicopters may be used for evacuation of wounded while damaged equipment may be moved forward with the linkup forces until a suitable opportunity for evacuation is available. PREPARATION FOR A LINKUP 20-15. Preparation creates conditions that improve friendly forces opportunities for success during the linkup. Units rehearse, refine the linkup plan, and conduct liaison activities prior to the execution for the linkup. Command and Control 20-16. Staffs will walk the subordinate forces through a rehearsal of the operation. While this occurs, they will ensure that the control measures established for the operation are effective. Specifically, they will want to monitor the progress of the subordinate forces as they maneuver along the axis of advance. Simultaneously, they will be prepared to issue a fragmentary order for a hasty defense or attack, depending on the situation. Actions on contact and operating within the commander’s guidance are aspects of the operation that the commander will want to ensure that subordinates completely understand. Intelligence 20-17. The intelligence staffs will prepare for the linkup by war-gaming the operation with the commander. They will want to ensure that the unit is prepared for likely enemy’s actions, preventing the linkup from occurring. Additionally, they will want to practice the conduct of the linkup and subsequent operations within the context of the enemy situation. Movement and Maneuver 20-18. There will probably be little time to conduct a combined arms rehearsal for movement and maneuver, especially due to the time-sensitive nature of the operation. The commanders will issue the order and attempt to walk the executing forces through the operation. The rehearsal will stress the linkup and the coordination required to linkup without confusion. Moreover, it will ensure that each force is prepared to respond to a meeting engagement or enemy attack during the linkup. A commander’s primary concern is that subordinate forces focus on the complexity of the linkup. Fires 20-19. The fire support coordination cell will ensure that the counterpart force in the linkup operation, whether moving or stationary, has the fire support plan. Specifically, the cell will want to ensure that both forces completely understand the fire control measures, coordinated fire lines and restricted fire lines. Further, if these control measures shift during the operation, the conditions and signals under which the change occurs must also be coordinated. Units position air defense assets to support the force as in a movement to contact or deliberate attack. Units will want to ensure that air defense will be prepared to protect the forces at the linkup point. This is where the two forces could collide and become congested. Sustainment 20-20. The sustainment elements will organize as they do for any other offensive operation. However, as mentioned earlier, they will carry additional supplies and material if they are conducting the linkup with an encircled force. Generally, this will include Class I, III, V, and VIII items. The logistic staffs will also ensure that each force understands the distribution plan, including traffic control. They will want to push as much material forward as possible during this operation. This is because the force will not only expend supplies as
3-90
372
Chapter 20 it attacks, but once having conducted the linkup, it can expect to continue the mission (even if it is to remain in place and defend), which will require even more supplies. EXECUTION FOR A LINKUP 20-21. The commander must be able to observe the progress of the operation. Generally, this means that the commander will follow the lead force. If a particular flank is of concern during the operation or a supporting attack is required to penetrate the enemy’s lines, then the unit will place a headquarters where it can observe the force’s secondary action. The commander and operations officer must remain in communication throughout the operation, using the main command post if necessary to relay messages. The staff must maintain the tempo of the operation because a stalled force is difficult to get moving again. Forces must have the ability to move forward from time to time to continue the forward momentum on the operation. The staff monitors the actions of subordinate forces to ensure that the control measures established in planning the operation are still valid. The staff will issue a fragmentary order for changes as necessary. 20-22. As the force begins to maneuver, the intelligence staffs will monitor the enemy situation. They will also monitor the situation facing the linkup force. Together this information will portray an overall enemy disposition which will greatly assist the intelligence staffs in calculating the enemy’s most probable course of action. The intelligence staffs identify as far in advance as possible the direction, strength, and time of the enemy counterattack. Likewise, they will also advise the commander of any identifiable weaknesses within the counterattack. 20-23. The initial conduct of the linkup will be identical to a movement to contact or deliberate attack, depending on the enemy situation. As the forces begin to maneuver, they will attempt to establish and maintain contact with their corresponding friendly force. Each force will monitor the progress of the other, adjusting the plan as necessary. The linkup point can be moved closer to the linkup force if it is unable to travel at a speed proportionate with the plan. Similarly, the fire control measures will also adjust. As the two forces draw closer, higher headquarters controls the maneuvering forces. If possible, the forces will also attempt to establish contact on a predesignated frequency to control the actual linkup. At this point, the momentum of the operation will slow to help prevent fratricide. The tradeoff may be that some enemy forces may slip between the two closing forces. Coordination signals identify each force as it approaches the linkup point. 20-24. The fire control measures shift based on the progress of the forces and the enemy situation. Specifically, the coordinated fire lines, which will initially protect each force as it maneuvers, change to protect the two forces as they begin to meet. Restricted fire lines prevent fratricide between the linkup forces. Once the linkup has occurred, the stationary and linkup forces organize as per the higher headquarters’ plan for future operations. If possible, the air defense elements in both linkup forces should monitor the same early warning net. This is particularly important if the linkup is attempting to reach an encircled force. This unity of air defense effort will ensure the most appropriate use of weapon systems and reduce unnecessary redundancy. Once the linkup is complete, air defense assets may be reorganized to support the next operation. 20-25. The engineers will provide mobility support to the higher headquarters, probably as attached elements of the lead forces. Once the linkup is complete, engineers may assist in countermobility or survivability operations depending on the plan. Another task organization may be required on the objective to accomplish the new missions. 20-26. Sustainment priorities focus on the forward movement of the force. Evacuation will be forward to logistics resupply points, reducing the turnaround time for recovery assets. As the linkup forces begin to close, sustainment assets must be as far forward as possible. Time is essential to the success of this operation, so assets must be prepared to keep pace with extremely fast operations. They must be prepared to address the immediate needs of the encircled force, to stockpile ammunition, or to move to other positions if the force should revert to a defensive posture.
3-90
373
Linkup TYPES OF LINKUPS 20-27. The linkup force concentrates its efforts on completing the linkup. Linkup operations frequently will require a passage of lines. Regardless of the purpose of the linkup, the operation will take on one of two forms: * Linkup of a moving force with a stationary force. * Linkup of two moving forces. LINKUP OF A MOVING FORCE WITH A STATIONARY FORCE 20-28. To ensure the forces join without engaging one another, linkup points are at locations where the axis of advance of the linkup force intersects the security elements of the stationary force. (See figure 20-1.) These points must be readily recognizable to both forces. Units plan alternate points in the event enemy activities cause linkup at places other than those planned. The number of linkup points selected depends on the terrain and number of routes used by the linkup force. Personnel in the linkup force must be thoroughly familiar with mutual identification procedures and plans for rapid passage of lines. Stationary forces assist in the linkup by opening lanes in minefields, breaching or removing selected obstacles, furnishing guides, and designating avenues of approach. Use of a common radio frequency enhances coordination and responsiveness between forces. Figure 20-1. Linkup of a moving force with a stationary force LINKUP OF TWO MOVING FORCES 20-29. Linkup between two moving forces is one of the most difficult operations often conducted to complete the encirclement of an enemy force. Units plan primary and alternate linkup points for two moving forces on boundaries where the two forces are expected to converge. As linking forces move closer, positive control must be coordinated to ensure they avoid firing on one another. This deliberate coordination ensures
3-90
374
Chapter 20 the enemy does not escape between the two forces. Leading elements of each force should monitor a common radio network. Figure 20-2 depicts a linkup of two moving forces. Figure 20-2. Linkup of two moving forces ACTIONS FOLLOWING LINKUP 20-30. When the linkup is made, the linkup force may join the stationary force, or it may pass through or around to continue the attack. If the linkup force is to continue operations in conjunction with the stationary force, a single commander for the overall force should be designated. The linkup force may immediately pass through the perimeter of the stationary forces, be assigned objectives within the perimeter, or be assigned objectives outside the perimeter, depending on its mission. Plans for these operations must be made in advance.
3-90
375
Appendix A Tactical Control Measures This appendix expands the control measure discussion from Chapter 1 and explains maneuver control measures, fire support coordination measures, and airspace coordination measures common to offensive, defensive, and enabling operations. These control measures apply to both automated and hand drawn graphics or symbols, displays, and overlays. Most tactical control measures are used in both planning products and operation overlays. GENERAL CONSIDERATIONS FOR CONTROL MEASURES A-1. Units use control measures to assign responsibilities, coordinate the warfighting functions, control operations, and prevent fratricide. Well-conceived control measures facilitate current and future operations. Throughout an operation, commanders adjust control measures as necessary to maintain synchronization and ensure mission accomplishment. A-2. Control measures apply to all forces. Control measures are used throughout the operations process and are graphically depicted within digital systems and on analog map overlays. Commanders ensure that all higher echelon control measures are incorporated into their units’ orders and common operational picture. Subordinate units develop additional control measures to command and control their forces and ensure those control measures are shared with adjacent, higher, and subordinate units and staffs. They reference the control measures established by higher headquarters when making reports to that headquarters. A-3. Units generally establish and follow standard operating procedures for naming common control measures. During operations, units follow the timelines or procedures prescribed by their higher headquarters regarding control measure updates. For example, a division artillery headquarters will normally establish rhythmic times for subordinate units to provide updates to their current and planned fire support coordination measures. A-4. The sections below consist of common maneuver control measures, fire support coordination measures, airspace coordination measures, and obstacle control measures. These control measures are not a comprehensive listing of all possible control measures a unit may employ during operations. (See FM 1-02.2 for a listing of all control measures.) MOVEMENT AND MANEUVER CONTROL MEASURES A-5. Maneuver control measures are used by maneuver forces and headquarters at all echelons to control the movement and maneuver of forces. Paragraphs A-7 through A-41 list and describe control measures commonly used during offensive, defensive, and enabling operations. Paragraphs A-44 through A-61 list and describe control measures commonly used in offensive operations while paragraphs A-62 through A-79 include those control measures that are only applicable to defensive operations. Paragraphs A-80 through A- 88 include direct fire control measures. COMMON CONTROL MEASURES A-6. Many graphical control measures are applicable to offensive, defensive, and enabling operations. The following are control measures discussed throughout FM 3-90. However, this list is not inclusive of all control measures. For a comprehensive listing of all approved control measures see FM 1-02.2.
3-90
376
Appendix A Area of Operations A-7. An area of operations is an operational area defined by a commander for land and maritime forces that should be large enough to accomplish their missions and protect their forces (JP 3-0). An area of operations (AO) is always completed enclosed by boundaries. An AO could consist of a singular boundary. An AO can also be enclosed with forward, rear, and lateral boundaries as shown in figure A-1. Figure A-2 depicts a division AO with subordinate BCT assigned areas. See paragraph 1-56 for more information on an AO. Figure A-1. AO with forward, rear, and lateral boundaries
3-90
377
Tactical Control Measures Figure A-2. Division AO with single boundary and contiguous BCT assigned areas Assembly Areas A-8. An assembly area is an area a unit occupies to prepare for an operation. Units of all types and echelons can be assigned assembly areas. In figure A-3 on page A-4, are examples of multiple units occupying one assembly area is a graphical shortcut taken when the map scale makes depiction of multiple assembly areas unreadable. In reality, the higher echelon commander would subdivide ASSEMBLY AREA THOMAS into two smaller assembly areas, one for each unit. A unit assembly area is normally within the assigned area of a higher headquarters and are typically noncontiguous. This means that a unit has the same responsibilities within its assigned assembly area as it has for any other assigned area. A-9. A tactical assembly area is an area that is generally out of the reach of light artillery and the location where units make final preparations (precombat checks and inspections) and rest, prior to moving to the line of departure (JP 3-35). Tactical assembly areas are where enemy contact is likely and the commitment of a unit into combat is possible or anticipated. Examples of tactical assembly areas include locations occupied by units designated as tactical reserves, by units after completing a rearward passage of lines, temporarily by units during tactical movement, and by units during reconstitution. Units in tactical assembly areas are typically preparing to move forward to execute a forward passage of lines followed by offensive operations or have been assigned a reserve mission by their higher commander. A-10. Planning for, occupying, and departing an assembly area is difficult and time consuming and requires careful consideration. Ideally, an assembly area provides— * Concealment from air and ground observation. * Adequate entrances, exits, and internal routes. * Space for dispersion
3-90
378
Appendix A * Enough distance from other areas and units to preclude mutual interference. * Cover from direct fire. * Good drainage and soil conditions that can sustain unit vehicles and individual Soldier movements. * Terrain masking of electromagnetic signatures. * Terrain allowing observation of ground and air avenues into the assembly area. * A location beyond enemy medium artillery range. Figure A-3. Assembly areas A-11. The proper location and size of assembly areas contributes significantly to both security and flexibility. The location should facilitate future operations, so movement to subsequent positions can take place smoothly and quickly by concealed routes. An assembly area must be large enough to accommodate the type and size of the force occupying it. Generally, dismounted infantry assembly areas are smaller than those assigned to armored or Stryker units. Because of their smaller signature, infantry units can use assembly areas closer to enemy forces than armored and Stryker units without excessive risk of enemy detection. The tactical mobility of armored and Stryker units allows them to occupy assembly areas at a greater distance from the LD than infantry units. A-12. There are three methods to organize an assembly area: as a single area, as part of a large assembly area, or dispersed. The biggest difference between the three methods is the amount of security required since every assembly area inherently conducts a perimeter defense. See Figures A-4, A-5, and A-6 for examples of each method. A-13. The single area method configures a unit in a perimeter defense with maneuver units deployed along the entire perimeter. Command and control, sustainment, and any other supporting units are located within the interior of the assembly area. Figure A-4 is an example of a single area assembly area for a battalion task force.
3-90
379
Tactical Control Measures Figure A-4. Single assembly area method A-14. A unit can also occupy a portion of a larger assembly area. This typically occurs when a subordinate formation occupies a portion of their higher headquarters assembly area. With this method, a unit has boundaries with adjacent units and may only have a portion of their assembly area focused on a perimeter. See figure A-5 for an example of an armor battalion occupying a portion of a larger assembly area. Figure A-5. Portion of a larger assembly area method A-15. A unit may also use a dispersed method to assign assembly areas. In this method subordinate units are assigned individual assembly areas. These subordinate units maintain their own 360-degree security. Similar to the single assembly area method, maneuver units occupy perimeter assembly areas with command and control, sustainment, and other units located within the interior. See figure A-6 on page A-6 for an example of the dispersed method by a division.
3-90
380
Appendix A Figure A-6. Dispersed assembly area method Boundaries A-16. A boundary is a line that delineates surface areas for the purpose of facilitating coordination and deconfliction of operations between adjacent units, formations, or areas (JP 3-0). Boundaries are normally drawn along identifiable terrain features and are used to delineate responsibility between adjacent units and between higher and lower echelon headquarters. Boundaries should not split responsibilities for key or decisive terrain, roads, rivers, or railways. Within their assigned areas, units may maneuver within the overall plan without close coordination with neighboring units unless otherwise restricted. Direct fire may be placed across boundaries on clearly identified enemy targets without prior coordination, provided friendly forces are not endangered. Indirect fire also may be used after prior coordination with the adjacent unit. Commanders adjust boundaries as necessary in response to the evolving tactical situation. A-17. Boundaries by themselves or with other control can be used to define a unit’s assigned area: area of operations, zone, or sector. A forward boundary is a boundary that delineates the forward edge of a unit’s area of operation. A lateral boundary is a boundary defining the left or right limit of a unit’s assigned area. A rear boundary is a boundary that delineates the rearward limits of a unit’s assigned area. The forward boundary is the farthest limit in the direction of the enemy, of an organization’s responsibility. The rear boundary also defines the start of the next echelon’s rear area. Figure A-1 on page A-2 depicts an AO with forward, rear, and lateral boundaries.
3-90
381
Tactical Control Measures Checkpoint A-18. A checkpoint is a predetermined point on the ground used to control movement, tactical maneuver, and orientation. Checkpoints are used by all units in all types of operations. Units may use checkpoints to supplement or as substitutes for phase lines. Units can also use a checkpoint as a fire control measure in lieu of the preferred control measure, a TRP. Figure A-7 depicts CHECKPOINT 13. Contact Point A-19. In land warfare, a contact point is a point on the terrain, easily Figure A-7. Checkpoint 13 identifiable, where two or more units are required to make contact (JP 3- 50). A commander establishes a contact point where a PL crosses a lateral boundary or another identifiable terrain feature as a technique to ensure coordination between two units. The commander provides a date-time group to indicate when to make that physical contact. Figure A-8 depicts CONTACT POINT 8. A-20. If both units are moving or are stationary, the mutual higher echelon commander normally designates the location of contact points and times of contact. When one unit is stationary, its commander normally designates the location of the contact point and the meeting time and transmits this information to the commander of the moving unit. Figure A-8. Contact point 8 Coordination Point A-21. A coordination point is a point that indicates a specific location for the coordination of tactical actions between adjacent units. It is used when a PL crosses a lateral boundary between two units or whenever a boundary crosses the forward edge of the battle area (FEBA). The difference between a contact point and a coordination point is that the establishing headquarters does not dictate the exact time when contact is required. Figure A-9 depicts a coordination point. Figure A-9. Coordination point Forward Line of Own Troops A-22. The forward line of own troops is a line that indicates the most forward positions of friendly forces in any kind of military operation at a specific time. The forward line of own troops (FLOT) normally identifies the forward location of security forces. In the defense, it may be beyond, at, or short of the FEBA. It does not include small, long-range reconnaissance assets and similar stay-behind forces. Friendly forces forward of the FLOT may have a restrictive fire coordination measure, such as a restrictive fire area (RFA), placed around them to preclude friendly fire incidents. An enemy FLOT indicates the forward most position of enemy forces. Figure Figure A-10. Forward line of own troops A-10 depicts the symbol for the FLOT.
