FM
stringclasses
43 values
page
int64
1
477
text
stringlengths
6
8.45k
3-55.93
336
Appendix H MALFUNCTIONS H-8. If a team member's weapon malfunctions, he immediately moves and conducts corrective action on the bound. SAFETY H-9. All team members keep weapons on "Safe" during bounds. FORMATION H-10. Team members bound on line so as to not cross into lines of fire. ASSEMBLY H-11. Once the team has broken contact, they reassemble on line and move out of the contact area. CONTACT LEFT OR RIGHT H-12. The team turns toward the contact, takes a knee, and returns fire. One element bounds back while the other team suppresses the enemy. The second team bounds back and continues until contact is broken. Both teams assemble on line and move out of the area (Figure H-3). Figure H-3. Break contact left, right (diamond or file).
3-55.93
337
Battle Drills REACT TO AIR ATTACK H-13. The first Soldier who hears or sees an aircraft gives the "freeze" signal. The first Soldier who sees an attacking aircraft alerts, "Aircraft, front (left, right, or rear)." The team moves quickly into a line formation, well spread out, perpendicular to the aircraft's direction of flight. As each Soldier comes on line, he goes prone, using available cover. Between attacks, the team should seek better cover and concealment. If the team leader wants the team to move out of the area, he gives the clock direction and distance (Figure H-4). Figure H-4. React to enemy air attack. H-14. After the team consolidates and reorganizes, it moves to the last rally point. The team should engage the aircraft only as a last resort. Using the head-on method, they mass fires to engage attacking aircraft. They engage slow-moving aircraft at 50 meters and fast-moving aircraft at 200 meters. If the team receives fire, the team leader decides whether to continue the mission, move out of the area, or return fire on the aircraft. H-15. Another technique is to disperse into two groups of three Soldiers each or three groups of two Soldiers each. On sight of the aircraft, the team leader designates a rally point and gives the command to disperse. On linkup, the team leader assesses the situation and either calls for extraction or continues the mission.
3-55.93
338
Appendix H REACT TO INDIRECT FIRE H-16. On receiving indirect fire, the team deploys and takes cover. If more rounds impact, the team leader gives the clock position and the direction and distance to move. The team consolidates while moving or at a distance given by team leader. Once the team consolidates and reorganizes, it moves out quickly. The enemy might adjust fires as the team moves. The team should remain oriented on the 12 o'clock position. They may elect to move to the last rally point or as directed by the team leader. He must also decide whether to continue the mission or move out of the AO (Figure H-5). Figure H-5. React to indirect fire or air attack. REACT TO FLARES H-17. If the team encounters flares, it should execute the following actions: GROUND FLARES H-18. The team moves out of the illuminated area and takes cover. Each Soldier closes his firing eye to protect his night vision. The team leader decides the next direction to move. OVERHEAD FLARE WITH WARNING H-19. The team assumes a prone position--behind concealment, when available--before the flare bursts. Each Soldier closes his firing eye to protect his night vision. OVERHEAD FLARE WITHOUT WARNING H-20. The team gets into a prone position, making the most use of nearby cover, concealment, and shadows until the flare burns out. Each Soldier closes his firing eye to protect his night vision. The team leader gives the direction of movement. BREAK FROM HIDE OR SURVEILLANCE SITE H-21. When a hide or surveillance site is compromised, the element involved might have to execute a breakout drill. The drill must be well rehearsed to ensure speed, a base of fire, screening, and survivability.
3-55.93
339
Battle Drills The type of breakout drill used depends on the type of site and the number of personnel in the site. Proper rehearsals determine the best methods of site construction and the materials needed for a breakout. After constructing the site, the team employs M18 Claymores and smoke to assist execution of the drill. • Emplace smoke grenades in the ground around the site so they can be activated with a pull cord instead of throwing them after clearing overhead cover. • Rig Claymores in tandem for one-step activation. • Keep equipment packed at all times. Prepare an assault pack with all of the site's mission-essential equipment. H-22. Upon site completion, the leader visually recons the immediate vicinity and designates covered and concealed positions for each team member. The leader designates responsibilities and order of movement from the time claymores are detonated. This helps eliminate confusion and increase battle drill speed and effectiveness. H-23. When compromise is inevitable, the element notifies other team members not in the position of the situation. Claymores are rigged to all detonate at one time. Smoke grenades are thrown and each Soldier moves to his designated covered and concealed position, and then he lays down a base of fire to cover bounding team members. After the breakout, the element links up with the rest of the team or continues the mission (Figures H-6A through H-6D, this page through B-11).
3-55.93
340
Appendix H Figure H-6A. Break contact from hide or surveillance site.
3-55.93
341
Battle Drills Figure H-6B. Break contact from hide or surveillance site (continued).
3-55.93
342
Appendix H Figure H-6C. Break contact from hide or surveillance site (continued).
3-55.93
343
Battle Drills Figure H-6D. Break contact from hide or surveillance site (continued).
3-55.93
345
Appendix I Tracking and Countertracking The LRS teams must learn crucial tracking skills and techniques for use while in enemy territory. This allows them to provide immediate intelligence on the frequency and flow of enemy traffic on a trail. Tracking is also useful when a LRS team conducts a PR mission to retrieve a downed pilot. Good tracking skills enhance countertracking skills, and good countertracking skills assist in the success or failure of a mission by allowing the team to effectively evade anyone tracking them while in enemy territory. Both skill sets increase the Soldier's general awareness and reduces the chance of being caught off guard. CONCEPTS OF TRACKING I-1. To become a tracker, the LRS Soldier must develop and refine traits such as patience, persistence, acute observation, good memory, and attention to detail. These all help when tracking signs weaken and the tracker must rely on intuition. As he evaluates sign, he forms an opinion about the enemy's training, equipment, and morale. Six factors help the tracker form a picture of the enemy. DISPLACEMENT-TYPE SIGN I-2. "To displace" means "to move something from its original position." Thus, "displacement" means "the act of displacing" or "the signs or evidence that something has moved." Survey Area I-3. The tracker looks for displacement signs in a full 15-meter deep, 180-degree arc and up to the height of a tall man (Figure I-1). He evaluates all of the signs for trends and patterns. Figure I-1. Areas surveyed for indicators by tracker. Human Passage I-4. Some displacement type signs that indicate the likely presence of other humans include footprints; scraped and broken vegetation; bits of thread or clothing on the ground or on vegetation; limbs freshly
3-55.93
346
Appendix I broken or grass bent over on a windless day; the sudden excited cries of animals or sounds of sudden movement; disturbed insect life; and upturned rocks. Armed Soldier I-5. A footprint, found near a waist-high scuffmark on a tree, can indicate the passage of an armed Soldier (Figure I-2). Figure I-2. Examples of displacement. Footgear I-6. A footprint can reveal what footgear the enemy is wearing, if any; the lack of proper equipment; the direction of movement; the number and gender of people moving and their rate of movement; the weight of their loads; the amount of time passed since they made the track; and whether they know they are being tracked (Figure I-3). Rapid Movement I-7. If the footprints are deep and the pace long, the party is moving fast. Long strides and deep prints, with toe prints deeper than heel prints, indicate that they are running. Heavy Load I-8. If the prints are deep, short, and widely spaced, with signs of scuffing or shuffling, the party is probably carrying a heavy load. Gender I-9. To determine the gender of the party, study the sizes and positions of the footprints. Women tend to walk with their toes pointed inward, whereas men usually walk with their feet pointed straight ahead or outward. Women's prints and their strides are usually shorter than those of men. Backstep I-10. If a party knows or suspects that someone is following them, they might try to hide their tracks. Parties walking backwards have a short, irregular stride. The prints will have an unusually deep toe, and the soil will be kicked backward, confirming the direction of movement.
3-55.93
347
Tracking and Countertracking Figure I-3. Types of footprints. Box Method I-11. To use the 36-inch-box method, mark off a 30- to 36-inch cross-section of the trail, count the prints in the box, then divide by two to determine the number of parties who used the trail. The M16 rifle is 39 inches long. You can use it to measure (Figure I-4). Identify a Key Print I-12. The figure shows the use of a left boot print as the key print. In this situation, you draw a line from the heel across the trail. Move Forward I-13. Move to the key print for the opposite foot and draw a line through the instep. Your two lines form two opposite sides of a box. The edges of the trail form the other two sides. Together, the four lines form a box. Count I-14. Count every whole or partial print that falls inside of the box. Because any person who was walking normally would have stepped in the box at least once, the number of footprints in the box will help you to determine the total number of people in the party.
3-55.93
348
Appendix I Figure I-4. Box method for determination of number of footprints. STAINS I-15. One obvious example of staining is blood on the ground or foliage. Other examples include mud dragged by footgear and crushed vegetation on a hard object. Crushed berries also cause stains, and, finally, the movement of water makes it cloudy. EFFECTS OF WEATHER I-16. The weather may help or hinder the tracker to determine the age of signs. Wind, snow, rain, and sunlight all affect tracking. Assess recent weather aids in determining the age of a track. A tracker can use the last rain or strong wind as a measure to show the amount of time it has been there. LITTER I-17. A poorly disciplined unit leaves a trail of litter. DECEPTION TECHNIQUES I-18. Deception applies when the followed party tries to slow the tracker by, for example, leaving false trails, walking backwards, brushing out trails, splitting up, fading out, fanning out, and walking over rocky ground or through streams. INTERPRETATION OF COMBAT INFORMATION I-19. The tracker makes a mental image of his quarry based on his learned concepts. When reporting to the commander, he reports what he believes, but should not state it as a fact. The commander considers the facts alongside the tracker's beliefs and any other information he has.
3-55.93
349
Tracking and Countertracking ORGANIZATION OF TRACKING TEAM I-20. Tracking units can be any size as long as they have these three elements: a leader, a tracker, and security. Often tracking teams consist of two types: TRACKER AND COVER PERSON I-21. Each team member is equally skilled. They can move fast because they know each other's abilities and weaknesses and can compensate for each other. TRACKING TEAM LEADER, TRACKER, RTO, AND TWO SECURITY PERSONNEL I-22. The advantages of a tracking team with this many members are increased observation and security. The disadvantage is the size of the team. TRACKER AND DOG TEAM I-23. Trackers work more effectively with dog teams than without. TRAITS OF A TRACKING DOG I-24. The dog(s) follows a trail faster and can continue to track at night. Despite years of domestication, dogs retain most of the traits of their wild ancestors. If put to controlled use, these traits are effective when tracking. Endurance I-25. A dog can hold a steady pace and effectively track for up to eight hours. The speed can be up to 10 miles per hour, only limited by the speed of the handler. The speed and endurance can be further increased by the use of vehicles and extra teams. Mental Characteristics I-26. Dogs are curious by nature. They can also be aggressive or lazy, cowardly or brave. Dogs' sensory traits are what make them seem intelligent. Aggressiveness I-27. Tracking dogs are screened and trained to function as aggressive trackers, eager to please their handlers. SENSES OF A TRACKING DOG I-28. Knowledge of the dog's senses and how he uses them helps the evader to think ahead of the dog. Sight I-29. A dog's vision is the lesser of the sensing abilities. He can see in black and white and has trouble spotting static objects at more than 50 yards. He can spot moving objects at considerable distances, but he does not look up unless he is trained. His night vision is no better than that of a human. Sound I-30. Dogs can hear quieter and higher frequencies than humans. A dangerous problem for the evader is the dog's ability to hear. Even more dangerous is their ability to locate the source of a sound. Dogs can hear 40 times better than a human. Smell I-31. The dog's sense of smell is about 900 times better than a human. It is by far the greatest asset to the tracker and largest threat to the evader. Dogs can detect minute substances or disturbances on the ground, or even in the air. Using distracting or irritating odors such as CS powder or pepper only bothers a dog for 3 to 5 minutes. After the dog discharges the odor, he can pick up a cold trail even quicker. The dog
3-55.93
350
Appendix I smells odors from the ground and air and forms scent pictures. He puts together these scent pictures from several sources. Individual Scent I-32. This is the most important scent when it comes to tracking. Vapors from body secretions work their way through the evader's shoes onto the ground. Sweat from other parts of the body rubs off onto vegetation and other objects. Scent is even left in the air. Reinforcing Scent I-33. Objects that reinforce the scent as it relates to the evader are introduced to the dog. Some reinforcing scents could be on the evader's clothing or boots, or they could be made of the same material as is used in his clothing. Even the smell of boot polish can help a dog find a person. Ecological Scent I-34. For the dog, the most important scent comes from the earth itself. The strongest smell comes from disturbances in ecology such as crushed insects, bruised vegetation, and broken ground. Over varied terrain, dogs can smell particles and vapors carried by the evader wherever he walks. UNFAVORABLE TRACKING CONDITIONS I-35. Few conditions are ideal for dog tracker teams. During training, the teams learn the difficulties that they will face and develop skills to cope with them: Unverified Start Point I-36. The dogs may follow the wrong route or scent. Heat, Low Humidity, and Dry Ground I-37. These all cause rapid evaporation of scent. Wind I-38. Wind disperses scent, causing the dog to track downwind. Heavy Rain I-39. This washes scent away. Distracting Scents I-40. These divert the dog's attention from the trail. Some distracting scents are blood, meat, manure, farmland, and populated areas. Elements that Cover Scent I-41. Some elements in nature cover the scent picture partially or completely. For example, sand can blow over the tracks and help to disguise it; snow and ice can form over the track and make it nearly impossible to follow; and water can completely obscure a trail. FAVORABLE TRACKING CONDITIONS I-42. Some conditions favor the teams: Fresh Scent I-43. Scent is probably the most important factor for dog tracker teams. Fresh scent increases the chance of success. Verified Starting Point I-44. Introducing a definite scent to the dogs early on increases the chance that the dogs will follow the correct trail.
3-55.93
351
Tracking and Countertracking Unclean Evader I-45. An unclean evader leaves a more distinctive scent. Fast Moving Evader I-46. A fast moving evader causes more ground disturbances than a slower moving evader and, because he is sweating more than the slower mover, he also leaves a stronger scent trail. Night and Early Morning I-47. At these times, the air is thicker, so scent lasts longer. Cool, Cloudy Weather I-48. This limits evaporation of scent. Lack of Wind I-49. This keeps the scent close to the ground. It also keeps it from spreading around, allowing the dog to follow the correct route. Thick Vegetation I-50. This restricts the dissemination of scent and holds the smell. COUNTERTRACKING I-51. To avoid or evade the enemy, the LRS team must constantly use countertracking techniques. Knowledge of tracking is probably the best way to successfully evade trackers. Knowledge of trackers and dog teams greatly assists the survivor when evading the enemy. The two main types of trackers and methods of evading each follow: Visual Trackers I-52. Visual trackers cue, obviously, on visible signs. Evading them requires that you reduce visual signs and confuse the tracker(s): Outdistance the Tracker I-53. Put time and distance between you and the tracker. This increases the chance that the track will disappear or the tracker team will track too slowly to keep up with you (the team). Change Direction Frequently I-54. Change direction often--at least every 1,000 meters--and cover your changes. This can confuse less skillful trackers and buy you some time. If a tracker picks up sign, he can send a party ahead as far as he feels confident that the tracks may be found on a track trap such as road or muddy bank. Track traps allow trackers to gain time and distance on the evaders. Methodical tracking is slow and arduous. By changing direction, you can prevent these cutting parties from finding sign where they expect it and can enlarge the area that the tracker must cover. If you must cross a track trap such as a road, approach at an off-angle to your azimuth and cross the road or track trap. After crossing, go a short distance, and then change direction sharply, carefully covering the signs. Use Streams for Deception I-55. Approach a stream at an off-angle. Move downstream for 100 to 200 meters, leaving false trails every so often. At the end of the false trail, leave a set of tracks and countertrack them just enough that the tracks can be seen just barely. This will make the tracker think that he has found the right set of prints. Find a place to enter the stream such as a log and move in the opposite direction from where you entered. Go to a place where you can leave the stream without leaving sign and do so. This will buy you time, because the trackers will have to check out false trails and scour the banks for tracks.
3-55.93
352
Appendix I Move on Hard Surfaces I-56. Any surface that is too hard to retain the indentations of feet makes visual tracking almost impossible. Ensure that the soles of your footwear are as clean as possible to avoid leaving deposits on the surface. Enter the hard-surfaced area from an off-angle, and leave as little sign as possible. Even as little as 100 meters of hard surface can gain you a great amount of time over a tracker team. Camouflage Sign I-57. Any deliberate attempt at camouflage will slow any following parties by making them look harder for sign. It will also make the aging of sign more difficult. The best technique is to leave as little sign as possible. This is an individual responsibility. One person at the rear of the formation cannot cover all the sign left by a team of six. Each person must take special care at track traps and things such as ant mounds that leave definite signs for trackers. When crossing roads or track traps, try to step in the footprints of the Soldiers before you. This will make the job of countertracking for the last Soldiers easier. If you cannot completely camouflage the tracks, try to age them by brushing them or sprinkling debris in them. Walk Backwards I-58. Walking backwards produces a different type of print than walking forward, but only the most skillful trackers will pick up the difference. Used with other deception methods, this one can create some confusion and buy some time. Split Up the Team I-59. Multiple sets of tracks slow the tracker team, because following six sets of prints takes much longer than following one set. The team can then link up at a rally or rendezvous site. This is a great technique for use in tall grass or other areas where leaving tracks is unavoidable. Animal tracks increase the confusion. Use Animal Trails I-60. Wildlife that shares trails with the team will soon obscure any signs of human passage. Set Booby Traps I-61. Even if the tracker team fails to detonate the device, they will become more cautious. A few hasty devices such as a grenade and trip wire will slow them down considerably. The more they encounter, the slower they will move. Dog Trackers I-62. Dogs track by scent, so countertracking against them is more difficult than countertracking a visual tracker. One of the main ways to defeat a dog is to defeat his handler. A dog is only as effective as the handler allows: Change Direction Frequently I-63. One way to defeat the handler is to change direction frequently. A relatively inexperienced handler might perceive the dog's resulting frequent direction changes as a sign of indecisiveness. He might then think that the dog has lost the scent. Changing direction frequently in difficult terrain such as brush has the added advantage of entangling dog and handler, thus fatiguing and stressing them. Use Hard Surfaces I-64. Dogs track best on loose textured surfaces. Hard surfaces seldom retain scent as well. Use these as is tactically feasible. The effect of this technique depends on the experience of the dog. Travel in More Frequented Areas I-65. While not a preferred technique for a LRS team, traveling in more frequented areas might be necessary to throw dogs off the scent. Having to differentiate between scents can cause them to lose the scent of the team.
3-55.93
353
Tracking and Countertracking Travel in Streams I-66. While traveling in streams, avoid contact with anything that could catch and reinforce your scent such as a branch or rock. METHODS OF AVOIDING DETECTION I-67. To avoid detection-- Wear Common Footwear I-68. Some types of soles, such as the ripple type, are uncommon, which allows for easier tracking. Flat soles leave less sign than treaded soles, but are impractical for traveling over rough terrain. Wearing sandbags over boots reduces sign. However, burlap rips off and leaves telltale sign, so watch out for this should you choose this method. Leave No Scent I-69. Avoid leaving scent. While in a position or on the move, leave as little scent picture as possible. Food, blood, urine, and feces all leave strong, reinforcing scents for a search dog. Be especially careful in areas where you must remain for some time and in areas that you know are patrolled by dog teams. Behave Unpredictably I-70. Go against everything that human nature tells you to do. Go into difficult terrain and behave as most people moving through such an area would not do. Practice Tracking I-71. Know your enemy. Practice tracking and you will notice things that you should avoid doing when you are the one being tracked. For the team to successfully countertrack as a unit, each team member must have a basic working knowledge of tracking.
3-55.93
355
Appendix J Night Operations Night-fighting skills are necessary and are combat multipliers. Infantry forces use these skills to gain tactical and psychological advantages. Night operations do not rely on technology for success--commanders can plan and execute them with or without the use of night vision devices. In fact, for LRSU, night operations are the norm. This appendix lists the psychological, physiological, and physical effects of night-fighting. It also discusses the techniques used to maintain direction, control, and surprise. Some of these apply in other limited visibility conditions such as fog, rain, snow, and sandstorms. NIGHT VISION J-1. At night, the eye uses spiral eye cells called rods. These cells cannot differentiate color, and are easily blinded by light. This creates a central blind spot, which causes the viewer to miss larger objects as distances increase. PROTECTION OF NIGHT VISION J-2. Soldiers who work and perform tasks in daylight experience a reduction in night vision. Exposure to intense sunlight for two to five hours significantly decreases visual sensitivity for up to five additional hours. Sunlight magnified by reflective surfaces such as sand or snow reduces the rate of adaptability to the dark and it reduces general night vision even more. These effects are cumulative and may persist for several days. Consequently, Soldiers scheduled for night operations should wear military, neutral-density (N-15) sunglasses (or the equivalent) in bright sunlight. NIGHT-VISION SCANNING J-3. Soldiers use the night-vision-scanning technique to overcome physiological limitations and reduce illusions. It also protects their night vision and dark adaptation capabilities. The night-vision-scanning technique involves scanning slowly and regularly from right to left or from left to right (Figure J-1). Granted, this is the same as scanning in daylight. The difference is that, at night, Soldiers must also avoid looking directly at faintly visible objects.
3-55.93
356
Appendix J Figure J-1. Typical scanning patterns. OFF-CENTER VISION J-4. Looking straight at an object (using central vision) works in daylight, but not at night. This is due to the aforementioned central blind spot. To compensate for this blind spot, Soldiers use off-center (peripheral) vision. In other words, instead of looking directly at an object, they look 10 degrees above, below, or to either side of it (Figure J-2). Figure J-2. Off-center viewing technique.
3-55.93
357
Night Operations ADAPTATION TO THE DARK J-5. Adaptation to the dark means that as darkness increases, so does visual sensitivity. Just like the aperture in a camera, the pupil opens to let in more light. Soldiers are unique, so they adapt to darkness at slightly different degrees and rates. After the first 30 minutes in the dark, visual sensitivity maxes out (to about 10,000 times that of normal), and it increases little after that time. • Visual sensitivity in the dark is affected by exposure to bright lights such as matches, flashlights, flares, and vehicle headlights. Full recovery from this exposure might take up to 45 minutes. • Use of night vision goggles impedes dark adaptation. However, if a Soldier adapts to the dark before he dons the goggles, then he will adapt to the dark fully about two minutes after removing the goggles. • Color perception decreases as light decreases. Soldiers can distinguish light and dark colors only to the degree of reflected light intensity. • Darkness reduces visual acuity to one-seventh of daylight levels, so Soldiers can see only large objects. BLEACHED-OUT EFFECT J-6. Even when the Soldier practices off-center viewing, the image of an object that he views for more than two to three seconds tends to bleach out into one solid color. As a result, he can no longer see the object, which can increase operational risk. To overcome this effect, the Soldier must know about this phenomenon and avoid looking at any object for more than two or three seconds. By shifting his eyes from one off-center point to another, he can continue to see the object in his peripheral vision. SHAPE OR SILHOUETTE J-7. At night, Soldiers must identify objects by their shapes or silhouettes. Knowing the architectural designs of structures common to the AO determines the success of this technique. For example, in the US, a church is often characterized by a high roof and steeple, but churches elsewhere have different architectures. LIGHT SOURCES AND DISTANCES J-8. Table J-1 shows how far the naked eye can detect light sources at night. Table J-1. Light sources and distances. Sources Distances Vehicle headlight 4.0 to 8.0 kilometers Muzzle flash from single cannon 4.0 to 5.0 kilometers Muzzle flash from small-arms weapon 1.5 to 2.0 kilometers Bonfire 6.0 to 8.0 kilometers Flashlight 0.0 to 2.0 kilometers Lighted match 0.0 to 1.5 kilometers Lighted cigarette 0.5 to 0.8 kilometers Note: From the air, these distances can increase two to three times.
3-55.93
358
Appendix J HEARING J-9. Hearing is more acute in the dark for several reasons: mental concentration increases; background noises tend to diminish; and, lower temperatures and higher humidity carry sound farther. Practice and training help the Soldier overcome fear of night sounds. Training helps him to discriminate (distinguish) multiple sounds, faint sounds, and the directions from which sounds originate. Table J-2 shows how far away the Soldier can hear particular sounds at night. Table J-2. Sounds and distances. Source Distance Cannon shot 0.0 to 15.0 kilometers Single shot from a rifle 2.0 to 3.0 kilometers Automatic weapons fire 3.0 to 4.0 kilometers Tank movement On a dirt road 0.0 to 2.0 kilometers On a highway 3.0 to 4.0 kilometers Motor vehicle movement On a dirt road 0.0 to 500.0 kilometers On a highway 0.0 to 1.0 kilometers Movement of troops on foot On a dirt road 0.0 to 300.0 meters On a highway 0.0 to 600.0 meters Small-arms weapon loading 0.0 to 500.0 meters Metal on metal 0.0 to 300.0 meters Conversation between a few men 0.0 to 300.0 meters Steps of a single Soldier 0.0 to 40.0 meters Axe blow, sound of saw 0.0 to 500.0 meters Blows of shovels and pickaxes 0.0 to 1,000.0 meters Screams 0.0 to 1,500.0 meters Oars on water 0.0 to 2,000.0 meters SMELL J-10. Smell is the Soldier's least used sense. Typically, he only uses two percent of its potential. Different diets produce different human odors. For example, habitual meat eaters smell different from habitual vegetarians. Most enemy have different diets from those of US Soldiers. Once US Soldiers learn the enemy's characteristic odor, they can easily detect him at night. Practice improves skill and confidence. J-11. Facing into the wind at a 45-degree angle makes sensing odors easier. The Soldier relaxes, breathes normally, sniffs sharply, thinks about specific odors, and concentrates. Table J-3 shows the distances at which the human nose can typically sense particular odors.
