FM
stringclasses 43
values | page
int64 1
477
| text
stringlengths 6
8.45k
|
---|---|---|
7-100.1 | 35 | _________________________________________________________________________________Chapter 1
PRINCIPLES OF OPERATION VERSUS AN EXTRAREGIONAL POWER
1-54. The State assumes the distinct possibility of intervention by a major
extraregional power in any regional conflict. Consequently, it has devised the
following principles for applying its various instruments of diplomatic-
political, informational, economic, and military power against this type of threat.
CONTROL ACCESS INTO REGION
1-55. Extraregional enemies capable of achieving overmatch against the
State must first enter the region using power-projection capabilities. There-
fore, the State’s force design and investment strategy is focused on access
controlto selectively deny, delay, and disrupt entry of extraregional forces
into the region and to force them to keep their operating bases beyond con-
tinuous operational reach. This is the easiest manner of preventing the ac-
cumulation of enemy combat power in the region and thus defeating a techno-
logically superior enemy.
1-56. Access-control operations are continuous throughout a strategic cam-
paign and can reach beyond the theater as defined by the State’s NCA. They
begin even before the extraregional power declares its intent to come into the re-
gion, and continue regardless of whether the State is conducting regional, transi-
tion, or adaptive operations. Access-control operations come in three basic forms:
strategic preclusion, operational exclusion, and access limitation.
Strategic Preclusion
1-57. Strategic preclusion seeks to completely deter extraregional involve-
ment or severely limit its scope and intensity. The State would attempt to
achieve strategic preclusion in order to reduce the influence of the extrare-
gional power or to improve its own regional or international standing. It
would employ all its instruments of power to preclude direct involvement by
the extraregional power. Actions can take many forms and often contain sev-
eral lines of operation working simultaneously.
1-58. The primary target of strategic preclusion is the extraregional power’s
national will. First, the State would conduct diplomatic and perception man-
agement activities aimed at influencing regional, transnational, and world
opinion. This could either break apart ad hoc coalitions or allow the State to
establish a coalition of its own or at least gain sympathy. For example, the
State might use a disinformation campaign to discredit the legitimacy of dip-
lomatic and economic sanctions imposed upon it. The extraregional power’s
economy and military would be secondary targets, with both practical and
symbolic goals. This might include using global markets and international fi-
nancial systems to disrupt the economy of the extraregional power, or con-
ducting physical and information attacks against critical economic centers.
Similarly, the military could be attacked indirectly by disrupting its power
projection, mobilization, and training capacity. Preclusive actions are likely
to increase in intensity and scope as the extraregional power moves closer to
military action. If strategic preclusion fails, the State will turn to operational
methods that attempt to limit the scope of extraregional involvement or cause
it to terminate quickly. |
7-100.1 | 36 | FM 7-100.1________________________________________________________________________________
Operational Exclusion
1-59. Operational exclusion seeks to selectively deny an extraregional force
the use of or access to forward bases of operation within the region or even
outside the theater defined by the NCA. For example, through diplomacy,
economic or political connections, information campaigns, and/or hostile ac-
tions, the State might seek to deny the enemy the use of bases in other for-
eign nations. It might also attack population and economic centers for the in-
timidation effect, using long-range surface-to-surface missiles (SSMs), WMD,
or SPF.
1-60. Forces originating in the enemy’s homeland must negotiate long and
difficult air and surface lines of communication (LOCs) merely to reach the
region. Therefore, the State will use any means at its disposal to also attack
the enemy forces along routes to the region, at transfer points en route, at ae-
rial and sea ports of embarkation (APOEs and SPOEs), and even at their
home stations. These are fragile and convenient targets in support of transi-
tion and adaptive operations.
Access Limitation
1-61. Access limitation seeks to affect an extraregional enemy’s ability to in-
troduce forces into the theater. Access-control operations do not necessarily
have to deny the enemy access entirely. A more realistic goal is to limit or in-
terrupt access into the theater in such a way that the State’s forces are capa-
ble of dealing with them. By controlling the amount of force or limiting the
options for force introduction, the State can create conditions that place its
conventional capabilities on a par with those of an extraregional force. Capa-
bility is measured in terms of what the enemy can bring to bear in the thea-
ter, rather than what the enemy possesses.
1-62. The State’s goal is to limit the enemy’ accumulation of applicable com-
bat power to a level and to locations that do not threaten the accomplishment
of a strategic campaign. This may occur through many methods. For example,
the State may be able to limit or interrupt the enemy’s deployment through
actions against his aerial and sea ports of debarkation (APODs and SPODs)
in the region. Hitting such targets also has political and psychological value.
The State will try to disrupt and isolate enemy forces that are in the region or
coming into it, so that it can destroy them piecemeal. It might exploit and
manipulate international media to paint foreign intervention in a poor
light, decrease international resolve, and affect the force mix and rules of
engagement (ROE) of the deploying extraregional forces.