3-90
382
Appendix A Gap A-23. A gap is an area free of obstacles that enables forces to maneuver in a tactical formation. It is wide enough to allow a friendly force to pass through while dispersed in a tactical formation. The presence of gaps prevents inadvertent concentrations of Soldiers and equipment around the entry points of lanes. Figure A-11 depicts the graphic control measure for a gap. Figure A-11. Gap Infiltration Lane A-24. An infiltration lane is a control measure that coordinates forward and lateral movement of infiltrating units and fixes fire planning responsibilities. Commanders select infiltration lanes that avoid enemy forces, provide cover and concealment, and facilitate navigation. Each unit assigned an infiltration lane picks its own routes within the lane and switches routes as necessary. The left and right limits of the infiltration lane act as lateral boundaries for the unit conducting the infiltration. Staffs must coordinate with the infiltrating unit any attacks by rotary- or fixed-wing aircraft, indirect fires, or munitions effects that impact the lane. Units leaving their assigned lane run the risk of impact by friendly fires. Company-sized units normally Figure A-12. Infiltration have a single infiltration lane, although they can use more than one lane MICHAEL lane. Larger organizations are always assigned more than one infiltration lane. Figure A-12 depicts the graphic control measure for INFILTRATION LANE MICHAEL. Line of Contact A-25. The line of contact is a general trace delineating the location where friendly and enemy forces are engaged. Units develop their line of contact (LC) based on the maximum effective range of the direct fire weapons systems or the visual line of sight from known or templated enemy locations. The commander designates the enemy side of the LC by the abbreviation “ENY.” In the defense, a LC is often synonymous with the FLOT. In the offense, commanders may combine the LC with the LD. When combined with the LD, it is represented by a phase line with LD/LC written next to the name. Figure A-19 on page A- 11 depicts PL JOHN being used as a LD/LC. A-26. For other forms of contact, a phase line can be designated as a probable line of contact. For Figure A-13. Line of contact example, based on IPB and information collection friendly forces can depict known or anticipated locations of enemy artillery assets and determine a probable line of contact for enemy indirect fires. Figure A-13 shows an example line of contact.
3-90
383
Tactical Control Measures Linkup Point A-27. A linkup point is a designated place where two forces are scheduled to meet. This easily identifiable point on the ground is where two forces meet or consolidate before proceeding on with their mission. Besides being easily identifiable, the linkup point must also be rather inconspicuous, or the enemy will be able to predict the location of the coordination and quickly target it. It should also be relatively isolated from direct fire and observation of possible enemy elements located on the surrounding terrain. Alternate linkup points must meet the same criteria and should be reconnoitered to the same degree as primary linkup points. Linkup points are normally positioned behind or Figure A-14. Linkup point 8 along one flank of the enemy’s positions on defensible terrain and located away from normal enemy troop movement routes. The linkup point should be large enough for all infiltrating elements to assemble, and it should offer cover and concealment for these elements. Figure A-14 depicts LINKUP POINT 8. Named Area of Interest A-28. A named area of interest is the geospatial area or systems node or link against which information that will satisfy a specific information requirement can be collected, usually to capture indications of enemy and adversary courses of action (JP 2-0). In this latter case, the NAI may be a person, group, or portion of cyberspace. Staffs tailor the shape of their NAI symbols to the actual area they want observed rather than using a prescribed shape. It is possible to re-designate a NAI as a target area of interest (TAI) when Soldiers confirm enemy activity in the area and have assets that can target it. This allows commanders to mass the Figure A-15. Named area of interest AUGUSTA effects of combat power on that area. Figure A- 15 depicts NAI AUGUSTA. Objective A-29. An objective is a location used to orient operations, phase operations, facilitate changes of direction, and provide for unity of effort (ADP 3-90). Objectives should be easily identifiable on the ground to facilitate their recognition. They normally assign subordinate commanders only their final objectives, but they can assign intermediate objectives as necessary. Figure A-19 on page A-11 depicts OBJECTIVE PAT. OBJECTIVE PAT is further divided into two subordinate objectives: OBJECTIVE KAI and OBJECTIVE ZEKE. Passage Lane A-30. A passage lane is a lane through an obstacle that provides safe passage for a passing force. It is a clear route through an obstacle. The lane may be cleared, including being reduced and proofed, as part of a breach operation, or it may be included as part of the design of a friendly obstacle. Passage lanes normally end where a route begins. That route should allow the passing unit to move rapidly through the stationary unit’s area. Figure A-16 depicts the graphic control measure for a passage lane. Figure A-16. Passage lane
3-90
384
Appendix A Passage of Lines A-31. A passage of lines occurs under two conditions. A forward passage of lines occurs when a unit passes through another unit’s positions while moving toward the enemy (ADP 3-90). A rearward passage of lines occurs when a unit passes through another unit’s positions while moving away from the enemy (ADP 3-90). Ideally, a passage of lines does not interfere with the conduct of the stationary unit’s operations. Figure A-17 shows the symbols for both a forward and a rearward passage of lines. The arrow goes in the direction the passing unit is moving. Figure A-17. Forward and rearward passage of lines Passage Point A-32. A passage point is a designated place where the passing units pass through the stationary unit. The location of this point is where the commander wants subordinate units physically to execute a passage of lines. Figure A-18 depicts the graphic control measure for PASSAGE POINT 7. Figure A-18. Passage point Phase Line A-33. A phase line is an easily identified feature in the operational area utilized for control and coordination of military operations (JP 3-09). A commander establishes PLs to control the maneuver of the units. PLs are not boundaries unless designated as such and do not establish any specific responsibilities between units, unless the operation order so specifies. When possible, commanders place them along easily recognizable terrain features—such as roads, railroad tracks, rivers, and ridgelines—to ensure easy identification. Units normally report crossing PLs, but do not halt unless specifically directed. Some PLs have additional designations for specific purposes, such as an LD or a PLD. Figure A-19 depicts five phase lines being used for an offensive operation.
3-90
385
Tactical Control Measures Figure A-19. Phase lines Position Area for Artillery A-34. A position area for artillery is an area assigned to an artillery unit to deliver surface to surface fires. A position area for artillery (PAA) is not an AO for the artillery unit occupying it. Commanders assign PAAs for terrain management and for locations where individual artillery systems can maneuver to increase their survivability. Establishing a PAA lets other subordinate units know they should avoid occupying that same terrain. While the exact size of a PAA depends on mission variables, a Paladin platoon normally requires a PAA encompassing over 4 square kilometers whereas a multiple launch rocket system (known as MLRS) platoon requires 9 square kilometers. Figure A-20 depicts a PAA. Figure A-20. Position area for artillery A-35. The maneuver echelon operations officer of the unit that owns the terrain establishes the PAA. The occupying artillery unit does not have the same authority and responsibilities toward the PAA that are associated with a unit assigned an assigned area. For example, other units can move through a PAA without clearing that movement with the artillery unit. However, to prevent fratricide or inadvertently concentrating forces units should make attempt to contact the artillery unit to determine if the PAA is occupied. Additionally, units moving through or occupying terrain within a PAA should be cognizant of the increased risk of receiving indirect fire from enemy artillery due to enemy counterbattery or preparatory fires. The artillery unit occupying a PAA establishes liaison with the unit that owns the assigned area where the PAA
3-90
386
Appendix A is located. The echelon fire support officer usually conducts this liaison in accordance with standard command and support relationships. A-36. The decision to establish a PAA affects airspace control for rotary-wing, fixed-wing, unmanned, and tilt-rotor aircraft integration. A PAA is a base upon which to establish future grid target lines for lateral deconfliction and areas for rotary-wing, fixed-wing, unmanned, and tilt-rotor aircraft to avoid, depending on high or low angle artillery fires. Rally Point A-37. A rally point is an easily identifiable point on the ground at which units can reassemble and reorganize if they become dispersed. Forces conducting a patrol or an infiltration commonly use this control measure. Figure A-21 depicts RALLY POINT 14. Figure A-21. Rally point 14 Release Point A-38. A release point is a designated place on a route where elements are released from centralized control. Once released from centralized control they are released back to the authority of their respective commanders. Each start point (SP) must have a corresponding release point (RP), which must also be easy to recognize on the ground. Marching units do not stop at the RP; instead, as they move through the RP and continue toward their own appropriate destination. Figure A-23 shows RP 3 on ROUTE IRON. Relief in Place A-39. A relief in place is an operation in which, by direction of higher authority, all or part of a unit is replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and the assigned zone of operations are transferred to the incoming unit (JP 3-07.3). Figure A-22 depicts a relief in place. (See Chapter 15 for more information on relief in place.) Figure A-22. Relief in place Route A-40. A route is the prescribed course to be traveled from a point of origin to a destination. Routes can have different functions. Commanders can add those functions as adjectives to specify different types of routes. Examples of such routes include a passing route, main supply route, and alternate supply route. Commanders can further designate routes as open, supervised, dispatch, reserved, or prohibited. They can assign names, numbers, or alphanumeric designations to routes within their assigned areas. Figure A-23 depicts ROUTE IRON.
3-90
387
Tactical Control Measures Figure A-23. Routes Start Point A-41. The start point is a designated place on a route where elements fall under the control of a designated march commander. All routes have a designated SP and RP that are easily recognizable on the map and on the ground, such as a road junction. It is far enough from the assembly area to allow units to organize and move at the prescribed speed and interval when they reach the SP. Figure A-23 depicts SP 7 on ROUTE IRON. Target Area of Interest A-42. A target area of interest is the geographical area where high-value targets can be acquired and engaged by friendly forces (JP 2-0). Commanders use TAIs to apply a specific effect against a specific target with a defined outcome. The difference between a TAI and an NAI is that an NAI is established to obtain information and answer a specific information requirement whereas a TAI is established to create a pre-determined effect. The unit staff develops TAIs during the MDMP, based on the currently available products resulting from the IPB. These TAIs are further refined during course of action analysis and finally approved by the commander during course of action approval. The shape of a TAI reflects the target and effect intended for the TAI. Information collection assets normally cue their use. Commanders designate TAIs for any organic or Figure A-24. Target area of interest supporting systems. TAIs differ from engagement WHITETAIL areas. Engagement areas plan for the use of all available weapons, while TAIs might be engaged by a single weapon or system. Figure A-24 depicts TAI WHITETAIL.
3-90
388
Appendix A OFFENSIVE OPERATIONS CONTROL MEASURES A-43. This section defines in alphabetical order those common offensive control measures commanders use to synchronize the effects of combat power. The commander uses the minimum control measures required to successfully complete the mission while providing subordinates the flexibility needed to respond to changes in the situation. Figure A-25 depicts some of the common offensive control measures that will be further discussed throughout this section. Figure A-25. Common offensive control measures Assault Position A-44. An assault position is a covered and concealed position short of the objective from which final preparations are made to assault the objective (ADP 3-90). Assault positions are typically only assigned to attacking maneuver formations. Units supporting and maneuvering with the maneuver force execute their final preparations in the same assault positions as the maneuver force. These final preparations can involve tactical considerations, such as a short halt to coordinate the final assault, reorganize to adjust to combat losses, or make necessary adjustments in the attacking force’s dispositions. These preparations can also involve technical activities, such as engineers conducting their final checks on obstacle clearing systems and the crews of plow and roller equipped tanks removing their locking pins. Commanders may locate their assault positions near either a final coordination line (FCL) or a probable line of deployment (PLD). Figure A-25 depicts ASSAULT POSITION PEGGY. (Paragraphs A-52 and A-57 define a FCL and PLD respectively.) Assault Time A-45. The assault time is the moment to attack the initial objectives throughout the geographical scope of the operation (ADP 3-90). Higher echelon headquarters impose this control measure to achieve simultaneous results from several different units. Using an assault time synchronizes the moment an enemy force feels the effects of friendly combat power. Assault times are similar to the time-on-target control method used by field
3-90
389
Tactical Control Measures artillery units when processing fire missions. A commander uses an assault time instead of a time of attack because of differences in distance, tactical mobility, and known obstacles among subordinate units. (See paragraph A-59 for more information on a time of attack). Attack by Fire Position A-46. An attack by fire position designates the general position from which a unit performs the tactical task of attack by fire (ADP 3-90). The purpose of these positions is to mass the effects of direct fire systems for one or multiple locations toward enemy forces. Attack by fire positions rarely apply to units larger than a company. An attack by fire position does not indicate the specific site. Figure A-26 depicts ATTACK BY FIRE POSITION BRANDON. (See paragraph B-3 for more information on the tactical mission task of attack by fire). Figure A-26. Attack by fire position JAMES Attack Position A-47. The attack position is the last position an attacking force occupies or passes through before crossing the line of departure (ADP 3-90). An attack position facilitates an attacking force’s deployment and last- minute coordination before it crosses the LD. Located on the friendly side of the LD, an attack position offers cover and concealment for the attacking force. Commanders use it primarily at battalion level and below. Whenever possible, units move through the attack position without stopping. An attacking unit occupies an attack position for various reasons, including when the unit is waiting for specific results from preparation fires or when it is necessary to conduct additional coordination, such as a forward passage of lines. If the attacking unit occupies the attack position, it stays there for the shortest amount of time possible to avoid offering enemy forces a lucrative target. Figure A-25 on page A-14 depicts ATTACK POSITIONS BLUE and GOLD. Axis of Advance A-48. An axis of advance designates the general area through which the bulk of a unit’s combat power must move (ADP 3-90). A commander uses an axis of advance for three primary reasons: * To direct the bypass of locations that could delay the progress of the advancing force, such as known contaminated areas. * To indicate that the force is not required to clear the entire assigned area as it advances. The force will be required to clear the axis based on specified bypass criteria. * To indicate to a unit involved in offensive encirclement, exploitation, or pursuit operations the need to move rapidly toward an objective. A-49. An axis of advance can be used by any maneuver echelon. Subordinate maneuver units can develop their own axis of advance within the confines of their higher headquarters axis of advance. For example, a battalion can establish multiple company level axis of advance as long as each company’s axis of advance remains within the bounds of the battalion’s axis of advance. The width of the axis varies based on factors such as terrain, size and type of friendly forces, and time. Generally, a wider axis of advance is used in unrestricted terrain. When using an axis of advance, the risk is that friendly forces do not detect enemy forces outside the axis and the enemy is inadvertently bypassed. Figure A-25 on page A-14 depicts AXIS OF ADVANCE JAN. When developing the axis of advance, commanders also establish bypass criteria (see paragraph 12-27 for bypass criteria). Battle Handover Line A-50. The battle handover line is a designated phase line where responsibility transitions from the stationary force to the moving force and vice versa (ADP 3-90). The common higher echelon commander of the two forces establishes the battle handover line (BHL) after consulting both commanders. The stationary commander determines the location of the line. The BHL is forward of the FEBA in the defense or the FLOT
3-90
390
Appendix A in the offense. Commanders draw it where the direct fires of forward combat elements of the stationary unit can effectively support the passing unit until completion of the passage of lines. The area between the BHL and the stationary force belongs to the stationary force commander. The stationary force commander may employ security forces, obstacles, and fires in the area. Figure A-27 depicts a BHL at PL DANIEL used in conjunction with other control measures during a forward passage of lines. Figure A-27. Battle handover line DANIEL Direction of Attack A-51. The direction of attack is a specific direction or assigned route a force uses and does not deviate from when attacking (ADP 3-90). It is a restrictive control measure that requires a subordinate unit to attack as indicated and is not normally allowed to bypass the enemy. It is normally used at battalion and lower levels. Direction of attack is a more restrictive control measure than axis of advance and units are not free to maneuver off the assigned route. Direction of attack is normally used in counterattacks or to ensure that supporting attacks make maximal contribution to the main attack. It is also used during night attacks, infiltrations, and when attacking through obscuration. When using a direction of attack, commanders designate a PD at the beginning. Figure A-25 on page A-14 depicts DIRECTION OF ATTACK JOAN. Final Coordination Line A-52. The final coordination line is a phase line close to the enemy position used to coordinate the lifting or shifting of supporting fires with the final deployment of maneuver elements (ADP 3-90). Brigade and below maneuver formations typically use an FCL. The FCL should be placed on easily recognizable terrain. Final adjustments to supporting fires necessary to reflect the actual versus the planned tactical situation take place before crossing the FCL. The FCL is not a FSCM. Figure A-25 on page A-14 depicts PL ROBERT as an FCL.