3-55.93
359
Night Operations Table J-3. Odor sources and distances. SOURCE DISTANCE Diesel fuel 0.0 to 500.0 meters Cigarette smoke 0.0 to 150.0 meters Heat tab 0.0 to 300.0 meters FATIGUE J-12. Too much work and too little sleep make for a tired Soldier, especially in conditions of great stress. Tired Soldiers affect the unit's capabilities. Following a work-rest schedule can help prevent collective fatigue. It builds-in recovery time to maintain unit effectiveness. Leaders-- • Ensure that each Soldier sleeps or rests during part of each of his off-shift periods. • Rotates cross-trained Soldiers through various duties to reduce errors. • Should assign two Soldiers to each job that requires discrimination between factors, such as OP procedures or writing and encrypting messages. • Can experiment until he finds the best schedules. A four-hours-on, four-hours-off schedule works in good weather; a two-hours-on, four-hours-off schedule works better for bad weather. Other schedules can also help. No schedule suits everyone, but a particular schedule might work best for a particular team. J-13. Sleep order depends on task seriousness, complexity, and tedium level. For example, team leaders and RTOs might rate Priority 1 or 2 in this system. So, if someone has to miss sleep to check the OP, the team leader might check it once, his assistant twice, and an observer thrice. The team leader must get the most sleep, since he makes the most serious decisions and processes the most complex information. J-14. Some Soldiers operate at their greatest efficiency early in their awake cycle, and vice versa. Leaders try to have decision makers perform their most critical tasks when they tend to think most clearly. Leaders evaluate and plan this ahead of time. CAUTION The intense concentration required to use night vision devices can degrade the other senses. Leaders should prepare Soldiers for night operations by having them use all of their senses. On some operations, this might require that some of them avoid using night vision devices. SELECTION OF ROUTE J-15. The leader determines the route for night movement based on METT-TC. Since more than one route might satisfy METT-TC, leaders should select the easiest one to navigate. Night travel is strenuous, and often done when Soldiers are tired. This adds to physical and psychological stress. Simple navigation is easier to direct and control. J-16. He analyzes the selected route farther using the factors of OAKOC. METT-TC might weight some of these factors, such as terrain, cover, or avenues of approach, over other factors. J-17. Before analyzing the route, the leader divides it into segments or legs. Each leg starts with a checkpoint and ends with a change in direction or prominent terrain feature. The leader orients and controls the team's movement on the checkpoints along the route. He uses OAKOC to analyze each leg, and to
3-55.93
360
Appendix J determine probable hasty ambush sites, likely areas for enemy movement, and locations with improved observation. J-18. The leader also identifies a contiguous feature, or catchpoint, such as a river, road, or ridge, on the far side of each checkpoint. If the team misses the checkpoint, they head for the nearest catchpoint. This is a quick, easy way to reorient movement. J-19. The leader tries to reconnoiter the route before he moves the unit. Ideally, he reconnoiters day and night. During his reconnaissance, he adds, confirms, or adjusts orientation aids. These can include any of the following: • Terrain features (hills, cliffs, rivers, ridges, draws). • Man-made features (towers, buildings, bridges, and roads). • Ground surveillance radar (GSR). • Wire. • Illumination rounds. • Night vision devices. • Machine gun tracer fire. When mortar illumination rounds or tracer fire is used to locate positions, the leader plans the fire patterns so that the team can see them. J-20. A reorientation plan is one of the final ingredients in route selection. The leader plans for reorientation throughout the movement using checkpoints, catchpoints, and position locators. Nevertheless, units do get lost. Therefore, the leader must plan how to recover and reorient his team and complete the mission. He plans this during the reconnaissance and adds checkpoints as needed. He uses distant terrain features to resection off indirect fire. Planning how to react should the unit become lost reduces the negative effects should it occur. NIGHT WALKING J-21. Leaders must train their units to move silently. Night movement requires different muscles than day movement, and so requires practice. J-22. Whereas daylight travel stresses the calf muscles, walking at night places more strain on the muscles of the thighs and buttocks. Soldiers must get used to taking short, careful steps, stressing the use of the larger muscle groups in their thighs. This method of balanced, smooth walking at night reduces the chance of tripping over roots and rocks, and it reduces noise. Sufficient practice helps make crossing terrain at night seem as natural and easy as walking on a sidewalk in the daytime. Soldiers conditioned to move this way can travel far with little fatigue. J-23. To walk at night, the Soldier looks ahead, shifts his weight completely to his left foot, and then slowly lifts his right foot about knee high. He balances on his left foot while he eases his right toes down and out, feeling lightly for twigs or trip wires. Still keeping his weight on his left foot, he gently touches his right toes to the ground about 6 inches to the front of his left foot. He lightly feels the ground under the outside of the toes of his right boot. Then, he feels with his right boot for any twigs, loose rocks, or holes. If he finds none, he finally settles his foot on the ground. Once he is confident of solid, quiet footing, he slowly shifts his weight forward onto the right foot, hesitates until he has his balance, then repeats the sensing process with his left foot. J-24. Crossing fords and streams requires extensive team-level training. The team must establish and maintain security when crossing these obstacles. To cross a ford, the Soldier slips silently into the water, gains and maintains his footing, and remains alert. He starts crossing by sliding his leading foot forward and dragging his rear foot, as if shuffling. This helps him keep his balance in the current. After everyone crosses, the leader counts heads, and the team moves out.
3-55.93
361
Night Operations SIGNALS J-25. The team uses simple, familiar signals to pass information, identify locations, control formations, or initiate activity. Each basic signal has alternate signals as backups, and everyone must know these as well. Signaling at night helps the leader control what is happening. It supports security and surprise. It requires different methods than daylight signaling, for example, arm-and-hand signals might not be visible at night. The most common signals use sound, touch, and sight. The leader chooses signals based on the unit's activity and desired results, then he briefs the Soldiers and has them practice. AUDIO SIGNALS J-26. These include radio, wire, telephones, messengers, and grating or clicking of objects. Radio and Telephone Signals J-27. When using the radio and telephone at night, operators take precautions. They know that noise travels farther at night than during the day. They lower the volume as much as practical. They use headphones or earphones to reduce unnecessary noise. They know the possibility of loud static. They use signals such as breaking squelch a specified number of times. Messages J-28. Messengers carry written messages to avoid confusion and misinterpretation. When this is not possible, leaders ensure the messenger understands the message by having him repeat it word for word. Oral Signals K-1. Oral communication at night should be whispered. To do this, the Soldier takes a normal breath, exhales half of it, and then whispers into the other person's ear using the remainder of his breath. VISUAL SIGNALS J-29. These can be active or passive and include many options. For visual signals to work, everyone must see and recognize them. Passive Visual Signals • Sticks indicating direction. • Light-colored paint. • Tape. • Rock formations. • Markings on the ground. • Powder. Active Visual Signals • Flares. • Flashlights. • Illumination rounds (M203, mortar, artillery). • Chemical lights. • Infrared or incandescent strobe lights. • Either AN/PVS-5 or -7 night vision devices (infrared), or both. • Burning fuel (saturated sand in a can). • Luminous tape or compass dial.
3-55.93
362
Appendix J Uses of Visual Signals J-30. These signals can be used to identify a critical trail junction, mark a rally or rendezvous point, mark caches, or report that a danger area is clear. White powder can be used to indicate direction at a confusing trail intersection. A flashlight with a blue filter (with an "X" cut out of the filter) can signal "All clear" to a unit crossing a danger area. The possibilities are endless. However, the leader ensures that each Soldier in the team understands every signal used. TOUCH SIGNALS J-31. These consist of wire, string, or rope used in the hide or surveillance position to communicate without disclosing the position. They usually consist of wire loosely secured to an arm or leg. By prearrangement, two pulls on the wire might mean that a ground-mounted force is approaching, while three pulls might indicate a convoy. TARGET DETECTION J-32. Successful night movement and target engagement depend on knowing the enemy--how he attacks, defends, and uses terrain. Studying the enemy's techniques and patterns aids in target detection. Nature provides an endless array of patterns. Man invariably disturbs or alters these patterns so they are detectable. Sensing the enemy at night requires leaders and Soldiers to exercise patience, pay attention to detail, and practice. Patience and confidence are critical to effectively sense a target at night. While moving through an area, Soldiers look calmly and methodically for patterns rather than on details. For example, they look for straight lines, light variations, and any other odd-looking, obviously man-made, or disturbed patterns. The team looks for sentries or positions at the entrances to draws, on hills overlooking bridges or obstacles, and on the military crests of prominent terrain features. This is where the enemy will go for observation. The team also looks for supporting positions. They must know the ranges of enemy weapons, including supporting weapons, as well as the ranges of the enemy's night vision and line-of-sight observation devices. They must search thoroughly for enemy positions and for any other signs of enemy activity. Typical indicators of enemy activity include sounds, odors, displacement, weathering, littering, and camouflage: Sounds J-33. A Soldier places an ear to the ground or drives a stick 6 inches into it. Ground is denser than air, so sounds can travel farther through it, although determining direction is difficult. Rain and winds mask sounds. Rain causes Soldiers to seek shelter in static positions or, if moving, to put down their earflaps. Both actions degrade the ability to hear someone stalking them. Odors J-34. When the sun sets, the air cools and odors float downhill. When the sun and temperatures rise, so do odors. The more odors rise, the more likely they are to be picked up and carried by the wind. Displacement J-35. The team checks for displaced stones, leaves, or logs. The undersides of these objects are usually darker in color than their top sides, and they are usually also damp. Crumbled rocks have lighter colored faces and chips. At night, Soldiers need flashlights to detect these signs, so the team must place security well out. When viewed through infrared devices, broken and crushed vegetation look very different from undisturbed vegetation. Weathering J-36. Weathering indicates a recent disturbance. At night, the team usually needs experience--and light--to detect weathering.
3-55.93
363
Night Operations Littering J-37. Littering proves humans were present and can give clues about their discipline (or lack of it), distraction, supplies, and morale. However, it might be deliberate, that is, litter and other items left behind might contain booby traps. Camouflage J-38. Natures few straight lines tend to stand out. So do contrasting or unnatural colors, tones, and textures such as green leaves among dead branches. For example, an infrared source will show newly cut foliage. MOVEMENT J-39. Team leaders determine the best formation and movement techniques based on METT-TC. The file works well at night--it is easy to control and allows rapid movement through dense terrain. The only problem is that it does not allow the team to mass fire to the front. However, its advantages usually outweigh its disadvantages. To aid in movement control and security— • Each Soldier must be within reach of the Soldier to his front. • No Soldier moves unless told to do so. • The leader(s) does the talking. • The leader(s) positions himself far enough forward to make timely decisions to eliminate confusion.
3-55.93
365
Appendix K Example Evasion and Recovery Plan Figure K-1, page K-2, shows an example plan of action for an evasion. Figure K-2 and Figure K-3, pages K-5 and K-6, show the front and back of an example of DD Form 1833 TEST (V2).
3-55.93
366
Appendix K Figure K-1. Example plan of action for an evasion.
3-55.93
367
Example Evasion and Recovery Plan Figure K-1. Example plan of action for an evasion (continued).
3-55.93
368
Appendix K Figure K-1. Example plan of action for an evasion (continued).
3-55.93
369
Example Evasion and Recovery Plan Figure K-2. Example of DD Form 1833 TEST (V2) (front).
3-55.93
370
Appendix K Figure K-3. Example of DD Form 1833 TEST (V2) (back).
3-55.93
371
Glossary Section I. ACRONYMS AND ABBREVIATIONS 1SG First Sergeant CAS close air support A CATS combined arms training strategy AAA antiaircraft artillery CBRN chemical, biological, radiological, and nuclear AC2 Army airspace command and control CCA close combat attack AES advanced encryption standard CCIR commander's critical information requirements ALE automatic link establishment CLS combat lifesaver ANDVT advanced narrowband digital voice terminal COA course of action AO area of operations COB company operations base AOB alternate operations base COMSEC communications security AOI area of interest COO combined obstacle overlay ARNG Army National Guard CYRIL proword used to describe a situation report ARNGUS Army National Guard of the United States D ASCOPE areas, structures, capabilities, DAG division artillery group (OPFOR) organizations, people, events DAMA demand-assigned, multiple access ASI additional skill identifier DAR designated area of recovery ASIP Advanced System Improvement DF direction finding Program DOD Department of Defense ATOSPIN air tasking order special instructions DP decision point ATV all-terrain vehicle DSVT digital secure-voice terminal B DTG date-time group BCT brigade combat team DV digital voice BDA battle damage assessment DZ drop zone BFSB Battlefield Surveillance Brigade E BLOS beyond line-of-sight E&E escape and evasion BMNT begin morning nautical twilight E&R evasion and recovery BRS base radio station ECCM electronic counter- countermeasures BSC brigade support company ECW extreme cold weather C EMT emergency medical technician CAB(M) combat aviation brigade (medium) EOM end of message CAF combat air force
3-55.93
372
Glossary EPA evasion plan of action HC hexachloroethane EW electronic warfare HF high frequency F HHT headquarters and headquarters troop FAC forward air controller HMMWV high-mobility, multipurpose fax facsimile (graphics only) wheeled vehicle FC Fires Cell HPT high payoff target FH frequency hopping hq headquarters (graphics only) FID foreign internal defense hr hour (graphics only) F-Kill firepower kill HUMINT human (collected) intelligence FLIR forward-looking infrared HVT high-value target FLOT forward line of own troops I FM frequency modulation; field IBCT Infantry brigade combat team manual IFF identification friend or foe FO forward observer IMETS Integrated Meteorological System FOT frequency of transmission IMINT imagery intelligence FRAGO fragmentary order IND individual FRIES fast-rope insertion and extraction system INTREP intelligence report FRP final reference point INTSUM intelligence summary FSO fire support officer IPB intelligence preparation of the battlefield G IR information requirement G-2 Assistant Chief of Staff, Intelligence IRP initial reference point G-3 Assistant Chief of Staff, ISOPREP isolated personnel report Operations and Plans ISR intelligence, surveillance, and G-6 Assistant Chief of Staff, reconnaissance Communications IWEDA Integrated Weather Effects GI&S geospatial information and Decision Aid services J GMV ground mobility vehicle J-2 joint staff intelligence directorate GPS global positioning system J-3 joint staff operations and plans GSO ground safety officer directorate GSR ground-surveillance radar J-6 joint staff communications- electronics directorate H jm jumpmaster (graphics only) HAHO high altitude, high opening JOG joint operations graphic HALO high altitude, low opening JPRA Joint Personnel Recovery Agency HCA humanitarian and civic assistance
3-55.93
373
Glossary J-SEAD joint suppression of enemy air M defense M meter JSRC joint search and rescue center MA mission analysis JTF joint task force MASINT measurement and signals K intelligence Kbps kilobits per second MBITR multiband intra-team radio KIA killed in action MCL minimum clear (takeoff) length K-Kill catastrophic damage MCOO modified combined obstacle overlay km kilometers MCP main command post kmph kilometers per hour MCW minimum clear (takeoff) width L MDMP military decision-making process LAN local area network METT-TC mission, enemy, terrain and lat latitude (graphics only) weather, troops and support LBE load-bearing equipment available, time, and civil considerations LCE load-carrying equipment MFF military free fall LEA law enforcement agency MHz megahertz LNO liaison officer MIA missing in action LOC lines of communication MIJI meaconing, intrusion, jamming, long longitude (graphics only) and interference LORAN-C Long-Range Navigation-- mm millimeter Revision C MOU Memorandum of Understanding LOS line of sight MPF mission planning folder LQA link quality analysis MRE meal ready to eat LRAS3 Long-Range Advanced Scout Surveillance System MSE mobile subscriber equipment LRS long-range surveillance MSIP multispectral image processor LRSC long-range surveillance company MSS mission support site LRSD long-range surveillance N detachment NAI named area of interest LRSLC long-range surveillance leaders NCO noncommissioned officer course NCOIC noncommissioned officer in charge LRSU long-range surveillance unit NEO noncombatant evacuation LTIOV latest time information of value operations LWCSS Lightweight Camouflage NFA no-fire area Screening System NIMA National Imagery Mapping LZ landing zone Agency
3-55.93
374
Glossary NLOS non-line of sight POL petroleum, oil, and lubricants NLT not later than POW prisoner of war NM nautical mile (1,852 meters or PR personnel recovery 6,076 feet) PSG platoon sergeant NSA National Security Agency PZ pickup zone NSN national stock number R NSTV nonstandard tactical vehicle R&S reconnaissance and surveillance NVG night vision goggles RAG regimental artillery group NVIS near-vertical incidence sky wave (OPFOR) O RASP recruitment, assessment, and selection program OAKOC observation and fields of fire, avenues of approach, obstacles RCC rescue coordination center key terrain, cover and concealment RDF radio direction finding OB order of battle RFA restricted fire area obj objective (graphics only) RFI request for information OE operational environment RFL restrictive fire line OIC officer in charge RH-53 heavy assault, airlift, or OP observation post minesweeping helicopter OPCON operational control RII request for intelligence information OPFOR opposing force ROE rules of engagement OPLAN operation plan RP release point or rally point opn operation (graphics only) RSLC Reconnaissance and Surveillance OPORD operation order Leader Course OPSEC operations security RTO radio telephone operator ORP objective rally point rv rendezvous (graphics only) P S pax people (graphics only) S-2 Intelligence Officer PEO peace enforcement operation S-3 Operations and Training Officer PIR priority intelligence requirements S-6 C2 Information Officer PKO peacekeeping operation SAFE selected area for evasion PL platoon leader SAID SAFE area intelligence description PLGR precision lightweight GPS receiver SALUTER Size, Activity, Location, Unit, plt platoon (graphics only) Time, Equipment, and Remarks PMCS preventive maintenance checks SAM surface-to-air missile and services SARDOT search and rescue point PO peace operation
3-55.93
375
Glossary SCI sensitive, compartmented TOE table of organization and information equipment SEAD suppression of enemy air defenses TTP tactics, techniques, and procedures SEO sniper employment officer U SERER survival, evasion, resistance, UAS unmanned aircraft system escape, recovery UHF ultra high frequency SFG(A) Special Forces Group (Airborne) UNDER proword used to describe a cache SIGINT signals intelligence report SINCGARS Single-Channel Ground and USAF United States Air Force Airborne Radio Subsystem USAR United States Army Reserve SIR specific information requirements USSOCOM United States Special Operations SITEMP situation template Command V SITMAP situation map VHF very high frequency SITREP situation report VoIP voice over Internet protocol SOCOORD special operations coordinator VSWR voltage standing wave radio SOF special operations force W SOP standing operating procedure WAN wide area network SPIES Special Patrol Insertion and Extraction System WARNO warning order SQI special qualifications identifiers WFF warfighting function SSB single sideband WWII World War II SSM surface-to-surface missile wx weather (graphics only) surv surveillance (graphics only) XYZ T XO Executive Officer TACAIR tactical air TACCP tactical command post TACP tactical air-control party TACSAT tactical satellite TAI target area of interest TC training circular tgt target (graphics only) THFRS Transformation High-Frequency Radio System TLP troop leading procedures tm team (graphics only) TOC tactical operations center
3-55.93
376
Glossary Section II. TERMS B O backbrief A briefing by subordinates to the outstation a remo te or outlying station commander to review how ordnance explosives, chemicals, subordinates intend to accomplish pyrotechnics, and similar their mission stores, such as bombs, guns and C ammunition, flares, smoke, or napalm critical frequency the highest frequency bent back to earth U unilateral undertaken by one person or party; one-sided H W handshake the ex change of informtion between two electronic devices waveform graphi c representation of a wave shape that represents the N relationship between two net a group of communications variables such as amplitude and stations operating under unified frequency control
3-55.93
377
References REQUIRED PUBLICATIONS These documents must be available to the intended users of this publication. ARMY REGULATIONS AR 40-400. Patient Administration. 06 February 2008. AR 350-1. Army Training and Leader Development. 03 August 2007. AR 385-63. Range Safety. 19 May 2003. AR 600-9. The Army Weight Control Program. 27 November 2006. FIELD MANUALS FM 3-0. Operations. 27 February 2008. FM 3-04.15. Multi-service Tactics, Techniques, and Procedures for the Tactical Employment of Unmanned Aircraft Systems. 03 August 2006. FM 3-04.113. Utility and Cargo Helicopter Operations. 07 December 2007. FM 3-05.211. Special Forces Military Free-fall Operations. 06 April 2005. FM 3-05.212. Special Forces Waterborne Operations. 31 August 2004. FM 3-06. Urban Operations. 26 October 2006. FM 3-06.11. Combined Arms Operations in Urban Terrain. 28 February 2002. FM 3-07. Stability Operations. 06 October 2008. FM 3-09.32. (JFIRE) Multi-service Tactics, Techniques, and Procedures for the Joint Application of Firepower. 20 December 2007. FM 3-11. Multiservice Tactics, Techniques, and Procedures for Nuclear, Biological, and Chemical Defense Operations. 10 March 2003. FM 3-11.3. Multiservice Tactics, Techniques, and Procedures for Chemical, Biological, Radiological and Nuclear Contamination Avoidance. 02 February 2006. FM 3-11.4. Multiservice Tactics, Techniques, and Procedures for Nuclear, Biological, and Nuclear (NBC) Protection. 02 June 2003. FM 3-11.5. Multiservice Tactics, Techniques, and Procedures for Chemical, Biological, Radiological, and Nuclear Decontamination. 04 April 2006. FM 3-11.19. Multiservice Tactics, Techniques, and Procedures for Nuclear, Biological, and Chemical Reconnaissance. 30 July 2004. FM 3-19.30. Physical Security. 08 January 2001. FM 3-21.8. Infantry Rifle Platoon and Squad. 28 March 2007. FM 3-21.10. The Infantry Rifle Company. 27 July 2006. FM 3-21.20. The Infantry Battalion. 13 December 2006. FM 3-21.38, Pathfinder Operations. 25 April 2006. FM 3-21.220. Static Line Parachuting Techniques and Tactics. 23 September 2003. FM 3-24 . Counterinsurgency. 15 December 2006.
3-55.93
378
References FM 3-34.210. Explosives Hazards Operations. 27 March 2007. FM 3-97.6. Mountain Operations. 28 November 2000. FM 4-01.011. Unit Movement Operations. 31 October 2002. FM 4-02. Force Health Protection in a Global Environment. 13 February 2003. FM 4-25.11. First Aid. 23 December 2002. FM 4-25.12. Unit Field Sanitation Team. 25 January 2002. FM 4-30.31. Recovery and Battle Damage Assessment and Repair. 19 September 2006. FM 5-103. Survivability. 10 June 1985. FM 6-0. Mission Command: Command and Control of Army Forces. 11 August 2003. FM 6-22.5. Combat and Operational Stress Control Manual for Leaders and Soldiers. 18 March 2009. FM 6-30. Tactics, Techniques, and Procedures for Observed Fire. 16 July 1991 FM 7-0. Training for Full-spectrum Operations. 12 December 2008. FM 7-1. Battle-Focused Training. 15 September 2003. FM 7-15. The Army Universal Task List. 31 August 2003. FM 7-85. Ranger Unit Operations. 09 June 1987. FM 7-92. The Infantry Reconnaissance Platoon and Squad (Airborne, Air Assault, Light Infantry). 23 December 1992. FM 8-42. Combat Health Support in Stability Operations and Support Operations. 27 October 1997. FM 21-10. Field Hygiene and Sanitation. 21 June 2000. FM 22-6. Guard Duty. 17 September 1971. FM 27-10. The Law of Land Warfare. 18 July 1956. GRAPHIC TRAINING AIDS GTA 01-14-001. Battle Damage Assessment & Repair (BDAR) Smart Book. 01 March 2007. HANDBOOK SH 21-76. Ranger Handbook. 2006. JOINT PUBLICATIONS JP 0-2. Unified Action Armed Forces (UNAAF). 10 July 2001. JP 3-07.1. Joint Tactics, Techniques,and Procedures for Foreign Internal Defense (FID). 30 April 2004. OTHER Harris Corporation. Operator’s Manuals for the AN/PRC-117, AN/PRC-150, and AN/PRC-152, 2005 through 2007. http://premier.harris.com/rfcomm. Thales Corporation. Operators Manual for the AN/PRC-148. October 2004. https://secure.thalescomminc.com/customer_care_V2.asp. USSOCOM Reg 350-6. Special Operations Infiltration/Exfiltration Operations. 25 August 2004.
3-55.93
379
References SOLDIER TRAINING PUBLICATIONS STP 21-1-SMCT. Soldier's Manual of Common Tasks Skill Level 1. 18 June 2009. STP 21-24-SMCT. Soldier's Manual of Common Tasks, Warrior Leader Skill Level 2, 3, and 4. 09 Sept 2008. TECHNICAL MANUALS TM 11-5820-467-15. Operator's, Organizational, Direct Support, General Support, and Depot Maintenance Manual for Antenna Group, AN/GRA-50. 19 July 1961. TM 11-5820-887-10. Operator's Manual for Digital Message Device Group, 0A-8990/P. 20 August 1982. TM 11-5820-919-12. Operator's and Organizational Maintenance Manual for Radio Set, AN/PRC-104A. 15 January 1986. TM 11-5820-923-12. Operator's and Organizational Maintenance Manual Radio Set, AN/GRC-213. 14 February 1986. TM 11-5820-924-13. Operator's, Organizational and Direct Support Maintenance Manual for Radio Set, AN/GRC-193A. 14 February 1986. TM 11-5820-1025-10. Operator's Manual for Radio Set AN/PRC-126. 01 February 1988. TRAINING CIRCULARS TC 21-24. Rappelling. 09 January 2008. RELATED PUBLICATIONS These documents are quoted or paraphrased in this publication. DEPARTMENT OF THE ARMY PAMPHLET DA Pamphlet 350-38. Standards in Training Commission. 13 May 2009. FIELD MANUALS FM 1-02. Operational Terms and Graphics. 21 September 2004. FM 2-0. Intelligence. 17 May 2004. FM 3-05.70. Survival. 17 May 2002. FM 3-25.26. Map Reading and Land Navigation. 18 January 2005. FM 3-50.1. Army Personnel Recovery. 10 August 2005. FM 3-50.3. Multi-service Tactics, Techniques, and Procedures for Survival, Evasion and Recovery. 20 March 2007. FM 3-90.15. Sensitive Site Operations. 25 April 2007. FM 5-0. Army Planning and Orders Production. 20 January 2005. FM 5-19. Composite Risk Management. 21 August 2006. FM 5-33. Terrain Analysis. 11 July 1990. FM 6-02.72. Tactical Radios Multiservice Communications Procedures for Tactical Radios in a Joint Environment. 14 June 2002. FM 6-02.74. Multi-Service Tactics, Techniques, and Procedures for the High Frequency-Automatic Link Establishment (HFALE) Radios. 20 November 2007.