EMPLOY OPERATIONAL SHIELDING
1-63. The State will use any means necessary to protect key elements of its
combat power from destruction by an extraregional forceparticularly by air
and missile forces. This protection may come from use of any or all of the fol-
lowing:
• Complex terrain.
• Noncombatants.
• Risk of unacceptable collateral damage. |
7-100.1 | 37 | _________________________________________________________________________________Chapter 1
• Countermeasure systems.
• Dispersion.
• Fortifications.
• IW.
1-64. Operational shielding generally cannot protect the entire force for an
extended time period. Rather, the State will seek to protect selected elements
of its forces for enough time to gain the freedom of action necessary to prose-
cute important elements of a strategic campaign.
CONTROL TEMPO
1-65. The OPFOR initially employs rapid tempo to conclude regional opera-
tions before an extraregional force can be introduced. It will also use rapid
tempo to set conditions for access-control operations before the extraregional
force can establish a foothold in the region. Once it has done that, it needs to
be able to control the tempoto ratchet it up or down, as is advantageous to
its own operational or tactical plans.
1-66. During the initial phases of an extraregional enemy’s entry into the re-
gion, the OPFOR may employ a high operational tempo. Taking advantage of
the weaknesses inherent in enemy power projection, it seeks to terminate the
conflict quickly before main enemy forces can be brought to bear. If the
OPFOR cannot end the conflict quickly, it may take steps to slow the tempo and
prolong the conflict, taking advantage of enemy lack of commitment over time.
CAUSE POLITICALLY UNACCEPTABLE CASUALTIES
1-67. The OPFOR will try to inflict highly visible and embarrassing losses on
enemy forces to weaken the enemy’s domestic resolve and national will to
sustain the deployment or conflict. Modern wealthy nations have shown an
apparent lack of commitment over time, and sensitivity to domestic and
world opinion in relation to conflict and seemingly needless casualties.
1-68. The OPFOR has the advantage of disproportionate interests: the ex-
traregional power may have limited objectives and only casual interest in the
conflict, while the State approaches it from the perspective of total war and a
threat to its aspirations or even to its national survival. The State is willing
to commit all means necessary, for as long as necessary, to achieve its strate-
gic goals. Compared to the extraregional enemy, the State stands more will-
ing to absorb higher military and civilian casualties in order to achieve vic-
tory. It will try to influence public opinion in the enemy’s homeland to the ef-
fect that the goal of intervention is not worth the cost.
NEUTRALIZE TECHNOLOGICAL OVERMATCH
1-69. Against an extraregional force, the OPFOR will forego massed forma-
tions, patterned echelonment, and linear operations that would present easy
targets for such an enemy. It will hide and disperse its forces in areas where
complex terrain limits the enemy’s ability to apply his full range of techno-
logical capabilities. However, the OPFOR can rapidly mass forces and fires
from these dispersed locations for decisive combat at the time and place of its
own choosing. |
7-100.1 | 38 | FM 7-100.1________________________________________________________________________________
1-70. Another way to operate on the margins of enemy technology is to ma-
neuver during periods of reduced exposure. The OPFOR trains its forces to
operate in adverse weather, limited visibility, rugged terrain, and urban envi-
ronments that shield them from the effects of the enemy’s high-technology weap-
ons and deny the enemy the full benefits of his advanced reconnaissance, intelli-
gence, surveillance, and target acquisition (RISTA) systems.
1-71. Modern militaries rely upon information and information systems to
plan and conduct operations. For this reason, the OPFOR will conduct exten-
sive information attacks and other offensive IW actions. It can also use the
enemy’s robust array of RISTA systems against him. A sophisticated enemy’s
large numbers of sensors can overwhelm subordinate units’ ability to receive,
process, and analyze raw intelligence data and to provide timely and accurate
intelligence analysis. The OPFOR can add to this saturation problem by us-
ing deception to flood enemy sensors with masses of conflicting information.
Conflicting data from different sensors at different levels (such as satellite
imagery conflicting with data from unmanned aerial vehicles) can confuse the
enemy and degrade his situational awareness.
1-72. The OPFOR will concentrate its own RISTA, maneuver, and fire sup-
port means on the destruction of high-visibility (flagship) enemy systems.
This offers exponential value in terms of increasing the relative combat
power of the OPFOR and also maximizes effects in the information and psy-
chological arenas. Losses among these premier systems may not only degrade
operational capability, but also undermine enemy morale. Thus, attacks
against such targets are not always linked to military objectives.
CHANGE THE NATURE OF CONFLICT
1-73. The OPFOR will try to change the nature of conflict to exploit the dif-
ferences between friendly and enemy capabilities. Following an initial period
of regionally-focused conventional operations and utilizing the opportunity af-
forded by phased enemy deployment, the OPFOR will change its operations
to focus on preserving combat power and exploiting enemy ROE. This shift in
the focus of operations will present the fewest targets possible to the rapidly
growing combat power of the enemy. Also, the OPFOR or affiliated forces can
use terror tactics against enemy civilians or soldiers not directly connected to
the intervention as a device to change the fundamental nature of the conflict.