3-90
391
Tactical Control Measures Limit of Advance A-53. The limit of advance is a phase line used to control forward progress of the attack (ADP 3-90). A LOA is a restrictive control measure because the attacking unit does not advance any of its elements or assets beyond the LOA, but the attacking unit can push its security forces to that limit. Units can employ direct and indirect fires beyond the LOA. A LOA is typically established by a higher echelon headquarters. Commanders usually select linear terrain features, perpendicular to the direction of attack, on the far side of the objective as LOAs because such terrain features are easily identifiable. They employ LOAs to prevent overextending the attacking force and to reduce the possibility of fratricide and friendly fire incidents by fires supporting the attack. They position LOAs far enough beyond their objectives to allow their units to defend the objective. A LOA prevents units from exploiting success and launching a pursuit; therefore, commanders should only use LOAs if they do not want to perform an exploitation or pursuit. A forward boundary is always a LOA, but a LOA is not necessarily a forward boundary. In fact, a LOA and the unit’s forward boundary should rarely coincide because of the resulting limitations that a forward boundary places on supporting fires beyond the forward boundary. Figure A-25 on page A-14 shows PL BASIL used as a LOA. Line of Departure A-54. In land warfare, the line of departure is a line designated to coordinate the departure of attack elements (JP 3-31). The purpose of the LD is to coordinate the advance of the attacking force so that its elements strike the enemy in the order and at the time desired. The LD also marks where the unit often transitions from movement to maneuver. Commanders can also use it to facilitate the coordination of fires. Generally, it should be perpendicular to the direction the attacking force will take on its way to the objective. Friendly forces should control the LD. Commanders analyze the terrain before designating an LD. Different units have different movement rates on leaving their assembly areas based on their inherent mobility characteristics and the terrain traversed. Commanders consider these different characteristics when establishing an LD to prevent these differences from affecting the synchronization of the operation. When possible, commanders select the LD so that the terrain the attack unit traverses before crossing the LD provides sufficient cover for the attacking unit’s final deployment into a maneuver formation before crossing the LD. In many cases, the LD is also the LC because the unit in contact is conducting the attack from its current positions. Figure A-25 on page A-14 depicts PL JOHN as a combined LD and LC. Objective Rally Point A-55. The objective rally point is an easily identifiable point where all elements of the infiltrating unit assemble and prepare to attack the objective (ADP 3-90). It is typically near the infiltrating unit’s objective; however, there is no standard distance from the objective to the objective rally point. It should be far enough away from the objective so that the enemy will not detect the infiltrating unit’s attack preparations. Point of Departure A-56. The point of departure is the point where the unit crosses the line of departure and begins moving along a direction of attack (ADP 3-90). Units conducting reconnaissance and security patrols and other operations in a low-visibility environment commonly use a point of departure (PD) as a control measure. Like the LD, it marks the point where the unit transitions from movement to maneuver under conditions of limited visibility. Figure A-28 depicts PD 7. Figure A-28. Point of departure 7 Probable Line of Deployment A-57. A probable line of deployment is a phase line that designates the location where the commander intends to deploy the unit into assault formation before beginning the assault (ADP 3-90). Commanders at battalion- sized and smaller units primarily employ PLDs when their units do not cross their LD in an assault formation. It is usually a linear terrain feature perpendicular to the direction of attack and recognizable under conditions
3-90
392
Appendix A of limited visibility. The PLD should be located outside the range where enemy forces can place the attacking force under effective direct fire. In figure A-25 on page A-14, PL ROBERT is designated as the PLD. Support by Fire Position A-58. A support by fire position designates the general position from which a unit performs the tactical mission task of support by fire (ADP 3-90). Paragraph B-58 defines the tactical mission task of support by fire. The purpose of these positions is to increase the supported force’s freedom of maneuver by placing direct fires on an objective that a friendly force is going to assault. Support by fire positions are located within the maximum friendly direct fire range of the enemy positions. Commanders select them so that a moving assault force does not mask its supporting fires. For this reason, support by fire positions are normally located on the flank of an assault force, Figure A-29. Support by fire elevated above the objective if possible. Support by fire positions position are rarely applicable to units larger than company size. When used as a planning symbol, the support by fire position depicted in figure A-29 indicates the general location and direction from which the unit provides fires. When used as a control measure, the position of the symbol dictates the actual location of the position, and the arrows define the left and right limits of the unit’s sector of fire. Time of Attack A-59. The time of attack is the moment the leading elements of the main body cross the line of departure, or in a limited-visibility attack, the point of departure (ADP 3-90). Commanders use it when conducting simultaneous operations where supporting efforts must accomplish their mission to create conditions for the success of the main effort. When determining a time of attack, they consider the time subordinates require to— * Conduct necessary reconnaissance, prepare plans, and issue orders. * Synchronize plans among all subordinate units. * Complete attack preparations, such as pre-combat inspections. * Move to the LD or PD. A-60. Orders normally designate the time of attack as H hour. This occurs when the main body crosses the LD. However, H-hour can also designate the time to implement a phase of an operation, such as an airborne or air assault phase. The headquarters planning the operation specifies the term’s exact meaning. This is usually a part of the unit’s standard operating procedures. Zone A-61. A zone is an operational area assigned to a unit in the offense that only has rear and lateral boundaries (FM 3-0). By not emplacing a boundary to a unit’s front it allows them to move quicker and synchronize fires better against the enemy they are facing. A zone is different from an area of operations in that instead of a forward boundary to restrict movement and fires a higher headquarters uses maneuver control measures and fire support coordination measures. Example control measures to use include things such as a limit of advance and a coordinated fire line. Zones are most appropriate for any unit likely to make direct fire contact with the enemy during high-tempo offensive operations or when there is a fluid FLOT. Units assigned a zone treat areas behind the FLOT as an AO. Zone can be further subdivided as needed into area of operations, zones, or sectors as appropriate. Any unit not expecting to be in direct fire contact with the enemy should use an area of operations or other means of terrain management. If a unit is attacking in a zone and culminates and transitions to a hasty defense, they will continue to use the zone because they eventually expect to go back on the offense and the defense is a temporary thing. Figure A-30 depicts a battalion zone for 1-66 Armor.
3-90
393
Tactical Control Measures Figure A-30. Example zone for 1-66 Armor DEFENSIVE OPERATIONS CONTROL MEASURES A-62. The commander controls the defense by using control measures to provide the flexibility needed to respond to changes in the situation and allow the defending commander to rapidly concentrate combat power at the decisive point. Defensive control measures within a commander’s assigned area include designating the security area, BHL, MBA with its associated FEBA, and the echelon support area. The commander can use battle positions and additional direct fire control and FSCMs in addition to those control measures discussed earlier in appendix A to further synchronize the employment of combat power. The commander designates disengagement lines to trigger the displacement of subordinate forces. These common defensive control measures are discussed in alphabetical order in paragraphs A-63 through A-79. Battle Positions A-63. A battle position is a defensive location oriented on a likely enemy avenue of approach (ADP 3-90). A battle position is generally only used during defensive operations. The battle position (BP) is a symbol that depicts the location and general orientation of most of the defending forces. A commander’s use of a battle position does not direct the position of the subordinate’s entire force within its bounds since it is not an assigned area. There are five kinds of BPs—primary, alternate, supplementary, subsequent, and strong point. When assigning BPs, the higher echelon always designates the primary BP. The subordinate unit designates and prepares alternate, supplementary, and subsequent positions as time and other resources permit and if the terrain or situation requires them. Figure A-31 on page A-20 depicts the five kinds of BPs.
3-90
394
Appendix A Figure A-31. Five kinds of battle positions A-64. The primary position is the position that covers the enemy’s most likely avenue of approach into the assigned area. It is the best position from which to accomplish the mission, such as cover an engagement area. A-65. An alternate position is a defensive position that the commander assigns to a unit or weapon system for occupation when the primary position becomes untenable or unsuitable for carrying out the assigned task. It covers the same area as the primary position. Commanders locate alternate positions so the occupants can continue to fulfill their original tasks, such as covering the same avenue of approach or engagement area as their primary positions. These positions increase the defenders’ survivability by allowing defenders to engage enemy forces from multiple positions. For example, a unit moves to its alternate positions when enemy forces bring suppressive fires on the primary position. A-66. A supplementary position is a defensive position located within a unit’s assigned area that provides the best sectors of fire and defensive terrain along an avenue of approach that is not the primary avenue where the enemy is expected to attack. For example, an avenue of approach into a unit’s assigned area from one of its flanks normally requires establishing supplementary positions to allow a unit or weapon system to engage enemy forces traveling along that avenue. A-67. A subsequent position is a position that a unit expects to move to during the course of battle. A planned and, to some extent, prepared location for a defense or delay that is behind the primary positions initially occupied for a defense. A defending unit may have a series of subsequent positions. Subsequent positions can be further organized into primary, alternate, and supplementary positions. A-68. A strong point is a heavily fortified battle position tied to a natural or reinforcing obstacle to create an anchor for the defense or to deny the enemy decisive or key terrain (ADP 3-90). Strong points require extensive engineer support to create obstacles and increase survivability efforts. This include providing all assets overhead protection, trenches, and other protective construction using both natural and man-made terrain. Commanders prepare a strong point for all around defense. Commanders also establish a strong point when anticipating that enemy actions will isolate a defending force retaining terrain critical to the defense.
3-90
395
Tactical Control Measures A-69. Before assigning a strong point mission, commanders ensure that the strong point force has sufficient time and resources to construct the position. A minimally effective strong point typically requires one day of effort from an engineer unit the same size as the unit defending the strong point. Normally, companies and battalions occupy strong points, although brigades may construct them. Units do not normally establish strong points for units smaller than company size. This is because a platoon or squad cannot secure a perimeter large enough to contain all required assets and supplies. A-70. Units as large as battalion task forces and as small as squads or sections use BPs. Commanders select positions based on terrain, enemy capabilities, and friendly capabilities. A commander can assign all or some subordinates’ BPs within their BP. Figure A-32 depicts a combined arms battalion BP. A-71. A commander may assign subordinates BPs in situations when there is a need to retain a greater degree of control over the maneuver of subordinate units than that provided through only using an assigned area, as the higher unit controls maneuver outside the general location of the BP. A commander can assign multiple BPs to a single unit, which allows that unit to maneuver between BPs. The commander specifies mission and engagement criteria to the unit assigned to a BP. Security, functional and multifunctional support, and sustainment forces typically operate outside a unit’s BP. Figure A-33 on page A-22 depicts a brigade assigned area with battalion BPs. A-72. Units occupy or depart BPs as part of the overall plan. The commander assigning a unit to a BP should specify when and under what conditions the unit can displace from the position, since a BP is not normally held at all costs. If a higher echelon commander orders a unit to defend a BP, its commander has the option of moving off the BP. If a higher echelon commander directs a unit to retain a BP, the subordinate commander needs to know the specific conditions that need to exist before the unit can displace. Figure A-32. Combined arms battalion with company battle positions
3-90
396
Appendix A Figure A-33. Brigade assigned area with battalion battle positions Disengagement Line A-73. A disengagement line is a phase line located on identifiable terrain that, when crossed by the enemy, signals to defending elements that it is time to displace to their next position (ADP 3-90). Commanders use these lines in the delay and the defense when they want their defending units to avoid becoming decisively engaged. They establish criteria, either time or condition based, for disengagement, such as number of enemy vehicles by type, friendly losses, or enemy movement to flanking locations. They may designate multiple disengagement lines, one for each system in the defense, or if they want the unit to conduct multiple displacements. Figure A-34 depicts PL JOAN as a disengagement line. Engagement Area A-74. An engagement area is an area where the commander masses effects to contain and destroy an enemy force. This includes organic direct fire systems and supporting systems, such as close air support. The size and shape of the engagement area is determined by the relatively unobstructed intervisibility from the weapon systems in their firing positions and the maximum effective range of those system. Commanders designate EAs to cover each enemy avenue of approach into unit positions. The commander routinely subdivides their EA into smaller EAs for subordinates using one or more target reference points or by prominent terrain features. While subordinates are assigned sectors of fire, responsibility for an avenue of approach or key terrain is never split. Commanders at battalion and below typically use this control measure. The seven steps of engagement area development are: identify all likely enemy avenues of approach, determine likely enemy schemes of maneuver, determine where to kill the enemy force, plan and integrate obstacles, emplace weapon systems, plan and integrate indirect fires, and rehearse. Figure A-34 depicts a sketch of several engagement areas used within the context of a reinforced battalion task force defense.
3-90
397
Tactical Control Measures Figure A-34. Task force engagement areas Final Protective Fire A-75. Final protective fire is an immediately available, prearranged barrier of fire designed to impede enemy movement across defensive lines or areas (JP 3-09.3). Both direct and indirect fire weapons can provide final protective fires (FPFs). A commander can only assign each firing battery or platoon a single FPF. Firing units should lay on their FPFs (or other assigned priority targets) but do not “engage” or fire them unless directed. A FPF is a priority target for an element or system, and those fire units engage that target when they are not engaged in other fire missions. When an enemy force initiates its final Figure A-35. Final protective fire assault into a defensive position, the defending unit initiates its FPFs to engage enemy infantry soldiers and armored vehicles. Figure A-35 depicts an FPF to be fired by A/1-16 Field Artillery.
3-90
398
Appendix A Final Protective Line A-76. A final protective line is a selected line of fire where an enemy assault is to be checked by interlocking fire from all available weapons and obstacles. Whenever possible, units reinforce the final protective line (FPL) with protective obstacles. All company and below echelons identify their final protective lines as part of their defensive preparations. Typically, initiation of FPFs is the signal for all elements to shift fires to their assigned portion of the final protective line and spare no ammunition in repelling the enemy assault. Figure A-36 depicts a FPL. Figure A-36. Final protective line Forward Edge of the Battle Area A-77. Forward edge of the battle area is the foremost limits of a series of areas in which ground combat units are deployed to coordinate fire support, the positioning of forces, or the maneuver of units, excluding areas in which covering or screening forces are operating (JP 3-09.3). A FEBA is not a boundary, but a phase line designating the forward most point of the MBA and helps convey the commander’s intent. It marks the foremost limits of the areas in which most ground combat units deploy, excluding the areas in which security forces are operating. MBA forces can temporarily move forward of the FEBA to expedite the retrograde operations of security forces. A commander designates a FEBA to coordinate fire support and to Figure A-37. Forward edge of the battle area help maneuver subordinate forces. The FEBA shows the senior commander’s planned limit for the effects of direct fires. Defending units must address this area in their scheme of maneuver and exchange information regarding tactical plans at contact points. The Army only uses a FEBA during defensive operations. Figure A-37 depicts the current FEBA and a proposed FEBA. Main Battle Area A-78. The main battle area is the area where the commander intends to deploy the bulk of their unit to defeat an attacking enemy. The bulk of a unit’s combat power is deployed in MBA. The MBA extends from the FEBA to the unit’s rear boundary. Security forces are located outside of the MBA. Sector A-79. A sector is an operational area assigned to a unit in the defense that has rear and lateral boundaries with interlocking fires (FM 3-0). By not emplacing a boundary to a unit’s front it allows them to synchronize fires better against the enemy they are facing. A sector is different from an area of operations in that instead
3-90
399
Tactical Control Measures of a forward boundary to restrict movement and fires a higher headquarters uses maneuver control measures and fire support coordination measures. Example control measures to use include things such as a battle position and a coordinated fire line. Sectors are most appropriate for any unit likely to make direct fire contact with the enemy during high-tempo defensive operations or when there is a fluid FLOT. Units assigned a sector treat areas behind the FLOT as an AO. Sectors can be further subdivided as needed into area of operations, sectors, or zones as appropriate. Any unit not expecting to be in direct fire contact with the enemy should use an area of operations or other means of terrain management. If a unit is defending in a sector and transitions to a hasty attack to exploit the enemy, they will continue to use the sector until an order can be issued that will better control the attack, which will then change it to either a zone or area of operations. Figure A-38 depicts a battalion sector for 1-66 Armor. Figure A-38. Example sector for 1-66 Armor DIRECT FIRE CONTROL MEASURES A-80. Commanders communicate to subordinates the manner, method, and time to initiate, shift, and mass direct fires by using direct fire control measures. The commander controls unit fires to direct the engagement of enemy systems and gain the greatest effect. The commander uses IPB products and reconnaissance to determine the most advantageous way to use direct fire control measures to mass the effects on the enemy and reduce friendly fire incidents from direct fire systems. The commander must understand the characteristics of weapon systems and available munitions (such as the danger to unprotected Soldiers when tanks fire discarding sabot ammunition over their heads or near them). Direct fire control measures defined in this publication include engagement criteria, engagement priorities, sectors of fire, TRPs, and trigger line. Maneuver platoon and company publications address and go into further detail on other direct fire control measures, such as frontal, cross, or depth fire patterns and simultaneous, alternating, or observed techniques of fire. Figure A-39 on page A-26 depicts common graphical direct fire control measures.
3-90
400
Appendix A Figure A-39. Direct fire control measures Engagement Criteria A-81. Engagement criteria are protocols that specify those circumstances for initiating engagement with an enemy force. They may be restrictive or permissive. Commanders establish engagement criteria during direct fire planning. Commanders and leaders of small tactical units use engagement criteria in conjunction with engagement priorities and other direct fire control measures to mass fires and control fire distribution. Engagement Priority A-82. Engagement priority identifies the order in which the unit engages enemy systems or functions. Commanders assign engagement priorities based on the type or level of threat at different ranges to match organic weapon systems capabilities against enemy vulnerabilities. Engagement priorities depend on situations. Commanders use engagement priorities to distribute fires rapidly and effectively. Subordinate elements can have different engagement priorities. Normally, units engage the most dangerous targets first, followed by targets in depth or specialized systems, such as engineer vehicles.
3-90
401
Tactical Control Measures Sector of Fire A-83. A sector of fire is the area assigned to a unit or weapon system in which it will engage the enemy in accordance with established engagement priorities. Battalions and smaller echelons primarily use this direct fire control measure. Each sector of fire can extend from a firing position to the maximum engagement range of the weapon, or it can be an enclosed area at a distance from the firing position. Commanders assign each subordinate unit or available weapon system a primary sector of fire and a secondary sector of fire to increase the capability of concentrating fire in certain areas. The primary sector of fire is that area in which the assigned unit, individual, or Figure A-40. Sectors of fire crew-served weapon is initially responsible for engaging and destroying enemy targets located in that sector based on established priorities for engagement. Fire shifts to the secondary sector on order when there are no targets in the primary sector or when the movement of another friendly element needs covering. This secondary sector of fire should correspond to another element’s primary sector of fire to obtain mutual support. Subordinate commanders may impose additional fire control measures as required. Figure A-40 depicts primary, secondary, and enclosed sectors of fire. Target Reference Point A-84. A target reference point is a predetermined point of reference, normally a permanent structure or terrain feature that can be used when describing a target location (JP 3-09.3). A target reference point (TRP) is an easily recognizable point on the ground, either natural or manmade used to initiate, distribute, and control fires. Maneuver leaders at battalion and lower echelons designate TRPs to define unit or individual sectors of fire and observation, usually within an engagement area. A TRP can also designate the center of an area where a commander plans to rapidly distribute or converge fires. Leaders designate TRPs using the standard target symbol and numbers. Once Figure A-41. Target reference approved by the echelon fire support officer, TRPs can be point 032 designated as indirect fire targets by using the standard target symbol and target numbering identification (using two letters and four numbers). If a TRP is not also used as an indirect fire target, it is designated using numeric marking only. Figure A-41 depicts the symbol for TRP 032, a direct fire only TRP. The rest of the TRPs in the figures in this publication are both direct and indirect fire targets and are thus designated using indirect fire procedures. Trigger Line A-85. A trigger line is a phase line used to initiate and mass fires into an engagement area or an objective at a predetermined range for all or like weapon systems. Event or time-oriented criteria are used to initiate planned actions directed toward achieving surprise and inflicting maximum destruction on the enemy. Commanders can designate one trigger line for all weapon systems or separate trigger lines for each weapon or type of weapon system. Commanders specify the engagement criteria for this situation. The criteria may be either time or event driven, such as when a certain number or certain types of vehicles cross the trigger line before initiating engagement. Commanders can use a time-based fires delivery method or a geography-based fires delivery. Commanders may reserve the authority to initiate engagement by firing the commander’s own individual weapon or giving the command to fire.