3-55.93
380
References FM 6-02.90. Multi-Service Tactics, Techniques, and Procedures for Ultra High Frequency Tactical Satellite and Demand Assigned Multiple Access Operations. 31 August 2004. FM 6-99.2. US Army Report and Message Formats. 30 April 2007. FM 7-92 . The Infantry Reconnaissance Platoon and Squad (Airborne, Air Assault, Light Infantry). 23 Dec 1992. FM 17-95. Cavalry Operations. 24 December 1996. FM 23-10. Sniper Training. 17 August 1994. FM 34-130. Intelligence Preparation of the Battlefield. 08 July 1994. FM 90-4. Air Assault Operations. 16 March 1987. JOINT PUBLICATIONS JP 1. Doctrine for the Armed Forces of the United States. 02 May 2007. JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 12 April 2001 JP 3-50. Personnel Recovery. 05 January 2007. OTHER Combined Arms Center Publication Operational and Organizational Concept for the Battlefield Surveillance Brigade (BFSB). 14 November 2000. Technical Memo 5-87. Modern Experience in City Combat, US Army Human Engineering Laboratory, March 1987. REFERENCED FORMS DA forms are available on the APD Web site (www.apd.army.mil); DD forms are available on the OSD Web site (www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm). DEPARTMENT OF THE ARMY FORMS DA Form 1594. Daily Staff Journal or Duty Officer's Log. DA Form 2028. Recommended Changes to Publications and Blank Forms. DA Form 5752-R. Rope Log (Usage and History (LRA)). DEPARTMENT OF DEFENSE FORMS DD Form 1833 TEST (V2). Isolated Personnel Report (ISOPREP). INTERNET Some of the documents listed elsewhere in the References, as well as all of the individual and collective tasks referred to in this publication, may be accessed at one the following Army websites: Air Force Pubs http://afpubs.hq.af.mil/ Army Forms http://www.apd.army.mil Army Knowledge Online https://akocomm.us.army.mil/usapa/doctrine/index.html Digital Training Management System https://dtms.army.mil/DTMS (individual and collective tasks) DoD forms http://www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm NATO ISAs http://www.nato.int/docu/standard.htm Reimer Digital Library http://www.train.army.mil
3-55.93
381
Index A antennas (continued) cold weather operations, 6-35, unidirectional pattern, 6-23 6-36, D-2 actions (illus) combat and responsibilities, 4-4 whip antenna, 6-30 (illus) assessment, 4-30 (illus) architecture management, 6-1 patrol, 4-44 on objective, 4-17 area rubber raiding activities matrix, 7-14 (illus) of influence, 7-3 reconnaissance craft, 5-1 air of interest, 7-3 (See also rubber boat.) assault, 5-24 of operations, 7-3 command and control infiltration/exfiltration reconnaissance, 4-21 Army operations, four types, annex, B-46 (illus) Army aviation, 5-24 1-1 AN/PRC-150 assessment, A-2 employment schematic compatible radios, 6-3 association matrix, 7-12 (illus) LRSC, 2-9 (illus) (illus), 6-6 (illus) assumptions, B-14 (illus) LRSD in an MSS, 2-10 in vehicular attack, electronic, 6-16 (illus) AN/VRC-104(V)3 automatic link sequence, 6-4 LRSD and LRS team, 2-1 configuration, 6-7 (illus) (illus) nonstandard, 2-7 analysis command post, 2-7 assumptions, B-14 B common types of antennas, facts, B-13 backbrief, B-16, B-17 (illus) 6-26 mission, B-11, B-15 (illus) base radio station, 6-2, 6-6 communications, 6-1 of threat factors, 7-9 battle drills, H-1 annex, B-41 (illus) ANGUS (Initial Entry) Report, battlefield surveillance brigade base, 6-6 6-13 (illus) (BFSB) staff, 2-2 computers and intelligence, antennas, 6-18 beyond line-of-sight (BLOS) 2-14, 2-15 bidirectional pattern, 6-24 equipment, 6-4 data wire diagram, 6-10 (illus) bidirectional antenna pattern, (illus) expedient insulators, 6-31 6-24 (illus) security (COMSEC), 6-15 (illus) boat, rubber, 5-2 (illus) company operations base, 2-8 formula for calculating BORIS (Intelligence) Report, (illus) length of half wave dipole 6-13 (illus) computers, 6-2 antenna, 6-27 (illus) box method, I-4 (illus) confirmation brief, B-10 half wave dipole, 6-26 branches and sequels, E-1 construction and selection, (illus) bridges, 4-25, 4-32 6-25 high frequency antenna brief types, B-8 (illus), B-9 contingencies, 4-29 "V" type, 6-34 (illus) (illus) contingency half rhombic type, 6-33 buildings, 4-33 matrix, E-2 (illus) (illus) bunkers, 4-34 plan, E-1 long-wire type, 6-28 converging routes method, (illus), 6-33 (illus) C 4-24 (illus) inverted "V" type, 6-27 cargo straps, securing of, 5-18 coordination (illus) (illus) checklist, 5-28 (illus) omni-directional pattern, chain of command, 8-2 for army aviation, F-1 6-25 (illus) chemical, biological, count, 5-4 (illus) sloping antenna, "V" type, radiological, and nuclear countertracking procedures, 6-34 (illus) (CBRN), 4-66 I-1 sloping wire antenna, 6-29 classification, 6-22 courses of action, 4-12 (illus) (illus) of evasion, 8-3 CRACK (Battle Damage terminated sloping "V" of urban area by size, 7-2 Assessment) Report, 6-15 antenna, 6-29 (illus) (illus) (illus)
3-55.93
382
Index CYRIL (Situation) Report, example subsurface site, G-6 heavy team and platoon 6-14 (illus) (illus) operations, 4-29 execution (actions on helicopter operations, 5-9 D objective), 4-17 helocasting operations, 5-7 damage types and levels, 4-31 exfiltration phase and HF, VHF, and UHF radios, 6-2 dams and locks, 4-35 extraction method, 4-17 hide site, 4-28 (illus) data wire diagram, 6-10 (illus) expedient insulators, 6-31 actions in, G-9 databases (illus) high-frequency debrief, B-33, B-34 (illus) extraction method, 4-17 ranges in ionosphere, 6-20 decision brief, B-16 (illus) F decision support template, skip zone and distance, 6-22 7-20 facilities, C-1 (illus) desert operations, 6-35 facts, B-13 (illus) high frequency antennas, desert operations, D-1 fan method, 4-23 (illus) directional, field-expedient, destruction priority, fast rope insertion/extraction 6-33 communications devices, system (FRIES), 5-20 half rhombic type, 6-33 6-17 (illus) fatigue, J-5 (illus) disguises, 8-6 field expedient antennas, 6-30 long-wire type, 6-33 (illus) displacement, I-2 (illus) field site, C-1 "V" type, 6-34 (illus) dissemination of information, finished subsurface site, G-4 HMMWVs 4-29 fire camouflaged, 5-42 (illus) distillation towers, 4-35 plans, 4-46 procedures for loading into drawing technique support, 4-45 CH-47 for infiltration, common shapes, 4-59 support annex, B-42 (illus), 5-37 (illus) hatching, 4-60 F-4 (illus) wedge formation, 5-40 perspective, 4-59 fishhook and dog leg methods, (illus) vanishing points, 4-59 G-8 (illus) I whole to part, 4-58 (illus) fixed site, C-1, C-2 (illus) duress codes, 6-11 (illus) footprints, I-3 (illus) identification of gaps in forcible occupation of site, G-8 existing databases, 7-4 E (illus) (illus) electronic warfare, 6-16 Forms image-gathering equipment, elements, reconnaissance and DA Form 1594, 2-12 4-53 surveillance, 4-22 (illus) DA Form 2028, xiii imagery, 4-52, 4-53 (illus) employment, tactical, 6-7 DA Form 5752-R, 5-20 infiltration phase environmental characteristics, DD Form 1833 TEST (V2), and insertion method, 4-16 7-1 K-5 (illus), K-6 (illus) insertion method, 4-16 environmental formula for calculating length intelligence, 1-2 effects on operations, 7-4 of half wave dipole antenna annex, F-5 (illus) analysis, 7-4 applied to example, 6-27 estimate annex, B-39 (illus) environmental effects, 7-9 (illus) gaps, 7-4 threat evaluation fragmentary order, B-8 (illus) preparation of the environments, unusual, 6-35 frequency management, 6-1 battlefield, 7-1, 7-4 evaluation of threat, 7-9 intelligence, surveillance, and G evasion and recovery, 8-1 reconnaissance, 1-10 (illus), evasion and recovery, K-1 geographic environments, D-1 3-2 (illus) evasion plan of action, K-2 ground force personnel, 4-38 operations, 3-1 (illus) ground wave, 6-20 (illus) requirements, 7-20 evasion intent, B-11 (illus) H aids, 8-7 intermediate staging area areas, 8-9 half wave dipole antenna, 6-26 use in planning, C-4 (illus) evasion (illus) inverted "V" antenna, 6-27 classifications, 8-3 hasty subsurface sites, G-2 (illus) example link diagram, 7-11 hearing, J-4 ionosphere, 6-20 (illus), 6-21 (illus) (illus)
3-55.93
383
Index issues (illus) mission concept brief surveillance, 4-26 (MICON), B-19 team, 4-1 J slides, B-20 through B-33 types, 4-61 jungle operations, 6-35, D-1 (illus) urban, 6-35 mission, intent, and priority L intelligence requirements, operations (continued) landing point diameters, 5-26 B-11 (illus) vehicle, 5-31 (illus) missions, 1-3, 1-4 waterborne, 5-1 landing zones, 5-25 special, 4-66 OPORD, F-2 (illus) laser designators, 4-45 mountain operations, 6-35, orders leader reconnaissance, 4-25, 6-37, D-2 and briefs, B-1 G-7 movement, 8-4, J-9 fragmentary, B-8 liaison operation, B-4 N duties, employment, and warning, B-1 coordination, 2-13 named areas of interest, 2-13 organization light sources and distances, J-3 networks, 6-1 of LRSC, 1-5 (illus) (illus) night of tracking team, I-5 linkup, 4-29 vision, J-1 P and dissemination of walking, J-6 information, 4-29 panoramic sketch, 4-55 (illus) O annex, B-43 (illus) Pathfinder, 4-67 loading sequence, UH-60, 5-31 objective sketchpad, 4-56 pattern analysis plot sheet, (illus) (illus) 7-18 (illus) long-range surveillance occupation of hide site, G-7 personnel company (LRSC), 1-4 odor, J-5 (illus) recovery, 4-67 long-wire antenna, 6-28 (illus) off-center viewing technique, security, 3-11 LRS tasks by operation, 4-10 J-2 (illus) petroleum, oil, lubricants (illus) omni-directional antenna (POL), 4-38 LRSD and LRS teams, 1-7 pattern, 6-25 (illus) phase capabilities and limitations, operation order, B-4, B-5 exfiltration, 4-17 1-8 (illus) planning, 4-1 command and control, 2-1 operational environment, 7-1 pickup zones, 5-25 operations, 5-45, 6-7 plan of action for an evasion, M Airborne, 5-46 K-2 (illus) marking procedures, 5-26 bases, 6-1 planning area facilities and (illus) capabilities and limitations, sites, C-1, C-3 (illus) message 4-65 plans, 4-47, 8-2 and report formats, 6-9 cold weather, 6-35 polarization, 6-19 header, 6-11 (illus) desert, 6-35 polyvinyl chloride site, G-3 method of extraction, 4-17 foot movement, 5-47 (illus) METT-TC, 4-7 (illus) heavy team and platoon, power plant turbines and MIJI Report, 6-18 (illus) 4-29 generators, 4-39 military equipment, 4-36 helicopter, 5-9 primary missions, 1-4 mission helocasting, 5-7 primary, alternate, and analysis brief, B-10 ISR, 3-1 contingency radios, 6-3 classification, 3-11 jungle, 6-35 priority intelligence development process, 3-1, mobility platforms, 5-31 requirements, B-11 (illus) 3-4 (illus) mountain, 6-35 priority of actions for orders, 3-1, 3-3 other, 5-45 rehearsal, 4-14 (illus) planning factors, 4-44 reconnaissance, 4-21 priority of destruction, planning folder, 3-5 security, 3-11 communications devices, contents, 3-5 stability, 4-60 6-17 (illus) development, 3-5 stay behind, 5-46 priority of work, G-9 format, 3-9 protection, electronic, 6-16 roadblocks (illus)
3-55.93
384
Index Prusik knot, recovery line S surface sites, G-1 with, 5-19 (illus) surveillance satellite operations, 4-26 R dishes, 4-41 site, 4-27 (illus) tactical, 6-9 radio wave propagation, 6-19 suspension line weave site, scanning patterns, J-2 (illus) radios, 6-2 G-3 (illus) scout swimmers, 5-5 rail lines and rail yards, 4-39 secondary missions, 1-4 reassignment, A-4 security, 3-11 reconnaissance and T and reports, 4-27 surveillance selection, A-4 tactical elements, 4-22 (illus) and occupation of sites, 4-26 employment, 6-7 squadron, 2-6 of route, J-5 operations center, 2-10 reconnaissance operations, separation, 3-12 tactical satellite, 6-9 4-21 through 4-25, 4-47 ships, 4-41 target recovery, 4-18 short count, long count, 5-4 acquisition, 4-44 line with Prusik knot, 5-19 (illus) detection, J-8 (illus) signals, J-7 folder, 3-9 (illus) of personnel, 4-67 site task organization types, 8-2 field and fixed, C-1 outside named areas of recruitment, A-1 hide, 4-28 (illus) interest, 2-13 rehearsal selection, 4-26, 6-8, G-6 tasks area annex, F-6 (illus) sterilization, G-9 break contact from hide or priority of actions, 4-14 surface, G-1 surveillance site, H-8 (illus) slides, mission concept brief, (illus) relationship matrix, 7-13 (illus) B-20 through b-33 (illus) break contact front repair procedure, whip (illus) (diamond or file), H-2 antenna, 6-30 (illus) sloping antenna, "V" type, (illus) report formats, 6-11 (illus), 6-34 (illus) break contact front, left and 6-12 (illus) sloping wire antenna, 6-29 right (australian peel), reports, 6-9 (illus) H-3 (illus) resonance, 6-18 smell, J-4 break contact left, right restated mission, B-15 (illus) sounds, J-4 (illus) (diamond or file), H-4 rigging special missions, 4-66 (illus) fast rope special operations forces react to enemy air attack, other aircraft, 5-22 (illus) comparison of LRSU H-5 (illus) UH-60, 5-21 (illus), 5-22 operations to, 1-4 react to indirect fire or air (illus) organization, 1-4 attack, H-6 (illus) of snap links, 5-17 (illus) sustainment, 1-5 team operations, 4-1 of SPIES rope on UH-60, subordinate organizations teams, 6-2 5-17 (illus) and key personnel, 1-5 LRSD and LRS, 1-7 of wood block, 5-18 (illus) Special Patrol terminated sloping "V" SPIES, for CH-46 or Insertion/Extraction System antenna, 6-29 (illus) CH-47, (SPIES), 5-9 terrain, urban, 4-46 5-20 (illus) specified and implied tasks, threat roads, 4-40 B-12 (illus) capability, 7-15 route SPIES rope rigging on UH-60, courses of action, 7-16, 7-17 reconnaissance, 4-25 5-17 (illus) factors, 7-9 selection, J-5 steel towers, 4-42 time event chart, 7-15 (illus) rubber boat, 5-2 (illus) storage tanks for petroleum, topographic sketch, 4-55 ruggedized COTS laptop, 6-6 oil, lubricants, 4-38 (illus) runways and taxiways, 4-40 success, elements of, 6-2 tracker and dog team, I-5 successive sector method, 4-24 tracking concepts and (illus) procedures, I-1 transformers, 4-42
3-55.93
385
Index troop leading procedures UNDER (Cache) Report, 6-14 (illus) and METT-TC, 4-7 (illus) (illus) movement coordination tunnels, 4-43 unidirectional antenna pattern, annex, F-7 (illus) two-man surface site, with 6-23 (illus) W ghillie suits, G-1 (illus) units types of recovery, 8-2, 8-3 reconnaissance and warfare support, electronic, (illus) surveillance, 1-2 6-16 unusual environments, 6-35 warning order, B-1, B-3 (illus) urban waterborne operations, 5-1 U operations, 6-35, 6-37 wavelength, 6-18 (illus) terrain, 4-46 UH-60 XYZ loading sequence, 5-31 V zone reconnaissance, 4-23 (illus) vehicle SPIES rope rigging on, 5-17 load, 5-35 (illus) (illus) movement annex, B-44
3-55.93
387
FM 3-55.93 (FM 7-93) 23 June 2009 By Order of the Secretary of the Army: GEORGE W. CASEY, JR. General, United States Army Chief of Staff Official: JOYCE E. MORROW Administrative Assistant to the Secretary of the Army 0915309 DISTRIBUTION: Active Army, Army National Guard, and United States Army Reserve: To be distributed with initial distribution number (IDN) 110804, in accordance with DA Form 12-11E, requirements for
3-99
1
FM 3-99 Airborne and Air Assault Operations MARCH 2015 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
3-99
2
This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at
3-99
3
*FM 3-99 FieldManual Headquarters No. 3-99 DepartmentoftheArmy Washington,DC, 6 March2015 Airborne and Air Assault Operations Contents Page PREFACE .............................................................................................................. ix INTRODUCTION .................................................................................................... x Chapter 1 OVERVIEW .........................................................................................................1-1 Section I – Forcible Entry Operations ..............................................................1-1 JointPrinciplesforForcibleEntryOperations......................................................1-2 OperationalApplications of ForcibleEntryOperations........................................1-4 JointCommandandControl................................................................................1-6 JointOperation Planning.................................................................................. 1-13 JointEntryForce............................................................................................... 1-16 Section II – Vertical Envelopment ................................................................. 1-18 TacticalApplications......................................................................................... 1-18 CommandResponsibility.................................................................................. 1-21 SpaceOperation............................................................................................... 1-25 PART ONE AIRBORNE OPERATIONS Chapter 2 ORGANIZATION AND EMPLOYMENT ..............................................................2-1 Section I – Airborne Assault Force ..................................................................2-1 OrganizationofForces........................................................................................2-1 EchelonEmployment...........................................................................................2-2 Section II – Airborne Assault Force Considerations ......................................2-4 AssaultForceFormation......................................................................................2-4 JointandArmyControlTeams............................................................................2-4 Section III – Capabilities, Limitations, Vulnerabilities ....................................2-5 Capabilities..........................................................................................................2-5 Limitations............................................................................................................2-5 Vulnerabilities.......................................................................................................2-6 Section IV – Airborne Command and Control Platforms ...............................2-6 AirborneWarningAndControlSystem................................................................2-6 JointSurveilanceTargetAttack RadarSystem...................................................2-7 Distribution Restriction: Approved for publicrelease;distributionisunlimited. *This publication supersedes FM 90-26, dated 18 December 1990 and ATTP 3-18.12, dated 1 March 2011.