1-74. Against early-entry forces, the OPFOR may still be able to use the de-
sign it employed in previous operations against regional opponents, particu-
larly if access-control operations have been successful. However, as the extrare-
gional force builds up to the point where it threatens to overmatch the OPFOR,
the OPFOR is prepared to disperse its forces and employ them in patternless op-
erations that present a battlefield that is difficult for the enemy to analyze and
predict.
1-75. The OPFOR may hide and disperse its forces in areas of sanctuary. The
sanctuary may be physical, often located in urban areas or other complex ter-
rain that limits or degrades the capabilities of enemy systems. However, the
OPFOR may also use moral sanctuary by placing its forces in areas shielded
by civilians or close to sites that are culturally, politically, economically, or
ecologically sensitive. It will defend in sanctuaries when necessary. However, |
7-100.1 | 39 | _________________________________________________________________________________Chapter 1
units of the OPFOR will move out of sanctuaries and attack when they can
create a window of opportunity or when opportunity is presented by physical
or natural conditions that limit or degrade the enemy’s systems.
1-76. OPFOR units do not avoid contact; rather, they often seek contact, but
on their own terms. Their preferred tactics under these conditions would be
the ambush and raid as a means of avoiding decisive combat with superior
forces. They will also try to mass fires from dispersed locations to destroy key
enemy systems or formations. However, when an opportunity presents itself,
the OPFOR can rapidly mass forces and execute decisive combat.
ALLOW NO SANCTUARY
1-77. Along with dispersion, decoys, and deception, the OPFOR uses urban
areas and other complex terrain as sanctuary from the effects of enemy
forces. Meanwhile, its intent is to deny enemy forces the use of such terrain.
This forces the enemy to operate in areas where the OPFOR’s long-range fires
and strikes can be more effective.
1-78. The OPFOR seeks to deny enemy forces safe haven during every phase
of a deployment and as long as they are in the region. It is prepared to attack
enemy forces anywhere on the battlefield, as well as to his strategic depth.
The resultant drain on manpower and resources to provide adequate force-
protection measures can reduce the enemy’s strategic, operational, and tacti-
cal means to conduct war and erode his national will to sustain conflict. The
goal is to present the enemy with a nonlinear, simultaneous battlefield. Such
actions will not only deny the enemy sanctuary, but also weaken his national
will, particularly if the OPFOR or affiliated forces can strike targets in the
enemy’s homeland.
OPFOR MILITARY AND OPERATIONAL ART
1-79. The OPFOR embraces the concept that military strategy and opera-
tions are an important part, but not the whole, of the conduct of war. Military
strategy is not separate from politics and political leadership but a means to
support the State in achieving its political objectives. The national security
strategy is essentially a political document that sets forth the goals of the
State and informs military strategists. It is their responsibility to build,
train, and employ forces for the purpose of achieving those political goals.
1-80. When the political leadership makes the decision to employ military
forces to achieve a goal, the military strategy for that employment is closely
associated with diplomatic-political, informational, and economic strategies
to bring about a favorable political result. Thus, the military leadership re-
quires a broad understanding of the overall national strategy, and the politi-
cal leadership needs an understanding of the capabilities and limitations of
the military.
MILITARY STRATEGY
1-81. The OPFOR views military strategy as the art of developing the ways
and means for the application of military power to achieve State objectives.
Ways and means encompass the threatened or actual use of force. Military |
7-100.1 | 40 | FM 7-100.1________________________________________________________________________________
doctrine describes fundamental principles and provides guidelines for the use
of military forces in pursuit of national objectives.
1-82. Military and operational art is the theory and practice of conducting
armed conflict. It recognizes that war is a human endeavor and therefore not
amenable to quantifiable formulas that limit thinking and lead to unimagina-
tive and predictable solutions. It is the intellectual and intuitive synthesis of
military doctrine, military science, and intangibles to address the problem at
hand. Military science is not discarded but, like military doctrine, is seen as
providing tools that support the practice of military art. The single, most im-
portant ingredient in the practice of military strategy, and of military and
operational art, is the commander. The commander who develops creative so-
lutions to military problems is highly valued.
1-83. The study and analysis of political and military history has an impor-
tant place in the development of OPFOR military thought and doctrine. The
OPFOR views the role of history and past experience as one that provides in-
sights and observations into the present and future conduct of war. It is a
significant source for the development of new and adaptive ways of conduct-
ing military operations. The OPFOR has developed an effective method for
identifying, analyzing, validating, and applying new concepts. It is an inter-
active process that establishes a partnership between military colleges and
civilian institutions on one side and the active force on the other.
OPERATIONAL ART
1-84. Operational art links tactics and strategy to form a coherent structure
for the conduct of war. Some strategists have traditionally expressed opera-
tional art as the sequencing of battles and engagements so that the collective
outcomes will produce a specified military condition in a theater. Others de-
scribe operational art as the blending of direct and indirect approaches to
achieve necessary conditions in a theater. The OPFOR has developed a style
of operational art that is an amalgam of both theories, capturing the best
from each.