3-90
402
Appendix A A-86. Commanders designate a PL as the trigger line for available supporting fire support systems. They base the location of the trigger line on the mission variables, including such variables as the time of flight for artillery shells, positioning of the guns, and the existence of quick-fire links. The trigger line’s location varies from situation to situation. Its position reflects the distance an enemy force is likely to traverse in the time it takes from when fires are requested to when artillery rounds impact at a given enemy’s movement speed. This gives time for supporting fire support systems to respond to the initial call for fire. For example, in a desert environment an enemy force is expected to travel two kilometers in three minutes. The battalion creates an indirect fire trigger line that is approximately two Figure A-42. Trigger line kilometers beyond the point where the commander wants to engage enemy forces with indirect fires since it takes three minutes to process a call for fire and for rounds to impact. Figure A-42 depicts both direct fire and fire support trigger lines based on enemy movement. A-87. Commanders can establish another trigger line for the unit’s most accurate long-range weapon system in the vicinity of the area where the fire support impacts to capitalize on the asymmetric attack. However, dust and debris resulting from the artillery fire may prevent direct fire systems from engaging enemy forces. Commanders establish other trigger lines and TRPs for shorter-range systems. Commanders may give guidance to extremely proficient crews to engage enemy forces at longer than normal ranges or give them different engagement priorities than the rest of the force, such as giving priority to engaging air defense or engineer breaching systems. A-88. As enemy forces advance, commanders establish a decision point to help force a determination on whether to continue to fire in depth or to concentrate unit fires on a single point. Many factors impact this decision, most of which concern enemy forces regarding their methods of maneuver and the effects of the defending force’s fires. COMMON FIRE SUPPORT COORDINATION MEASURES A-89. Commanders employ FSCMs to facilitate rapid target engagement and simultaneously provide safeguards for friendly forces. The fire support coordinator recommends FSCMs to the commander based on the commander’s guidance, location of friendly forces, scheme of maneuver, and anticipated enemy actions. Locations and implementing instructions for FSCMs are disseminated electronically and via overlays through command and fire support channels to higher, lower, and adjacent units. Once established, FSCMs are entered into or posted on all the command’s displays and databases. Below are some of the most commonly used FSCMs. FSCMs are either permissive or restrictive. (See ADP 3-19 and FM 3-09 for a detailed explanation on the use of all FSCMs.) PERMISSIVE FIRE SUPPORT COORDINATION MEASURES A-90. Permissive FSCMs facilitate the attack of surface targets. Permissive FSCMs do not include the clearance of airspace and all fires require terrain and airspace clearance prior to engagement. FSCMs will change frequently during operations and the commander adjusts FSCMs as required to keep pace with operations Common permissive FSCMs include a coordinated fire line (CFL), a fire support coordination line (FSCL), kill box, and a free-fire area (FFA).
3-90
403
Tactical Control Measures Coordinated Fire Line A-91. A coordinated fire line is a line beyond which conventional surface-to- surface direct fire and indirect fire support means may fire at any time within the boundaries of the establishing headquarters without additional coordination but does not eliminate the responsibility to coordinate the airspace required to conduct the mission (JP 3-09). The purpose of the CFL is to expedite the surface-to-surface attack of targets beyond the CFL without coordination with the ground commander in whose area the targets are located. Such fires still comply with rules of engagement and law of war targeting constraints; designation of a CFL is not authorization to fire Figure A-43. Coordinated fire line indiscriminately into the area. Brigade combat teams or divisions usually establish a CFL although a maneuver battalion may establish one, particularly during amphibious operations. It is possible for each echelon to establish a CFL so a unit would need to be aware of the several constraints. A CFL should be placed on identifiable terrain, however, additional considerations include the limits of ground observation, the location of the initial objectives in the offense, and the requirement for maximum flexibility in both maneuver and the delivery of supporting fires. Subordinate CFLs may be consolidated by higher headquarters. Figure A-43 depicts a CFL. Fire Support Coordination Line A-92. The fire support coordination line is a fire support coordination measure established by the land or amphibious force commander to support common objectives within an area of operations, beyond which all fires must be coordinated with affected commanders prior to engagement and, short of the line, all fires must be coordinated with the establishing commander prior to engagement (JP 3-09). FSCLs facilitate the expeditious attack of surface targets of opportunity beyond the coordinating measure. The FSCL is not a boundary, the synchronization of operations on either side of the FSCL is the responsibility of the establishing commander, out to the limits of the land or amphibious force boundary. FSCLs apply to all fires of air-, land-, and sea-based weapon systems using any type of ammunition. If possible, the FSCL should follow well-defined terrain features to assist identification from the air. The joint force land component Figure A-44. Fire support commander (JFLCC) and joint force maritime component coordination line commander (JFMCC) cannot employ fires long of the FSCL without coordination with affected commanders, and the joint force air component commander (JFACC) cannot employ fires short of the FSCL without coordination with the JFLCC or JFMCC. Supporting elements attacking targets beyond the FSCL must ensure that an attack will not produce adverse effects on, or to the rear of, the line. Short of a FSCL, all air-to-ground and surface-to-surface attack operations are controlled by the appropriate land or amphibious force commander. Coordination of attacks beyond the FSCL is especially critical to commanders of air, land, and special operations forces. Figure A-44 depicts an example FSCL.
3-90
404
Appendix A A-93. The decision on where to place or even whether to use a FSCL requires careful consideration. If used, its location is based on estimates of the situation and concept of operations. The establishment of a FSCL does not create a free-fire area (FFA) beyond the FSCL. Engagements beyond the FSCL must be consistent with the establishing commander's priorities, timing, and desired effects. Location of enemy forces, anticipated rates of movement, concept and tempo of the operation, organic weapon capabilities such as wide- area munitions, or those with delayed effects, and other factors are all considered by the commander. The establishing commander adjusts the location of the FSCL as required to keep pace with operations. A series of disseminated "on-order" FSCLs will help accelerate the coordination required. The establishing commander quickly transmits the change to higher, lower, adjacent, and supporting headquarters to ensure that appropriate controlling agencies coordinate engagement operations. Changes to the FSCL require notification of all affected forces within the AO and must allow sufficient time for these forces and/or components to incorporate the FSCL change. Current technology and collaboration tools between the elements of the joint force determine the times required for changing the FSCL. The FSCL is normally positioned closer to the forward line of own troops in the defense than in the offense; however, the exact positioning depends on the situation. Placing the FSCL at greater depths will typically require support from higher headquarters and other supporting commanders. Also, when the FSCL is positioned at greater depth, there is greater requirement for detailed coordination with the establishing commander and can slow the expeditious clearance of fires short of the FSCL. By establishing a FSCL close in, yet at sufficient depth so as to not limit high tempo maneuver, land and amphibious force commanders ease the coordination requirements for engaging targets within their assigned areas by forces not under their control, such as naval surface fire support or air interdiction. Note. During large-scale combat operations, it is likely that divisions and corps are operating as a tactical headquarters and will only provide input on proposed FSCL locations to the land component commander. Free-Fire Area A-94. A free-fire area is a specific region into which any weapon system may fire without additional coordination with the establishing headquarters (JP 3-09). Where indirect fires and aircraft share a FFA, units should establish an airspace coordination area to assist in deconflicting operations. Normally, division or higher echelon headquarters establish a FFA on identifiable terrain. Figure A-45 depicts a FFA. Figure A-45. Free fire area Kill Box A-95. A kill box is a three-dimensional permissive fire support coordination measure with an associated airspace coordinating measure used to facilitate the integration of fires (JP 3-09). It is used to facilitate integrating joint fires and coordinating associated airspace. The two types of kill boxes are blue kill box and purple kill box. A blue kill box facilitates the attack of surface targets with air-to-surface munitions without coordination with the AO commander’s headquarters. Within its boundaries a blue kill box extends from the surface to a ceiling altitude agreed upon by the requesting unit, AO commander, and airspace control authority. A purple kill box facilitates the attack of surface targets with subsurface-to-surface, surface-to- surface, and air-to-surface munitions without coordination with the AO commander’s headquarters. Within its boundaries a purple kill box extends from the surface, through an airspace coordinating measure floor to a ceiling altitude agreed upon by the requesting unit, AO commander, and airspace control authority.
3-90
405
Tactical Control Measures Figure A-46 depicts a blue kill box. Figure A-47 depicts a purple kill box. (See ATP 3-09.34/MCRP 3- 31.4/NTTP 3-09.2.1/AFTTP 3-2.59 for more information on kill box planning and employment.) Figure A-46. Blue kill box Figure A-47. Purple kill box RESTRICTIVE FIRE SUPPORT COORDINATION MEASURES A-96. Restrictive fire support coordination measures prevent fires into or beyond the control measure without detailed coordination. Their primary purpose is to provide safeguards for friendly forces, noncombatants, facilities, or terrain. Restrictive FSCMs include a no-fire area (NFA), a restrictive fire area (RFA), and a restrictive fire line (RFL). Establishing a restrictive measure imposes certain requirements for specific coordination before the engagement of those targets affected by the measure.
3-90
406
Appendix A No-Fire Area A-97. A no-fire area is an area designated by the appropriate commander into which fires or their effects are prohibited (JP 3-09.3). Any echelon commander uses a no-fire area to protect independently operating elements, such as forward observers and special operations forces. A commander can also use it to protect friendly forces in the echelon support area and for humanitarian reasons, such as preventing the inadvertent engagement of dislocated civilian concentrations, or to protect sensitive areas, such as cultural monuments. Figure A-48 depicts a no-fire area. This rule has two exceptions: * The establishing headquarters may approve fires within a no-fire area on a case-by-case mission basis. Figure A-48. No fire area * When an enemy force within a no-fire area engages a friendly force, the friendly force may engage a positively identified enemy force to defend itself. Restrictive Fire Area A-98. A restrictive fire area is a location in which specific restrictions are imposed and into which fires that exceed those restrictions will not be delivered without coordination with the establishing headquarters (JP 3-09). The purpose of the RFA is to regulate fires into an area according to the stated restrictions, such as no unguided conventional or dud- producing munitions. Maneuver battalion or larger ground forces normally establish RFAs. On occasion, a company operating independently may establish an RFA. Usually, it is located on identifiable terrain by grid or by a radius (in meters) from a center point. Commanders may depict RFA restrictions on a map or overlay, or they can reference an operation order that contains the restrictions. Figure A-49 depicts a restricted fire area. Figure A-49. Restrictive fire area
3-90
407
Tactical Control Measures Restrictive Fire Line A-99. A restrictive fire line is a specific boundary established between converging, friendly surface forces that prohibits fires or their effects from crossing (JP 3-09). Both or only one of those converging forces may be moving. Fires and their effects can cross a RFL when the event has been coordinated with the affected force. The purpose of the line is to prevent interference between converging friendly forces, such as what occurs during a linkup operation. The next higher common commander of the converging forces establishes the RFL. Located on identifiable terrain, it is usually located closer to the Figure A-50. Restrictive fire line stationary force—if there is one—than to the moving force. Alternatively, a commander can use an RFL to protect sensitive areas, such as cultural monuments. Figure A-50 depicts a restricted fire line. FIRE SUPPORT TARGETS A-100. A target is an entity or object that performs a function for the threat considered for possible engagement or other action (JP 3-60). There are control measures for point targets, circular targets, rectangular targets, and linear targets. Commanders designate fire support targets using a two-letter and four-digit code established in field artillery doctrine. A-101. Commanders may choose to attack two or more targets simultaneously or sequentially. A group of targets consists of simultaneously engaging two or more targets. Commanders graphically show a group of targets by circling the targets and identifying the group with Figure A-51. Fire support targets a group designator. This group designator consists of the two letters assigned to the block of target numbers assigned to a unit with a number inserted between the two letters. A series of targets consists of engaging two or more targets sequentially. A series can include individual targets or combinations of individual and group targets. Commanders show a series of targets as individual targets or groups of targets within a prescribed area. Commanders assign each series a code name or nickname. The designation of a series or group of targets does not preclude the attack of individual targets within the series or group. It also does not preclude the attack of one or more groups of targets within the series. Figure A-51 depicts the different fire support targets. COMMON AIRSPACE COORDINATING MEASURES A-102. Airspace coordinating measures are measures employed to facilitate the efficient use of airspace to accomplish missions and simultaneously provide safeguards for friendly forces (JP 3-52). Airspace coordinating measures (ACMs) are employed to facilitate the efficient use of airspace to accomplish missions and simultaneously provide safeguards for friendly forces. ACMs provide the three-dimensional description
3-90
408
Appendix A of the airspace, associated restrictions, requests for access and other applicable coordination procedures. The details of each ACM are provided in the airspace control order. Airspace elements establish ACMs to accomplish one or more functions: * Establish reserved airspace for specific airspace users. * Restrict the actions of some airspace users. * Create airspace in which units can use weapons with minimal risk of friendly fire incidents. (Friendly fire incidents include death by fratricide, injury, and property damage.) * Control actions of specific airspace users. * Require airspace users to accomplish specific actions. A-103. Paragraphs A-104 through A-112 discuss some of the common airspace coordinating measures. (See JP 3-52 for a complete listing of ACMs and their uses see.) AIR CORRIDORS A-104. An air corridor is a restricted air route of travel specified for use by friendly aircraft established for the purpose of preventing friendly aircraft from being fired upon by friendly forces (JP 3-52). It is used to route Army aviation elements between areas such as holding areas and forward arming and refueling points. An air corridor’s altitude will not exceed the coordinating altitude prescribed in the airspace control order. There are seven specific uses of air corridors. Two examples of these uses are the minimum risk route and standard use army aircraft flight route. Minimum Risk Route A-105. A minimum risk route is a temporary air corridor of defined dimensions recommended for use by aircraft that presents the minimum known hazards to low-flying aircraft transiting the combat zone (JP 3-52). These routes are recommended by the ground commander and are used primarily for cross FLOT operations. They are established based on known threats and friendly unit locations. Aircraft executing close air support missions do not usually use these routes in the vicinity of the target area. Standard Use Army Aircraft Flight Route A-106. A standard use Army aircraft flight route is a route established below the coordination level to facilitate the movement of Army aircraft (JP 3-52). It is generally used by Army aircraft for administrative and logistic purposes. If a coordination level has been established the using authority can implement it as long as it remains below the coordination level. If no coordination level has been established the airspace control authority establishes it upon the ground commander’s request.
3-90
409
Tactical Control Measures COORDINATING ALTITUDE A-107. A coordinating altitude is an airspace coordinating measure that uses altitude to separate users and as the transition between different airspace control elements (JP 3-52). The establishment of a coordinating altitude allows the airspace control authority to assign a volume of airspace to another airspace control organization. Army forces must be aware that any airspace user that transits or fires through an established coordinating altitude must coordinate with the appropriate airspace control agency. For example, all artillery fires that exceed the coordinating altitude must be coordinated and approved prior to execution. The coordinating altitude is normally expressed in feet above mean sea level. A-108. The joint force airspace control authority establishes the coordinating altitude, typically after consultation with the other Service components. The airspace control authority publishes the coordinating altitude as part of the airspace control order. Army forces Figure A-52. Coordinating altitude and can request adjustments to the coordinating coordination level altitude based on mission requirements for approval by the airspace control authority. Typically, the only echelon that does this is a division if has a joint air-ground integration center. Figure A-52 depicts a coordinating altitude of 13,000 feet mean sea level. COORDINATION LEVEL A-109. A coordination level is an airspace coordinating measure below which fixed-wing aircraft by normally will not fly (JP 3-52). The coordination level and coordinating altitude are not synonymous terms. The key distinction being that a coordination level is used to separate fixed- and rotary-wing aircraft while a coordinating altitude is used to separate different airspace control elements. Additionally, a coordination level can be established with or without a coordinating altitude. Army forces recommend a coordination level, or any adjustments to an existing coordination level to the airspace control authority for approval. BCTs and above can initiate a request for a coordination level within their air defense airspace management/brigade aviation element cell or joint air-ground integration center. A coordination level is established by the airspace control authority and is reflected in the airspace control order. The coordination level is normally expressed in feet above ground level. Figure A-52 depicts a coordination level. RESTRICTED OPERATIONS ZONE A-110. A restricted operations zone is airspace reserved for specific activities in which the operations of one or more airspace users is restricted (JP 3-52). A restricted operations zone (ROZ) ACM has fourteen specific uses. Example uses include close air support and unmanned aircraft. Close Air Support ROZ A-111. A close air support ROZ is airspace designated for holding orbits and is used by rotary- and fixed- wing aircraft in proximity to friendly forces. This ROZ is used in support of air assets performing close air support missions in support of ground maneuver forces. When determining the appropriate ROZ size units need to consider the type of aircraft providing support and altitude limits This ROZ is requested by the applicable ground maneuver force and is established by the airspace control authority.
3-90
410
Appendix A Unmanned Aircraft ROZ A-112. An unmanned aircraft ROZ is airspace of defined dimensions created specifically for UAS operations. Generally, this airspace defines where UAS operations are conducted, and does not include en route airspace. This ROZ is only for use with UAS. Requesting units should request sufficient airspace to facilitate the requirements unique to the UAS platform such as turn radius requirements. This ROZ is requested by the applicable ground maneuver for and is established by the airspace control authority.