3-99
4
Contents Joint AirborneCommunicationsCenter/CommandPost.................................... 2-7 Chapter 3 AIRBORNE ASSAULT PLANNING ................................................................... 3-1 Section I – Roles and Responsibilities ............................................................ 3-1 HigherHeadquarters........................................................................................... 3-1 AirborneAssaultForce........................................................................................ 3-2 SupportingAviation............................................................................................. 3-2 Section II – Reverse Planning Sequence ........................................................ 3-2 GroundTactical Plan........................................................................................... 3-3 LandingPlan....................................................................................................... 3-3 Air MovementPlan.............................................................................................. 3-3 MarshallingPlan.................................................................................................. 3-4 Section III – Planning Considerations ............................................................. 3-4 PlanningMethodology......................................................................................... 3-4 PredeploymentPlanningandPreparation.......................................................... 3-6 X-hour/N-hourSequencesforDeployment......................................................... 3-6 OptimizeAvailablePlanningTime...................................................................... 3-6 ControlMeasures................................................................................................ 3-9 DetermineGo/No-GoCriteria........................................................................... 3-10 AirfieldOpening................................................................................................. 3-10 Section IV – Shaping Operations ................................................................... 3-11 CreateConditions............................................................................................. 3-11 PreserveConditions.......................................................................................... 3-12 Chapter 4 GROUND TACTICAL PLAN............................................................................... 4-1 Section I – Elements ......................................................................................... 4-1 TaskOrganization............................................................................................... 4-1 MissionStatement............................................................................................... 4-1 Commander’sIntent............................................................................................ 4-2 ConceptofOperations........................................................................................ 4-2 TaskstoSubordinates........................................................................................ 4-2 Section II – Plan Development ......................................................................... 4-3 MissionVariables of METT-TC........................................................................... 4-3 AssaultObjectiveandAirheadLine.................................................................... 4-5 Section III – Air-ground Operations ............................................................... 4-12 FundamentalConsiderations............................................................................ 4-12 CloseCombatAttack......................................................................................... 4-12 CloseAirSupport.............................................................................................. 4-14 UnmannedAircraftSystem............................................................................... 4-15 Section IV – Execution .................................................................................... 4-16 ConductoftheAirborneAssault....................................................................... 4-16 Developmentofthe Airhead.............................................................................. 4-17 Buildup ofCombatPower................................................................................. 4-17 Section V – Follow-on Operations ................................................................. 4-18 Section VI – Supporting Operations .............................................................. 4-18 RemoteMarshalling.......................................................................................... 4-19 IntermediateStagingBase................................................................................ 4-20
3-99
5
Contents Chapter 5 LANDING PLAN ................................................................................................. 5-1 Section I – Delivery Considerations ................................................................ 5-1 Organization........................................................................................................ 5-1 Requirements...................................................................................................... 5-1 Priorities.............................................................................................................. 5-2 Section II – Delivery Elements ......................................................................... 5-2 SequenceofDelivery.......................................................................................... 5-2 MethodofDelivery.............................................................................................. 5-3 PlaceofDelivery................................................................................................. 5-5 TimeofDelivery.................................................................................................. 5-9 Section III – Preparation and Supporting Fires .............................................. 5-9 FireSupportPlanning....................................................................................... 5-10 FireSupportConsiderations............................................................................. 5-11 Air Operations................................................................................................... 5-14 Section IV – Assembly and Reorganization .................................................. 5-17 Assembly........................................................................................................... 5-17 Reorganization.................................................................................................. 5-25 Chapter 6 AIR MOVEMENT PLAN ..................................................................................... 6-1 Section I – Joint Planning ................................................................................. 6-1 Section II – Elements of the Air Movement Plan ............................................ 6-1 Air MovementTable............................................................................................ 6-1 Types ofMovement............................................................................................. 6-2 AircraftRequirements......................................................................................... 6-2 Section III – Load Planning Considerations ................................................... 6-3 TacticalIntegrity.................................................................................................. 6-3 CrossLoading..................................................................................................... 6-3 Self-Sufficiency................................................................................................... 6-4 Section IV – Loading and Delivery of Forces ................................................. 6-5 LoadPlanning Sequence.................................................................................... 6-5 LoadPlanningofVehicles................................................................................... 6-5 Air MovementPlanningWorksheet..................................................................... 6-5 UnitAircraftUtilization Form................................................................................ 6-6 Section V – Aircraft Load and Air Movement Table ....................................... 6-6 Section VI – Manifests and Air-Loading Planning System ............................ 6-9 Manifests............................................................................................................. 6-9 Integrated ComputerizedDeploymentSystem................................................... 6-9 Chapter 7 MARSHALLING PLAN ....................................................................................... 7-1 Section I – Preparation ..................................................................................... 7-1 Section II – Movement ...................................................................................... 7-2 Section III – Protection ...................................................................................... 7-2 PassiveDefenseMeasures................................................................................ 7-2 Dispersal............................................................................................................. 7-3 Section IV – Departure Airfield-Marshalling Area ............................................ 7-3 SelectingDepartureAirfields............................................................................... 7-3 SelectingandOperating MarshallingAreas........................................................ 7-4
3-99
6
Contents FacilityRequirements.......................................................................................... 7-4 MarshalledUnitandSupportOrganizationActivities.......................................... 7-7 Section V – Outload .......................................................................................... 7-9 Outload PlanningConsiderations........................................................................ 7-9 OutloadControl................................................................................................. 7-10 PART TWO AIR ASSAULT OPERATIONS Chapter 8 ORGANIZATION AND EMPLOYMENT ............................................................. 8-1 Section I – Air Assault and Air Movements .................................................... 8-1 Section II – Air Assault Task Force ................................................................. 8-1 OrganizingForces............................................................................................... 8-2 BrigadeCombatTeams...................................................................................... 8-2 CombatAviationBrigades................................................................................... 8-2 Section III – Task Force Considerations ......................................................... 8-4 Section IV – Capabilities, Limitations, Vulnerabilities ................................... 8-5 Capabilities.......................................................................................................... 8-5 Limitations........................................................................................................... 8-5 Vulnerabilities...................................................................................................... 8-6 Section V – Airspace Control ........................................................................... 8-6 Concurrent Employment..................................................................................... 8-6 AirspaceCoordinating Measures........................................................................ 8-7 AirspaceDevelopment........................................................................................ 8-8 Section VI – Air Assault Task Force Mission Command ............................. 8-10 MissionOrders.................................................................................................. 8-10 CommandPosts................................................................................................ 8-12 PersonnelandKeyElementswithintheTask Force........................................ 8-13 MissionCommandSystem................................................................................ 8-15 Chapter 9 AIR ASSAULT PLANNING ................................................................................ 9-1 Section I – Roles and Responsibilities ............................................................ 9-1 HigherHeadquarters........................................................................................... 9-1 BrigadeCombatTeam........................................................................................ 9-1 SupportingAviation Units.................................................................................... 9-1 Section II – Reverse Planning Sequence ........................................................ 9-1 Section III – Planning Methodology ................................................................. 9-2 Deliberate Planning............................................................................................. 9-3 Time-Constrained Planning................................................................................ 9-4 RapidDecisionmakingandSynchronizationProcess......................................... 9-5 AllowableCargoLoad PlanningConsiderations................................................. 9-6 Section IV – Planning Process ......................................................................... 9-6 WarningOrder..................................................................................................... 9-6 InitialPlanningConference................................................................................. 9-7 Air MissionCoordinationMeeting....................................................................... 9-7 Air MissionBrief.................................................................................................. 9-8 Air MissionBriefDocuments............................................................................... 9-8 AirAssault Task ForceRehearsal....................................................................... 9-9 AircrewBrief........................................................................................................ 9-9
3-99
7
Contents AviationTask ForceRehearsal........................................................................... 9-9 ConditionChecks................................................................................................ 9-9 AbortCriteria..................................................................................................... 9-10 Section V – Control Measures ........................................................................ 9-11 Force-OrientedControl Measures..................................................................... 9-11 Boundaries........................................................................................................ 9-12 FireSupportCoordinationMeasures................................................................ 9-12 AirspaceCoordinating Measures...................................................................... 9-12 Section VI – Shaping Operations ................................................................... 9-13 Section VII – Medical and Casualty Evacuation ........................................... 9-14 MedicalEvacuationPlanning............................................................................ 9-14 CasualtyBackhaul............................................................................................ 9-15 MedicalEvacuationLandingZone.................................................................... 9-15 Chapter 10 GROUND TACTICAL PLAN............................................................................. 10-1 Section I – Elements ....................................................................................... 10-1 TaskOrganization.............................................................................................10-1 MissionStatement.............................................................................................10-1 Commander’sIntent..........................................................................................10-1 ConceptofOperations......................................................................................10-2 TaskstoSubordinateUnits...............................................................................10-4 Section II – Plan Development ....................................................................... 10-4 MissionAnalysis................................................................................................10-4 AssaultObjectiveandLandingZone Development..........................................10-8 Section III – Air-ground Operations ............................................................... 10-8 EffectiveIntegration...........................................................................................10-8 CloseCombatAttacks.......................................................................................10-9 CloseAirSupport............................................................................................10-11 UnmannedAircraftSystems...........................................................................10-11 Section IV – Execution .................................................................................. 10-12 ConductoftheAirAssault...............................................................................10-12 Buildup ofCombatPower...............................................................................10-12 Chapter 11 LANDING PLAN ............................................................................................... 11-1 Section I – Landing Zone Selection ............................................................... 11-1 CriteriaforSelectingLandingZones................................................................. 11-1 LocationofLandingZones................................................................................11-2 NumberofLanding Zones.................................................................................11-2 Section II – Landing Zone Updates................................................................ 11-3 LandingZoneCondition....................................................................................11-3 Fixed-wingSupport...........................................................................................11-3 UnmannedAircraftSystemSupport..................................................................11-3 Section III – Hot Landing Zone Considerations ............................................ 11-3 Scenarios..........................................................................................................11-3 ReactiontoEnemyContactAwayFromtheObjective.....................................11-4 ReactiontoEnemyContactontheObjective...................................................11-4 Section IV – Preparation and Supporting Fires ............................................ 11-4
3-99
8
Contents Section V – Landing Site Operations ............................................................ 11-5 LandingZoneandObstacleMarkings..............................................................11-5 Exitingthe Aircraft.............................................................................................11-6 Exitingthe LandingZone................................................................................11-11 Chapter 12 AIR MOVEMENT PLAN ................................................................................... 12-1 Section I – Development Considerations ...................................................... 12-1 Air Routes..........................................................................................................12-1 EnRouteFormations........................................................................................12-3 TerrainFlightModes.........................................................................................12-5 Fires..................................................................................................................12-6 SuppressionofEnemyAirDefenses................................................................12-6 AirAssaultSecurity...........................................................................................12-8 MissionCommand............................................................................................12-8 Section II – Air Movement Table .................................................................... 12-9 Air MovementTableDevelopment....................................................................12-9 Air MovementTableCriteria.............................................................................12-9 Chapter 13 LOADING AND STAGING ............................................................................... 13-1 Section I – Loading Plan ................................................................................. 13-1 PickupZoneSelection......................................................................................13-1 PickupZone Organization andControl.............................................................13-2 CoordinationWithSupportingAviationUnit......................................................13-3 PreparationofAirLoading Tables....................................................................13-3 DispositionofLoadsonPickupZone................................................................13-4 Lifts,Serials,andChalks...................................................................................13-5 BumpPlan.........................................................................................................13-6 Section II – Staging Plan ................................................................................. 13-7 PreparationforLoading.....................................................................................13-7 MovementtoPickupZone................................................................................13-7 Chalk Check-InandInspection.........................................................................13-7 LoadStaging.....................................................................................................13-8 Sling LoadOperations.......................................................................................13-8 GLOSSARY ........................................................................................................................ Glossary-1 REFERENCES ...........................................................................................................(cid:17)(cid:17) References-1 INDEX ...........................................................................................................................(cid:17) Index-1 Figures Figure 1-1.Jointphasingmodel..............................................................................................1-5 Figure 3-1. MDMPandairborneassaultplanningprocess.....................................................3-5 Figure 4-1.Assaultobjectives................................................................................................ 4-6 Figure 4-2.Airheadline.......................................................................................................... 4-7 Figure 4-3.Boundaries......................................................................................................... 4-10
3-99
9
Contents Figure 4-4.Baseoptions....................................................................................................... 4-19 Figure 5-1.Offsetandparalleldropzones.............................................................................. 5-7 Figure 5-2.Parallelon-linedropzones................................................................................... 5-8 Figure 5-3.AssemblycontrolpostsforABNIBCTforceslandingononedropzone............ 5-18 Figure 5-4.Movementofpersonneltocompanyassemblyarea.......................................... 5-19 Figure 5-5.Line-of-flight/clocksystem.................................................................................. 5-20 Figure 5-6.Stineraid............................................................................................................. 5-21 Figure 6-1.Cross-loadedaircraft............................................................................................ 6-7 Figure 7-1.Airbornetaskforcemarshallingarea.................................................................... 7-5 Figure 7-2.Heavy-droploadingareacontrolcenter................................................................ 7-6 Figure 7-3.Heavy-dropriggingsite......................................................................................... 7-7 Figure 7-4.Conceptofoutloadcontrol.................................................................................. 7-11 Figure 8-1.Gridlinemethod................................................................................................... 8-9 Figure 8-2.Attackbyfiremethod.......................................................................................... 8-10 Figure 8-3.Exampleofairassaultleadershippositioning..................................................... 8-12 Figure 9-1.Airassaultplanningstages................................................................................... 9-2 Figure 9-2.MDMPandairassaultplanningprocess.............................................................. 9-4 Figure 9-3.Time-constrainedairassaultplanning.................................................................. 9-5 Figure10-1.Organizationalframework.................................................................................10-3 Figure10-2.Weatherdata....................................................................................................10-7 Figure11-1.One-sideoff-load(UH-60)................................................................................11-7 Figure11-2a.One-sideoff-load(squadsinsamechalk)traillandingformation...................11-8 Figure11-2b.One-sideoff-load(squadsinsamechalk)staggeredtrailrightlanding formation.................................................................................................................11-8 Figure11-3.Two-sideoff-load(UH-60)................................................................................11-9 Figure11-4.Two-sideoff-load(squadsinsamechalk)diamondlandingformation...........11-10 Figure11-5.Two-sideoff-load(chalkscross-loaded)heavyrightlandingformation..........11-10 Figure11-6. Rearrampoff-loadandlandingzoneexit(CH-47).........................................11-11 Figure11-7.One-sidelandingzonerush(squadsinsamechalk)traillanding formation..............................................................................................................11-12 Figure11-8.Two-sidelandingzonerush(chalkscrossloaded)traillandingformation......11-13 Figure11-9.Two-sidelandingzonerush(squadsinsamechalk)traillanding formation..............................................................................................................11-14 Figure12-1.Airrouteoverlay................................................................................................12-3 Figure12-2.Standardflightandlandingformations.............................................................12-5 Figure13-1.Examplepickupzonediagram..........................................................................13-4 Figure13-2.Lifts,serials,andchalks.................................................................................... 13-6 Tables Table 1-1.Commandresponsibilityofairborneoperations................................................... 1-22 Table 1-2.Commandresponsibilityofairassaultoperations................................................ 1-24
3-99
10
Contents Table 7-1.Parachute issue.....................................................................................................7-2 Table 8-1.HeavyCombat AviationBrigadeorganization.......................................................8-3 Table 8-2.Medium CombatAviationBrigadeorganization.....................................................8-4 Table 8-3. Standardairassault radionetworksandmonitoringrequirements..................... 8-18 Table 9-1.Exampleofanairmissioncoordinationmeetingagenda......................................9-8 Table12-1. Exampleair movementtable..........................................................................12-10 Table13-1. Exampleair loadingtable..................................................................................13-3 Table13-2. Aircraftbumpinformation..................................................................................13-6
3-99
11
Preface Army Field Manual (FM) 3-99, Airborne and Air Assault Operations, establishes doctrine to govern the activitiesandperformanceofArmyforcesinforcibleentry(specificallyairborneand airassaultoperations)and provides the doctrinal basis for vertical envelopment and follow-on operations. This publication provides leaders with descriptive guidance on how Army forces conduct vertical envelopment within the simultaneous combinationofoffense,defense,andstability.These doctrinalprinciplesareintended tobeusedas a guideand arenottobeconsideredprescriptive. FM 3-99encompassestacticsforArmyairborneandairassaultoperations anddescribeshowcommandersplan, prepare, and conduct airborne and air assault operations by means of joint combined arms operations. This publicationsupersedesFM90-26,AirborneOperationsandArmyTactics,Techniques,andProcedures 3-18.12, AirAssaultOperations. To comprehend the doctrine contained in this publication, readers must first understand the principles of war, the natureof unified land operations, and the linksbetween the operationaland tacticallevelsof war described in JointPublication(JP) 3-0,ArmyDoctrine Publication(ADP) 3-0,and ArmyDoctrine ReferencePublication (ADRP) 3-0. The reader must understand the fundamentals ofthe operationsprocess found in ADP and ADRP 5-0 associated with the conduct of offensive and defensive tasks contained in FM 3-90-1 and reconnaissance, security, and tactical enabling tasks contained in FM 3-90-2. In addition the reader must also fully understand the principles of mission command as described in ADP 6-0 and ADRP 6-0 and command and staff organizationandoperationsfoundinFM 6-0. The principal audience for FM 3-99 is the commanders, staff, officers, and noncommissioned officers (NCOs) of the brigade, battalions, and companies within the brigade combat team. The audience also includes the United StatesArmyTraining andDoctrine Commandinstitutionsand components, and the United States Army SpecialOperationsCommand.Itservesasanauthoritativereferenceforpersonneldevelopingdoctrine,materiel and force structure, institutionaland unittraining, and standard operatingprocedures(SOPs) for airborne or air assaultoperations. Commanders, staffs, and subordinatesensure their decisions and actionscomply withapplicable United States, international, and, in some cases, host-nation laws and regulations. Commanders at all levels ensure their Soldiersoperateinaccordancewiththelawofwarandtherulesofengagement.(RefertoFM27-10.) FM 3-99 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the glossary and text. Terms for which FM 3-99 is the proponent publication (the authority) are marked with an asterisk(*)inthe glossary.Termsanddefinitionsfor whichFM 3-99is the proponent publicationare boldfaced in the text and the term is italicized. For other definitions shown in the text, the term is italicized and the numberoftheproponentpublicationfollowsthedefinition. This publication applies to the Active Army, the Army National Guard/Army National Guard of the United States,andtheUnitedStatesArmyReserveunlessotherwisestated. The proponent for FM 3-99 is the U.S. Army Training and Doctrine Command (TRADOC). The preparing agency is the United States Army Maneuver Center of Excellence (MCoE). Send comments and recommendations by— mail or e-mail—using or following the format of DA Form 2028, (Recommended ChangestoPublicationsandBlankForms). Pointofcontactinformationisasfollows: E-mail: [email protected] Phone: COM706-545-7114orDSN835-7114 Mail: Commanding General, Maneuver Center of Excellence, Directorate of Training and Doctrine, Doctrine andCollectiveTrainingDivision,ATTN:ATZK-TDD,FortBenning,GA31905-5410 Unlessotherwisestated,wheneverthemasculinegenderisused,bothmenandwomenareimplied.
3-99
13
Introduction Assured access is the desired conditions that the United States seeks to maintain in potential areas of strategic importance throughout the world. Assured access is the result of a combination of geopolitical factors that affect the United States’ability to exert influence and project power in a variety of political, economic, humanitarian, and military situations. While assured access includes the freedom of movement through the global commons of international airspace and oceanic sea lanes, operational access is the ability to project military force into an operational area with sufficient freedom of action to accomplishthemission. Operational access is the joint force contribution to assured access, the unhindered national use of the global commons and select sovereign territory, waters, airspace and cyberspace. Operational access challenges can be categorized in a number of ways. They can be classified in terms of geographical, military, or diplomatic access issues. They can be described in terms of anti-access challenges, capabilities designed to prevent entry into an operational area, or area-denial capabilities designedtolimitfreedom of actionwithintheoperationalarea. Army forces, as part of the joint force, contribute to projecting military force into an operational area and sustaining it in the face of armed opposition by defeatingenemy anti-access and area denial capabilities. Projecting and sustaining forces require the capability to secure multiple entry points into an operational area. As a major application of forcible entry, the joint force uses vertical envelopment (airborne and air assault operations), giving leaders flexibility and depth to set conditions for decisive action. Vertical envelopment capitalizes on mobility to surprise the enemy, seize a lodgment,and gaintheinitiative. The joint force establishes several precepts for gaining operational access. Foremost among them is “Conduct operations to gain access based on the requirements of the broader mission, while also designing subsequent operations to lessen access challenges.” Consistent with this precept, entry operations into enemy territory are a means to military or political objectives, rather than an end in themselves. Entry operations are planned within the larger context of the campaign’s overarching purpose. Without considering the impacts of entry operations on the larger objectives of a military campaign it is possible that entry may be gained through means that decreasethelikelihoodofachievingpoliticalandmilitaryobjectives. Operations during the last 25 years make clear that future entry of forces onto hostile or uncertain territory will be necessary for a number of purposes, one of which is the establishment of a lodgment. Joint doctrine defines forcible entry as the “seizing and holding of a lodgment in the face of armed opposition,” and a lodgment as “a designated area in a hostile or potentially hostile operational area that, when seized and held, makes the continuous landing of troops and materiel possible and provides maneuver space for subsequent operations.” Each service and functional component hasanimportantroleinhowjointforcibleentryoperationsovercomeopposedaccess. This manual provides doctrinal guidance for forcible entry operations at the operational and tactical levels. It describes relationships within the operational joint
3-99
14
Introduction task force; vertical envelopment, organizational roles, functions, capabilities, and limitations; and responsibilities for the brigade combat team and its subordinate units within the assault force during airborne and air assault operations. A summary of key constructs to FM 3-99 follows: (cid:120) Operational access—forcible entry and vertical envelopment—within the operational environment. (cid:120) Task force organization, mission, capabilities, and limitations as well as the duties and responsibilitiesfortheconductofairborneandairassaultoperations. (cid:120) Task force command and staff operations; cross-functional staff organizations (cells, working groups,andcenters)toassistincoordination. (cid:120) Meetings, working groups, and boards to integrate the staff, enhance planning, and decisionmakingwithinthetaskforce. (cid:120) Airborneand airassaulttask forceunique capabilitiesandplanningconsiderationsintransitioning toothertacticaloperations.
3-99
15
Chapter 1 Overview Adaptive adversaries and enemies will contest United States joint forces across all domains— air, sea, land, space and cyberspace. Enemies are likely to employ anti- access strategies to prevent friendly force ability to project and sustain combat power into a region, and area denial strategies to constrain our nation’s freedom of action within the region. Assured access— the unhindered national use of the global commons and selected sovereign territory, waters, airspace and cyberspace, is achieved by projecting all the elements of national power. Often the United States requires operational access— the ability to project military force into an operational area with sufficient freedom of action to accomplish the mission. Operational access is the desired condition that the United States seeks to maintain in areas of strategic importance, to achieve assured access. Army forces, as part of joint forces project forces into an operational area and conduct operations to defeat enemy anti-access and area denial capabilities and establish security conditions and control of territory to pressure freedom of movement and action for follow-on operations or deny that area’s use to the enemy. Forcible entry operations are complex and always involve taking prudent risk to gain a position of relative advantage over the enemy. Equally critical is the transition between phases of the operation. This chapter discusses forcible entryoperations and in particular the application of vertical envelopmentas a tactical maneuver conducted by airborne or air assault forces to seize, retain, and exploit the initiative. SECTION I – FORCIBLE ENTRY OPERATIONS 1-1. United States forces gain access to sovereign spaces through invitation (humanitarian relief), negotiations (basing rights), coercion (peacemaking operations under United Nation charter) or through force. The joint force’s ability to project power and influence is challenged by proliferated anti-access weaponswithincreasingrange, diversity,densityand sophisticationinthe handsofbothstateand nonstate actors who are devising innovative approaches to contest joint forces in all domains. This evolving threat necessitates the development of comprehensive joint force solutions for gaining and maintaining operationalaccess.(RefertoJP 3-18formoreinformation.) 1-2. The composite of the conditions, circumstances, and influences that make up an operational environment affects the employment of capabilities and impacts the decisions of commanders. The operational environment of the access force includes all enemy, adversarial, friendly, and neutral systems across the range of militaryoperations; it includes an understanding of the physical environment, the state of governance, technology, local resources, and the culture of the local population. (Refer to JP 2-01.3 for moreinformation.) 1-3. Forcible entry is the seizing and holding of a military lodgment in the face of armed opposition (JP 3-18). A lodgmentis a designated area in a hostile or potentiallyhostile operationalarea that, whenseized and held, makes the continuous landing of troops and materiel possible and provides maneuver space for subsequent operations (JP 3-18). A forcible entryoperation is conducted to gain entry into the territoryof an enemy by seizing a lodgment as rapidly as possible to enable the conduct of follow-on operations or conduct a singular operation. The operations must be designed to provide maneuver space for subsequent operations. This section addresses the principles and operational application of joint forcible entry
3-99
16
Chapter 1 operations. It discusses joint command and control, planning process and considerations, and the entry force. JOINT PRINCIPLES FOR FORCIBLE ENTRY OPERATIONS 1-4. Fundamental principles are essential to plan, prepare, execute, and access joint forcible entry operations.Jointprinciplesforforcibleentryoperationsare: ACHIEVESURPRISE 1-5. Commanders and planners strive to achieve surprise regarding exact objectives, times, methods, and forces employed in forcible entry operations. Surprise depends upon comprehensive information-related capabilities[operationssecurity(OPSEC) and militarydeception]followedbydisciplined executionbythe joint force. (Refer to JP 3-13.3 and JP 3-13.4 for more information.) Surprise is not a necessarycondition for operational success (particularly when the force has overwhelming superiority), but it can reduce operationalrisksignificantly. CONTROLOFTHEAIR 1-6. Counterair integratesoffensive and defensive operationsto attainand maintain a desired degree ofair superiorityand protectionintheoperationalareatoprotecttheforceduring periodsofcritical vulnerability and to preserve lines of communications. At a minimum, the joint force must neutralize the enemy’s offensiveair and missile capabilityand air defensesto achievelocalair superiorityand protectionover the planned lodgment. The joint force controls the air through integrated and synchronized air and missile defense operations. Air interdiction of enemy forces throughout the operational area enhances the simultaneityanddepthoftheforcibleentryoperation. CONTROLOFSPACE 1-7. Space superiority allows the joint force commander access to communications, weather, navigation, timing, remote sensing, and intelligence assets without prohibitive interference by the opposing force. Clearly defined command relationships are crucial for ensuring timely and effective execution of space operations and provide depth, persistence, and reach capabilities for commanders at the strategic, operational,andtacticallevels. ELECTROMAGNETICSPECTRUMMANAGEMENT 1-8. Electromagnetic spectrum management is the planning, coordinating, and managing use of the electromagnetic spectrum through operational, engineering, and administrative procedures (JP 6-01). It includes the interrelated functions of frequency management, host-nation coordination, and joint spectrum interference resolution that together enable the planning, management, and execution of operations within the electromagnetic operational environment during all phasesof military operations. Theelectromagnetic operational environment is the background electromagnetic environment and the friendly, neutral, and adversarial electromagnetic order of battle within the electromagnetic area of influence associated with a givenoperationalarea(JP 6-01).(RefertoJP 6-01formoreinformation.) OPERATIONSINTHEINFORMATIONENVIRONMENT 1-9. Information superiority is the operational advantage derived from the ability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same (JP 3-13). It enables the primary mission objective and information-related activities within informationoperations.Informationoperationsistheintegratedemployment, duringmilitaryoperations,of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decisionmaking of adversaries and potential adversaries while protecting our own (JP 3-13). (RefertoJP 3-13formoreinformation.) 1-10. Information in an operational environment is an important contributor to operational access as it enables commanders at all levels to make informed decisions on how best to apply combat power,
3-99
17
Overview ultimately creating opportunities to achieve decisive results. Operations in the information environment— the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information(JP 3-13)requires— (cid:122) Complementarytasks ofinformationoperationsthatinformandinfluence a globalaudienceand affectmoralewithintheoperationalenvironment. (cid:122) Cyber electromagnetic activities (See FM 3-38.) to ensure information availability, protection, and delivery, as well as a means to deny, degrade, or disrupt the enemy’s use of its command andcontrolsystemsandothercybercapabilities. (cid:122) Knowledge management capabilities to allow the commanders to make informed; timely decisionsdespitetheuncertaintyofoperations. (cid:122) Information management to help commanders make and disseminate effective decisions faster thantheenemycan. (cid:122) Informationsystemstounderstand,visualize,describe,anddirectoperations. SEACONTROL 1-11. Local maritime superiority is required to project power ashore in support of the joint forcible entry operation and to protect sea lines of communications (SLOCs). Protection of SLOCs ensures the availability of logistic support required to sustain operations and support the transition to continuing operationsbyfollow-onforces. ISOLATETHELODGMENT 1-12. A lodgment is a designated area in a hostile or potentially hostile operationalarea that, when seized and held, makes the continuous landing of troops and materiel possible and provides maneuver space for subsequentoperations. The joint force attacksor neutralizes enemy capabilities with the potential to affect theestablishmentofthelodgment.Thesecapabilitiesinclude— (cid:122) Enemyground,sea,andairforcesthatcanbecommittedtoreacttojointforceassaults. (cid:122) Indirectfiresystemsandtheatermissilesystemsthatcanrangethelodgment. (cid:122) Relatedenemysensors,commandandcontrolsystems,anddigitalnetworks. GAINANDMAINTAINACCESS 1-13. Gaining and maintainingaccess is a critical precondition for successful forcible entryand follow-on operations. In any given operational area, numerous and diverse limitations to access present themselves. Access may be restricted due to diplomatic, economic, military, or cultural factors. Ports, airfields, and infrastructuresmaybephysicallylimited.Additionalaccesspreconditionconsiderationsinclude— (cid:122) Leveraging established basing, access, and security cooperation agreements as well as the regional and national expertise and partner capabilities developed through precrisis engagement activitiesatthenationalandregionallevels. (cid:122) Appropriate shaping operations or activities focused on identifying and neutralizing an adversary’santi-accesscapabilitiesbalancedagainsttheneedforsurprise. (cid:122) Operational access to expand the degree to which the full range of joint capabilities within the jointoperationsareaisutilized. NEUTRALIZEENEMYFORCESWITHINTHELODGMENT 1-14. The joint force must neutralize enemy forces within the lodgment to facilitate the establishment of airheads(Refer tochapter3 ofthispublicationformore information.)and beachheads(Refer toJP 3-02for more information.) within the operational area and to provide for the immediate protection of the force. Planningconsiderationsshouldinclude— (cid:122) Identificationofenemyinfrastructure,which maybeofvalueforfutureusebyfriendlyforces. (cid:122) Limitingphysicaldamagetolessenthetimeneededtorebuild.