1-85. No particular level of command is uniquely concerned with operational
art. The Chief of the General Staff and the theater commander(s) normally
plan and direct strategic and theater campaigns, respectively, while field
group and operational-strategic command (OSC) commanders normally de-
sign the major operations of a campaign. The OPFOR recognizes the classic
division of warfare between the strategic, operational, and tactical levels.
However, the boundaries between these levels are not associated so much
with particular levels of command as with the effect or contribution to achiev-
ing strategic, operational, or tactical objectives.
OPERATIONAL ART AND THE NATIONAL SECURITY STRATEGY
1-86. As discussed earlier in this chapter, the national security strategy can
involve four types of strategic-level actions: strategic, regional, transition,
and adaptive operations. In specific terms, OPFOR operational art consists of
the sequencing of the actions of military forces to attain strategic goals set
forth within and across this spectrum of strategic-level actions. In practical
terms, this is expressed in the strategic campaign plan. |
7-100.1 | 41 | _________________________________________________________________________________Chapter 1
1-87. Regional operations are largely conventional actions against a less ca-
pable force. While dealing with such a regional opponent primarily
through offensive means, the State employs its economic, informational,
and diplomatic-political instruments of power in a peacetime, “defensive”
mode against other regional and extraregional parties with whom it is not at
war. This overall strategy constitutes a “strategic defense” that supports the
offensive military operations being conducted in the region while seeking to
preclude outside involvement. The practitioner of operational art must insure
that his plan for use of forces is congruent with the aims of the SCP and vice
versa. The soldier does not view the proper, coordinated use of these other in-
struments of power as a hindrance. From his perspective, their use to influ-
ence an extraregional power not to commit forces or to delay their commit-
ment is the equivalent of having extra divisions.
1-88. Transition and particularly adaptive operations are at the core of what
makes OPFOR military and operational art distinctive, if not unique. The po-
litical and military leadership recognizes that attempts to achieve national
strategic goals through the use of force can result in a military response from
within and outside the region. Strategic plans take this possibility into ac-
count and, depending on the degree of risk, contingencies are planned to ac-
count for such an eventuality.
1-89. Applying the principles of operation versus an extraregional power,
(discussed earlier in this chapter) and taking a “systems warfare” approach,
the State and the OPFOR seek to develop contingency plans that transition
to a “strategic offense” while conducting military operations that are, at least
initially, defensive in nature. The purpose of the strategy is to disaggregate
the enemy’s elements of power through the conduct of strategic operations,
while seeking to disaggregate his combat systems at the operational level.
The ultimate goal is to exhaust the enemy and destroy his will to continue
the fight.
1-90. In preparing contingency plans, the political and military leadership
conducts a detailed analysis to determine major actions that might be taken
by an intervening force to mobilize, deploy, and operate within the region.
Using this analysis (which is continually updated) and the assessed risk, they
further refine the plan. Actions to support the plan, prior to its execution,
could include increasing the readiness of units, organizations, and industry
required to support an intervention scenario. Other actions could include pre-
positioning forces, weapons, and logistics to those areas that support the con-
tingency plan. Plans for strategic operations in support of transition and
adaptive operations are developed while the military operational planners
continue to plan for the employment of tactical forces to achieve the aims set
forth in the strategy. All of this is set against a matrix that identifies key
events that would trigger execution of the contingency.
1-91. Inherent in the concept of adaptive operations is the idea that the op-
erational planner assigns missions and arrays tactical forces in such a way to
support the operation. Although the tactical commander will understand,
from a conceptual context, that he is involved in adaptive operations, from a
tactical perspective that will be transparent. It is through the manner in
which the operational commander arrays and employs his forces that adap-
tive operations are achieved. Tactical commanders are adaptive in the sense |
7-100.1 | 42 | FM 7-100.1________________________________________________________________________________
that they have the flexibility within the missions assigned by the operational
commander and within the techniques and procedures they develop to more
effectively accomplish those missions.
1-92. The OPFOR includes in its planning and execution the use of paramili-
tary forces. It is important to stress that, with the exception of internal security
forces, those paramilitary organizations that are not part of the State structure
and do not necessarily share the State’s views on national security strategy.
THE ROLE OF PARAMILITARY AND IRREGULAR FORCES IN
OPERATIONS
1-93. Paramilitary forces are those organizations that are distinct from the
regular armed forces but resemble them in organization, equipment, training,
or purpose. Basically, any organization that accomplishes its purpose, even
partially, through the force of arms is considered a paramilitary organization.
These organizations can be part of the government infrastructure or operate
outside of the government or any institutionalized controlling authority.
1-94. In consonance with the concept of “all means necessary,” the OPFOR
views these organizations as assets that can be used to its advantage in time
of war. Within its own structure, the OPFOR has formally established this
concept by assigning the Internal Security Forces, part of the Ministry of the
Interior in peacetime, to the SHC during wartime. Additionally, the OPFOR
cultivates relationships with and covertly supports nongovernment paramili-
tary organizations to achieve common goals while at peace and to have a high
degree of influence on them when at war.