3-90
411
Appendix B Tactical Mission Tasks The tactical mission tasks in this appendix describe the results or effects commanders want to achieve—the what of a mission statement. These tasks have specific military definitions. TASKS FOR TACTICAL MISSIONS B-1. Tactical mission tasks are the “what” of a mission statement. Most of these actions and effects have associated military symbols. Staffs use them in course of action development and sketches as part of the military decision-making process. Some are also graphic control measures or obstacle effects and are used as such. See table B-1 for a list of all tactical mission tasks. Table B-1. Tactical mission tasks Attack by fire Control Fix Reduce Block Counterreconnaissance Follow and assume Retain Breach Destroy Follow and support Secure Bypass Disengage Interdict Seize Canalize Disrupt Isolate Support by fire Clear Exfiltrate Neutralize Suppress Contain Occupy Turn B-2. Commanders are not limited to the tactical mission tasks listed in this appendix in specifying desired subordinate actions in operation orders or operation plans. Many of the words and terms used to describe the what of a mission statement do not have special connotations beyond their common English language meanings. However, units must have a shared understanding of the what of the operation. Tasks involving only actions by friendly forces rarely provide sufficient clarity for a mission statement, thus the addition of a solid purpose coupled with the task adds understanding and clarity. Commanders ensure that missions assigned to subordinate units are consistent with their schemes of maneuver and resources allocated to those subordinates. For example, a defending unit requires far greater effort (resources) to destroy an enemy force than to disrupt it. Likewise, an attacking unit requires more combat power to clear enemy forces from a given area than to contain enemy forces in that same area. ATTACK BY FIRE B-3. Attack by fire is a tactical mission task using direct and indirect fires to engage an enemy from a distance. Friendly forces use direct fires, supported by indirect fires, to engage an enemy force without closing with the enemy to destroy, suppress, fix, or deceive that enemy. This task is usually given when the mission does not dictate or support occupation of the objective. An attack by fire is not done in conjunction with a maneuvering force. When assigning this task, the commander must state the desired effect on enemy forces, such as neutralize, fix, or disrupt. A commander may assign the force conducting an attack by fire to a battle position with either Figure B-1. Attack by fire task a sector of fire or an engagement area. The arrow points at the targeted force or objective, and the commander places the base of the arrow in the general area from which
3-90
412
Appendix B the commander wants to deliver the attack. Attack by fire positions are rarely applicable to units larger than company size. Figure B-1 on page B-1 depicts the attack by fire tactical mission task. B-4. An attack by fire closely resembles the task of support by fire. The chief difference is that one unit conducts the support by fire task to support another unit, so the second unit can maneuver against enemy forces. The attack by fire task includes— * Assigning sectors of fire or engagement areas to each subordinate weapon system to include the enemy force’s defensive positions or avenues of approach. * Designating control measures for massing, distributing, and shifting of direct and indirect fires. * Designating BPs, an assigned area, or an axis of advance to allow the friendly force to engage the enemy force. * Providing for security and all-around defense, including control measures to ensure tie in of subordinate elements and maximum use of hide positions. * Using OPSEC to deceive enemy forces about movement, occupation, and intent of the operation. * Reconnoitering, preparing, and securing movement routes and firing positions before the movement of the main body, and stocking class V items. * Providing movement instructions to the initial battle positions. BLOCK B-5. Block is a tactical mission task that denies the enemy access to an area or an avenue of approach. A blocking task normally requires the friendly force to block the enemy force for a certain time, or until a specific event has occurred. The line perpendicular to the enemy’s line of advance indicates the limit of enemy advance. A blocking unit may have to hold terrain and become decisively engaged. Block as a tactical mission task differs from the tactical mission task of fix. A blocked enemy force can move in any direction other than the obstructed one, while a fixed enemy force cannot move in any direction. Figure B-2 depicts the block tactical mission task. Figure B-2. Block task B-6. Block is also an obstacle effect that integrates fire planning and obstacle effort to stop an attacker along a specific avenue of approach or prevent the attacking force from passing through an engagement area. The vertical line in the obstacle effect graphic indicates the limit of enemy advance. It also indicates where the obstacle ties in to restricted terrain. A force may employ blocking obstacles to assist in the task. Blocking obstacles are complex, employed in depth, and integrated with fires to prevent enemy forces from proceeding along an avenue of approach or to proceed only at unacceptable Figure B-3. Block obstacle effect cost. When employed, blocking obstacles serve as a limit, not allowing enemy forces beyond that point. Obstacles alone cannot accomplish a blocking task. Figure B-3 depicts the block obstacle effect. (See Chapter 17 for more information on the block obstacle effect.) BREACH B-7. Breach is a tactical mission task in which a unit breaks through or establishes a passage through an enemy obstacle. An enemy obstacle can include enemy defenses, obstacles, minefields, or fortifications. Units attempt to bypass and avoid obstacles and enemy defensive positions to the maximum extent possible to maintain tempo and momentum. Breaching enemy defenses and obstacle systems is normally the last choice. If a breach is necessary, units employ all available means to break through or establish a passage. A breach is a synchronized combined arms operation under the control of the maneuver commander.
3-90
413
Tactical Mission Tasks B-8. The area located between the arms of the graphic shows the general location for the breach. The length of the arms extend to include the entire depth of the area that must be breached. Breaching operations may be required to support an attack anywhere along the continuum from a deliberate to a hasty attack. Regardless of where the attack falls along the continuum, the breaching tenets— intelligence, breaching fundamentals, breaching organization, mass, and synchronization—apply when conducting breaching operations in support of an attack. Figure B-4. Breach task Figure B-4 depicts the breach tactical mission task. (See ATP 3-90.4/MCTP 3-34A for more information concerning breaching operations.) BYPASS B-9. Bypass is a tactical mission task in which a unit deliberately avoids contact with an obstacle or an enemy force. A commander orders a bypass to maintain momentum while deliberately avoiding combat with an enemy force. A bypass can take place in offensive or defensive actions. The arms of the graphic go on both sides of the location or unit that will be bypassed. Figure B-5 depicts the bypass tactical mission task. B-10. Commanders base the bypass decision on— * The requirement to maintain momentum and Figure B-5. Bypass task aggressive action. * Knowledge of the enemy force’s strength, intent, or mission. * The degree to which the bypassed enemy force can interfere with the advance. * The general state of the enemy force; for example, if enemy resistance is crumbling, the friendly force can take greater risks. * Any bypass criteria established by a higher echelon headquarters. B-11. The force conducting the bypass immediately reports any bypassed obstacles and enemy forces to its higher echelon headquarters. This force normally keeps the bypassed enemy force under observation until relieved by another force unless it is part of a raid. A senior commander does not normally delegate authority to bypass below the battalion task force level. Commanders establish bypass criteria to limit the size of enemy forces that subordinates can bypass without their approval. Before approving the bypass, commanders ensure that the bypassing force checks the bypass route for enemy presence and trafficability. The bypassing force prevents the bypassed enemy force from interfering with the moving friendly force. B-12. The two bypass techniques that a force can employ are— * Avoiding the enemy force totally. * Fixing the enemy force in place with fires and then conducting the bypass.
3-90
414
Appendix B B-13. If the bypassing force cannot avoid the enemy force, then the bypassing force fixes the enemy force with part of its maneuver elements and bypasses it with the balance of the force. (See figure B-6.) Generally, a commander will not attempt to bypass an enemy force if more than a third of the unit’s combat power is required to fix the enemy force. The commander assigns one subordinate unit the mission of fixing the enemy force in this situation, reinforcing the fixing force as required by the mission variables. The fixing force coordinates with the unit assigned to relieve the fixing force as soon as possible and provides the new unit with all available information about the enemy and terrain. The relieving unit is normally another unit assigned a follow and support task. Once relieved, the force fixing the enemy force either rejoins its parent organization or becomes part of the following element and comes under its control. B-14. Occasionally a commander may direct the fixing force to break contact with the enemy force after the Figure B-6. Task force conducting a bypassing force completes the bypass. This occurs when the fix and a bypass bypassing force has no requirement to maintain an uninterrupted logistics flow, such as in a raid. In this case, the fixing force fixes the enemy force by employing defensive and limited offensive actions in synchronization with all available fire support until ordered to rejoin the bypassing force. CANALIZE B-15. Canalize is a tactical mission task in which a unit restricts enemy movement to a narrow zone. Friendly forces do this by exploiting terrain coupled with the use of obstacles, fires, or friendly maneuver. Successful canalization results in moving the enemy formation, individual Soldiers, or weapon systems into a predetermined position where they are vulnerable to piecemeal destruction. Figure B-7 depicts the canalize tactical mission task. Figure B-7. Canalize task CLEAR B-16. Clear is a tactical mission task in which a unit eliminates all enemy forces within an assigned area. Friendly forces do this by destroying, capturing, or forcing the withdrawal of enemy forces, so they cannot execute organized resistance and interfere with the friendly unit’s mission. In all cases, this task requires a thorough reconnaissance to discover the enemy force’s locations. After discovering the enemy force’s location, the clearing force maneuvers against the enemy force. The bar connecting the arrows designates the desired limit of advance for the clearing force. The bar also establishes the width of the area to clear. Figure B-8 depicts the clear tactical mission task. Figure B-8. Clear task B-17. This task requires significant time and other resources. In the mission statement, a commander can modify the objective associated with this task to destroying, capturing, or forcing the withdrawal of only enemy forces larger than a stated size. In this case, the clearing force keeps smaller enemy forces under observation, while the rest of the friendly force bypasses them. B-18. Clear is also a mobility task that involves the total elimination of an obstacle that is usually performed by follow-on engineers and is not done under fire. Units conduct clearing operations to eliminate completely the enemy’s obstacle effort or the residual obstacles affecting the operational area. (See FM 3-90.4 for more information on mobility clearing operations.)
3-90
415
Tactical Mission Tasks CONTAIN B-19. Contain is a tactical mission task in which a unit stops, holds, or surrounds an enemy force. This causes the enemy to center their activity on a given front and prevent them from withdrawing any part of their forces for use elsewhere. Contain may identify a specific enemy unit, or geographic terms or time may express the limits of the containment. Containment allows an enemy force to reposition itself within the designated geographic area, while fixing an enemy does not. The contain graphic encompasses the entire area desired to contain enemy forces during the development of alternative courses of action. Figure B-9 depicts the contain tactical mission task. Figure B-9. Contain task CONTROL B-20. Control is a tactical mission task in which a unit maintains physical influence over an assigned area. By controlling an area, units prevent its use by an enemy force or create conditions necessary for friendly operations. That influence can result from friendly forces occupying the specified area or dominating that area by their weapon systems. Control of an area does not require the complete clearance of all enemy soldiers from that area. The tactical mission task of control differs from that of secure because secure does not allow enemy fires to impact on the secured area. Enemy forces can engage targets within the controlled area, but they cannot move ground forces through that area. A Figure B-10. Control task unit designated to control a route or area directs and regulates the use of the area, to include movement of friendly traffic through the designated area or route. Control may also mean a command relationship or a function commanders exercise through their command and control systems. Figure B-10 depicts the control tactical mission task. (See ADP 3-0 and ADP 6-0 for more information on command and control.) COUNTERRECONNAISSANCE B-21. Counterreconnaissance is a tactical mission task that encompasses all measures taken by a unit to counter enemy reconnaissance and surveillance efforts. Counterreconnaissance is not a distinct mission, but a component of all security operations and local security measures. It prevents hostile observation of a force or area. It involves both active and passive elements and includes combat action to destroy or repel enemy reconnaissance units and surveillance assets, such as unmanned aircraft systems. B-22. Destroying enemy ground and aerial reconnaissance assets while denying the enemy information through other collection systems allows friendly force commanders to operate against an enemy who is operating blindly. The enemy commander’s inability to see the battlefield eventually desynchronizes the enemy commander’s actions and renders that commander’s force vulnerable to aggressive action by friendly forces. (See Chapter 13 for additional information on counterreconnaissance.) DESTROY B-23. Destroy is a tactical mission task that physically renders an enemy force combat-ineffective until it is reconstituted. Alternatively, to destroy a combat system is to damage it so badly that it cannot perform any function or be restored to a usable condition without being entirely rebuilt. The amount of damage needed to render a unit combat ineffective depends on the unit’s type, discipline, and morale. Destroying armored or dug in targets with area fire weapons requires considerable ammunition and time, so forces do not normally attempt it unless they have terminally guided munitions. Figure B-11 depicts the destroy tactical mission task. Figure B-11. Destroy task
3-90
416
Appendix B DISENGAGE B-24. Disengage is a tactical mission task in which a unit breaks contact with an enemy to conduct another mission or to avoid becoming decisively engaged. It involves moving to a location where enemy forces cannot engage the friendly force with either direct fires or observed indirect fires. Disengaging from enemy forces while displacing from one position to the next is a difficult procedure. Figure B-12 depicts the disengage tactical mission task. B-25. A disengagement plan includes— * The maneuver concept of operations for tactical elements after disengagement, along with the movement routes for each subordinate unit. * Fires to suppress enemy forces and cover the unit’s movement. * Screening smoke to conceal the unit’s movement, as part of a military deception operation, or to cover passage points. Figure B-12. Disengage task * Contact and passage points if moving through friendly lines. * The time disengagement starts. * The earliest time that functional and multifunctional support and sustainment elements move. B-26. The senior headquarters conducts operations to support the disengaging forces and relieve pressure on units in contact with enemy forces. For example, if a division is conducting a delay, the division commander uses attached aviation assets to help a BCT disengage from close operations. Simultaneously, the division uses its long-range artillery, rocket, and electromagnetic warfare systems to destroy or disrupt enemy follow- on echelons to prevent them from interfering with the disengagement. The intent is to create conditions that allow the unit to disengage while avoiding decisive combat. B-27. To facilitate disengagement, units suppress the enemy force in contact by bombarding the enemy force with large volumes of both direct and indirect fires provided by forces other than the disengaging unit. In open terrain, a unit generally moves its short-range systems first. In close terrain, a unit generally moves its long-range systems first to support by fire positions. The time involved to move a system to its next position also affects when that system moves. Small-unit leaders usually direct this movement because of the limited range of combat net radios and the fact that the tactical situation varies across a unit’s front. This process is repeated as necessary. Once disengagement starts, units must complete it rapidly. A commander can employ supporting units or reserves to protect the disengaging unit’s flanks and assist in freeing any closely engaged elements. The unit then moves to its next position using the appropriate movement techniques. B-28. If enemy combat systems have not closed within direct fire range of the friendly disengaging unit, all its elements may be able to move simultaneously under the cover of massed fires and smoke. Speed of execution and continued coordination are essential to the success of this task. DISRUPT B-29. Disrupt is a tactical mission task in which a unit upsets an enemy’s formation or tempo and causes the enemy force to attack prematurely or in a piecemeal fashion. Units disrupt an enemy force by integrating direct and indirect fires, terrain, and obstacles. This increases an enemy force’s vulnerability to friendly fires. It may temporarily knock a unit out of a battle. Disruption is not an end; it is the means to an end. The center arrow points toward the targeted enemy unit. Figure B-13 depicts the disrupt tactical mission task. B-30. The maneuver force attempting to disrupt an enemy force must attack the defending enemy force with enough combat power to achieve Figure B-13. Disrupt task the desired results with one mass attack or sustain the attack until it achieves the desired results. It may involve attacking the enemy force while it is still in its assembly areas or
3-90
417
Tactical Mission Tasks in an approach march before it can deploy into a movement formation. A commander determines the degree of acceptable risk based on anticipated friendly losses, the location of the attack, the number of attacks, and other risk management factors. B-31. Disrupt is an obstacle effect that focuses fire planning and obstacle effort to cause the enemy to break up its formation and tempo, interrupt its timetable, commit breaching assets prematurely, and attack in a piecemeal effort. It also helps to deceive an enemy force concerning the location of friendly defensive positions, to separate combat echelons, or to separate combat forces from their logistics support. The short arrows in the obstacle effect graphic indicate where obstacles impact the enemy’s ability to maneuver. The longer arrows indicate where units allow enemy forces to Figure B-14. Disrupt obstacle bypass the obstacle effect, so the defending force can engage effect the enemy force with fires. The arrows indicate the direction of an enemy attack. A defending unit normally uses the disrupt obstacle effect forward of engagement areas. Obstacles alone cannot disrupt an enemy unit. Figure B-14 depicts the disrupt obstacle effect. (See Chapter 17 for more information on the disrupt obstacle effect.) EXFILTRATE B-32. Exfiltrate is a tactical mission task in which a unit removes Soldiers or units from areas under enemy control by stealth, deception, surprise, or clandestine means. Friendly forces use stealth, deception, surprise, or other clandestine means to exfiltrate the area. Friendly forces exfiltrate when they have been encircled by enemy forces and cannot conduct a breakout or be relieved by other friendly forces. Forces returning from a raid, an infiltration, or a patrol behind enemy lines can also conduct an exfiltration. A commander exfiltrates an encircled force to preserve a portion of the force; it is preferable to the capture of the entire force. A force exfiltrates only after destroying Figure B-15. Exfiltrate task or incapacitating all equipment, except medical, that it must leave behind. Only as a last resort, when the alternative is the capture of the entire force, does a force conducting an exfiltration leave its casualties in place with supplies, chaplain support, and medical personnel. Figure B-15 depicts the exfiltrate tactical mission task. B-33. Exfiltration is most feasible through rough or difficult terrain in areas lightly covered by enemy observation and fire. These conditions often allow undetected movement of small elements when movement of the entire force would present more risk. Exfiltration requires resourcefulness, a high degree of discipline, expert land navigation skills, and motivation. It is unlikely that the entire force will be able to exfiltrate since part of it may have to create a diversion. Good, small-unit leadership is essential in this type of operation. B-34. The exfiltrating force first establishes its rally points and exfiltration lanes. It coordinates its linkup plans with other friendly units. A commander designates exfiltration lanes as RFAs or no-fire areas. The exfiltrating force uses preparation fires to cover its movement and to expend stockpiled ammunition. Based on reconnaissance and available intelligence, the exfiltrating force subdivides into small groups and exfiltrates during periods of limited visibility, passing through or around enemy defensive positions. If detected, it tries to bypass enemy forces. Exfiltration may be more difficult with combat and tactical vehicles because the noise they make and the limitations they impose on exfiltration routes make detection more likely.