3-99
18
Chapter 1 EXPANDTHELODGMENT 1-15. Thejointforcequicklybuildscombatpowerinordertoenhancesecurityandtheabilitytorespondto enemy counter attacks, enable continuous landing of troops and materiel, and facilitate transition to subsequent operations. Analyze requirements to expand with regards to maximum on ground capabilities, throughput,andinfrastructure. MANAGETHEIMPACTOFENVIRONMENTALFACTORS 1-16. Managing the impact of environmental factors refers to overcoming the effect of land and sea obstacles; anticipating, preventing, detecting, and mitigating threat use of chemical, biological, radiological, and nuclear (CBRN), and weapons of mass destruction; and, determining the impact of climate, weather, and other naturally occurring hazards. (Refer to JP 3-11, JP 3-40, and JP 3-59 for more information.) INTEGRATESUPPORTINGOPERATIONS 1-17. Reconnaissance, surveillance, security, and intelligence operations are critical to information collection based on the commander’s critical information requirement. Information operations, civil- military operations, and special operations (to include special reconnaissance missions) are keys to setting conditions, and integrated into the operation at every stage from initial planning to transition. Logistic services comprise the support capabilities that collectively enable the joint force to rapidly provide sustainmentofentryforcesinordertoachievetheenvisionedendstateofthejointforcecommander(JFC). OPERATIONAL APPLICATIONS OF FORCIBLE ENTRY OPERATIONS 1-18. The Army combines campaign qualities and expeditionary capabilities to contribute decisive, sustained land power to unified actions. Campaign quality extends expeditionary capability well beyond deploying combined arms forces that are effective upon arrival. It is an ability to conduct sustained operationsforas longasnecessary,adaptingto unpredictableand oftenprofoundchangesinanoperational environment (OE) as the campaign unfolds. Expeditionary capability is the ability to promptly deploy combinedarmsforcesworldwideintooperationalenvironments(OEs)andconductoperationsuponarrival. Future conflicts, involving forcible entry operations, place a premium on promptly deploying land power andconstantlyadaptingtoeachcampaign’suniquecircumstancesastheyoccurandchange. CAMPAIGNQUALITY 1-19. The joint force commander (JFC) conducts campaigns to translate operational-level actions into strategic results and exploits the advantage of interdependent service capabilities. Through operational art and the principles of joint operations, the JFC determines the most effective and efficient methods for applyingdecisiveoperationsinvariouslocationsacrossmultipleechelons. EXPEDITIONARYCAPABILITY 1-20. Expeditionary operations require the ability to deploy quickly with little notice, shape conditions in the operational area, operate immediately on arrival exploiting success and consolidating tactical and operationalgains.Expeditionarycapabilities of anentryforce are more thanphysicalattributes;theybegin with a mindsetthatpermeates the force.The Army provides entry forcesto the jointforcecommander that areorganizedandequippedtorapidlydeployaswellasconduct sustainedoperations. PHASINGANDTRANSITIONS 1-21. A phaseis a planningandexecutiontoolusedtodivideanoperationindurationoractivity (ADRP 3- 0). Phasing is critical to arranging complex operations. It describes how the commander envisions the overall operation unfolding in time. Within a phase, a large portion of the force executes similar or mutuallysupportingactivities.Achieving aspecifiedcondition orsetofconditionstypically markstheend
3-99
19
Overview of a phase.Descriptionsofeffortsduringeachphaseshould emphasizeeffort,concentrate combatpowerin timeandspaceat a decisivepoint,andaccomplishitsobjectivesdeliberatelyandlogically. 1-22. Phasing is critical to arranging all tasks of an operation that cannot be conducted simultaneously. Commanders, with the assistance of the staff, visualize the mission, decide which tactics to use, and balance the tasks of unified land operations while preparing their intent and concept of operations (CONOPS). They determine which tasks the force can accomplish simultaneously, if phasing is required, whatadditionalresources are necessary, and howto transitionfromone taskto another. Atthe operational level,thisrequireslookingbeyondthecurrentoperationandprioritizingforcesforthenextphaseorsequel. 1-23. Transitions mark a change of focusbetweenphasesor betweenthe ongoingoperationand execution of a branchor sequel. Transitions require planningand preparation wellbefore their execution to maintain the momentum and tempo of operations. The force is vulnerable during transitions, and commanders establish clear conditions for their execution. Transition occurs for several reasons. It may occur from an operationdominated by combined arms maneuver to one dominated by wide area security. Anunexpected changeinconditionsmayrequirecommanders to direct anabrupttransitionbetweenphases.Insuchcases, the overall composition of the force remains unchanged despite sudden changes in mission, task organization, and rules of engagement. Typically, task organization evolves to meet changing conditions; however, transition planning also must account for changes in mission. Commanders continuously assess the situation andtask-organize andcycletheir forcesto retainthe initiative. Theystrive toachievechanges inemphasiswithoutincurringanoperationalpause. 1-24. TheJFC’svisionofhow a campaignoroperationshouldunfold andanticipatedenemyactiondrives decisions regarding phasing. Generally, joint operations and campaigns involve six phases (shape, deter, seizeinitiative,dominate, stabilize,and enablecivilauthority)asillustrated infigure 1-1.Phasingassistsin framing commander’s intent and assigning tasks to subordinate commanders. Byarranging operations and activities into phases, the joint force commander can better integrate and synchronize subordinate operations in time, space, and purpose. Each phase represents a natural subdivision of the campaign or operation. Within the context of the phases established by a JFC, subordinate JFCs and component commanders may establish additional phases that fit their CONOPS. A creditable threat of forcible entry operations can be an effective deterrence and may be applicable in both Phase 0 (Shape) and Phase I (Deter). Figure 1-1. Joint phasing model 1-25. A forcible entry operation normally is conducted during Phase II (Seize the Initiative) or Phase III (Dominate) of a joint operation. A forcible entry operation may be the JFC’s opening move to seize the initiative. For example, a JFC might direct friendly forces to conduct a vertical envelopment (airborne or air assault operation) to seize and hold a lodgment to ensure the continuous landingof troops and materiel and provide the maneuver space to conduct follow-on operations. The establishment of the lodgment, followed bythearrivaland preparationoffollow-onforces, usuallymarksthe endofthe forcibleentrysub- phaseoftheoperationand a transitiontofurtheroffensiveoperationstoseizetheinitiativeordominate.
3-99
20
Chapter 1 1-26. Forcible entry operations during the dominate phase of a campaign may be used for the following purposes: (cid:122) A suddenattackinforcetoachievedecisiveresults (acoupdemain). (cid:122) Conductingoperationalmovementandmaneuvertoattainpositionaladvantage. (cid:122) A militarydeception. 1-27. The defeat of enemy forces usually marks the end of the dominate phase of the operation and a transitionto area securityand further operationsto stabilize and enable civilauthority. The mere existence of a forcibleentry capabilitymaybe usedbythe JFCas a militarydeception operation, as a showofforce ortoforceenemymovementevenwithoutmounting a forcibleentryoperation. JOINT COMMAND AND CONTROL 1-28. Joint and partner interoperability (to include communications, planning and operations processes, staff functionality, language skills, and cultural knowledge) is critical to achieve unity of effort. Joint command and control information systems must enable interoperability and help synthesize information intoknowledge whileoperatinginaustereenvironments,onthemove,andacrosswideareas. 1-29. Joint command and control capabilities must maintain communications when networks are compromised or degraded due to friendly or enemy actions as well as materiel breakdown, natural atmospheric effects, or geospatial interference. The following paragraphs provide guidance on the employment options, organization of the operational area, command relationships, and command and controlfunctionsthatsupporttheconductofforcibleentryoperations. FORCEEMPLOYMENT 1-30. The combinationof forcible entrycapabilitiesemployed depends onthe mission.Unityofcommand is vital when multiple forcible entry capabilities are used or combined. Forcible entry operations are complex and must be kept simple in concept and well understood by all elements of the joint force and supportingcommands. 1-31. If the JFC decides to use a combination of forcible entry capabilities, he must decide whether to conduct the forcible entries as concurrent or integrated operations. The distinction between concurrent and integrated operations has implications for organizing forces, establishing command relationships, and applyingforcetoaccomplishthemission.Hemustconsidertheuniqueaspectsofthe specificoperation and should organize the force, establish command relationships, and apply force in a manner that fits the currentsituation. 1-32. Concurrent operations occur when a combination of amphibious, airborne, or air assault forcible entryoperationsareconductedsimultaneouslybutasdistinctoperationswithseparateoperationalareasand objectives. Integrated forcible entry operations result when amphibious, airborne, or air assault forcible entries are conducted simultaneously within the same operational area and with mutually supporting objectives. Integrated forcible entry operations feature the complementary employment of forces and seek tomaximizethecapabilitiesoftherespectiveforcesavailabletothecommander. 1-33. Dispersed joint forces use strategic and operational maneuver via air and sea to deploy or employ fromtheglobalsystemofmainoperatingbases,forwardoperatingsites,cooperativesecuritylocations,and amphibious and other sea-based platforms to project military force into an operational area with sufficient freedomof action to accomplish the mission. The complementarycapability to employ from the air, with airborne and air assault forces, and the sea, with amphibious and air assault forces, complicates the adversary’s defense. Byrequiring the adversaryto defend a vast area againstour mobilityand deep power projection, joint forces can render some of his force irrelevant while exploiting the seams created in his defensivedisposition. 1-34. Advanced force operations include strike operations, clandestine insertion of special operations forces and organic or supporting reconnaissance and/or surveillance teams, deception, counter-mine or counter-obstacle operations, and information operations. These activities combine with efforts to gain localized air and maritime superiority in the approaches to and entry areas. Joint strike operations along with theater air and missile defense, computer network operations, and electronic attack help provide
3-99
21
Overview protectionand select areasof domainadvantage allowing for the conductof entryoperations. (Refer to JP 3-05andADRP 3-05formoreinformation.) 1-35. To counter the enemy’s defensive capabilities, joint forces attack from multiple directions and dimensions and disperse or concentrate forces depending on the intelligence preparationof the operational environment. (See JP 2-01.3.) Ideally, they avoid enemy defenses and seize undefended entry points throughverticalenvelopment, attackingtherearandflanksof a force,ineffectcuttingofforencircling the force. In hostile environments, assault forces conduct simultaneous force projection and sustainment to multipleunexpectedorausterelocationsalong a coastlineandunexpected orausterelandingzonesashore. 1-36. Operational maneuver requires the near-simultaneous movement and support of multiple tactical formations by ground, air, and sea from separate staging areas to locations in depth from which their militarycapabilitiescanbe focused againstcriticalenemyforcesandfacilities.Highoperationaltempoand continuous pressure disrupts the enemy’s ability to regroup, reconstitute capabilities, or reconfigure forces to support new plans. The primary means of maintaining continuous pressure is the rapid cycling of joint functions,relatedcapabilitiesandactivitiesgroupedtogethertohelpJFCsintegrate,synchronize,anddirect jointoperations. 1-37. Anintermediate staging base is a tailorable, temporarylocation used for staging forces, sustainment and/or extraction into and out of an operational area (JP 3-35). Intermediate staging bases (ISBs) are a critical capability that enables shorter range recycling of intra-theater lift capabilities, reorganization and reconfiguration of capabilities to meet evolving tactical demands and recalibration of battle and logistical rhythms. Obtaining ISBs remains a critical part of baseline condition setting for joint force employment worldwideinaccessoperations.AbsentISBs,thejointforce’sabilitytomaintaincontinuouspressureinthe faceofareadenialcapabilitiesisreducedsignificantly. 1-38. Joint commanders can employ forces in ISBs as a deterrent or as part of a forcible entry or other combat operation to defeat enemy forces. Besides conducting forcible entry to secure a lodgment as a prelude to a larger campaign, they mayconductlimited attacksto seize keyterrain upon whichthe enemy has emplaced air and missile defenses and anti-satellite missiles to ensure freedom of action in other domains. 1-39. Entry operations may rely on joint assets in an ISB for command and control, fires, protection, intelligence, reconnaissance, surveillance, and sustainment. Under austere conditions or when overcoming anti-access capabilities joint ISBs help reduce the requirement for large ground-based sustainment stocks and extended ground lines of communication, which could be vulnerable to enemy attack and which requireadditionalforcestosecure. 1-40. Forcible entry may include an airfield opening to support air operations following the initial entry. An airfield is an area prepared for the accommodation (including any buildings, installations, and equipment), landing, takeoff of aircraft. (JP 3-17). As airfields are identified for use and the missions and aircraft for which the airfield will be opened are determined; operators and planners generate options for one of three operational environments: permissive, uncertain, and hostile. Once employment forces are assigned by the joint task force, more detailed planning is conducted in coordination with the entry force andUnitedStatesAirForce(USAF)first-responderairfieldopeningunits. ORGANIZATIONOFTHEFORCIBLEENTRYOPERATIONALAREA 1-41. Gainingoperationalareaaccess. Jointforcesseektoachieveperiodsofadvantage ineverydomainto counter enemy anti-access capabilities and gain access to an operational area. They attack enemy anti- access capabilities and gain access to an operational area by conducting cross-domain operations in an effort to maximize the advantages and negate the disadvantages encountered in a single domain. Gaining totaldomaindominanceisrarelyobtainable,accessforcesfightfordomainsuperiority— (cid:122) Togainanadvantageintimeandplacethatneednotbepermanentorwidespread. (cid:122) At critical times and places within the operational area to achieve, the degree of freedom of actionrequiredtoaccomplishobjectives. 1-42. Maintaining operational area access. The Army’s role in the joint fight for maintaining operational area access is the integration of ground maneuver into a joint effort; conducting entry operations; and
3-99
22
Chapter 1 employing and sustaining forces while fighting to maintain freedom of action. The primary means of maintaining continuous pressure on the enemy is the continuous and rapid cycling of capabilities under operational-leveldirectionthroughoutthedurationofoperations. 1-43. Operational area. Operational area is an overarching term encompassing more descriptive terms for geographic areasin which militaryoperationsare conducted. Operationalareasinclude, butare notlimited to, area of operations, amphibious objective area, joint operations area, and joint special operations area (JSOA). The JFC may designate operational areas on a temporary basis to facilitate the coordination, integration,anddeconflictionbetweenjointforcecomponentsandsupportingcommands. Operationalareas have physical dimensions comprised of some combination of air, land, and maritime domains and are definedbygeographicalboundaries. 1-44. Area of operations. Definedareas of operations for land and maritime forces typically do not encompass the entire operational area of the JFC, but should be large enough for the land and maritime component commanders to accomplish their missions and protect their forces. Component commanders withareasofoperationsmaydesignate subordinateareaofoperationswithinwhichtheir subordinateforces operate. For example, the joint force land component commander (JFLCC) may assign subordinate commanders separate areas of operations within an assigned airborne or air assault area of operations. These subordinate commanders employ the full range of joint and service doctrinal control measures and graphics to delineate responsibilities, deconflict operations, safeguard friendly forces and civilians, and promoteunityofeffort. 1-45. Amphibious objective area. An amphibious objective area is an area of land, sea, and airspace, assignedby a jointforce commander to commander,amphibious task force (CATF)to conductamphibious operations.The amphibiousobjective area should be specified in the initiatingdirective. Thisarea mustbe of sufficient size to ensure accomplishment of the amphibious force’s mission and must provide sufficient area for conducting necessary sea, air, and land operations. This three-dimensional area often is limited in height(for example, up to 25,000 feet). Amphibiousobjective area air control proceduresare identicalto a high-density airspace controlzone(HIDACZ)and CATF is theregional(orsector)air defensecommander (RADC or SADC).The amphibious objective area extends below the water surface, and can have a depth limitation.(RefertoJP 3-02formoreinformation.) 1-46. Joint special operations area (JSOA). A joint special operations area is an area of land, sea, and airspace, assigned by a JFC to the commander of a joint special operations force to conduct special operations activities. The JFC may establish a JSOA when geographic boundaries between special operationsforcesand conventionalforces arethe mostsuitable controlmeasures. Establishmentofa JSOA forspecialoperationsforcesto conductoperationsprovidesa controlmeasureandassistsin the prevention of fratricide. The commander, joint special operations task force (CDRJSOTF) may request the establishment ofa JSOA.When a JSOAisdesignated,the CDRJSOTFis the supportedcommander within the designated JSOA. The CDRJSOTF may further assign a specific area or sector within the JSOA to a subordinate commander for mission execution. The scope and duration of the special operations forces mission, operational environment, and politico-military considerations all influence the number, composition,andsequencingofspecialoperationsforcesdeployedinto a JSOA.Itmaybelimitedinsizeto accommodate a discrete direct action mission or may be extensive enough to allow a continuing broad rangeofunconventionalwarfareoperations.(RefertoJP 3-05formoreinformation.) 1-47. Airspace control area. An airspace control area is that airspace laterally defined by the boundaries that delineate the operational area. This airspace may include subareas. This airspace may entail an operational area and is a means of planning and dividing responsibility. While an operational area is in existence,airspacecontrolwithinthe operationalarea isdelegated accordingto JFCguidance,theairspace controlplan,andairspacecontrolorder.(RefertoJP 3-52formoreinformation.) 1-48. Control and coordination measures. Control and coordination of forcible entry operations pose a difficultchallenge to all elementsofthe joint force. Inaddressing this challenge, the JFCs and appropriate commanders may employ various control and coordination measures that facilitate the execution of operationsand, atthe same time, protectthe force tothe greatestpossibledegree. These measuresinclude, but are not limited to, boundaries that circumscribe operational areas; control measures to facilitate joint force maneuver; fire support coordination measures (FSCMs); and airspace coordinating measures. (Refer toJP 3-52formoreinformation.)
3-99
23
Overview COMMANDRELATIONSHIPSFORFORCIBLEENTRYOPERATIONS 1-49. The JFC has full authority to assign missions, redirect efforts, and direct coordination between subordinate commanders to ensure unity of command. He may organize the forcible entry force as a subordinate joint task force or the forcible entry force may be organized from a component. An initiating directive provides guidance on command relationships and other pertinent instructions for the duration of theforcibleentryoperation.Jointforcecommandersubordinatecommandrelationshipsmayinclude: FunctionalComponentCommanders 1-50. Designating joint force functional component commanders, allows resolution of joint issues at the functional component level and enhances component interaction at that level. Delegating control of the forcible entry operation to a functional component commander permits the JFC to focus on other responsibilities in the operational areas. Based on the JFC’s guidance, the forcible entry operation maybe conducted by a functional component commander. (Refer to JP 3-30, JP 3-32, and JP 3-02 for more information.)Responsibilitieswhenorganizedunderfunctionallinesincludethefollowing: (cid:122) Joint force land component commander (JFLCC). Plans, coordinates, and employs designated forces or capabilities for joint land operations in support of the joint force commander’s CONOPS. Normally commands forcible entry operations that involve airborne or air assaults thatoriginate from land bases, and typicallydesignates subordinate airborne and air assault task forcecommanders. Airborne task force commander (ABNTFC). Serves as the airborne assault force (cid:132) commander’s(ABNAFC) higherecheloncommander.TheABNTFCmaybethejointforce commander or ground commander, depending upon experience and the scope of the operation. Responsible for the planning, coordination, and employment of designated airborne forcible entry forces or capabilities in the support of the joint force commander’s CONOPS.The ABNTFChasoverallresponsibilityto synchronizeandintegratetheactions of assigned, attached, and supporting air capabilities or forces in time, space, and purpose. The command relationships established between the joint force commander, ABNAFC, commander, airlift force; joint force air component commander (JFACC), and other designatedcommandersoftheforcibleentryforcearekeytomissionsuccess. Air assault task force commander (AATFC). Serves as the overall commander of the air (cid:132) assaulttask force (AATF) using fixed- and rotary-wing aircraft deploying fromland-based facilities and ships. Responsible for the planning, coordination, and employment of designated air assault forcible entry forces or capabilities in the support of the joint force commander’s CONOPS. The AATFC ensures continuity of command throughout the operation by forming and employing the AATF, which is a temporary group of integrated forcestailoredto a specificmissionunderthecommandof a singleheadquarters. (cid:122) Joint force air component commander (JFACC). Synchronizes and integrates the actions of assigned, attached, and supporting air capabilities or forces in time, space, and purpose in support of the joint force commander’s CONOPS. The JFACC coordinates with the supported functional component commander or joint task force commander to establish airspace control andairdefenseplansinsupportof a forcibleentryoperation. (cid:122) Joint force maritime component commander (JFMCC). Plans, coordinates, and employs designated forces or capabilities for joint maritime operations in support of the joint force commander’sCONOPS. Commander, amphibious task force (CATF) and commander, landing force (CLF) (cid:132) amphibious assault forcible entry operations include air and land assaults that originate fromthe sea. The amphibious force is organized to best accomplish the mission based onthe CONOPS. Establishing command relationship between the CATF, CLF, and other designated (cid:132) commanders of the amphibious force is an important decision. An establishing directive is essential to ensure unity of effort within the amphibious force. Normally, a support relationshipisestablishedbetweentheCATFandCLFbytheJFCorestablishingauthority.
3-99
24
Chapter 1 SpecialOperationsForcesCommand 1-51. Whendirected,Commander,United States(U.S.)SpecialOperationsCommandprovidescontinental U.S.-basedspecialoperationsforcesto aJFC.TheJFCnormallyexercises combatant command (command authority) of assigned and operational control of attached special operations forces through a commander, theater special operations command (TSOC), or a subunified commander. When a JFC establishes and employs multiple task forcesconcurrently, the TSOC commander mayestablishand employmultiple joint special operations task forces (JSOTFs) to manage special operations forces assets and accommodate joint task force/task force special operations requirements. Accordingly, the joint task force commander, as the common superior, establishes support or tactical control command relationships between the JSOTF commandersand joint task force/tasks force commanders. The special operations forces liaison to the JFC helpscoordinatethe operationsofthesupportedorsupportingspecialoperationsforceandadvisesthejoint force commander of special operations forces capabilities and limitations. (Refer to FM 6-05 for more information.) Multinational Partners 1-52. Entry forces participating in a multinational operation always have at least two distinct chains of command: a national chain of command and a multinational chain of command. Although nations often participateinmultinationaloperations,theyrarely,ifever,relinquishnationalcommandoftheirforces. 1-53. Forcibleentryoperationswithmultinationalpartnersareplannedandconductedmuchthesameas a U.S. jointforceoperation.Attaining unityofeffortthroughunityofcommand fora multinationaloperation maynotbepoliticallyfeasible, butitshould be a goal. Forcible entry objectives mustbe understood by all nationalforces.(RefertoFM 3-16formoreinformation.) AIRSPACECONTROL 1-54. The JFC normally designates a JFACC as the commander for joint air operations. In addition, to a JFACC, the JFC maydesignate an area air defense commander (AADC) and anairspace control authority orhe maydesignate theJFACCasthe AADCand airspace controlauthority.If a separateairspacecontrol authorityorAADCisdesignated,closecoordinationisessentialforunityofeffort. AirspaceControlAuthority 1-55. The airspace control authority plans, coordinates, and develops airspace control procedures and operates the airspace control system. He monitors, assesses, and controls operational area airspace and directs changes according to the joint force commander’s intent. The airspace control authority normally controls the airspace through the theater air control system (TACS) and the Army air-ground system (AAGS) in forcible entries. Situations may limit establishment of ground systems and require airborne or sea-basedsystemsto conductairspace control. Commandersandstaffsshould closelymonitor andplanthe employment of critical communication systems within TACS/AAGS. (Refer to JP 3-52 for more information.) ArmyAir-Ground System 1-56. Army components of the AAGS consist of airspace elements, fire support cells, air and missile defense sections, and coordination and liaison elements embedded in Army command posts. Collectively theycoordinate and integrate airspaceuse —joint,coalition, nonmilitaryand Army mannedand unmanned aircraftsystems,directedenergy, munitions—fortheechelonstheyareassigned.Theseparticipantsconsist of airspace elements, fire support cells, air defense airspace management/brigade aviation elements (ADAM/BAEs), an Army air and missile defense command (AAMDC), battlefield coordination detachments (BCDs), ground and reconnaissance liaison detachments, and air defense artilleryfire control officers (ADAFCOs). Some participants of the theater air-ground system (TAGS) —such as the air mobilityliaisonofficer, the tacticalair controlparty, and the air support operationscenter—remainunder operational controlofdifferent Services but provide direct supportduring theconductofoperations. (Refer toFM 3-52formoreinformation.)
3-99
25
Overview AirspaceElementsbyEchelonandRole 1-57. Airspace elements are organic to brigade combat teams BCTs and higher. Corps and division airspace elements are the same and both contain an airspace element in their main and tactical command posts.TheBCTscontain a versionofanairspaceelementreferred toasanADAM/BAE.TheADAM/BAE integratesbrigade airspace, includingair and missile defense (AMD) and aviation functions. Eachofthese elements coordinates with higher, subordinate, and adjacent elements to maximize the effectiveness of airspacecontrol. 1-58. The ADAM/BAE manages the airspace control working group to facilitate and synchronize contributionsfromallthe elementsthatperformthe airspace collectivetasks.The airspace control working group typically consists of an air liaison officer and representatives from the airspace element, aviation element,AMDelement,firesupportcell,tacticalaircontrolparty,andunmannedaircraftsystemselement. AirspaceCoordinationandLiaisonElement 1-59. The JFACC establishes one or more joint air component coordination elements (JACCEs). JACCEs colocate with the joint force commanders headquarters and other component commanders’ headquarters. When established, these elements act as the JFACC’s primary representatives to the respective commanders and facilitate interaction among the respective staffs. The JACCE facilitates integration by exchanging current intelligence, operational data, and support requirements. It also aids integration by coordinating JFACC requirements for airspace coordinating measures (ACMs), FSCMs, close air support, airmobility,andspacerequirements. 1-60. The battlefield coordination detachment (BCD), the Army liaison to the JFACC, is located in the joint air operations center (JAOC). The BCD facilitates the synchronization of air and Army ground operations within the area of responsibility. BCD personnel work with their counterparts in the JAOC to facilitate planning, coordination, and executionof air-ground operations. The BCD expedites the exchange of information through face-to-face coordination and digital interfaces with JAOC elements and with— Armyground liaisonofficers atUSAFoperationscenters, the Armytheater maincommand post, thecorps main command post (or if necessary the tactical command posts), and with subordinate unit command posts,ifappropriate.Atthecorpsordivisionmaincommand post,theBCDexchangesinformationwiththe integratingandfunctionalcellswithintheheadquarters.(RefertoFM 3-52formoreinformation.) 1-61. The BCD also supervises the Army’s reconnaissance liaison detachments and ground liaison detachments that provide coordination among Army forces and USAF reconnaissance, fighter, and airlift wings. The Armyassigns ground liaisondetachments to eachUSAF air wingoperations center supporting groundoperations.TheArmygroundliaisondetachmentsprovideArmyexpertise,interpretingandbriefing pilotsonthegroundcommander’sconceptofoperations, tactics,equipment,andthegroundsituation.They also provide guidance on targetdesignation, help identify friendlytroops, and participate in the debriefing ofpilotsontheir return frommissions. These detachments are also the principalpointsofcontactbetween the USAF contingency response groups and Army airfield control groups for controlling Army theater airliftmovements.(RefertoJP 3-17formoreinformationonairmobilityoperations.) AirspaceControl Coordination DuringAirborneand AirAssaultForceOperations 1-62. Missions such as airborne, air assault and other incursions into enemy territory require specific airspace control coordination. When supporting a forcible entry operation, the air component commander for the operation or JFACC (if designated) may use airborne command and control assets to enhance coordination and control of joint air operations and airspace management. Additional considerations includethefollowing: (cid:122) Force employmentandsysteminteroperabilitynormally determinesthesystemsavailabletothe airspacecontrolauthorityindesignatingairspacecontrolsystemtocontroljointairoperations. (cid:122) Distances involved and the duration require establishing special air traffic control facilities or specialtacticsteamstoextenddetailedcontrolintotheobjectivearea. (cid:122) Air traffic volume demands careful coordination to limit potential conflict and to enable the successofmission-essentialoperationswithintheairhead.