1-95. The primary paramilitary organizations are the Internal Security
Forces, insurgents, terrorists, and drug and criminal organizations. The de-
gree of control the OPFOR has over these organizations varies from absolute,
in the case of the Internal Security Forces, to tenuous when dealing with ter-
rorist and drug and criminal organizations. In the case of those organizations
not formally tied to the OPFOR structure, control can be enhanced through
the exploitation of common interests and ensuring that these organizations
see personal gain in supporting OPFOR goals.
1-96. The OPFOR views the creative use of these organizations as a means of
providing depth and continuity to its operations. A single attack by a terrorist
group will not in itself win the war. However, the use of paramilitary organi-
zations to carry out a large number of planned actions, in support of strategy
and operations, can play an important part in assisting the OPFOR in achiev-
ing its goals. These actions, taken in conjunction with other adaptive actions,
can also supplement a capability degraded due to enemy superiority.
INTERNAL SECURITY FORCES
1-97. The Internal Security Forces subordinated to the SHC provide support
zone security and collect information on foreign organizations and spies. They
perform civil population control functions and ensure the loyalty of mobi-
lized militia forces. Some units are capable of tactical-level defensive ac-
tions if required. These basic tasks are not all-inclusive, and within their
capability these forces can perform a multitude of tasks limited only by |
7-100.1 | 43 | _________________________________________________________________________________Chapter 1
the commander’s imagination. While performing these functions, the Inter-
nal Security Forces may be operating within their own hierarchy of com-
mand, or they may be assigned a dedicated command relationship within an
OSC or one of its tactical subordinates.
1-98. During regional operations, the Internal Security Forces may serve to
control the population situated in newly seized territory. They are an excel-
lent source of human intelligence and can provide security for key sites lo-
cated in the support zones. The Internal Security Forces can either augment
or replace regular military organizations in all aspects of prisoner-of-war
processing and control. While continuing their normal tasks in the homeland,
they can assist regular military organizations in the areas of traffic control
and regulation.
1-99. During transition operations, the Internal Security Forces evacuate im-
portant political and military prisoners to safe areas where they can continue
to serve as important sources of information or means of negotiation. Traffic
control and the security of key bridges and infrastructure take on a higher
level of importance as the OPFOR repositions and moves forces transitioning
to adaptive operations. The Internal Security Forces can continue to gather
intelligence from the local population and assist in mobilizing civilians in oc-
cupied territory for the purpose of augmenting OPFOR engineer labor re-
quirements. Finally, the use of qualified personnel to stay behind as intelli-
gence gatherers and liaison with insurgent, terrorist, and criminal organiza-
tions can provide the OPFOR an increased capability during the adaptive op-
erations that follow.
1-100. Especially important in the conduct of adaptive operations is the abil-
ity of the Internal Security Forces to free up regular military organizations
that can contribute directly to the fight. The security of support zones within
an OSC area of responsibility is just one example of this concept. Where nec-
essary, some units can augment the defense or defend less critical areas, thus
freeing up regular military forces for higher-priority tasks. Stay-behind
agents working with insurgent, terrorist, and criminal organizations can
contribute by directing preplanned actions that effectively add depth to the
battlefield. Their actions can cause material damage to key logistics and
command and control (C2) assets, inflict random but demoralizing casualties,
and effectively draw enemy forces away from the main fight in response to
increased force-protection requirements.
INSURGENT FORCES
1-101. The OPFOR ensures that the exploitation and use of insurgent forces
operating against and within neighboring countries is an integral part of its
strategic and operational planning. Insurgent forces, properly leveraged, can
provide an added dimension to the OPFOR’s capabilities and provide options
not otherwise available. During peacetime, a careful balance is kept between
covert support for insurgent groups that may prove useful later and overt re-
lations with the government against which the insurgents are operating.
1-102. During peacetime, support to insurgents can consist of weapons, stag-
ing and sanctuary areas within the State, and training by OPFOR SPF. It is
during this time that the OPFOR attempts to cultivate the loyalty and trust |
7-100.1 | 44 | FM 7-100.1________________________________________________________________________________
of insurgent groups they have identified as having potential usefulness in
their strategic and operational planning. In all operations of the strategic
campaign, insurgent forces serve as an excellent source of intelligence.
1-103. During the conduct of regional operations, the decision to influence in-
surgents to execute actions that support operations will depend on a number
of factors. If the OPFOR views extraregional intervention as unlikely, it may
choose to keep insurgent participation low. A key reason for making this de-
cision is the potential for those forces to become an opponent once the OPFOR
has accomplished its goals. On the other hand, the OPFOR may plan to have
these groups take part in directly supporting its operations in anticipation of
further support in the case of an extraregional intervention. Insurgent in-
volvement during regional operations may be held to furthering OPFOR IW
objectives by creating support for the State’s actions among the population,
harassing and sniping enemy forces, conducting raids, and assassinating
politicians who are influential opponents of the State. Insurgents can also
serve as scouts or guides for OPFOR regular forces moving through unfamil-
iar terrain and serve as an excellent source of political and military intelligence.