3-90
418
Appendix B FIX B-35. Fix is a tactical mission task in which a unit prevents the enemy from moving from a specific location for a specific period. This may occur by engaging an enemy force to prevent its withdrawal for use elsewhere, or by using deception, such as transmitting false orders. A commander uses fix in offensive and defensive actions; it is always a supporting effort. The point of the arrow faces toward the desired enemy unit to fix. The broken part of the arrow indicates the desired location for that event to occur. Figure B-16 depicts the fix tactical mission task. B-36. Fixing an enemy force does not mean destroying it. The friendly Figure B-16. Fix task force has to prevent the enemy force from moving in any direction. This task usually has a time constraint, such as “fix the enemy reserve force until OBJECTIVE FALON is secured.” The tactical mission task of fix differs from that of block in that a fixed enemy force cannot move from a given location, but a blocked enemy force can move in any direction other than the one obstructed. B-37. Fix is an obstacle effect that focuses fire planning and obstacle effort to slow an attacker’s movement within a specified area, normally an engagement area. The primary use of this effect is to give a friendly force time to acquire, target, and destroy an attacking enemy force with direct and indirect fires throughout the depth of an engagement area or avenue of approach. The irregular part of the arrow in the obstacle intent graphic indicates the location where complex obstacles slow the enemy force’s rate of advance. The arrow indicates the direction of enemy force’s advance. Figure B-17 depicts the fix obstacle Figure B-17. Fix obstacle effect effect. FOLLOW AND ASSUME B-38. Follow and assume is a tactical mission task in which a committed force follows and supports a lead force conducting an offensive operation and continues the mission if the lead force cannot continue. The lead force may be unable to continue for several reasons such as becoming fixed or attrited by enemy forces. The follow and assume force is not a reserve, but it is committed to accomplish specific tasks. Planners place the box part of the associated task military symbol around the icons of units assigned this task. Figure B-18 depicts the follow and assume tactical mission task. Figure B-18. Follow and assume B-39. Tasks for a follow and assume force include— task * Preparing to execute all missions of the followed unit. * Maintaining contact with the trail elements of the leading force. * Preparing to conduct a forward passage of lines through the force it is following. * Monitoring all combat information and intelligence being provided to and from the force it is following. * Avoiding engaging enemy forces bypassed by the force it is following. B-40. A commander assigns a follow and assume mission to ensure that the attacking force maintains the momentum of its offensive action. The follow and assume force ensures it can immediately execute a forward passage of lines and assume the lead force’s mission. B-41. A commander assigning a unit mission the task of follow and assume has two options in establishing the relationship between the lead and trail units. Commanders normally retain command of both units and
3-90
419
Tactical Mission Tasks require that all requests for support from the supported unit to the supporting unit pass through their headquarters. Alternatively, in situations where a commander will not be able to maintain control over both units, the supporting unit is placed in a standard command relationship with the supported unit, such as attached or operational control. An example of this occurs when both units are trying to encircle a retrograding enemy force and the commander remains with the direct pressure force. FOLLOW AND SUPPORT B-42. Follow and support is a tactical mission task in which a committed force follows and supports a lead force conducting an offensive operation. A follow and support force is not a reserve but is a force committed to specific tasks. It contains an arrow graphic around the symbol of the unit being assigned this task. Figure B-19 depicts the follow and support tactical mission task. B-43. Missions of a follow and support force include— * Destroying bypassed enemy units when the lead unit does not clear the assigned area as it advances. Figure B-19. Follow and * Blocking movement of enemy reinforcements. support task * Relieving in place any direct pressure or encircling force halted to contain enemy forces. * Securing lines of communications. * Clearing obstacles. * Guarding prisoners, key areas, and installations. * Recovering friendly battle losses. * Securing key terrain. * Controlling dislocated civilians. B-44. A commander assigns a unit the task of follow and support to keep the supported force from having to commit its combat power to tasks other than the main effort, which would slow the momentum and tempo of the offense. The follow and support force accomplishes its tasks to prevent enemy forces, obstacles, and other factors from interfering with offensive actions, especially along the lines of communications. B-45. A commander assigning the follow and support task has two options in establishing the relationship between the supported and the supporting units. A commander can place the follow and support unit in a standard command relationship with the supported unit, such as attached or operational control. Alternatively, a commander can retain command of the follow and support force and require that all tasking requests from the supported unit go through that commander’s headquarters. INTERDICT B-46. Interdict is a tactical mission task where a unit prevents, disrupts, or delays the enemy’s use of an area or route in any domain. It is an offensive action that desynchronizes the enemy. Interdiction is a supporting effort conducted to complement and reinforce other ongoing offensive or defensive operations. The two arrows should cross on the unit or location targeted for interdiction. An interdiction tasking must specify how long to interdict, defined as a length of time or some event that must occur before the interdiction is lifted, and the exact effect desired from the interdiction. Figure B-20 depicts the interdict tactical mission task. Figure B-20. Interdict task B-47. A friendly force’s capability to interdict may have a devastating impact on an enemy force’s plans and ability to respond to friendly actions. For example, interdiction efforts that result in an enemy force’s maneuver being delayed or disrupted enhance the friendly force’s ability to achieve tactical advantages. Delaying or disrupting enemy resupply efforts limits the enemy force’s ability to sustain intense, high tempo offensive or defensive actions and restricts enemy mobility. Space and
3-90
420
Appendix B cyberspace capabilities prevent, disrupt, or delay enemy communications capabilities, which degrades the enemy’s ability to command and control their forces. B-48. The depth at which the attacking force conducts the interdiction generally determines the friendly force’s freedom of action. Increasing the depth of operations reduces the danger of fratricide to air and surface forces, reduces the coordination required, and allows increasingly flexible operations. Aerial forces, such as manned and unmanned aircraft, can attack enemy forces to interdict their movement throughout the assigned area. B-49. The depth at which interdiction takes place also determines the speed with which units observe its effects. Normally, ground maneuver units first focus on targets close to the FLOT. Interdiction efforts there immediately impact enemy forces near the interdiction target, but they do not affect the enemy force’s ability to mass effects. Attacks at greater distances from the FLOT have a delayed impact on close combat but eventually degrade the enemy force’s ability to mass effects. B-50. Interdicting the movement of enemy units can be extremely effective in assisting the encirclement of those forces and their eventual destruction. Fixed enemy ground forces—or those trapped by the loss of their mobility—provide lucrative targets. A commander plans to interdict withdrawing enemy forces to enhance the pursuit. While interdiction can contribute to success by hampering reinforcement and resupply, it can also contribute by trapping enemy forces or canalizing their maneuvers, leading to their destruction in detail. ISOLATE B-51. Isolate is a tactical mission task in which a unit seals off an enemy, physically and psychologically, from sources of support and denies it freedom of movement. An isolated force is prevented from having contact with other enemy forces. A unit does not allow an isolated enemy force sanctuary within its present position. Instead, a unit continues to conduct offensive actions against an enemy force. The position or direction of the arrow has no significance, but the graphic surrounds the targeted enemy unit. Figure B-21 depicts the isolate tactical mission task. Figure B-21. Isolate task NEUTRALIZE B-52. Neutralize is a tactical mission task in which a unit renders the enemy incapable of interfering with an operation. The two lines cross over the symbol of the unit or facility targeted for neutralization. When assigning a task to neutralize, a commander specifies the enemy force or materiel to neutralize and the duration, which is time or event driven. The neutralized target may become effective again when casualties are replaced, damage is repaired, or effort resulting in the neutralization is lifted. A unit normally uses a combination of lethal and nonlethal effects to neutralize enemy personnel or materiel. The assets required to neutralize a target vary according to the type and size Figure B-22. Neutralize task of the target and the weapon and munitions combination used. Figure B-22 depicts the neutralize tactical mission task. OCCUPY B-53. Occupy is a tactical mission task in which a unit moves into an area to control it without enemy opposition. Both the friendly force’s movement to and occupation of the area occur without enemy opposition. A unit can control an area without occupying it, but not vice versa. That is the difference between the tactical mission tasks of occupy and control. The symbol should encompass the entire area that a commander desires to occupy. Units typically occupy assembly areas, objectives, and Figure B-23. Occupy task defensive positions. Figure B-23 depicts the occupy tactical mission task.
3-90
421
Tactical Mission Tasks REDUCE B-54. Reduce is a tactical mission task in which a unit destroys an encircled or bypassed enemy force. This task can occur at any location on the battlefield. Reduce is also a mobility task to create and mark lanes through, over, or around an obstacle to allow the attacking force to accomplish its mission (ATP 3- 90.4/MCTP 3-34A). There is no symbol for this task. RETAIN B-55. Retain is a tactical mission task in which a unit prevents enemy occupation or use of terrain. A commander assigning this task specifies the area to retain and the duration of the retention, which is time or event driven. While a unit is conducting this task, it expects enemy forces to attack and prepares for decisive engagement. A unit tasked to retain a specific piece of terrain does not necessarily have to occupy it. The direction of the arrow has no significance, but the symbol includes the entire area to be retained. Figure B-24 depicts the retain tactical mission task. Figure B-24. Retain task SECURE B-56. Secure is a tactical mission task in which a unit prevents the enemy from damaging or destroying a force, facility, or geographical location. This task normally involves conducting area security operations. A force given the mission of securing a unit, facility, or geographic location, such as a route or base, not only prevents enemy forces from over running or occupying the secured location, but also prevents enemy direct fires and observed indirect fires from impacting the secured location, unit, or facility. Stated simply, the secured area or location is safe enough to build and project combat power. There is a difference between control and secure. The control tactical mission task Figure B-25. Secure task allows enemy direct and indirect fires to affect the location being controlled while secure does not. A unit does not have to physically occupy the area immediately around the unit, facility, or geographic location it is securing if it can prevent the enemy from occupying or firing at that location by other means. The commander states the mission duration in terms of time or event when assigning a mission to secure a given unit, facility, or geographic location. The direction of the arrow has no significance, but the symbol includes the entire area to be secured. Figure B-25 depicts the secure tactical mission task. SEIZE B-57. Seize is a tactical mission task in which a unit takes possession of a designated area by using overwhelming force. An enemy force can no longer place direct fire on a seized objective. The arrow points to the location or objective to seize. This task differs from secure because it requires offensive action to obtain control of the designated area or objective. It differs from the task of occupy because it involves overcoming anticipated enemy opposition. Once a friendly force seizes a physical objective, it clears the terrain within that objective by killing, capturing, or forcing the withdrawal of all enemy forces. Figure B-26 depicts the seize tactical mission task. Figure B-26. Seize task
3-90
422
Appendix B SUPPORT BY FIRE B-58. Support by fire is a tactical mission task in which a unit engages the enemy by direct fire in support of another maneuvering force. The primary objective of the support force is normally to fix and suppress enemy forces so that they cannot effectively fire on the maneuvering force. The secondary objective is to destroy enemy forces if they try to reposition. The commander specifies the desired effect on enemy forces when assigning this task. The support by fire tasked is rarely applicable to units larger than company size. Figure B-27 depicts the support by fire tactical mission task. Figure B-27. Support by fire task B-59. A unit conducting the task of support by fire does not maneuver to capture enemy forces or terrain. A commander gives this task to another unit as part of a larger maneuver. When assigning a support by fire mission, a commander designates the enemy force, when to attack, the general location from which to operate, the friendly force to support, and the purpose of the task, such as fix or suppress. The ends of the arrows point in the general direction of the targeted unit or location. The base of the area indicates the general area from which to deliver fires. B-60. Once a commander gives an element the task of support by fire, it should occupy support by fire positions that have cover and concealment, good observation, and clear fields of fire. Elements occupying support by fire positions should— * Check the security of the position. * Search for targets. * Orient weapons on likely or suspected enemy positions. * Occupy fighting positions providing some degree of protection. Armored and Stryker forces occupy hull-down firing positions, while infantry forces use trees, natural berms, and similar existing terrain features. * Assign observation sectors to each Soldier or weapon system in the support by fire element. * Use available thermal sights to locate heat sources not visible to the naked eye, such as vehicles concealed in tree lines or other wooded areas or personnel serving at observation posts. B-61. Support by fire closely resembles the task of attack by fire. The difference is that support by fire supports another force so that it can maneuver against enemy forces, while an attack by fire does not support the maneuver of another friendly force. SUPPRESS B-62. Suppress is a tactical mission task in which a unit temporarily degrades a force or weapon system from accomplishing its mission. It occurs when a unit employs direct or indirect lethal and nonlethal effects, such as artillery, electromagnetic warfare, or smoke on enemy personnel, weapons, and equipment to prevent or degrade enemy fires, sensors, and visual observation of friendly forces. Unlike the neutralization task, the original target regains its effectiveness without needing to reconstitute once the effects of the systems involved in the suppression effort lift or shift to another target. Figure B-28 depicts the suppress tactical mission task. Figure B-28. Suppress task
3-90
423
Tactical Mission Tasks TURN B-63. Turn is a tactical mission task in which a unit forces an enemy force from one avenue of approach or movement corridor to another. A commander relates obstacles, fires, and terrain to improve the friendly tactical situation while degrading the enemy force’s situation. For example, in the offense, a commander might want to turn a pursued enemy force to place it in a position where the friendly force can destroy it. In the defense, a commander might want to turn an attacking enemy force to allow the friendly force to conduct a counterattack into the enemy force’s flank. The place where the arrow breaks indicates the general location of the obstacle complex that will Figure B-29. Turn task make enemy forces move from one avenue of approach to another. Figure B-29 depicts the turn tactical mission task. B-64. Turn is an obstacle effect that integrates fire planning and obstacle effort to divert an enemy formation from one avenue of approach to an adjacent avenue of approach or into an engagement area. Its development requires well- defined mobility corridors and avenues of approach. To achieve this effect, the obstacles have a subtle orientation relative to the enemy force’s approach. The obstacles and their associated fires allow bypasses in the direction desired by the friendly scheme of maneuver. Finally, the obstacles tie into restrictive terrain at the initial point of the turn. A commander normally uses the turn Figure B-30. Turn obstacle effect effect on the flanks of an engagement area. The direction of the arrow indicates the desired direction of turn. Figure B-30 depicts the turn obstacle effect.
3-90
425
Appendix C Encirclements Encirclements are an outcome that can result from offensive operations to isolate and destroy enemy forces or result from a friendly force being isolated by enemy forces. This appendix provides an overview of encirclement operations and consists of the organization of forces for an encirclement, control measures, and planning and execution of encirclement operations. It also includes what to do if a unit is encircled and how to break out from an encirclement. ENCIRCLEMENT OVERVIEW C-1. Encirclement is where one force loses its freedom of maneuver because an opposing force is able to isolate it by controlling all ground lines of communications and reinforcement. A unit can conduct offensive encirclement operations designed to isolate an enemy force or they could become encircled resulting from the unit's isolation by the actions of an enemy force. Encirclements occur because combat operations involving modernized forces are likely to be chaotic, intense, and highly destructive, extending across large areas containing relatively few units as each side maneuvers against the other to obtain positional advantage. C-2. Typically, encirclements result from penetrations and envelopments, or are extensions of exploitation and pursuit operations that bypass large enemy forces in order to maintain momentum. As such, they are not a separate form of maneuver but an extension of an ongoing operation. They may be planned sequels or result from exploiting an unforeseen opportunity. They usually result from the linkup of two encircling arms conducting a double envelopment. However, they can occur in situations where an attacking unit uses a major obstacle, such as a shoreline, as a second encircling force. Although a commander may designate terrain objectives in an encirclement, isolating and destroying or defeating enemy forces are the focus. Ideally, an encirclement results in the surrender of the encircled force. This minimizes friendly force losses and resource expenditures. A key consideration prior to executing an encirclement is understanding that the encircling force is fixed and therefore unavailable for other operations until the enemy force being encircled is reduced. ORGANIZATION OF FORCES FOR AN ENCIRCLEMENT C-3. An encirclement operation usually has at least two phases—the actual encirclement and actions taken against the isolated enemy forces. Commanders consider adjusting subordinate units’ task organizations between phases to maximize unit effectiveness in each phase. The first phase is the actual encirclement that results in the enemy force’s isolation. The organization of forces for an encirclement is similar to that of a movement to contact or an envelopment. The unit executing an encirclement organizes encircling forces into a direct pressure force and one or more encircling arms. Armored, mechanized, and motorized infantry, air assault, and airborne units are especially well suited for use as an encircling force since they have the tactical mobility to reach positions that cut enemy ground lines of communication. Bypassed and non-encircled enemy forces on the flanks and rear of advancing friendly forces require all around security. C-4. A commander should direct the encirclement effort. However, there must also be unity of command for each encircling arm. The encircling force headquarters may name one of its subordinate units as the headquarters for an encircling arm. Alternatively, that force’s headquarters may create a temporary command post from organic assets, such as its tactical command post, to control one or more arms of the encirclement. If that encircling arm has subordinate inner and outer arms, each of them also requires separate subordinate commanders. The missions and spatial orientation between the inner and outer encircling arms are sufficiently different; therefore, one force cannot act in both directions at once. Figure C-1 on page C-2 depicts an encirclement.