3-99
26
Chapter 1 (cid:122) Establishment of a high-density air control zone around a drop zone or landing zone (includes sufficientterrainandairspace)topermitsafeandefficientairtrafficcontrol. (cid:122) A high-density air control zone can be nominated by the ground force commander and should include,at a minimum,the airspacebounded bytheairheadline.(Refertochapter 4 andchapter 10ofthispublicationformoreinformation.) (cid:122) Within the high-densityair control zone, all aircraft flights should be coordinated with the drop zone,landingzone,andtheagencyresponsibleforcontrollingthejointairspace. (cid:122) Air mission commander coordinates with the assault force commander to select the time on targetandthedirectionofapproachintoandthroughtheairhead. (cid:122) Environmental effects on airspace control coordination may dictate force employment techniquesandaircraftselectionforspecificmissionprofiles. AREAAIRDEFENSECOMMANDER 1-63. The JFC designates an area air defense commander (AADC) with the authorityto plan, coordinate, and integrate overall joint force defensive counterair operations. The AADC normally is the component commanderwiththepreponderanceof airand missile defense assets and thecapabilityto plan, coordinate, and execute integrated air and missile defense operations. Additionally, the AADC is granted the required commandauthoritytodeconflictandcontrolengagementsandtoexercisereal-timebattlemanagement. 1-64. As approvedbythejointforcecommander,the AADC maydesignatethe commander,Armyairand missile defense command (AAMDC) as a deputy AADC for air and missile defense [DAADC (AMD)] in support of the AADC for defense counterair operations. The AAMDC is responsible for balancing the Army counterair assets/capabilities between the Army/JFLCC maneuver units and theater-level requirements. The AAMDC ensures that Army theater air and missile defense operations are internally coordinatedandproperlyintegratedwiththejointforceand multinationalforces. 1-65. The Army provides mission command, sensors, and weapon systems for the counterair operational area, but does not provide the capability for regional or sector air defense commands within the land component area of operations. Regional or sector air defense commands normally are provided by command and controlelements [control and reportingcenter (AADC), tacticalair operationscenter United StatesMarineCorps(USMC),orAegisUnitedStatesNavy(USN)]oftheothercomponents. 1-66. Theoperationalarea,toincludeingressandegressroutes,mustbefullyprotectedbyanintegratedair defense system consisting of air, land, maritime, cyberspace, and space assets. The joint force is particularly vulnerabletoattacksbyenemyaircraftorsurface-to-surface missilesduringtheearly stagesof a forcible entry. Accordingly, the primary objectives for air defense operations are to assist in gaining air superiority. 1-67. TheAADCintegratesallavailablesurface-to-air assetsintotheoverallairdefenseplanandcomplies with procedures and weapons control measures established by the joint force commander or JFACC. The AADCexercisesthedegreeofcontrolofallsystemsthroughestablished guidelines;weaponscontrolstatus andjointforcecommander-approvedproceduralcontrols. 1-68. During air movement to the operational area, the AADC controls air defense operations from an airborne platform (for example, Airborne Warning and Control System). In practice, extended distances from staging bases to designated areas of operation may require the AADC to delegate control responsibilities to an air control element on board the airborne platform. Initial air defense assets may be limited to fighter aircraft only. Control of these aircraft is exercised through established procedural controls. 1-69. Forces initially entering the area of operation are accompanied by organic short-range air defense systems that must be integrated into the air defense architecture. Planned procedural control measures and guidelines may be established bythe AADC to expedite integration of assets. With force buildup and the introduction of follow-on forces into the lodgment area, more robust high- to medium-altitude air defense systems normally become available. These systems must establish communications with the AADC’s commandandcontrolagencyandbeincorporatedintotheestablishedairdefensesystem.
3-99
27
Overview COMMUNICATIONS 1-70. Communications systems supporting forcible entry operations must be interoperable, agile, trusted, and shared. The complexity and tempo of assault force operations requires the technical capability to supportanincreasedleveloflateralcoordinationandintegrationbetweenassault, specialoperationsforces, and multinational forces in the operating area. Assault forces rely upon en route collaborative planning, rehearsal, execution and assessment tools and beyond-line-of-sight, over-the-horizon, on-the-move communications. 1-71. Typical forcible entryoperations communications employ single and multichannel tactical satellites (TACSATs); commercial satellite communications (SATCOM); and single-channel ultrahigh frequency (UHF), very high frequency (VHF), and high frequency (HF) radios. When operating in degraded environments, assault forces must be prepared to operate using only line-of-sight or intermittent communications. CommunicationsSystemPlanning 1-72. Communications system planning must be an integral part of joint force planning. Once specific command and control organization for the forcible entry operation is established, communications system planningbeginsandinformationexchangerequirementsareestablished. 1-73. The communication directorate of a joint staff (J-6) is responsible for planning and establishing the communications system and the communications estimate of supportability. The J-6 must be able to integrate communication across the joint force among elementsconducting assault force operations, initial assaultelementsforwardplanningatanISB,andthe mainassaultforcepreparingforoperationsfromhome station. 1-74. Communications system planning is conducted in close coordination with the operations directorate of a joint staff (J-3) and intelligence directorate of a joint staff (J-2) to identify specialized equipment and dissemination requirements for some types of information. (Refer to JP 6-0 and FM 6-02 for more information.) CommunicationsSupportDuringAirborneandAirAssaultForceOperations 1-75. Communications requirements vary with the mission, size, composition, geography, and location of forcibleentryforces andthe senior headquarters. Significantconsiderationsinclude the use ofintermediate staging bases and airborne command and control platforms, to include en route mission planning and intelligencesharing,whichcanaddtothecomplexityofmanagingthecommunicationsarchitecture. 1-76. Because communications systems must be built up at the objective area, some aspects of communications support are unique in forcible entry operations. Assault force support considerations includethefollowing: (cid:122) Long-rangeradiocommunicationsthroughretransmissionandrelaysiteswithU.S.-based forces orintermediatestagingbasestofacilitatecontrolofpersonnel,supplies,andequipment. (cid:122) Interoperability with the overall joint force communications architecture—communications redundancyforassaultforceandsubordinatecommanders. (cid:122) Initialdeploymentcommunicationscapabilitylargelybased onUHFSATCOM,becomesmore robustassignalunitsandequipmententertheoperationalarea. (cid:122) Command relationships, networks, frequency management, codes, navigational aids, and other communicationissuesmustberesolvedbeforetheassaultphasebegins. JOINT OPERATION PLANNING 1-77. Joint operation planning includes all activities that must be accomplished to plan for an anticipated operation: the mobilization, deployment, employment, sustainment, redeployment, and demobilization of joint forces. It integrates military power with other instruments of national power to achieve a desired military end state; the set of required conditions that defines achievement of the commander’s objectives. Joint operation planning connects the strategic end state to campaign design and ultimately to tactical missions. The following paragraphs discuss the joint operation planning process and intelligence
3-99
28
Chapter 1 preparation of the operational environment, and planning considerations in support of forcible entry operations. JOINTOPERATIONPLANNINGPROCESS 1-78. In conducting joint operation planning, commanders and staffs apply operational art to operational design using the joint operation planning process (JOPP). This includes forcible entry operation requirements. The JOPP is an orderly, analytical planning process comprised of a set of logical steps to analyze a mission; develop, analyze, and compare alternative course of actions; select the best course of action; and produce a plan or order. The process provides a methodical approach to planning at an organizational level before and during the joint operation. It focuses on the interaction between an organization’s commander, staff, the commanders and staffs of the next higher and lower commands, and supportingcommandersandtheirstaffs. 1-79. Through the application of operational art and operational design and by using JOPP, the JFC and staff combine art and science (control) to develop products that describe how (ways) the joint force will employitscapabilities(means)toachievethe militaryendstate(ends). Operationalartistheapplicationof creative imagination by commanders and staffs— supported by their skill, knowledge, and experience. Operational design is a process of iterative understanding and problemframing that supports commanders and staffsintheir application ofoperationalart withtoolsand a methodologyto conceiveofand construct viable approaches to operationsand campaigns. Operationaldesignresultsinthe commander’soperational approach, which broadlydescribes the actions the joint force needs to take to reach the end state. JOPP is anorderly,analyticalprocessthroughwhichtheJFCand staff translate thebroad operational approachinto detailedplansandorders.(RefertoJP5-0formoreinformation.) JOINTINTELLIGENCEPREPARATIONOFTHEOPERATIONALENVIRONMENT 1-80. The J-2 has the primary staff responsibility for planning, coordinating, and conducting the overall joint intelligence preparation of the operational environment (JIPOE) analysis and production effort at the joint force level. The JIPOE supports decisionmaking and planning by identifying, analyzing, and estimating the enemy’s centers of gravity, critical factors, capabilities, limitations, requirements, vulnerabilities,intentions,andcoursesofactionthataremostlikelytobeencounteredbythejointforce. 1-81. Joint task force joint intelligence support element or joint task force joint intelligence operations center (JIOC) is the intelligence organization at the joint task force level that is responsible for complete air,space,ground,andmaritime threatcharacteristicsanalysisforthejointoperation.Itidentifiesadversary centers of gravity; analyzes command, control, and communications systems, targeting support; collection management;andmaintenanceofa24-hourwatchinafullJIPOEeffort. 1-82. The joint intelligence support element or JIOC continuously develops, updates, and tailors JIPOE products while proactively seeking out and exploiting all possible assistance from interagency and multinational intelligence sources. It directs the effort, integrating analyses with all products produced by subordinate commands and other organizations and ensures the JIPOE process encompasses a systematic analysis of all relevant aspects of the operational environment with tailored products continuously developed and updated to support the planning process. (Refer to JP 2-0 and JP 2-01.3 for more information.) PLANNINGCONSIDERATIONSINSUPPORTOFFORCIBLEENTRYOPERATIONS 1-83. Forcible entry, which mayinclude airborne,air assault, andamphibiousoperations, or a combination ofall three cancreate multipledilemmasbycreating threatsthatexceedtheenemy’scapabilityto respond. Theseoperationsarecomplexandhighriskandshouldremainassimpleaspossibleinconcept. 1-84. Forcible entry operations require extensive intelligence, detailed coordination, innovation, and flexibility. Schemes of maneuver and coordination between forces need to be clearly understood by all participants. Forces are tailored for the mission and echeloned to permit simultaneous deployment and employment.
3-99
29
Overview 1-85. Entry forces require seamless intelligence and operations integration from the small unit up through national-level decision makers, enabling leaders at all levels to access relevant information at the proper time and place. The JIOC ensures the intelligence staffs of subordinate component commands have appropriate reconnaissance, surveillance, and intelligence products prepared for each domain in which entryforcesoperate. 1-86. As part of achieving decisive advantages early, joint force operations may be directed immediately against the enemy’s center of gravity using conventional and special operations forces and capabilities. Attacks may be decisive or may begin offensive operations throughout the enemy’s depth that can create dilemmascausingparalysisanddestroyingcohesion. 1-87. When airborne, air assault, and amphibious operations are combined, unity of command is vital. Rehearsals are a critical part of preparation for forcible entry. Participating forces need to be prepared to fight immediately upon arrival and require robust communications and intelligence capabilities to move with forward elements. The forcible entry force must be prepared to immediately transition to follow-on operations,andshouldplanaccordingly. 1-88. Forceentryactionsoccurinbothsingular andmultipleoperations.Theseactionsincludeestablishing forward presence, preparing the operational area, opening entrypoints, establishing and sustaining access, receiving follow-on forces, conducting follow-on operations, sustaining the operations, and conducting decisiveoperations.Additionalactivitiestoconsiderinclude— (cid:122) Informationoperations.Thefullimpactofinformationoperationonfriendly,neutral,andhostile forces should be considered with the key goal of information operations achieving and maintaininginformationsuperiorityfor the U.S.anditsallies;andexploitingenemyinformation vulnerabilities. Information operations are the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, orusurpthedecision makingofadversariesand potentialadversaries whileprotectingtheentryforce.(RefertoJP3-13.) (cid:122) Operationssecurity and militarydeception. Use to confuse the enemyand ease access. Actions, themes,and messages portrayed byall friendlyforcesmustbeconsistentif militarydeceptionis to be believable. Operations security helps foster a credible military deception. (Refer to JP3-13.3andJP3-13.4.) (cid:122) Specialoperationsforces.Mayprecedeforcibleentryforcestoincludethefollowing: Identify,clarify,andmodifyconditionsinthelodgment. (cid:132) Conducttheassaultstoseizesmall,initiallodgmentssuchasairfieldsorseaports. (cid:132) Provideorassistinemployingfiresupport. (cid:132) Conductotheroperations:seizureairfields,reconnaissanceoflandingzonesoramphibious (cid:132) landingsites. Conduct special reconnaissance and direct action well beyond the lodgment to identify, (cid:132) interdict,anddestroyforcesthatthreatentheconventionalentryforce (SeeJP3-05). 1-89. Entryforces must collect, process, and disseminate relevant information in near real time to support fire and movement, and maintain the abilityto deliver and control joint firesthroughout the assault. Given the distances from which entry forces are deployed and employed, ground forces require access to and direction of joint fires during the assault, stabilization of the lodgment, and introduction of follow-on forces. 1-90. Targeting intelligence supports forcible entry operations in verifying existing information and making recommendations on targeting and collateral damage estimate with respect to intelligence preparation of the operational environment, service capabilities, and rules of engagement. Targeting intelligence analysis encompasses many processes, all linked and logically guided by the joint targeting cycle, that continuously seek to analyze, identify, develop, validate, assess, and prioritize targets for engagement in order to achieve the commander’s objectives and end state. (Refer to JP 3-60 and ATP 3- 60.1formoreinformation.) 1-91. Thethreata tactical missionmayposetothe civilian populacerequiresbalancedlethalandnonlethal actionsduringforcibleentryoperations.Overcautiouspreventionactivitiesorprocedureslimitthe freedom
3-99
30
Chapter 1 ofactionjustasunrestrained actioncanresultinprovocationtacticsbyadversaries. (Refer to ATP 3-09.32 formoreinformation.) 1-92. Obtainingaccurate combatidentification provides the abilityto differentiate among friendly, enemy, neutral and unknown personnel and objects. Combat identification is the process of attaining an accurate characterization of detected objects in the operational environment to support an engagement decision (JP 3-09). 1-93. To achieve surprise or strike a decisive blow, entry forces focus on identifying and defeating enemy area denial capabilities (mine development, emplacement and control network). Commanders must weigh thebenefitofmassedfiresversustherequirementforprecisioninanareadenialenvironment. 1-94. Contingency response groups planners are integrated into the planning process as early as possible. Contingencyresponse groups provide the USAF first-responder airfield opening unit capabilityto the JFC regardlessof service or missionofthe field beingopened. Each contingencyresponse group canbe scaled to meetspecifictaskingrequirements to supportair operationsatspecificpointsup to large-scale airfields. (RefertoFM 3-17.2formoreinformation.) 1-95. Sustainment requirements can be formidable, but must not become such an overriding concern that the forcible entry operation itself is jeopardized. Commanders and staffs must carefully balance the introduction of sustainment forces needed to support initial combat with combat forces required to establish, maintain, and protect the lodgment as well as forces required to transition to follow-on operations. JOINT ENTRY FORCE 1-96. Forcibleentryisexecutedas either amajoroperationor apartofa larger campaignto seizeandhold a militarylodgmentinthe face ofarmed opposition for thecontinuouslandingofforces. Jointentryforces can strike directly at the enemy and can open new avenues for other military operations. The entry force employs distributed, yet coherent, forcible entry operations to attack the objective area or areas. The net resultis a coordinatedattackthatoverwhelmstheadversarybeforetheadversaryhas time toreact. Awell- positioned and networked force enables the defeat of adversary reaction and facilitates follow-on operations,ifrequired. INTELLIGENCE, SURVEILLANCE,ANDRECONNAISSANCE 1-97. Joint entry forces must operate a fully integrated and collaborative intelligence, surveillance, and reconnaissance enterprise that provides timely intelligence and counterintelligence to meet entry force requirements. This enterprise must be sustainable and remain responsive and adaptive, and capable of addressingnewchallengesandopportunitiesastheyemerge. (RefertoJP 2-01formoreinformation.) 1-98. Entry forces have to fight for and collect information in close contact with the enemy and civilian populations through continuous physical reconnaissance, persistent surveillance, security operations, and intelligence operations: to develop the contextual understanding to counter enemy anti-access capabilities andgainaccesstoan operationalarea;counterareadenial strategiestoensurefreedomofaction;andadapt continuouslytochangingsituations.(RefertoFM 3-55andATP 2-01formoreinformation.) 1-99. Human interaction on the ground must complement other intelligence to create contextual understanding of events on the ground. This aids in the abilityto locate, target, and suppress or neutralize hostile anti-access and area denial capabilities in complex terrain with lethal or nonlethal effects while limitingcollateraldamage.(RefertoFM 2-22.3formoreinformation.) 1-100. Long-range surveillance and special operations forces support entry forces by conducting shaping operations in support of forcible entry operations, to include reconnaissance and surveillance and raids. Advanced force operations include strike operations, clandestine insertion of special operations forces and organic reconnaissance teams, deception, counter mine or counter obstacle operations, and information operations.(RefertoFM 3-55.93andATTP 3-18.04formoreinformation.)
3-99
31
Overview INTEGRATIONANDSYNCHRONIZATION 1-101. The complex nature and operational tempo of forcible entry operations requires entry forces to support an increased level of lateral coordination and integration throughout the application of unified action within an operational area. The entry forces’ role in the operation for access is the integration of ground and littoral maneuver into the joint effort; conducting entry operations; and employing and sustainingforceswhilefightingtomaintainaccessthroughoutthedurationofoperations. 1-102. Integrating and synchronizing near simultaneous execution of a broad range of operations is essential to presenting the enemy with the greatest range of challenges against which to react. Designing, planning, and executing these operations require a philosophy that embraces decentralization of resources and authority for portions of the force yet more centralized planning and execution for missions where resources are scarce, or strategic sensitivities demand greater control. However, entry forces must be prepared to operate with decentralized decisionmaking, as adversaries may attempt to isolate units by attackingcommunicationscapabilities. REHEARSALS 1-103. Forcible entry is a deliberate operation in that the situation allows for the development and coordinationofa specified taskorganizationand a detailed plan, to include multiple branchesand sequels. The processoflearning, understanding, and practicinga plan inthe time available before actualexecution reducesandmitigatesoperationalfrictionsinherenttoentryoperations. 1-104. Rehearsing key entry force actions and sustainment activities allows participants to become familiar with the operation and the visualization of the plan. This process assists in orienting joint and multinational forces to their surroundings and to other units during execution. Rehearsals provide a forum for subordinate leaders to analyze the plan, but they must exercise caution in adjusting the plan. Changes mustbecoordinatedthroughoutthechainofcommandtopreventerrorsinintegrationandsynchronization. 1-105. While the joint entry force may not be able to rehearse an entire operation, commanders should identifyessentialelementsforrehearsal.Operationplanrehearsalbenefitsinclude: (cid:122) Commonunderstanding. (cid:122) Unityofeffort. (cid:122) Articulatesupportingintents. (cid:122) Subordinateandsupportingcommandersquestions. (cid:122) Branchesorsequels. (cid:122) Integrationandsynchronization. OPERATIONALPHASING 1-106. As stated earlier in this chapter, forcible entry operations are conducted during the “Seize the Initiative” or “Dominate” phase of a joint operation. Within the context of these phases established by a higher-levelJFC,thejointentryforce commander mayestablishadditionalphasesthatfittheforcibleentry CONOPS. Planning for each phase must include branch and sequel planning. Transitions between these phasesaredesigned tobedistinctshiftsemphasizedbythe jointentryforce, oftenaccompaniedbychanges in command or support relationships. Forcible entry operations may be planned and executed in the followingfivephases. PhaseI––PreparationandDeployment 1-107. Forcible entry operations are conducted by organizations whose force structures permit rapid deployment into the objective area. Joint entry forces may deploy directly to the operational area or to stagingareastoprepareforsubsequentoperations.Keyactivitiesinclude: (cid:122) Planning.Allphases,includesDepartmentofDefenseagenciesandinteragencyparticipants. (cid:122) Movement.Planningfrombothstrategicandoperationalperspectives. (cid:122) Intelligence.Focusedonansweringthecommander’scriticalinformationrequirement. (cid:122) Reconnaissanceandsurveillance.Insertionintooperationalarea.
3-99
32
Chapter 1 (cid:122) Transitiontoassault.Setsconditionsrequiredforsuccessfulassault. PhaseII –– Assault 1-108. Assault phase, in airborne and air assault operations, a phase beginning with delivery by air of the assault echelon—the elementof a forcethatisscheduled forinitialassaulton theobjectivearea,and extendingthroughattackofassaultobjectivesandconsolidationoftheinitialairheadorlodgmentarea.Key activitiesinclude: (cid:122) Initial assault designed to surprise and overwhelmthe enemy with decisive force and to protect assaultforce. (cid:122) Overcoming natural and man-made obstacles intended to restrict or halt movement that allows theenemytomassitsforcesandrepeltheassault. (cid:122) Main assault entry by parachute assault and air assault, landed forces must have immediately availablejointfiresupport. (cid:122) Transitionto stabilizingthe lodgment, introductionof follow-on forcesto assist in securingand preparingorrepairingthe lodgmentto allowthe landingof air assets, and continue to follow-on operationswithoutanoperationalpause. PhaseIII – Stabilizationofthe Lodgment 1-109. Stabilization of the lodgment involves securing the lodgment to protect the force and ensure the continuouslandingofpersonnelandmateriel. (cid:122) Organizing the lodgment to support the increasing flow of forces and logistic resource requirements. (cid:122) Expanding the lodgment as required, support the joint force in preparing for and executing follow-onoperations. (cid:122) Transitionto introducing follow-on forces intended to conduct follow-onoperations, in extreme circumstances, follow-on forces may be required to assist assault forces in the seizure of initial objectives,ormaybeusedtohelpsecureanddefendthelodgment. PhaseIV – Introductionof Follow-OnForces 1-110. The introduction of follow-on forces is required when subsequent operations are planned for conduct in or from the lodgment. It provides the joint force commander with increased flexibility to conductoperationsasrequired. Phase V – Terminationor Transition 1-111. Forcible entry operation to subsequent operations or termination must be an integral part of the planningphaseofthejointdeploymentprocess. Completedinoneoftwoways:attainmentofthecampaign objectives (termination), or completion of the operational objectives when a lodgment is established for follow-oncombatoperations(transition).(RefertoJP 3-18formoreinformation.) SECTION II – VERTICAL ENVELOPMENT 1-112. Operational experience has demonstrated that the rapid projection of combat power is the key to successful ground and littoral maneuver. Experience and analysis have shown that the most effective method of doing so is through a combination of vertical and surface means. These complementary means provide flexibility in negating threats unique to operational access. This section addresses vertical maneuverwithinforcibleentryoperations,theairborneorairassaultforce,andcommandresponsibilities. TACTICAL APPLICATIONS 1-113. Forcible entry, composed of an entry force, together with other forces that are trained, organized, and equipped for entry operations, project power. Forcible entry can be executed through vertical envelopment, directly against the enemy in a sudden attack in force to achieve decisive results or to
3-99
33
Overview establish a lodgment to allow for the introduction of follow-on forces. Besides serving as a forcible entry assault force, such forces can conduct follow-on operations fromthe lodgment. The following paragraphs discuss the application of vertical envelopment as conducted by airborne or air assault forces to achieve operationalobjectives. TACTICALMANEUVER 1-114. Vertical envelopment is a tactical maneuver in which troops that are air-dropped, air-landed, or inserted viaair assault, attack the rearand flanksofa force,ineffect cuttingoffor encirclingthe force(JP 3-18). Commandersconductverticalenvelopment to occupy advantageous ground to shape the operational area and accelerate the momentum of the engagement. An enemy may or may not be in a position to oppose the maneuver. While the commander should attempt to achieve an unopposed landing when conductingverticalenvelopment,theassaultforcemustprepareforthepresenceofopposition. 1-115. Vertical envelopment, airborne and air assault operations, allows a tactical commander to do the following: (cid:122) Threatenenemyechelonsupportareas, causingtheenemyto divertcombatelementsto protect vitalbasesorinstallationsandholdkeyterrain. (cid:122) Overcomedistancesquickly,overflybarriers,andbypassenemydefenses. (cid:122) Extendtheareaoverwhichthecommandercanexertinfluence. (cid:122) Disperse reserve forces widely for survivability reasons while maintaining their capability for effectiveandrapidresponse. (cid:122) Exploitcombatpowerbyincreasingtacticalmobility. COMMONFACTORS 1-116. Planning results in establishing positions that support completing the assigned mission. Factors that are common to vertical envelopments include reverse planning process, condition setting, and the impactofmeteorologicalconditions(weatherandlightdata). ReversePlanningProcess 1-117. Airborne and air assault commanders begin planning operations with a visualization of the ground tactical plan and work through a reverse-planning sequence. Planning factors common to airborne and air assaultoperationsareasfollows: (cid:122) Ground tactical plan. A ground tactical plan is the basis for planning throughout the planning process. Itisthe firstplan completed and itaddresses the destruction ofenemy forcesthatpose animmediate threatto thelodgment area. However, eachplanaffectsthe others, and changesin oneplancanrequireadjustmentsintheothers. Note. For example, the amount of lift available determines the feasibilityof the ground tactical plan. If there are not enough lift systems to put all the required forces in place at the required time, the commander adjusts the ground tactical plan as well as the other plans. Therefore, vertical envelopment planning requires the unit staff obtain vital planning data, such as the availabilityoflift systemsandthetechnicalandtacticalcapabilitiesofthosesystems,asearlyas possible. (cid:122) Landingplan. (cid:122) Movementplan. (cid:122) Loadingandstagingplans.(Airassault.) (cid:122) Marshallingplan.(Airborne.) (cid:122) Additionalplanningfactorsinclude— Inanalyzingtheplanthecommanderandstaffconsiderlodgmentterrainandinfrastructure, (cid:132) withaemphasisontheabilitytosupportfollow-onoperationsandforces. Intelligence regardingtheenemyandterraincharacteristicsoftheobjectiveareaisvitalto (cid:132) thisplanningprocess.(RefertoADRP2-0andFM2-0formoreinformation.)