1-104. The usefulness of insurgent forces can be considerable in the event of
extraregional intervention and the decision to transition to adaptive opera-
tions. During transition operations, insurgent forces can support access-
control operations to deny enemy forces access to the region or at least delay
their entry. Delay provides the OPFOR more time to conduct an orderly tran-
sition and to reposition its forces for the conduct of adaptive operations. The
principal means of support include direct action in the vicinity of APODs and
SPODs and along LOCs in the enemy’s rear area. Dispersed armed action for
the sole purpose of creating casualties can have a demoralizing effect and
cause the enemy to respond, thus drawing forces from his main effort.
OPFOR regular forces can coordinate with insurgents, supported by SPF ad-
visors, to execute a variety of actions that support the strategic campaign or a
particular operation plan. Insurgents can support deception by drawing at-
tention from an action the OPFOR is trying to cover or conceal. They can de-
lay the introduction of enemy reserves through ambush and indirect fire,
cause the commitment of valuable force-protection assets, or deny or degrade
the enemy’s use of rotary-wing assets through raids on forward arming and
refueling points and maintenance facilities.
TERRORIST AND CRIMINAL ORGANIZATIONS
1-105. Through the use of intelligence professionals and covert means, the
OPFOR maintains contact with and to varying degrees supports terrorist and
criminal organizations. During peacetime, these organizations can be useful,
and in time of war they can provide an added dimension to OPFOR strategy
and operations.
1-106. Although the OPFOR recognizes that these groups vary in reliability,
it constantly assesses both their effectiveness and usefulness. It develops re-
lationships with those organizations that have goals, sympathies, and inter-
ests congruent with those of the State. In time of war, it can encourage and
materially support criminal organizations to commit actions that contribute
to the breakdown of civil control within a neighboring country. It can provide
support for the distribution and sale of drugs to enemy military forces, which |
7-100.1 | 45 | _________________________________________________________________________________Chapter 1
creates both morale and discipline problems within those organizations. The
production of counterfeit currency and attacks on financial institutions help
to weaken the enemy’s economic stability. Coordination with and support of
terrorists to attack political and military leaders and commit acts of sabotage
against key infrastructure (such as ports, airfields, and fuel supplies) add to
the variety and number of threats that the enemy must address. The State
and OPFOR leadership also have the ability to promote and support the
spread of these same kinds of terrorist acts outside the region. However, they
must carefully consider the political and domestic impact of these actions be-
fore making the decision to execute them.
SYSTEMS WARFARE
1-107. The OPFOR defines a system as a set of different elements so con-
nected or related as to perform a unique function not performable by the ele-
ments or components alone. The essential ingredients of a system include the
components, the synergy among components and other systems, and some
type of functional boundary separating it from other systems. Therefore, a
“system of systems” is a set of different systems so connected or related as to
produce results unachievable by the individual systems alone. The OPFOR
views the operational environment, the battlefield, the State’s own instru-
ments of power, and an opponent’s instruments of power as a collection of
complex, dynamic, and integrated systems composed of subsystems and com-
ponents.
1-108. Systems warfare serves as a conceptual and analytical tool to assist in
the planning, preparation, and execution of warfare. With the systems ap-
proach, the intent is to identify critical system components and attack them
in a way that will degrade or destroy the use or importance of the overall system.
PRINCIPLE
1-109. The primary principle of systems warfare is the identification and iso-
lation of the critical subsystems or components that give the opponent the
capability and cohesion to achieve his aims. The focus is on the disaggrega-
tion of the system by rendering its subsystems and components ineffective.
While the aggregation of these subsystems or components is what makes the
overall system work, the interdependence of these subsystems is also a poten-
tial vulnerability. Systems warfare has applicability or impact at all three
levels of warfare.
APPLICATION AT THE STRATEGIC LEVEL
1-110. At the strategic level, the instruments of power and their application
are the focus of analysis. National power is a system of systems in which the
instruments of national power work together to create a synergistic effect.
Each instrument of power (diplomatic-political, informational, economic, and
military) is also a collection of complex and interrelated systems.
1-111. The State clearly understands how to analyze and locate the critical
components of its own instruments of power and will aggressively aim to pro-
tect its own systems from attack or vulnerabilities. It also understands that
an adversary’s instruments of power are similar to the State’s. Thus, at the |
7-100.1 | 46 | FM 7-100.1________________________________________________________________________________
strategic level, the State can use the OPFOR and its other instruments of
power to counter or target the systems and subsystems that make up an op-
ponent’s instruments of power. The primary purpose is to subdue, control, or
change the opponent’s behavior.
1-112. If an opponent’s strength lies in his military power, the State and the
OPFOR can attack the other instruments of power as a means of disaggre-
gating or disrupting the enemy’s system of national power. Thus, it is possi-
ble to render the overall system ineffective without necessarily having to de-
feat the opponent militarily.