3-90
426
Appendix C Figure C-1. Inner and outer arms of an encirclement C-5. The encirclement unit organizes only an encircling arm if there is no possibility of the encircled forces receiving relief from enemy forces outside the encirclement. If there is danger of an enemy relief force reaching the encircled enemy force, the unit organizes both an inner and outer encircling arms. The commander assigns the outer encircling arm a security mission, an offensive mission to drive away any enemy relief force, or a defensive mission to prevent the enemy relief force from making contact with the encircled enemy force. Once the encirclement is complete, these inner or outer encircling arms form a perimeter. C-6. The second phase of an encirclement operation involves actions taken against an isolated enemy force. The commander’s decision to fix, contain, or destroy isolated enemy forces affects the task organization of subordinate units, as do enemy attempts to break out from the encirclement or linkup with the encircled force. All these possible outcomes require resources in terms of units and supplies, but some require more resources than others do. If the unit’s mission is to contain or fix an isolated enemy force, the unit organizes subordinate forces for defensive action and arranges them around the enemy force’s perimeter. If the unit’s mission is to reduce or destroy that same enemy force, that unit organizes subordinate forces for offensive action. A higher echelon commander often assigns either mission to the commander of a follow and support force. C-7. Regardless of whether a commander decides to fix, contain, or destroy enemy forces, the unit conducts reconnaissance to maintain contact and monitor enemy force actions in response to the encirclement. This allows the unit to respond effectively to any enemy movement. The most effective reconnaissance combines ground, aerial, and surveillance systems to provide constant coverage and multiple assessments of enemy activities throughout the encircled area. ENCIRCLEMENT CONTROL MEASURES C-8. As shown in figure C-2, control measures for an encirclement are similar to those of other offensive operations, especially an envelopment, but with a few additional considerations. If the encirclement unit uses both an inner and an outer encircling arm, the unit must establish a boundary between them. The unit places the boundary so that each element has enough space to accomplish their mission. The inner force requires enough space to fight a defensive battle to prevent the encircled force from breaking out. The outer force requires adequate terrain and depth in its assigned area to defeat any attempt to relieve the encircled force.
3-90
427
Appendix C Figure C-2. Example of encirclement control measures C-9. The commander who controls both converging forces establishes a RFL between them. The unit may also establish a free-fire area, which encloses the area occupied by a bypassed or encircled enemy forces. The unit may also establish contact points. PLANNING AN ENCIRCLEMENT C-10. Encirclement operations may require allocating large forces and significant resources. They take a great deal of time and usually slow an advance. The encircling force maintains contact with an encircled enemy force, the following general planning considerations apply. Units— * Determine the best available assets that gain and maintain contact with enemy forces. * Keep encircled enemy forces isolated and incapable of receiving intelligence, logistics, and fire support from enemy formations outside of the encirclement. * Use reconnaissance and surveillance assets so that they know the capabilities of the encircled force and, as much as possible, its commander’s intentions. * Retain freedom of maneuver. * Control fires and fields of fire to avoid fratricide. C-11. Units apply the general planning considerations for the offense or the defense depending on the overall mission. Units plan to rotate the forces involved in reducing the encircled pocket to maintain constant pressure on the enemy. C-12. Every encircled enemy unit reacts differently. Initially, some become demoralized and cannot offer any serious resistance. Additional methods for psychologically affecting enemy personnel and reducing their mental and physical capabilities is by disrupting their sleep and rest patterns. However, if left undisturbed, most enemy units recover and attempt to break out and regain contact with their main force or attack the flank and rear of advancing friendly units. The encircling force must plan for the enemy force’s most probable reactions. C-13. If the enemy force is not reduced, and it can be resupplied or has access to considerable supply stocks, then it continues to be a serious threat to encirclement units in future operations. The encircling force must be approximately equal in size to this type of encircled force to fix or contain it. This situation occurred when
3-90
428
Appendix C German forces occupied various fortified French ports after Allied armies liberated the rest of France in 1944. Each encircled German division took approximately one Allied division to maintain its isolation. Conversely, an enemy force isolated without adequate supplies either surrenders or faces containment by considerably smaller forces. This situation occurred in Egypt during the 1973 Arab-Israeli War when an Israeli division isolated the Egyptian 3rd Army. EXECUTING AN ENCIRCLEMENT C-14. When feasible, encircling forces advance parallel to the enemy’s direction of movement. They attempt to reach key passes, bridges, and other critical points before the main enemy force reaches them. When the encircling force cannot outdistance the enemy force, it engages the enemy force’s flanks to force the enemy to fight under the most unfavorable conditions possible, ultimately in two or more directions simultaneously. Engineer units rapidly breach obstacles in the path of the encircling force. Friendly forces emplace obstacle complexes, supported by fires, to block probable avenues of escape, as they counter attempted enemy breakouts from encirclement. Units may use air assault and airborne forces to seize key passes or other critical terrain objectives to cut enemy LOCs. The encircling force completes the encirclement when it cuts all enemy ground LOCs. This generally occurs when the two arms of a double envelopment complete their linkup. C-15. Intervals in an attacking force can also occur during combat operations as the result of different rates of advance by movement formations that face different levels of enemy resistance and different terrain. An encircled enemy force attempts to discover intervals and take advantage of them as it tries to escape or breakout of the encirclement. Once the enveloping force completes the linkup that creates the encirclement, it must close these intervals as quickly as possible to prevent enemy forces from exploiting them. C-16. An enemy force may attempt to cut off an encircling force and extend its flank beyond the area of the friendly attack. If the enveloping unit attempts to outflank such a hostile extension, it may lead to the overextension of the enveloping force or to a dangerous separation of the enveloping force from support. It is usually better to take advantage of the enemy force’s extension and subsequent weakness by penetrating the thinly held front of an enemy force rather than risk the overextension of the enveloping force in an effort to outflank the enemy force’s positions completely. Alternatively, in response to the unfolding encirclement an enemy force may attempt a frontal, spoiling attack. In this case, the friendly force in contact defends itself or engages in a delaying operation, while the enveloping force continues the envelopment or moves directly toward the enemy force in a counterattack. C-17. Commanders of highly mobile forces forming the inner encircling arm may choose not to establish a continuous series of positions around an encircled enemy force. They may order subordinate forces to occupy only key terrain from which they can strike at encircled enemy forces to prevent them from concentrating forces and to isolate them further. Units who adopt this technique need to be able to detect enemy attempts to breakout and concentrate sufficient combat power against these attempts to thwart their efforts to isolate encircled enemy forces. Units of the outer encircling arms prevent additional enemy forces from reinforcing the isolated enemy force or interfering with the activities of the inner encircling arm. C-18. Once units decide to destroy encircled enemy forces, they reduce those enemy forces as rapidly as possible to free resources for use elsewhere. The reduction of an encircled enemy force continues without interruption, using the maximum concentration of forces and fires, until the encircled enemy force’s complete destruction or surrender. Units may destroy encircled enemy forces by fires or by maneuver. Reduction by Fires C-19. Reducing an encircled enemy force by fires alone is the least preferred method to destroy an enemy force. This method implies that the encircling friendly forces commander will use fire support as the primary or sole means of reducing the encircled enemy force. It includes the use of artillery, mortars, direct fires, fixed- and rotary-wing aviation (including armed UAS), and cyber and electromagnetic warfare capabilities. C-20. This method has advantages and disadvantages. An advantage is that it generally reduces the number of casualties suffered by the encircling force. Disadvantages of this method include an extensive amount of attack/delivery systems, ammunition, and time to reduce the encircled force. Additionally, fires alone might not be sufficient to force the surrender of the encircled enemy force. In most cases, reducing an encircled enemy force requires using fires and movement.
3-90
429
Appendix C Reduction by Maneuver C-21. Reduction by maneuver uses a combination of fire and ground maneuver forces to attack and destroy an encircled enemy force. In many cases the constraints of time, munitions, and availability of sufficient fires assets will lead a commander to use the reduction by fires and movement method. The four techniques for reducing an encircled enemy are squeeze, hammer and anvil, wedge, and escape route. Squeeze Technique C-22. The squeeze technique uses simultaneous, coordinated attacks on enemy forces from various directions. Following the initial encirclement, the capture or destruction of an enemy force is methodical and thorough. Units use fire and movement together in a controlled contraction of the encirclement. As an enemy’s perimeter contracts, commanders remove units from the inner perimeter and add them to the reserve depending on the terrain and other mission variables. This technique is effective against battalion-size or smaller groups of encircled enemy forces. Figure C-3 depicts the squeeze technique. Figure C-3. Squeeze technique C-23. The squeeze technique promotes an enemy force’s confusion and rapid dispersion of combat power and prevents an enemy commander from using the enemy’s reserves in a decisive manner. The friendly unit shapes the operation by initially concentrating on destroying enemy command nodes, air defense systems, artillery systems, and sustainment capabilities. These sustainment capabilities include any drop zones, landing zones, or airstrips available to the enemy forces that would allow them to receive support from outside the encirclement.
3-90
430
Appendix C Hammer and Anvil Technique C-24. The hammer and anvil technique employs a stationary blocking force as an anvil on one or more sides of the inner perimeter, while other elements of the encircling force use offensive action as a hammer to force the encircled enemy force against the blocking force. Either the anvil or the hammer can destroy the enemy force. Usually the hammer, as the attacking element, accomplishes this task. This technique is most effective when the blocking force is located on or to the rear of a natural terrain obstacle. On favorable terrain, units can use an airborne or air assault force as the anvil or blocking element. Figure C-4 depicts the hammer technique. Figure C-4. Hammer technique Wedge Technique C-25. The wedge technique uses a unit to divide enemy forces in the pocket while the rest of the encircling force remains in place. This technique allows units to concentrate against a small portion of the encircled enemy force. However, the encircling force maintains pressure on other encircled enemy forces to prevent them from reinforcing or supporting the threatened area. The unit dividing the pocket conducts sudden and swift attacks immediately after the end of supporting preparation fires. Figure C-5 depicts the wedge technique.
3-90
431
Appendix C Figure C-5. Wedge technique Escape Route Technique C-26. The escape route technique involves leaving one or more gaps in the inner encircling arm to entice enemy forces to attempt a breakout. Once an enemy force starts moving and is no longer sheltered in defensive positions, that moving enemy force is more vulnerable to acquisition, attack, and destruction. A unit using this technique should integrate military information support operations with constant offensive action to demoralize the escaping enemy force. C-27. The negative aspect of these techniques is that they require considerable forces and supplies, which are not always available. Therefore, at times the encircling force has to limit itself to less decisive measures. These include temporarily containing or fixing bypassed enemy forces until resources become available to enable the encircling force to destroy the enemy force. Continued isolation of the encircled force can only be guaranteed when the enemy force cannot strengthen its forces by inserting additional units and supplies by air. Even total, long-term isolation does not necessarily lead to decisive defeat of an encircled enemy. It is a temporary measure designed to provide additional time to the attacking force. DEFENDING ENCIRCLED C-28. Encirclement of a friendly force is likely to occur during highly mobile and fluid operations or when operating in restrictive terrain. Unit offensive actions may result in encirclement. Likewise, encirclements may occur when units employ detachments left in contact. Units anticipate becoming encircled when assigned stay-behind missions or when occupying either a strong point or a combat outpost. Units make appropriate preparations in these situations. C-29. If a unit finds itself encircled, they immediately form a perimeter defense which can evolve into defending an encirclement. If this happens, distinct tactics exist for the encircled force. An encircled force has the following options: continue to defend encircled, conduct a breakout, exfiltrate toward other friendly forces, or attack deeper into enemy-controlled territory. Once encircled, the unit’s form of maneuver depends on the senior commander’s intent and mission variables, including the— * Availability of defensible terrain. * Relative combat power of friendly and enemy forces. * Sustainment status of the encircled force and its ability to be resupplied, including the ability to treat and evacuate wounded Soldiers.
3-90
432
Appendix C * Morale and fighting capacity of the Soldiers. C-30. The senior commander in an encirclement assumes command over all encircled forces and takes immediate action to protect them. In the confusion leading to an encirclement, it may be difficult to determine what units are encircled, let alone identify the senior commander. However, the senior commander is identified within the encirclement as quickly as possible. That senior commander needs to decide quickly what assets should stay within the potential encircled pocket and what assets should leave. The senior commander immediately informs their higher echelon headquarters of the situation. Simultaneously, the senior commander directs the performance of the following tasks: * Establish security. * Re-establish a chain of command. * Establish a reserve. * Establish security elements as far forward as possible to provide early warning. * Reorganize and centralize control of all artillery. * Maintain morale. * Centralize the control of all supplies. C-31. The senior commander positions security elements as far forward as possible to reestablish contact with enemy forces and provide early warning. Vigorous patrolling begins immediately. Each unit clears its position to ensure that there are no enemy forces within the perimeter. Units use technical assets and electromagnetic warfare systems to augment local security and locate areas along the perimeter where enemy forces are deploying additional forces. C-32. The senior commander re-establishes unity of command. The senior commander reorganizes any fragmented units and places Soldiers separated from their parent units under the control of other units. The senior commander establishes a clear chain of command throughout the entire encircled force, adjusts support relationships with the encirclement, and re-establishes communications with units outside the encircled force. ORGANIZATION OF FORCES FOR AN ENCIRCLED DEFENDER C-33. With the establishment of a perimeter defense, the commander learns about the specific capabilities and limitations of the different friendly units isolated in the encirclement. The commander uses this information to design a defense to maximize the capabilities of available forces. Forward units establish mutually supporting positions around the perimeter and in depth along principal avenues of approach. Units occupy the best available defensible terrain. It may be necessary to attack to seize key or decisive terrain to incorporate that terrain into the perimeter defense. Once a unit is given an assigned area, preparations are the same as in the defense. Figure C-6 illustrates an encircled division’s perimeter defense. Encircled units make their defensive positions as strong as possible, given time and resource constraints. The unit anticipates that enemy forces will attempt to split the defenses of the encircled force and defeat it in detail.
3-90
433
Appendix C Figure C-6. Encircled division perimeter defense C-34. The encircled force commander establishes a reserve that is mobile enough to react quickly to events anywhere along the perimeter. Therefore, given the availability of sufficient fuel, the unit constitutes a reserve using some of any available armored, mechanized, and Stryker units. The unit centrally positions this mobile reserve to take advantage of interior lines, which exist if the encircled force commander can maneuver the reserve or reinforce threatened positions on the perimeter faster than an enemy force can shift location or reinforce. A unit can achieve interior lines through a central position (with operations diverging from a central point) from superior lateral LOCs or greater tactical mobility. If only dismounted infantry forces are available, the unit establishes small local reserves to react to potential threats. The unit organizes a mobile anti-armor element from the best available anti-armor systems. If possible, subordinate echelons also retain reserves. C-35. While defending encircled, a unit may use the reserve to limit penetrations along the perimeter. The reserve may conduct spoiling attacks or counterattacks. The commander initiates a counterattack at the decisive moment and location as the enemy force attempts to penetrate friendly defensive positions. BREAK OUT FROM AN ENCIRCLEMENT C-36. A breakout is an operation conducted by an encircled force to regain freedom of movement or contact with friendly units (ADP 3-90). It differs from other attacks only in that a simultaneous defense in other areas of the perimeter must be maintained. A breakout is both an offensive and a defensive operation. An encircled force normally attempts to conduct breakouts when one of the following four conditions exist: * The commander directs the breakout or the breakout falls within the intent of a higher echelon commander. * The encircled force lacks sufficient relative combat power to defend itself against enemy forces attempting to reduce the encirclement.