3-99
34
Chapter 1 Positivetargetidentificationvettedtoensurecorrectidentification.(Refer to ATP 3-09.32 (cid:132) formoreinformation.) Continuous coordination between the parallel echelons of the assault force and the (cid:132) supportingforces;fromthebeginningofanoperationuntilitscompletionorabandonment. Maximized use of combined arms capabilities to ensure the assault force has sufficient (cid:132) powertoaccomplishitsmissionanddefenditself. Shortplanningtimes oftenrequirestaffs to modifycontingencyplansandSOPsto meetthe (cid:132) exactsituationwhilestillensuringadequatecoordination. 1-118. The commander determines ifadjustmentsto anyofthese plansentailacceptable risk. Ifthe riskis unacceptable,theCONOPSchanges. ConditionSetting 1-119. Condition setting is an iterative process where the commander’s situational understanding determines what part of the situation must change to ensure the success of the vertical envelopment. Warfighting capabilities or functions continuallyassess until the commander is satisfied with the result or operationalnecessity forces himto either cancel or conduct the verticalenvelopment. Conditions common toairborneandairassaultoperationsareasfollows: (cid:122) Posturetheairassaultorparachuteforceforsuccesswiththedegreeofacceptablerisk. (cid:122) Suppressionofenemyairdefense,planpreparationanddeceptionfires. (cid:122) Cross-serviceandechelon-staff,cell,andboardsynchronizationandintegration. (cid:122) Exchangeliaisons. (cid:122) Reconnaissance and surveillance detect systems that unacceptably endanger the operational success. (cid:122) Serviceandjointfires-detectedtargets. MeteorologicalConditions(weatherandlightdata) 1-120. Meteorological conditions influence the conduct of operations. Conditions common to airborne andairassaultoperationsareasfollows: (cid:122) Impactsverticalenvelopment to a greaterextentthanotheroperations. (cid:122) Long-rangeforecastsaffectplanningforforcebuildupandsustainmentbyaerialdelivery. (cid:122) Currentandfutureforecastedimpactontacticaloperationsandaircraftperformance. (cid:122) Currentweather informationatdeparture sitesandpickup zones,alongapproachroutes, and in theobjectivearea. (cid:122) Marginal weather conditions may enhance the element of surprise, but they increase the risk ofaccidents. (cid:122) Deteriorating weather condition: postponement of planned operation or reduced tempo of an ongoingoperationwhenriskbecomesunacceptable. (cid:122) Weatherconditionaffectsonjointfiresandmedicalevacuationorwithdrawalofforces. (cid:122) Conditions that include wind shears, crosswinds, and the ambient temperatures throughout the courseoftheoperation. (cid:122) Hightemperatureand altitude degrade aircraft liftperformance—acombinationofthese factors results in trade-offs in the operating parameters. (For example, a commander may insert dismountedreconnaissance teamson mountainsidesin the coolof the morning, butbe unable to executethesamemissioninthenoondayheat.) AIRBORNEASSAULTFORCE 1-121. Airborneforcesmaybeusedasthe assaultforceorusedincombinationwithothercapabilitiesfor a forcible entry; or they may conduct follow-on operations from a lodgment. As an assault force, airborne forcesmay airlandorparachuteintotheobjectiveareatoattackandeliminatearmedresistanceandsecure designated objectives. Airborne forces may be employed from a lodgment in additional joint combat operationsappropriatetotheirtrainingandequipment. Airborneforcesofferthe JFCanimmediate forcible entry option since they can be launched directly from the continental United States and/or forward
3-99
35
Overview deployed location without the delays associated withacquiring intermediate staging bases or repositioning ofsea-basedforces.(Refertothispublication,PartI,AirborneOperations,formoreinformation.) AIRASSAULTFORCE 1-122. An air assault force is a force composed primarily of ground and rotary-wing air units organized, equipped, and trained for air assault operations (JP 3-18). Air assault forces can deploy from land-based facilities and ships. Fires from aircraft (manned and unmanned) or ships (surface and subsurface) take on addedimportance tocompensatefor the lackofartillery. Anairassault forcemayrequiretheestablishment of anintermediate stagingbase. These forcescanrapidlyprojectcombatpower throughoutthe depthof an operationalarea.(RefertoPartII,AirAssaultOperations,ofthispublicationformoreinformation.) COMMAND RESPONSIBILITY 1-123. Entry forces conduct airborne and air assault operations with a preference for decentralized decisionmaking. The abilityto integrate and synchronize near simultaneous execution of a broad range of operationsis essential to presenting theenemywiththegreatest rangeofchallengesagainst whichto react. Designing,planningandexecutingtheseoperationsrequiresaphilosophythatembracesdecentralizationof resources and authorityfor portions of the force yet more centralized planning and execution for missions whereresourcesarescarceorstrategicsensitivitiesdemandgreatercontrol. COMMANDRESPONSIBILITYOFAIRBORNEOPERATIONS 1-124. The airborne assault of a forcible entry operation is delivered by strategic airlift from the continental United States or by strategic or tactical airlift from an intermediate staging base. An airborne assault over intercontinental distance, places additional requirements on joint command and control. Effective employment of an airborne assault force (ABNAF) requires an organizational structure with an Army intermediate higher headquarters nested within the joint task force. This intermediate headquarters, tailored to accompanythe assault force to the objective area facilitatesthe assaultforce inthe execution of itsgroundtacticalplanbycontrollingenablingfunctionsandunits.(Seetable1-1,page1-23.)
3-99
36
Chapter 1 Table 1-1. Command responsibility of airborne operations AIRBORNETF AIRBORNEASSAULTFORCE JTF CDR/HQ CDR/HQ CDR/HQ (Division) (IBCT) Operationalplanning. Operational/tacticalplanning. Groundtacticalplanning. JIPTLdevelopment. Jointfiresintegration. Jointfiresexecution. JointISRintegration. LRS/SOFintegration. UpdateIPB. Jointoperationalaccess. Receiptofassaultfires Forcibleentrycondition C2/missioncommandpre-assault handover. setting. fires. Enroutemissionplanningand rehearsal. APOESAandintegrationenroute Rig/outloadparatroopersand missioncommand,airspacecontrol equipment. Operationallevel aerialrelayusingjoint Conductairborneassault. commandandcontrol communicationsbetween Seizeassaultobjective. throughJOC,CAOC. JTF/APOEandIBCT/APOD EstablishAPODC2/mission commandnetwork. APOE/APODC2/mission SecureAPOD. command. Repair/maintainAPOD. Airflowmanagement. RSOI. Expandlodgment. Generationofcombatpower Follow-onforces. LEGEND APOD – aerialport of debarkation IPB– intelligencepreparationof thebattlefield APOE – aerialport ofembarkation ISR – intelligence, surveillance,reconnaissance APOE SA – aerialportofembarkationstagingarea JIPTL – joint integratedprioritytargetlist CAOC – combatairoperations center JOC – joint operations center C2 – commandandcontrol JTF – joint task force LRS – long-rangesurveillance CDR – commander RSOI – reception, staging, onwardmovement,andintegration HQ – headquarters SOF – specialoperations forces IBCT – Infantry brigadecombatteam COMMANDRELATIONSHIPSFORAIRBORNEOPERATIONS 1-125. The airborne assault force commander (ABNAFC) is responsible for seizing the airhead. He accompanies the initial assault and focuses on the planning and execution of the ground tactical plan. Although the size and composition of the assault force varies according to the mission, the ABNAF is typicallyanAirborne(ABN)Infantrybrigadecombatteam(IBCT). 1-126. The airborne task force commander (ABNTFC) is a higher echelon commander. He may be the joint force commander or ground commander, depending upon experience and the scope of the operation. As the assault requires an ABN IBCT, for example, the BCT commander leads the assault force and the parent Army headquarters (normally a division but could be a corps headquarters) provides the ABNTFC. Thisensures that the commander fightingthe ground tactical plan cangive his full attentionto the fight in the airhead without having to manage en route follow-on forces and support. An assault command post of the ABNTFC accompanies the initial ABNAF in order to provide a command element in the airhead to facilitatethesefunctionsandtoactasaninterfacewiththeairbornecommandpost. 1-127. The ABNTFC organizes the parachute assault force, strategic airlift force, supporting fires force, and follow-on airland forces in such a way as to best accomplish the mission. The ABNTFC’s responsibilities end upon achievement of a secure airhead line (Refer to chapter 4 of this publication for
3-99
37
Overview more information.) and the establishment of either a JFLCC or designated ground commander command postintheairhead. 1-128. En route mission planning and rehearsal systems allow the airborne force to maintain situational awareness and to receive and disseminate updated intelligence while en route from load time until arrival overtheairhead. (cid:122) Ground commanders in airlift aircraft may communicate with the chain of command over the Army secure en route communications package. Normally, the airlift mission commander and theairborneforcecommander areinthesame aircraft.Thesenior groundcommandercanadvise embarked ground commandersofchangesinthegroundtacticalsituationortotheairmovement plan. (cid:122) Airborne operations require the use of redundant airborne and ground command posts. Normally, a joint force airborne command post operates from a joint airborne communications centerand commandpost, whileacommandpost fromthe airborneforce operates froma fixed- wingplatformwithrequiredcommunicationsinstalled. (cid:122) TACSAT downlink and other en route communications systems can be used to communicate with USAF special tactics teams, air mobility liaison officers, contingency response elements, andcontingencyresponseteamsinobjectiveareas. (cid:122) The use ofspecialnavigational aidsand homingdevices to directaircraftto specified areas(for example, a designated drop zone) may be needed. Specialized airborne or air assault force personnel (for example,special tacticsteamsor long-rangesurveillanceunits) are equipped with navigational aids, global positioning systems, and homing devices. These teams are employed early to guide the airborne units, and provide reconnaissance, surveillance, visual flight rules service, and limited instrument flight rules air traffic control service. Other joint force assets suchasspecialoperationsforcesarecapableofperformingsomeofthesefunctions. COMMANDRESPONSIBILITYOFAIRASSAULTOPERATIONS 1-129. Air assault operations embody the combined arms concept through coordination and planning betweenthe air and ground commanders. Infantryand air unitsare fullyintegrated with other members of the combined arms team to form a powerful and flexible joint task force. An air assault operation dramatically extends the commander’s ability to influence operations within the area of operations and to execute operations in locations beyond the capability of more conventional forces. Effective employment of an air assault force requires an organizational structure with intermediate higher headquarters nested withinthejointtaskforce.(Seetable1-2,page1-25.)
3-99
38
Chapter 1 Table 1-2. Command responsibility of air assault operations JTF CDR/ AIR ASSAULTTF AIR MISSION GROUNDTACTICAL HQ CDR/ HQ CDR/ HQ CDR/ HQ (Div/BCT/BN) (BDE/BN/CO) (BCT/BN/CO) Operational Operational/tactical Airmovementand Groundtactical, Planning planning. planning. landingplanning. loading,andstaging planning Airspace management PZ/LZselectionand Air movement of Conduct air assault. OperationalC2 PZcontrol. personneland Seize assault OBJs. Execution throughJOC, JFEcondition equipment. SecureLZ. CAOC. monitoring. OPCONofall Expandlodgment. Aerialrelayusing aviationelements. jointcommsbetween JTF/PZandBCT/LZ. PZandfollow-on Mission command Mission command of forcescontrol. Mission Airflow from PZtoLZ all elements cleared Go/NoGocriteria Command management. (AATFCcolocated from LZ. assessmentand withAMC). decisions. Jointfires planning/integration. JointIntegrated Pre-assaultfires/Joint Enroutefires. Clear anddirectall PrioritizedTarget Fires SEAD/SEAD. Facilitationfrom firesinsidetheairhead List(JIPTL) Clearanddirectall PZtoLZ. line. development. firesoutsidethe airheadline. Personnelrecovery Approve,disapprove, operations Decision ormodifyall authority(above Authority componentsofthe immediateunit assaultplan. level). Legend: g etlist AMB-airmissionbrief AMC-airmissioncommander AATFC–airassault taskforcecommander BCT–brigadecombat team CAOC–combatairoperations center C2–commandandcontrol CDR–commander fenses HQ–headquarters JFE–joint fireselement COMMANDRELATIONSHIPSFORAIRASSAULTOPERATIONS 1-130. The AATF is a combined arms force under the command of a single headquarters consisting of Infantry, assault and attack reconnaissance helicopters, fire support, electronic warfare, and sustainment assets.Thecommanderorderingtheairassaultdesignatesthe AATFcommander.TheAATFcommander’s headquarters coordinates airspace with other airspace users, to include artillery, air defense, unmanned
3-99
39
Overview aircraft, close air support, and other aviation units. It coordinates the AATF’s plans for maneuver and sustainmentwiththoseofhigher,subordinate,andadjacentunits. 1-131. Normally, a BCT commander serves as the AATF commander for a ground maneuver battalion- size air assault and a ground maneuver battalion commander serves as the AATF commander for a company-size air assault. The air mission commander and the ground maneuver unit commander are subordinatetotheAATFcommander. 1-132. The air mission commander is the aviation unit commander or his designated representative. The air mission commander receives and executes the guidance and directives from the AATFC, and controls all aviation elements. The air mission commander ensures continuity of command for all supporting aviation units and employs attack helicopters and artillery along the air route, fighting the battle from the pickup zone to the landing zone, while keeping the AATFC informed. The air mission commander has operational control of assault helicopters providing lift to the ground maneuver force and the aviation unit providingassault helicopters is either in direct support of the ground combat unit or under the operational control of the AATF. The support relationship mayend at a predetermined point during the operation, on orderofthehighercommander,ortheAATFcommander maydeterminewiththeairmissioncommander’s inputwhentheoperationalcontrolrelationshipbeginsandends. 1-133. The commander directing the air assault normally does not attach aviation airlift or escort units to the AATF, because it is unlikely that a ground unit can control the aviation unit and supply the aviation- specific munitionsand large amountsof fuelrequired by aviationunits. Directsupport and the operational controlcommandrelationshipsdonotplace logisticsresponsibilityforthesupportingunit onthe supported unit. The operational control command relationship allows the AATF commander to reorganize the aviation airlift and escorting units when necessary as dictated by the situation. The direct support relationship allows the overall commander to shift the support of these aviation units to other units in response to unexpected developments. Consequently, direct support or operational control is usually the desiredrelationshipbetweenairandgroundunitsinairassaultoperations. 1-134. The commander ordering the air assault considers the availability and allocation of assault and attack aviation assets when determining the AATF’s task organization. He ensures that the ground maneuverforcecontainssufficientcombatpowertoseizeitsinitialobjectivesand defendits landingzones. The ground maneuver force requires a mission specific balance of mobility, combat power, and sustainment capabilities. The available rotary-wing aircraft must be able to insert the required combat power into the objective area as quickly as possible to provide surprise and shock effect, consistent with aircraftandpickupzoneandlandingzonecapabilities. 1-135. Airassaultoperationsrequirethe useofredundantairborneand ground command posts. Normally, a joint force airborne command post operates from a joint airborne communications center and command post, while a command post from the air assault force operates from fixed-wing or rotary-wing platform withrequiredcommunicationsinstalledoraspeciallyconfiguredmissioncommandrotary-wingaircraft. SPACE OPERATION 1-136. Airborne and air assault forces rely on space-based capabilities and systems for precision, navigation and timing, communication, terrestrial and space weather, and intelligence collection platforms to be successful during forcible entry operations. (Refer to JP 3-14 and FM 3-14 for more information.) These systems are critical enablers to plan, communicate, navigate and maneuver, maintain situational awareness,engagetheenemy,providemissilewarning,andprotectandsustaintheentryforce. 1-137. Space specialists supporting tactical planning by providing expertise and advice regarding available space capabilities and limitations enable space operations. Planning and coordination of space support with national, service, joint, and theater resources takes place with Army space professionals who are attached at the corps and division levels to provide expertise and advice to the commander on space relatedissuesthatmayimpactoperations. 1-138. Space support capabilities include receiving accurate status of positioning, navigation, and timing forplanningoperations, providingcapabilitiesand limitations ofspace-based intelligence, surveillanceand reconnaissance, weather, and communication systems, as well as providing assistance and notification of deliberateenemyinterferenceactivitiessuchasattemptstojamorspooffriendlycommunications.
3-99
40
Chapter 1 1-139. Space-basedsystemsenableairborneandairassaultforcesandsubsequentfollow-onforcesby(cid:650) (cid:122) Providingrapidcommunications thatenable a commandertogainandmaintaintheinitiativeby developingthesituationfasterthantheenemycanreact. (cid:122) Maintaining a sharedcommonoperationalpicture. (cid:122) Retaining the ability to recognize and protect own and friendly forces, as well as synchronize forceactionswithadjacentandsupportingunits. (cid:122) Providingcommunicationlinksbetweenforcesandcommanderswithintheaterandworldwide. (cid:122) Monitoring terrestrial areas of interest through information collection assets to help reveal the enemy’slocationanddisposition,andattemptingtoidentifytheenemy’sintent. (cid:122) Providingglobal positioning system status and accuracyof positioning, navigation, and timing forplanningandconductingmissionoperationssuchassupportfortargeting. (cid:122) Providing update of solar environment and the impact to both terrestrial and space-based segmentsoffriendlycommunicationsystems. (cid:122) Providing meteorological, oceanographic, and space environmental information which is processedandanalyzedtoproducetimelyandaccurateweathereffectsonoperations.
3-99
41
PART I Airborne Operations Chapter 2 Organization and Employment An airborne operation involves the air movement into an objective area of combat forces and their logistic support for execution of a tactical, operational, or strategic mission (JP 3-18). The means employed may be any combination of airborne units, air transportable units, and types of transport aircraft, depending on the mission and the overall situation. This chapter focuses on the role, organization, and capabilities of the airborne assault force (ABNAF) as well as the duties and responsibilities of personnel within or task-organized to an airborne (ABN) Infantry brigade combat team(IBCT)forairborneoperations. SECTION I – AIRBORNE ASSAULT FORCE 2-1. An airborne assault is the use of airborne forces to parachute into an objective area to attack and eliminate armed resistance and secure designated objectives (JP 3-18). An ABNAF comprises an ABN IBCT with capabilitiesorganized,trained,andequippedtogainentryinto an operationalareato enablethe conductoffollow-onoperationsorconduct a singularmission. 2-2. TheABNAFseizesanairhead to destroyorcaptureenemyforces;repelenemyassaultsbyfire,close combat, or counterattack; for follow-on forces; or for any combination. It can deploy rapidly and be sustained by an austere support structure; and can conduct operations against conventional and unconventional enemy forces in all types of terrain and climate conditions. This section addresses how an ABNAF is organized to include distinct levels of echelon employment and application to conduct an airborneassault ORGANIZATION OF FORCES 2-3. Once the commander determines the principal features of the ground assault plan (scheme of maneuver and fire support), he task-organizes subordinate units to execute assigned missions and determines boundaries. To ensure unity of effort or to increase readiness for combat, part or all of the subordinate units of a command can be formed into one or more temporary tactical groupings (teams or taskforces),eachunder a designatedcommander.Nostandardorganizationcanbeprescribedinadvanceto meetallconditions. Infantryunits usuallyformthe tactical nucleusofthe team; Infantry unit commanders leadthe teams.These teamsaretailored fortheinitialassaultbythe attachmentofsupportingunits. These supporting units join the Infantryunits as soon as possible in the marshalling area to plan and prepare for the initial assault. Dependent on the ground tactical plan, certain supporting units may be detached once centralized control is gained. Other units such as higher echelon command posts can be attached for the movementonly.
3-99
42
Chapter 2 INFANTRYBRIGADECOMBATTEAM 2-4. As the assault requires an ABN IBCT, the BCT commander leads the assault force and the parent Army headquarters (normally a division but could be a corps headquarters) provides the ABNTFC. This ensures that the commander fighting the ground tactical plan can give his full attention to the fight in the airhead and not be consumed with managing en route follow-on forces and support. Although the size and compositionofthe ABNAFvariesaccordingto the mission,theABNAF istypicallyanABNIBCT thatis scalableandtailoredwithadditionalcapabilitiesandforcesasdeterminedbytheABNTFC. INFANTRYBATTALION 2-5. For control, the airborne Infantry battalion usually is reinforced for the airborne assault and is organized into a task force. This is especially true if battalions land in widely separated drop zones or landing zones. A battalion task force usuallycomprises an airborne Infantrybattalion with reinforcements based onthe IBCT commander’s estimate for the airborne assault. Follow-on echelon— those additional forces moved into the objective area after the assault echelon. Follow-on echelon reinforcements may include more Infantry, Armored, Stryker, cavalry, antitank, engineer, dedicated artillery, and other units or detachments neededtoexpandthe lodgment. AsintheIBCT,attachmentstothe taskforcefortheairborne assault are made early in the planning phase. They can be withdrawn as soon as the ground situation stabilizes. INFANTRYRIFLEUNITS 2-6. Airborne Infantry rifle companies and platoons can be reinforced for the airborne assault according to the usual considerations governing a ground attack. Attachments are made before the move to, or on arrivalin,themarshallingbase. CAVALRY SQUADRON 2-7. The cavalry squadron of the airborne IBCT, assigned to perform reconnaissance and security missions within the assault phase, usually is reinforced for the airborne assault into a task force. After the ABNAF makes the initial assault landing into the objective area and consolidates the initial airhead, the commander organizes the airhead line, confirms reconnaissance and securityplans, and task-organizes the cavalrysquadronforoperationsinthesecurityarea. ECHELON EMPLOYMENT 2-8. After the task organizationof units or Soldiers for the airborne assault or landing is announced, units organize into assault, follow-on, and rear echelons. The airborne IBCT as the ABNAF, employs organic forcesandotherattachedunitsassigned forthe missionover threeechelons:theassaultechelon,thefollow- on echelon, and the rear echelon. Elements of the higher headquarters ABNAF are employed throughout thethreeechelonsasdirectedbytheABNAFC. ASSAULTECHELON 2-9. The assault echelon (airborne assault) referred to as the Alpha Echelon, is the initial entry force. It is part oftheABNAFthatconductstheparachuteassault onanunsecured dropzonetoseizethelodgment or initial assaultobjectives. The airborne assault echelon is composed of those forces required to conductthe parachute assault to seize assault objectivesand establish the initial airhead, and ifappropriate, prepare an airfield to receive follow-on echelons. This echelon is deployed with sufficient supplies to sustain operations for 72 hours. It includes the assault command post of the ABNTF headquarters providing joint interoperability. FOLLOW-ONECHELON 2-10. The follow-on echelon comprises two elements. Referred to as the Bravo Echelon and the Charlie Echelon,theseelementsaretheairlandportionoftheABNAF.
3-99
43
Organization and Employment (cid:122) The Bravo Echelon is the reinforcing forces in the airhead. When needed, the Bravo Echelon enters the objective area as soon as practical by air or surface movement, or a combination of the two. It is manned and equipped for combat power augmentation and lodgmentexpansion. Itincludesadditionalvehiclesand equipment fromthe ABNAF, plus more forcestoincludesupportingpersonnel.Theexistenceofoneofthefollowingconditionsrequires anABNAFtohave a follow-onechelon: Shortageofaircraft. (cid:132) Aircraftthatcannotlandheavyitemsofequipment. (cid:132) Anyenemysituation,terrain,or weatherthatmakesitimpossibletolandcertainSoldiers or (cid:132) equipmentintheassaultechelon. (cid:122) The Charlie Echelon includes the remainder of the ABNAF and the airborne task force (ABNTF) required for operations after the establishment of the airhead and securing or expanding the lodgment. The Charlie Echelon gives the ABNAF the capability to conduct sustained combat operations within the limitations of the IBCT and provides additional combat powerandequipmentfortheABNTF. Dependingonthe missionand subsequent operations, the Charlie Echelon maybe either a reinforcing force or the first elements of what will become the follow-onforce. Note. Airborne Infantryunits canbe committed to anairborne assault withthe full complement of the follow-onechelonaspartoftheassaultingforce;however, ifleaving a follow-on echelon that mustbe broughtforward by meansother thanair, it is oftendesirable or necessaryto leave certainpersonnelandequipmentbehind. REARECHELON 2-11. The rear echelon is the echelon containing those elements of the force that are not required in theobjectivearea.Therearechelonisnormallysmallfor a brigadeorbattalionandincludespersonnelleft at its rear base to perform administrative and service support functions. A higher headquarters usually controlsthe rearechelonfor allunits. Therearecheloncanremainattheremotemarshallingbase whenthe unit is to be relieved at an early date; or it can rejoin the unit when the IBCT remains committed to sustained combat for a prolonged or indefinite period. In addition, if the airborne force continues in the groundcombatroleafterlinkup,therearechelonmaybebroughtforward. DESIGNATIONOFRESERVE 2-12. The employment of the reserve element follows the normal employment of a reserve unit in a groundoperation. Thelocationoccupied bythe echelon reservedependsonthe mostlikelymissionfor the reserve on commitment. With the reserve element at the departure airfield, the reserve commander must continue planning for possible future commitment of his forces as far as maps, photos, and information of thesituationpermit. TheBattalion as theReserve 2-13. The reserve can be held in the departure area ready to be committed by air when and where the situation dictates. This usually happens in large-scale airborne operations when suitable airfields in the airheadarenotavailable.However,itmaycausedelaysincommitment— (cid:122) Ifsignalcommunicationsfail. (cid:122) Iftheairmovementislong. (cid:122) Ifflyingweatherisunfavorable. (cid:122) Iftimeisaddedforcoordinationofaircover. BrigadeandBattalionReserves 2-14. These reservesmaybeusedtoentertheairheadaspart of theassaultechelon.Theyprovidedepth to the airhead by blocking penetrations, reinforcing committed units, and counterattacking. They consist of
3-99
44
Chapter 2 notmorethan a companyat BCT levelor a platoonatbattalionlevel. However, their smallsize isdictated by tactical considerations and assigned missions. Commanders should organize, task, and position the reserve,ensuringthat— (cid:122) Thesizeofthereserveiscompatiblewithlikelymissions. (cid:122) Thereservecomesfromtheunitwiththefewestprioritytasks. (cid:122) Thereserveisnotassignedassaultobjectivesoranareaoftheairheadtodefend. (cid:122) Thereserveispositionedinanareathatallowsforquickemployment. (cid:122) Thereserveismobile.(Thiscanbeachievedusingorganicvehicles(suchas,weaponscompany, forwardsupportcompany,orifaugmentedwithArmoredorStrykerforces.) (cid:122) Thereserveislocatedinanassemblyarea,bothinitialandsubsequentassemblyareas,or a battle position,sothatitdoesnotinterferewithunitsassignedassaultobjectives. (cid:122) Thereserveisnearlinesofcommunicationin a coveredandconcealedlocationtoprovideease ofmovement,toreinforce,ortoblock. (cid:122) Thereserveislocatedwithinthe areaofoneunit,ifpossible. (cid:122) Thereserve’slocationallowsfordispersionoftheforce. SECTION II – AIRBORNE ASSAULT FORCE CONSIDERATIONS 2-15. The ABNAF can be part of a larger unit, or it can be comprised solely of the initial assault force, preparingthe wayfor deployment of a follow-on force.Thissectiondiscusses assault force considerations forformationandsupport. ASSAULT FORCE FORMATION 2-16. The ABNAF is formed early in the planning stage by a directing or establishing headquarters that allocates units and defines authorityand responsibilitybydesignating command and support relationships. Predesignatedandwell-understoodcommandandsupportrelationshipsinclude(cid:650) (cid:122) A task organization that provides a mission-specific balance of maneuver, combat power, and endurancetoseizeandprotecttheairheadorlodgment. (cid:122) Unit tactical integrity that is maintained when developing load plans and cross loading key leadership, crew-served weapons and equipment followed by all other personnel to ensure unit integrityuponinsertionintothedropzoneandassemble. (cid:122) A sustainmentcapabilitytosupport a rapidtempountilfollow-onorlinkup forcesarrive,or until themissioniscompleted. JOINT AND ARMY CONTROL TEAMS 2-17. Terminal guidance aids and control measures are used on the ground in the objective area to assist and guide incoming airlift aircraft to the designated drop zones or landing zones. Combat control teams comprised of USAF personnel are organized, trained, and equipped to provide aircraft terminal guidance. Armyteams from the long-range surveillance company(LRSC), a divisional or corps asset, are organized, trained, and equipped to deploy into the objective area and conduct reconnaissance and surveillance tasks beforethedeploymentoftheairborneforce. COMBATCONTROLTEAM 2-18. The combat control team is a small task-organized team of USAF parachute and combat diver qualified personnel. The combat control team’s mission is to establish assault zones (drop zones and landingzones) inaustereandnon-permissive environments. The missionincludesinitiallyplacingenroute and terminal navigational aids; controlling air traffic; providing communications; and removing obstacles and unexploded ordnance with demolitions. Combat control teams provide command and control, reconnaissance and surveillance, and limited weather observations. (Refer to JP 3-17 for more information.)