APPLICATION AT THE OPERATIONAL LEVEL
1-113. At the operational level, the application of systems warfare pertains
only to the use of armed forces to achieve a result. Therefore, the “system of
systems” in question at this level is the combat system of the OPFOR and/or
the enemy.
Combat System
1-114. A combat system (see Figure 1-5) is the “system of systems” that re-
sults from the synergistic combination of four basic subsystems that are inte-
grated to achieve a military function. The subsystems are as follows:
• Combat forces (such as main battle tanks, IFVs and/or APCs, or infantry).
• Combat support forces (such as artillery, SSMs, air defense, engineers,
and direct air support).
• Logistics forces (such as transportation, ammunition, fuel, rations, main-
tenance, and medical).
• C2 and RISTA (such as headquarters, signal nodes, satellite downlink
sites, and reconnaissance sensors).
1-115. The combat system is characterized by interaction and interdepend-
ence among its subsystems. Therefore, the OPFOR will seek to identify key
subsystems of an enemy combat system and target them and destroy them
individually. Against a technologically superior extraregional force, the
OPFOR will often use any or all subcomponents of its own combat system to
attack the most vulnerable parts of the enemy’s combat system rather than
the enemy’s strengths. For example, attacking the enemy’s logistics, C2, and
RISTA can undermine the overall effectiveness of the enemy’s combat system
without having to directly engage his superior combat and combat support
forces. Aside from the physical effect, the removal of one or more key subsys-
tems can have a devastating psychological effect, particularly if it occurs in a
short span of time. |
7-100.1 | 47 | _________________________________________________________________________________Chapter 1
COMBAT LOGISTICS
FORCES FORCES
Examples: Examples:
Tanks, Transportation,
IFVs/APCs, Ammunition,
Infantry Fuel,
Rations,
Maintenance,
COMBAT Medical
SYSTEM
COMBAT C2 AND
SUPPORT
RISTA
FORCES
Examples: Examples:
Artillery, Headquarters,
SSMs, Signal Nodes,
Air Defense, Satellite Downlinks,
Engineers, Reconnaissance Sensors
Direct Air Support
Figure 1-5. Combat System
Planning and Execution
1-116. The systems warfare approach to combat is a means to assist the
commander in the decision-making process and the planning and execution of
his mission. The OPFOR believes that a qualitatively and/or quantitatively
weaker force can defeat a superior foe, if the lesser force can dictate the terms of
combat. It believes that the systems warfare approach allows it to move away
from the traditional attrition-based approach to combat. It is no longer neces-
sary to match an opponent system-for-system or capability-for-capability.
Commanders and staffs will locate the critical component(s) of the enemy com-
bat system, patterns of interaction, and opportunities to exploit this connectivity.
Systems warfare has applications in both offensive and defensive contexts.
1-117. The essential step after the identification of the critical subsystems
and components of a combat system is the destruction or degradation of the
synergy of the system. This may take the form of total destruction of a sub-
system or component, degradation of the synergy of components, or the sim-
ple denial of access to critical links between systems or components. The de-
struction of a critical component or link can create windows of opportunity
that can be exploited, set the conditions for offensive action, or support a con-
cept of operation that calls for exhausting the enemy on the battlefield. Once
the OPFOR has identified and isolated a critical element of the enemy com-
bat system that is vulnerable to attack, it will select the appropriate method
of attack. |
7-100.1 | 48 | FM 7-100.1________________________________________________________________________________
1-118. Today’s state-of-the-art combat and combat support systems are im-
pressive in their ability to deliver precise attacks at long standoff distances.
However, the growing reliance of some extraregional forces on these systems
offers opportunity. Attacking critical ground-based C2 and RISTA nodes or
logistics systems and LOCs can have a very large payoff for relatively low in-
vestment and low risk to the OPFOR. Modern logistics systems assume se-
cure LOCs and voice or digital communications. These characteristics make
such systems vulnerable. Therefore, the OPFOR can greatly reduce a military
force’s combat power by attacking a logistics system that depends on “just-in-
time delivery.”
1-119. For the operational commander, the systems warfare approach to
combat is not an end in itself. It is a key component in his planning and se-
quencing of tactical battles and engagements aimed toward achieving as-
signed strategic goals. Systems warfare supports his concept; it is not the
concept. The ultimate aim is to destroy the enemy’s will and ability to fight.
APPLICATION AT THE TACTICAL LEVEL
1-120. It is at the tactical level that systems warfare is executed in attacking
the enemy’s combat system. While the tactical commander may use systems
warfare in the smaller sense to accomplish assigned missions, his attack on
systems will be in response to missions assigned him by the operational
commander.
APPLICATION ACROSS ALL TYPES OF STRATEGIC-LEVEL ACTIONS
1-121. Systems warfare is applicable against all types of opponents in all
strategic-level courses of action. In regional operations, the OPFOR will seek
to render a regional opponent’s systems ineffective to support his overall con-
cept of operation. However, this approach is especially conducive to the con-
duct of transition and adaptive operations. The very nature of this approach
lends itself to adaptive and creative options against an adversary’s techno-
logical overmatch.