3-90
434
Appendix C * The encircled force lacks adequate terrain available to conduct its defense. * The encircled force cannot sustain itself long enough for relief by forces from outside the encircled pocket. ORGANIZATION OF FORCES FOR A BREAKOUT C-37. Encircled units conducting a breakout attack typically task-organize to perform rupture, follow and assume, main body, and rear guard missions. The senior commander within an encirclement organizes a reserve and a separate deception force if sufficient forces exist. Previous combat may have attired the combat power of encircled units. The commander prioritizes which ones to resource if sufficient combat power does not exist to resource each of the forces. See the applicable organization depicted in figure C-7. Figure C-7. Organization of forces for a breakout operation C-38. Normally, the commander’s first priority is to resource the force with the rupture mission. The commander typically assigns multiple missions to subordinate forces because there are typically not enough forces in the encirclement to have separate forces for each required mission. For example, the follow and assume force could receive a be-prepared mission to help extract the rear guard, a mission generally given to the reserve. Forces located outside the encirclement assist the breakout by conducting shaping operations. Above all, the encircled force maintains the momentum of the breakout attack; otherwise, it is more vulnerable to destruction than it was before the breakout attempt. C-39. The encircled force reorganizes to conduct the breakout based on available resources. Without resupply, armored, mechanized, and motorized infantry units may not be able to move all their vehicles during the breakout attack. Priority of support may be limited to the rupture force and the rear guard, with the remaining force keeping only sufficient transportation assets to move the wounded and critical assets and supplies. The breakout plan outlines the commander’s destruction criteria for equipment or supplies left behind. The unit destroys all vehicles, critical munitions, supplies, and equipment (except medical supplies) it cannot move. C-40. An encircled force attacks using the rupture force to penetrate the enemy defensive positions in at least one location. The unit produces overwhelming combat power at each breakout point. The unit assigns the rupture force, which varies in size from one-third to two-thirds of the total encircled force, the mission to penetrate the enemy force’s encircling position, widen the gap, and hold the shoulders of the gap until all
3-90
435
Appendix C other encircled forces can move through. The rupture force must have sufficient strength to penetrate the enemy force’s position. This force must use surprise, mobility, and firepower to achieve a favorable combat power ratio over the enemy force at the point of attack. C-41. Initially, the rupture force is the main effort. The attack occurs where the unit anticipates a successful rupture of the enemy force’s inner ring, which facilitates subsequent operations by enabling the unit to attack enemy units from their flanks and rear. The rupture force unit probably has additional attached assets, such as additional maneuver forces and engineers. The unit should integrate these assets to achieve the rupture. C-42. The follow and assume force follows the rupture attack and is committed to maintain the momentum of the attack and seize objectives past the rupture. After the rupture force seizes a gap in the enemy encirclement, the follow and assume force normally main effort until completing linkup operations with another friendly force. When a unit receives a follow and assume mission in a breakout, its commander must coordinate closely with the rupture force commander regarding the location of the gap, the enemy situation at the rupture point, and the enemy situation, if known, along the direction of attack past the rupture point. The commander does not assign this force supporting shaping tasks, such as clear routes and fix bypassed enemy forces, if those tasks dissipate its available combat power. If executing these support tasks is vital to the success of the breakout and resources permit, then the unit designates a separate follow and support force to perform these tasks. C-43. The main body consists of the main command post, the bulk of encircled sustainment assets, the unit’s casualties, and some functional and multifunctional support assets. It contains combat forces not required for other missions and has sufficient combat power to protect itself. The overall commander places one subordinate commander in charge of the various elements of the main body to ensure orderly movement. Typically, the main body establishes a flank security force that deploys once the main body passes through the point of penetration and performs a flank screen or guard mission for the main body. C-44. The rear guard consists of Soldiers and equipment left on the perimeter to provide protection for the rupture attack and any supporting efforts, such as deception forces. Forces left in contact must conduct a vigorous delaying operation on the perimeter so that the enemy force cannot isolate any portion of the rear guard. Under a single commander, the rear guard protects the main body from attack while it moves from the area. In addition to providing security, the rear guard deceives the enemy forces about the intentions of the encircled force, simulating its activities until the main body clears the gap. C-45. A reserve primarily aims to retain flexibility through offensive action. The unit makes every attempt to keep a small portion of the encircled force uncommitted for employment at the decisive moment to ensure the breakout’s success. The unit may be unable to establish a separate reserve force because of the need to resource either the rupture force, the follow and assume force, or the rear guard. In this event, the unit assigns and prioritizes various be-prepared missions to the follow and assume force. C-46. A successful diversion is important to the success of any breakout operation. If the diversion fails to deceive the enemy commander regarding the intentions of the encircled force, the enemy commander could direct the enemy’s full combat power at the rupture point. On the other hand, the deception force may rupture the enemy’s lines. If a rupture occurs, the diversion force commander follows the intent of the commander of the encircled force. The encircled force commander may choose to exploit the success of forces conducting a diversion, or the commander may have to disengage them for use elsewhere in the breakout attempt. CONTROL MEASURES FOR A BREAKOUT C-47. At a minimum, units use boundaries, a LD or line of contact, a time of the attack, phase lines, an axis of advance or direction of attack, objectives, and a limit of advance to control and synchronize breakouts. Units only impose those control measures necessary to synchronize operations. PLANNING A BREAKOUT C-48. The encircled commander initiates a breakout attack as quickly as possible after encirclement by enemy forces. At this time, enemy forces are normally also somewhat disorganized, and they may not respond in a coordinated manner. Commanders should initiate a breakout attack even though detailed combat information about the enemy force’s dispositions is probably not available. The enemy force probably has not yet brought
3-90
436
Appendix C in sufficient combat power to encircle the friendly force in strength, and weak points probably exist in the enemy force’s perimeter. C-49. Early in an encirclement, there are gaps between or weaknesses in the enemy’s encircling forces. The friendly unit uses available reconnaissance and surveillance assets, including available joint systems, to provide information that increases the accuracy of the unit’s situational understanding and determines enemy weak points. The unit’s plans for the breakout attack capitalize on those identified weak points. Although the resulting attack may be along a less direct route or over less favorable terrain, it is the best COA because it avoids enemy strength and increases the chance for surprise. C-50. An encircled force may be operating under adverse conditions and may not have its normal information collection capabilities. This forces the encircled unit to conduct aggressive reconnaissance to collect information on enemy forces. The encircled unit also obtains information from joint assets, stay-behind units, and special operations forces in the area. If the enemy force is in close contact, the encircled unit may need to conduct a reconnaissance in force to ascertain enemy strengths. In any case, the unit quickly selects a COA and develops a plan accordingly. C-51. A supporting effort, such as a deception, assists a breakout by diverting enemy attention and resources away from the rupture effort. The force conducting a supporting effort may be located either inside or outside the encirclement area. The enemy force must regard the efforts of this force as credible and a threat to the continuity of the enemy force’s maneuver plan. The encircled commander directs the friendly force’s deception efforts to a point where the enemy force might expect a breakout or relief effort. The deception force is as mobile as available vehicles, fuel stocks, and trafficability allow, so it can reposition to take part in the breakout or maneuver elsewhere to support the breakout. Mobile, self-propelled weapons systems suit the needs of forces conducting supporting efforts. Additionally, the probability of a successful breakout increases measurably if another friendly force attacks toward the encircled force as it attempts to breakout. C-52. The encircled unit conducts tactical deception along with cyberspace electromagnetic activities tasks to assist the breakout attempt. Cyberspace electromagnetic activities is the process of planning, integrating, and synchronizing cyberspace operations and electromagnetic warfare operations in support of unified land operations (ADP 3-0). Tactical deception operations mislead enemy forces about the intentions of the encircled force, especially the location of the breakout attempt. For example, unmanned aircraft can concentrate their activities in an area away from where the rupture effort occurs to deceive enemy forces as to the exact location of the rupture. If it is not possible to breakout immediately, the encircled unit attempts to deceive enemy forces regarding the time and place of the breakout by concealing friendly breakout preparations and changing positions. The encircled unit can also make it appear that the encircled force will make a resolute stand and await relief. C-53. Units can use dummy radio traffic for the enemy to monitor or landlines that the enemy might be able tap to convey false information. The breakout should not be along the obvious route toward friendly lines, unless there is no other alternative. In this respect, breakout preparations mirror the preparations for any other offensive operation. As in other offensive actions, secrecy, tactical deception, and surprise allow for success. The other planning considerations for the breakout are the same as for any other attack. EXECUTING A BREAKOUT C-54. The unit exploits darkness and limited visibility during a breakout if friendly encircled forces have superior night vision capabilities. Concealment provided by darkness, fog, smoke, or severe weather conditions favor breakout by mitigating the effectiveness of the encircling enemy weapon systems or night vision devices/optics. The enemy has difficulty following the movements of the breakout force during conditions of limited visibility. However, if the encircled force waits for darkness or limited visibility, the encircling enemy may have time to consolidate containment positions. If friendly forces have air superiority, they may initiate a daylight breakout attack to exploit close air support capabilities. C-55. The encircled force takes all possible precautions to deceive the enemy force about the location of the main effort. The rupture force minimizes occupation of attack positions before starting the breakout. An encircled unit may require one or more supporting effort to assist the rupture force in penetrating enemy positions and expanding the shoulders of the rupture. The encircled unit may use feints and demonstrations
3-90
437
Appendix C to deceive enemy forces concerning the location and time of the main effort. However, deception attacks need not always occur first. C-56. The encircled commander organizes and controls the rupture force in the same manner as during an attack or movement to contact. Figure C-8 illustrates an example organization of forces for a breakout by an encircled division. The rupture force generates overwhelming combat power at the point of penetration and rapidly overwhelms enemy positions and expands the penetration. Encircled units unable to generate sufficient combat power for both the rupture force and the perimeter defense can thin their defensive perimeter in certain areas by using a detachment left in contact in conjunction with a withdrawal before executing the attack. They may also shorten the perimeter’s length, which reduces the size of the area occupied by the encircled force. Figure C-8. Example breakout organization of forces by an encircled division C-57. The rupture force applies the breaching fundamentals of suppress, obscure, secure, reduce, and assault to ensure its success at the point of penetration. These fundamentals always apply, but their application varies based on the prevailing mission variables. C-58. The encircled commander orders the rupture force to hold the shoulders of the penetration while the follow and assume force moves forward, if enemy forces at the penetration point have roughly the same combat power as the rupture force. As depicted in figure C-9 on page C-14, the actions of the follow and assume force then become the main effort. The encircled commander may have the rupture force continue its attack if enemy forces are not strong. If there are no identified enemy forces beyond the penetration, the rupture force may transition to a movement to contact. After the encircled friendly force breaks out, it moves toward other friendly forces and links up with them. C-59. Initially, the follow and assume force passes through the gap created by the rupture force. This force continues to move rapidly from the encircled area toward its final objective. If the follow and assume force becomes the encircled unit’s main effort, it cannot allow itself to become bogged down. Preparation fires by artillery, Army aviation, close air support, and air interdiction help the follow and assume force in maintaining momentum out of the encircled area. C-60. Once the breakout attack starts, the rear guard and any deception forces disengage or delay toward the area of the rupture. Perimeter forces integrate smoothly into the rear of the breakout column. Once the breakout succeeds, the commander shifts priority of fires as required by the mission variables.
3-90
438
Appendix C C-61. As other encircled units support or move through the area of penetration, the rear-guard commander must deploy forces over an extended area. The rear guard requires flexibility and mobility. The rear guard maintains the perimeter against enemy pressure. If the enemy force succeeds in destroying or encircling the original rear guard in the breakout process, then the unit must reconstitute a new rear guard. Figure C-9. Example breakout by an encircled division C-62. The main body follows the follow and assume force. It moves rapidly on multiple routes in an approach march immediately behind the follow and assume force, protected on its flanks by security elements. It should contain sufficient combat power to protect itself and reinforce the flank or rear security forces if they come under attack. C-63. Normally, the rear guard initially conducts a withdrawal to break contact with the enemy forces around the perimeter. It contracts the perimeter as it delays behind the main body. If enemy forces closely pursue the breakout force, the efforts of the rear guard may become the main effort for the encircled force. The unit should position the reserve where it can also support the rear guard. C-64. Initially, the priority for fire support is with the rupture force. Those fires focus on suppressing and obscuring the point of penetration. Fire support assets move as part of the main body and rear guard so security forces have adequate fire support. Target identification difficulties resulting from proximity and intermixing of forces, as well as the rapidly changing ground situation during the execution of a breakout, make close air support difficult. C-65. Engineers with the rupture force focus on mobility operations. Engineers with the follow and assume force or the reserve improve routes as necessary. Engineers supporting flank security elements focus on conducting countermobility operations. The rear guard must also have enough engineer support to conduct countermobility operations. C-66. The senior commander prioritizes supporting AMD assets to protect the rupture force, the rear guard, and the main body. This support may come from outside the encircled perimeter. The rear guard is second in priority of protection to help prevent enemy forces targeting the main body from overrunning it. C-67. Commanders can relieve sustainment shortfalls by using aerial resupply, ordering external forces to establish support areas, and using captured supplies. All units and vehicles carry the maximum supplies possible, with emphasis on carrying petroleum, oils, and lubricants and ammunition. The encircled force only
3-90
439
Appendix C takes vehicles it can support. It may be possible for the higher echelon headquarters of the encircled force to establish an intermediate staging base as the breakout attack moves toward a linkup with other friendly forces. CONSIDERATIONS FOR AN ENCIRCLED DEFENDER C-68. When defending an encircled area, units consider employing aviation, fires, engineer, and sustainment assets. Divisions and corps may consider relocating aviation systems from any attached combat aviation brigades to locations that are not in danger of encirclement. Aviation assets can rapidly bring additional firepower to bear on an encircling enemy force or rapidly move reaction forces to threatened locations along a defensive perimeter. Generally, aviation assets fly out of an encirclement when it becomes small enough to allow the enemy force’s artillery to range throughout the area. C-69. The commander centrally controls fire support systems, such as artillery, to provide support at numerous points along the perimeter and mass fires. The commander designates the senior field artillery staff officer, such as the chief of fires or brigade fire support officer, to control fire support. At the BCT level, the field artillery battalion commander also advises the commander. At lower echelons, commanders may co- locate mortars from various units under centralized control, especially if there are insufficient artillery assets. C-70. Generally, engineers concentrate first on countermobility, then survivability, and then mobility. Defensive protective positions include, but are not limited to, command posts, signal nodes (and other facilities for the command and control warfighting function), critical equipment (to include sensors), supply and ammunition storage/holding areas, and other items that are likely to be targeted by enemy action. Dispersal is difficult in a perimeter type defense; therefore, the next best alternative is position hardening by constructing field fortifications. C-71. Encircled units closely monitor their sustainment assets and supply stocks, especially if they cannot be resupplied for an extended period. Leader’s conserve and centrally control available resources. A commander may force units on the perimeter to cease all vehicle movement to allocate remaining fuel assets to the reserve. The senior commander within an encirclement retains essential sustainment capabilities to sustain the defense under the control of a senior sustainment operator or commander. When possible, that commander positions these units and their assets beyond the reach of potential penetrations in protected and concealed locations. The senior commander may incorporate other sustainment units into defensive positions in depth or around key facilities. A commander may choose to augment maneuver units with non-maneuver Soldiers, although this action may affect the non-maneuver (sustainment) capabilities of the encircled force. C-72. Casualty evacuation and mortuary affairs pose challenges for an encircled force. The unit evacuates wounded from the encirclement whenever possible for humanitarian reasons. This also reduces the burden of providing long-term medical care to wounded Soldiers. C-73. Soldiers have an inherent fear of encirclement by enemy forces. Unchecked, this fear can lead to a degradation in morale and discipline. When encircled, Soldiers under the firm control of their leaders can withstand the mental strain. Discipline can disintegrate rapidly in an encirclement. Officers and noncommissioned officers must uphold the highest standards of discipline. Their personal conduct sets the example. Encircled Soldiers need to see their senior commander and other leaders frequently. Leaders at all levels need to display a calm and confident manner. Soldiers in an encirclement must not regard their situation as desperate or hopeless. Commanders and leaders at all levels maintain the confidence of Soldiers by resolute action and a positive attitude. They must keep their Soldiers informed to suppress rumors and counter enemy propaganda.
3-90
441
Glossary The glossary lists acronyms and terms with Army, multi-Service, or joint definitions, and other selected terms. Where Army and joint definitions are different, (Army) follows the term. Terms for which FM 3-90 is the proponent publication (the authority) are marked with an asterisk (*). The proponent publication for other terms is listed in parentheses after the definition. SECTION I – ACRONYMS AND ABBREVIATIONS ACM airspace coordinating measure ADP Army doctrine publication AMD air and missile defense AO area of operations ATP Army techniques publication AR Army regulation BCT brigade combat team BHL battle handover line BP battle position C2 command and control CASEVAC casualty evacuation CBRN chemical, biological, radiological, and nuclear CFL coordinated fire line COA course of action COP common operational picture DA Department of the Army DLIC detachment left in contact DOD Department of Defense DODD Department of Defense Directive EA engagement area EMS electromagnetic spectrum EPW enemy prisoner of war FCL final coordination line FEBA forward edge of the battle area FLOT forward line of own troops FM field manual FPF final protective fire FPL final protective line FSCL fire support coordination line FSCM fire support coordination measure
3-90
442
Glossary IPB intelligence preparation of the battlefield JP joint publication LC line of contact LD line of departure LOA limit of advance LOC line of communication MBA main battle area MDMP military decision-making process MEDEVAC medical evacuation METT-TC(I) mission, enemy, terrain and weather, troops and support available, time available, civil considerations, and informational considerations MSR main supply route NAI named area of interest OPSEC operations security PAA position area for artillery PD point of departure PIR priority intelligence requirement PL phase line PLD probable line of deployment POB point of breach RFA restrictive fire area RFL restrictive fire line ROE rules of engagement ROZ restricted operations zone RP release point SOP standard operating procedure SP start point TAC-D tactical deception TAI target area of interest TCP traffic control post TM technical manual TRP target reference point UAS unmanned aircraft system U.S. United States SECTION II – TERMS *actions on contact A process to help leaders understand what is happening and to take action. air and missile defense Direct [active and passive] defensive actions taken to destroy, nullify, or reduce the effectiveness of hostile air and ballistic missile threats against friendly forces and assets. (JP 3-01)
3-90
443
Glossary air corridor A restricted air route of travel specified for use by friendly aircraft established for the purpose of preventing friendly aircraft from being fired upon by friendly forces. (JP 3-52) air movement An air transport of units, personnel, supplies, and equipment including airdrops and air landings. (JP 3-36) airspace control The exercise of delegated authority over designated airspace and users through control procedures and coordination measures to maximize operational effectiveness. (JP 3-52) airspace control order An order implementing the airspace control plan that provides the details of the approved requests for airspace coordinating measures. (JP 3-52) airspace coordinating measures Measures employed to facilitate the efficient use of airspace to accomplish missions and simultaneously provide safeguards for friendly forces. (JP 3-52) airspace management The planning, coordination, integration, and regulation of airspace by airspace control elements in support of airspace control. (JP 3-52) *alternate position A defensive position that the commander assigns to a unit or weapon system for occupation when the primary position becomes untenable or unsuitable for carrying out the assigned task. *ambush A variation of attack from concealed positions against a moving or temporarily halted enemy. antiterrorism Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, including limited response and containment by local military and civilian forces. (JP 3-26) *approach march The advance of a combat unit when direct contact with the enemy is intended. area damage control Measures taken before, during, and/or after hostile actions or natural or man-made disasters to reduce the probability of damage and minimize its effects. (JP 3-10) area defense A type of defensive operation that concentrates on denying enemy forces access to designated terrain for a specific time rather than destroying the enemy outright. (ADP 3-90) area of influence A geographical area wherein a commander is directly capable of influencing operations by maneuver or fire support systems normally under the commander’s command or control. (JP 3-0) area of operations An operational area defined by a commander for land and maritime forces that should be large enough to accomplish their missions and protect their forces. (JP 3-0) *area reconnaissance A form of reconnaissance operation that focuses on obtaining detailed information about the terrain or enemy activity within a prescribed area. *area security A type of security operation conducted to protect friendly forces, lines of communications, installation routes and actions within a specific area.