3-99
45
Organization and Employment LONG-RANGESURVEILLANCECOMPANY 2-19. The long-range surveillance company (LRSC) is a corps level asset for the purpose of long-range surveillance. The LRSC comprises a headquarters section, a communications platoon, a transportation section, a maintenance section, and three long-range surveillance platoons withthree teams each for a total of 9 teams. The LRSC is modular in that it has the command, control, and communications capability to supportmultipleoperationssimultaneously.(RefertoFM 3-55.93formoreinformation.) SECTION III – CAPABILITIES, LIMITATIONS, VULNERABILITIES 2-20. Airborne forces deploy strategically, operationally, or tactically on short notice anywhere in the world.They canbe employed as a deterrentor as a combatforce.The strategic mobilityof airborne forces permits rapid employment to meet contingence across the range of military operations; and provides a means by which a commander can decisively influence operations. This section discusses the capabilities, limitationsandvulnerabilitiesuniquetoanABNAF. CAPABILITIES 2-21. Since airborne forces are able to respond on short notice, airborne operations provide distinct advantagessuchas— (cid:122) Abilitytobypassalllandorseaobstacles. (cid:122) Surprise. (cid:122) Abilitytomassrapidlyoncriticaltargets. 2-22. Airborne forces can extend the area of operation, move, and rapidlyconcentrate combat power like nootheravailableforces.Specifically,airborneforcescan— (cid:122) Attackenemypositionsfromanydirection. (cid:122) Conductattacksandraidsbeyondthe areaofoperation. (cid:122) Conductlimitedexploitationandpursuitoperations. (cid:122) Overflyand bypass enemy positions, barriers, and obstacles and strike objectives in otherwise inaccessibleareas. (cid:122) Provideresponsivereserves,allowingcommanderstocommit a largerportionoftheirforcesto action. (cid:122) Reactrapidlytotacticalopportunities,necessities,andthreatsinunassignedareas. (cid:122) Rapidlyplaceforcesattacticallydecisivepointsinthe areaofoperation. (cid:122) Conductfast-pacedoperationsoverextendeddistances. (cid:122) Conductandsupportdeceptionwithfalseinsertions. (cid:122) Rapidlyreinforcecommittedunits. (cid:122) Rapidlysecureand defendkeyterrain(suchascrossingsites,roadjunctions,andbridges)orkey objectives. (cid:122) Rapidlyrepairorconstructinfrastructuretoreceivefollow-onforces. (cid:122) Delay a muchlargerforcewithoutbecomingdecisivelyengaged. 2-23. Airborne forces, when augmented with appropriate support or augmentation, can conduct sustained combatoperationsagainsttheenemy. LIMITATIONS 2-24. Thecommander andplannersmust recognize thelimitationsofairborne forcesandplanaccordingly. Theymustconsiderthefollowing: (cid:122) An airborne force depends on USAF aircraft for long-range movement, fire support, and sustainment. The availability and type of aircraft dictates the scope and duration of airborne operations. (cid:122) Aftertheinitialairdrop,thesustainedcombatpowerofairborneforces dependsonresupplyby air. Any interruption in the flow of resupply aircraft can cause a potential weakening of the
3-99
46
Chapter 2 airborne force. Enemy air defense fires against resupply aircraft and long-range artillery and mortar fires on the drop zone can hamper the delivery, collection, or distribution of critical supplies. (cid:122) Once on the ground, the airborne force has limited tactical mobility. That mobility depends on the number and type ofvehiclesand helicoptersthatcan be broughtinto the objectivearea with thefollow-onforce. (cid:122) The airborne force has limited field artillery and air defense artillery support until additional assets can be introduced into the objective area. Additional target acquisition assets are needed toprovideaccurateandtimelytargetinginformation. (cid:122) Evacuation of casualties from the airhead is difficult. Until evacuation means are available, the BCT must be prepared to provide medical care through the attachment of its organic medical companyortheattachmentofechelonaboveBCTmedicalelements. VULNERABILITIES 2-25. Airborne forcesare vulnerable to enemyattack while enroute to the drop zone. Althoughthe USAF can conduct limited airdrops without air superiority, large operations require neutralization or suppression of enemy air defenses (SEAD). This may require SEAD, radar jamming, and fighter aircraft besides transport and close air support sorties. Initial airborne assault elements are light and are separated from weapon systems, equipment, and materiel that provide protection and survivability. An ABNAF is particularlyvulnerabletoenemy— (cid:122) Attack by aircraft and air defense weapon systems during the movement and airborne assault phases. (cid:122) Attack by chemical, biological, radiological, and nuclear weapons because of limited chemical, biological,radiological,andnuclearprotectionanddecontaminationcapability. (cid:122) Attackbyground,air,orartilleryduringtheassaultandlandingphases. (cid:122) Airstrikesifairsuperiorityisnotgainedbeforetheairborneassault. (cid:122) Electronicattack,toincludejammingofcommunicationsandnavigationsystems,anddisrupting aircraftsurvivabilityequipment. (cid:122) Small-arms fire that presents a large threat to the aircraft during the air movement, airborne assaultandlandingphases. SECTION IV – AIRBORNE COMMAND AND CONTROL PLATFORMS 2-26. Airborne operations require extensive coordination between the USAF, Army, and often, other services.Duringforcible entry, airbornecommandandcontrolplatformsmay be employedseparatelyor in combination to augment or even replace the ground-based elements when response time is critical. This section discusses the airborne elements of the tactical air control system, consisting of the Airborne Warning and Control System (AWACS), Joint Surveillance Target Attack Radar System (JSTARS), and the Joint Airborne Communications Center/Command Post (JACC/CP) or "Jackpot" package, designed to fitaboard a C-130aircraft. AIRBORNE WARNING AND CONTROL SYSTEM 2-27. TheAWACS,designatedbytheUSAFasthe E-3 radar,is a modifiedBoeing707thathouses a radar subsystemand vastcommunicationsequipment. Itis under operationalcontrol ofthe tacticalairliftcontrol center(TACC).The AWACS radarsystemcancompensate forthe majorlimitationsofground-based radar systemssuchastheirinabilitytodetectlow-flyingaircraftduetoline-of-sightrestrictions.Otherlimitations of ground-based radar systems include their susceptibility to electronic countermeasures and their vulnerabilitytoattack. 2-28. The AWACScancommunicate with a wide range of systems. It hasextensive high frequency(HF), very high frequency (VHF), and ultrahigh frequency (UHF) radios used to communicate with ground controllers, airborne forces, and ground forces. The E-3‘s radar flexibility allows it to support tactical missions, defensive missions, or both at the same time. The aircraft is used for weapons control or as a
3-99
47
Organization and Employment surveillance platform. In an air defense role, the E-3 radar provides weapons control and surveillance capabilities.Itprovidescontrolforweaponsandairdefenseregionsduringstagesofincreasedalerts. JOINT SURVEILANCE TARGET ATTACK RADAR SYSTEM 2-29. The E-8C Joint Surveillance Target Attack Radar System (JSTARS) is an airborne command and control, intelligence, surveillance and reconnaissance platform. Its primary mission is to provide theater ground and air commanders with ground surveillance to support attack operations and targeting that contributes to the delay,disruptionanddestructionofenemyforces. Whenavailable, JSTARSaircraft may beemployedas a viableairborneassaultforcecommandplatforminsupportofforcibleentryoperations. 2-30. The E-8Cis a modified Boeing707-300 seriescommercialairframe extensivelyremanufactured and modified with the radar, communications, operations and control subsystems required to perform its operational mission. The most prominent external feature is the 27-feet (8 meters) long, canoe-shaped dome under the forward fuselage that houses the 24-feet (7.3 meters) long, side-looking phased array antenna. This aircraft is capable of in-flight refueling, allowing flexibility for extend operations in support offorcibleentryoperations. 2-31. The radar and computer subsystems on the E-8C can gather and display detailed information on ground forces. The informationis relayed in near-real time to ground command, control, communications, computers and intelligence systems. The antenna can be tilted to either side of the aircraft where it can develop a 120-degree field ofviewcovering nearly19,305 square miles (50,000 square kilometers) and is capable of detecting targets at more than 250 kilometers (more than 820,000 feet). The radar has some limitedcapabilitytodetecthelicopters,rotatingantennasandlow,slow-movingfixedwingaircraft. JOINT AIRBORNE COMMUNICATIONS CENTER/COMMAND POST 2-32. The Joint Airborne Communications Center/Command Post (JACC/CP), or "Jackpot" package is designed to fit aboard a military C-130 aircraft and has military and civilian band radios and Internet access. Joint Communications Support Element (JCSE) is the contingency support unit for the package consistingofU.S. Army,Navy, AirForce,and MarineCorps personnelprovidingoperatorsupporttoassist G-6 in managing the variety of communications equipment to include: SECRET Internet Protocol Router Network(SIPRNET) servicesthroughaninternational maritime satellite antenna; as well as, a fullarrayof FM and TACSAT networks. The JACC/CP canbe deployed within24 hours fromthe time the JCS issues deployment approval messages. With most C-130 aircraft not being capable of in-flight refueling, time available over an objective may be limited, possibly requiring basing from a forward area or an intermediatestagingbase.(RefertoJP 6-0 formoreinformation.) 2-33. The JACC/CP has four major components: operations center (12 SIPRNET laptop workstations), communications control, generator, and an air conditioner/accessorytrailer. The jackpot package provides onehighfrequency,singlesideband(HF/SSB)voiceorteletype communicationchanneloverits 1-kilowatt transceivers orhighfrequency, doubleindependent sideband with a total of fourindependent 3 kilohertz(3 SPKHZ) voice or teletype channels over its 10-kilowatt system. The 10-kilowatt system is limited to ground operations only. The JACC/CP contains three radios, an AN/ARC-73 (VHF/AM), AN/ARC-54 (VHF/FM)andAN/ARC-51BX(VHF/AM),forground-to-groundandground-to-aircommunications. 2-34. The voice radio system may be connected to a 10-line, 20-line, or 30-line, four-wire/two-wire telephone switchboard. The switchboard can connect any telephone subscriber to another telephone or a JACC/CP.Thecomplete JACC/CP canbetransportedin a winchequipped C-130orlarger aircraft. A wide lowboytrailermustbeusedtotransportthevansanydistanceoroverotherthanpavedorgravelroads.
3-99
49
Chapter 3 Airborne Assault Planning Airborne assaults may be conducted as a rapid crisis response against less capable enemies, where the conditions needed for the entry are quickly set with limited shaping operations or where forward deployed and rapid response elements must conduct the airborne assault mainly with their organic capabilities and minimal reinforcement. They may be larger-scale entry operations where there is significant shaping required to set the conditions for the airborne assault. Commanders begin planning for an airborne assault with a visualization of the ground tactical plan and work backwards through the landing plan, the air movement plan, and the marshalling plan. Planning is conducted in this order regardless of the type and duration of the mission or the size of the force. This chapter addresses roles and responsibilities, planning sequence and considerations, and shaping operations for an airborneassault. SECTION I – ROLES AND RESPONSIBILITIES 3-1. Airborne assault planning is as detailed as time permits and should include completion of written orders and plans. Within time constraints, the ABNAFC carefully evaluates capabilities and limitations of the total force and develops a plan that communicates a common vision and synchronizes the action of forces in time, space, and purpose to achieve objectives and accomplish missions. The planning should be highly structured involving the commander, staff, subordinate commanders, and others to develop a fully synchronized plan or order. Planning time should abide by the one-third/two-thirds rule to ensure subordinateshaveenoughtimetoplanandrehearse. HIGHER HEADQUARTERS 3-2. The joint task force commander directs the composition of the ABNTF headquarters and the ABNAF. This headquarters allocates units, defines authority, and assigns responsibility by designating command and support relationships. The staff of this headquarters is responsible to develop the task organization of the ABNAF and conducting the necessary steps of the military decisionmaking process (MDMP). A division-level commander or hisequivalent is the approvingauthorityfor the formation of an ABNAF.(RefertoFM 3-94formoreinformation.) PLANNINGRESPONSIBILITIES 3-3. The joint task force commander initiates airborne operations with a planning directive to participating units. The directive assimilates through normal command channels at the corps and division levels;pertinentinformationthenispassedtoBCTs.Thedirectivemust— (cid:122) Specifymissions. (cid:122) Outlinethecommandstructure. (cid:122) Identifyparticipatinggroundandairforces. (cid:122) Listforcesinsupport. (cid:122) Provide a scheduleofevents. (cid:122) Stateconditionsunderwhichtheoperationbegins,isdelayed,isaltered,oristerminated. (cid:122) Establishsupportedandsupportingrelationships.
3-99
50
Chapter 3 KEYPERSONNELRESPONSIBILITIES 3-4. The ABNTFC establishes mission command by ensuring that his concept is understood and by definingtheresponsibilitiesofkeypersonnelfor— (cid:122) Accomplishingthegroundmission. (cid:122) Task-organizingandaircraftassignment. (cid:122) Sustaining. 3-5. Thecommander,airliftforcefordefiningresponsibilitiesofkeypersonnelfor— (cid:122) Aircraftallocationtosupportthegroundtacticalplan. (cid:122) Assaultforceinsertion. (cid:122) Resupplyandevacuation. 3-6. TheABNTFCandcommander,airliftfordefiningjointresponsibilityofkeypersonnelfor— (cid:122) Establishingcontrolpartiesatdeparturelocation. (cid:122) Loading(Soldiersandequipment). (cid:122) Rehearsing. (cid:122) Rehearsingcommunicationcoordinationandstandardization. (cid:122) Selectingdropzonesandlandingzones. (cid:122) Establishingcontrolpartiesatdropzonesandlandingzones. (cid:122) Uploadingaircraft. (cid:122) Planningaerialresupplyandevacuation. (cid:122) Departingairfieldsecurity. (cid:122) Workingorplanningairmovementtables. (cid:122) Coordinatingmovements(Soldiersandaircraft). AIRBORNE ASSAULT FORCE 3-7. TheABNIBCT isthecoreofthe ABNAFandthe ABN IBCT commanderisnormallythe ABNAFC for a battalion or larger airborne assault. The primary role of the ABNAFC and his staff is to develop the ground tactical plan by providing his staff and all supporting unit commanders and staffs with key tasks, intent and guidance concerning the weight of the attack, reconnaissance coverage and the level of acceptablerisk. SUPPORTING AVIATION 3-8. Strategic location of the airhead or lodgment may limit what aviation support can be provided for reconnaissance and attack of the airhead or lodgment before the airborne assault. Once the joint force commander relinquishes control of the operation to the ABNAFC, both fixed- and rotary-wing supporting aviationunitsareunderthe operationalcontrol ofthe ABNAFC.Notallfixed-wingaviationfallsunderthe ABNAFC,onlythatwhichisindirectsupportofthegroundtacticalplan. 3-9. Once the airhead or lodgment is established, and dependent on the ground tactical plan, an aviation task force maybe created to supportan ABNAF especially ifthe ground tacticalplan necessitates support for follow-onoperations.However, thecombataviationbrigade commandertypicallyanticipatesthe needs of the ABNAFC and provides the necessary aviation units to support the mission of the ABNAF. As the supporting unit, the combat aviation brigade commander directs aviation units within his command or requestsaugmentationfromhishigherheadquarterstomeettheneedsoftheABNAFC. SECTION II – REVERSE PLANNING SEQUENCE 3-10. The ABNTFC and his staff develop, in this order, the ground tactical plan, the landing plan, the air movement plan, and the marshalling plan. The ABNAF staff and all supporting units coordinate, develop, and refine concurrently to make best use of available time and resources. They develop first the ground tactical plan, which serves as the basis to develop the other plans. Each plan may potentially affect the others.Changesinanaspect ofone plan mayrequire adjustmentsinthe other plans. The ABNAFC must
3-99
51
Airborne Assault Planning determine if such adjustments entail acceptable risk. If the risk is unacceptable, the concept of operations (CONOPS)mustchange. GROUND TACTICAL PLAN 3-11. The ground tactical plan is the basis for the development of all other plans. The ABNAFC and his staff give special consideration to the assembly and organization of the assault forces and to the decentralized nature of initial operations in the objective area. The subordinate commander requires the ground tactical plan of his higher headquarters before he can begin planning. He needs to know the type, location, and size of objectives and the enemy situation at each one; the mission and intent of higher headquarterstwolevelsup;andhistaskandpurpose.Thegroundtactical planisgenerated downthechain of command as a mutual effort. (Refer to chapter 4 of this publication for more information.) The ground tacticalplanincludes(cid:650) (cid:122) Assaultobjectivesandairheadline. (cid:122) Reconnaissanceandsecurityforcestoincludeobservationposts. (cid:122) Boundaries. (cid:122) Taskorganization. (cid:122) Designationofreserve. (cid:122) Supply(accompanying,follow-up,routine). (cid:122) Firesupportplan. (cid:122) Tacticalcrossload(forairlandorparachute). LANDING PLAN 3-12. Thelanding plan is the ABNAFC’s plan thatlinks the air movementplan tothegroundtactical plan. It is published at brigade level and below. Before the ABNAFC can prepare an overall landing plan, he must know where the subordinate commander wants to place his assault force. The landing plan is generated up the chain of command as a mutual effort. (Refer to Chapter 5 of this publication for more information.)Thelandingplanincludes(cid:650) (cid:122) Dropzone,landingzone,locationsanddescriptions. (cid:122) Sequenceofdelivery. (cid:122) Methodofdelivery. (cid:122) Placeofdelivery. (cid:122) Timeofdelivery. (cid:122) Cross-loadingplan. (cid:122) Assemblyplan. (cid:122) Landingplanworksheet. AIR MOVEMENT PLAN 3-13. The air movement plan provides the information required to move the airborne force from the departure airfields to the objective area. This plan is the third step in the reverse planning process and coversthe period fromwhen unitsload to whentheyexit the aircraft. The airborne commander designates the subordinate unit’s sequence of airflow and allocates aircraft. This allows the subordinate commanders to conduct air movement planning. The air movement plan is generated up the chain of command as a mutual effort. (Refer to chapter 6 of this publication for more information.) The air movement plan includes(cid:650) (cid:122) Departureairfields. (cid:122) Aircraftbyserial. (cid:122) Parkingdiagram. (cid:122) Aircraftmission(airmovementtablesandflightroutes). (cid:122) Unitprovidingtheaircraft.
3-99
52
Chapter 3 MARSHALLING PLAN 3-14. Thisplanisdeveloped last in the reverse planningsequence and isbased onthe requirementsof the otherplans.It providesthe neededinformationforunitsoftheassaultforcetoprepare for combat,to move to departure airfields, and to load aircraft.The marshalling plan provides detailed instructions for facilities andservicesneededduringmarshalling.It isgenerateddownthechainofcommand.(Referto chapter 7 of thispublicationformoreinformation.)Themarshallingplanincludes(cid:650) (cid:122) Movementtothemarshallingarea. (cid:122) Passivedefensivemeasures. (cid:122) Dispersalmeasures. (cid:122) Departureairfields. (cid:122) Marshallingoperations. (cid:122) Confirmationbriefschedule. (cid:122) Preparationforcombat(backbrief,inspection,supervision,rehearsal,andrest). (cid:122) Communications. SECTION III – PLANNING CONSIDERATIONS 3-15. Whether done deliberatelyor rapidly, all planningrequires skillful use of available time to optimize planning and preparation throughout the unit. Taking more time to plan often results in greater synchronization;however,anydelayinexecutionrisksyieldingtheinitiative withmoretimetoprepareand acttotheenemy.When allocatingplanningtimeensuresubordinateshaveenoughtime to planandprepare theirownactionsbeforeexecution. PLANNING METHODOLOGY 3-16. Planning for airborne operations mirrors the MDMP. (See figure 3-1.) It incorporates parallel and collaborative planning actions necessary to provide the additional time and detailed planning required for successfulexecutionofanairborneassaultmission.
3-99
53
Airborne Assault Planning Figure 3-1. MDMP and airborne assault planning process
3-99
54
Chapter 3 PREDEPLOYMENT PLANNING AND PREPARATION 3-17. Units must plan for and prepare internal deployment standard operating procedures (SOPs) and continually update and rehearse them. These SOPs should include actions that are common to all deployments, to include airland, parachute assault planning, preparation, execution, and assessment. They mayinclude: (cid:122) Conductrapid,shortnoticedeployment. (cid:122) Emergencydeploymentreadinessexercise(commonlyknownasEDRE). (cid:122) Preparepersonnelforoverseasdeployment. (RefertoFM 3-35formoreinformation.) (cid:122) Updateandreviewallvehicleloadplans. (cid:122) Validateandupdatemovementplanswithnexthigherheadquarters. (cid:122) Updateaccessandrecallrosters. (cid:122) Reviewfamilyreadinessgrouprostersandreardetachmentresponsibilities. (cid:122) Ensure special team personnel are identified and trained (movement, chemical, biological, radiological,andnuclear,outload,ammunitionhandling). X- HOUR/N-HOUR SEQUENCES FOR DEPLOYMENT 3-18. The X-hour/N-hour sequences for deployment are developed and followed to ensure all reports, actions, and outload processes are accomplished at the proper time during marshalling. They aid in developing air and deployment schedules and are flexible to allowfor modifications based on the mission andtheunitcommander’sconceptoftheoperation. 3-19. X-hour is the unspecified time that commences unit notification for planning and deployment preparation in support of potential contingency operations that do not involve rapid, short notice deployment.X-hoursequenceis an extended sequenceofeventsinitiatedby X-hour thatallowaunit tofocusonplanningfor a potentialcontingencyoperation,toincludepreparationfordeployment. 3-20. N-hour is the time a unit is notified to assemble its personnel and begin the deployment sequence. The N-hour sequence starts the reverse planning necessary after notification to have the first assault aircraft en route to the objective area for commencement of the parachute assault in accordancewiththeorderforexecution. 3-21. In anticipation of an order for execution; the ABNAF staff and its key leaders begin preparing or updating an operations plan. The length of X-hour planning varies based on the contingency planning or crisis action planning situation and the specific operations plan. It normally ceases with either the designation of N-hour, or if political or military events warrant, no further action. Deployment planning sequencesfallintooneofthreescenarios: (cid:122) Unconstrained X-hoursequence.Usedprimarilyfordeliberateplanningorcrisis-actionplanning thatisnotunder a timeconstraint. (cid:122) Constrained X-hoursequence.Usedforcrisisactionplanning. (cid:122) N-hoursequence.Maybeproceededbyan X-hoursequence. OPTIMIZE AVAILABLE PLANNING TIME 3-22. Effective execution requires issuing timely plans and orders to subordinates. Timely plans are those issued soon enough to allow subordinates time to plan, issue their orders, and prepare for operations. In time-constrained environments, products contain just enough information for the commander to make a reasoned decision and subordinates to assess the situation quickly and plan, prepare, and execute the necessaryactions. Regardless ofwhether timeforplanningisconstrained ornot,tooptimizeavailabletime and ensure the best possible synchronization, commanders encourage collaborative and parallel planning betweentheirheadquartersandhigherandlowerheadquarters. COLLABORATIVEANDPARALLELPLANNING 3-23. Both collaborative and parallel planning help optimize available planning time. Collaborative planningisseveralechelonsdevelopingplansandorderstogether.Commanders,subordinatecommanders,