RELATIONSHIP TO THE C2 PROCESS
1-122. The systems warfare approach to combat is an important part of
OPFOR planning. It serves as a means to analyze the OPFOR’s own combat
system and how it can use the combined effects of this system to degrade the
enemy’s combat system. The OPFOR believes that the approach allows its
decision makers to be anticipatory rather than reactive. |
7-100.1 | 49 | Chapter 2
Command and Control
This chapter examines the OPFOR system and process of command and
control (C2). It explains how the OPFOR expects to direct the forces and ac-
tions described in other chapters of this manual. It provides insights into the
OPFOR theory and practice of controlling combined arms, joint, interagency,
and multinational forces in war. Most important, it shows how OPFOR com-
manders and staffs think and work.
In modern war, victory is likely to go to the side that acts most quickly.
The overriding need for speedy decisions to seize fleeting opportunities
drastically reduces the time available for decision making and for issuing
and implementing orders. The need to seize opportunities on the battle-
field, coupled with dispersion to avoid the threat of precision weapons,
dictates the replacement of concentration in terms of space by concentra-
tion in terms of time and effects. Moreover, the operational and tactical
situation is subject to sudden and radical changes, and the results of
combat are more likely to be decisive than in the past. OPFOR C2 par-
ticipants, processes, and systems are designed to operate effectively
and efficiently in this new environment. The successful execution of an
information warfare (IW) plan is critical to victory.
Although dealing briefly with strategic control of forces, this chapter fo-
cuses on operational command and control. All OPFOR levels of command
share a common decision-making and planning process. They also share a
parallel staff organization and command post (CP) structure, tailored to
match the differences in scope and span of control.
CONCEPT
2-1. The OPFOR’s C2 concept is grounded in the essential principles of the
States’ process for exercising command and control. At the core of the State’s
C2 concept is the assumption that modern communications are susceptible to
attack and/or monitoring. Accordingly, the State operates from the view that
centralized planning defines the means for assuring both command (estab-
lishing the aim) and control (sustaining the aim). It leads to strategic and op-
erational directions. Necessarily, then, the State relies on the loyalty of its
forces and accords far-ranging authority to act within the aim while foregoing
rigorous control as both unproductive and unlikely in the modern environment.
2-2. For the OPFOR, this concept translates into centralized planning and
decentralized execution, requiring a high degree of initiative at low opera-
tional and tactical levels. The OPFOR not only accepts this condition as neces-
sary, but also considers decentralized execution the essence of its operational |
7-100.1 | 50 | FM 7-100.1________________________________________________________________________________
doctrine. It requires the commander at each level of command to act flexibly,
exercising his judgment as to what best meets and sustains the aim of his
superior. The OPFOR believes that this approach provides an absolute ad-
vantage particularly when operating against a sophisticated enemy equipped
with advanced information technology. This view stems from the conviction
that, if the means to exercise control from the top exists, then there is a dan-
ger that it will be used to the extent that it stifles creativity and initiative.
The OPFOR seeks to avoid this pitfall in its own C2 process, while recogniz-
ing that even sophisticated opponents may fall prey to it. It realizes that sti-
fled initiative and creativity can ultimately preclude such an opponent from
acting decisively or quickly.
PRINCIPLES OF COMMAND AND CONTROL
2-3. The OPFOR specifically defines command and control at tactical and
operational levels as the actions of commanders, command groups, and staffs
of military headquarters to maintain continual combat readiness and combat
efficiency of forces, to plan and prepare for combat operations, and to provide
leadership and direction during the execution of assigned missions. The ob-
jective of command is to accomplish the mission. The objective of control is to
attain maximum combat effectiveness from all available resources. To obtain
this objective, the OPFOR identifies several principles of command and control.
CENTRALIZED PLANNING
2-4. OPFOR military art is fundamentally based on a system of political con-
trol and the presumption of loyalty among subordinates who have been pre-
pared for high position in either the civil or military structure. Thus, military
art and the principles of command within the military are closely related to
those found in the political system. Indeed, the State views military capabil-
ity as one of its four instruments of national power. Centralized planning
characterizes the State and its various components, including the military.
DECENTRALIZED EXECUTION
2-5. The State accepts that decentralized execution is essential to controlling
the tempo of operations. The OPFOR, therefore, is organized to provide ini-
tiative within the bounds of the aim as stipulated in the planning process.
The OPFOR accepts some risk in this approach, but mitigates that risk in the
planning process by determining branches (accommodations made to the plan
that require diversion from the central plan) and sequels (follow-on opera-
tions in accordance with the plan). This approach depends on clearly stated
aims and delineation of the limits of authority at the each level of command.
It provides considerable flexibility to subordinates and is deemed essential by
the State and the OPFOR for meeting the needs of the modern operational
environment.
DELIBERATE DECISION-MAKING PROCESS
2-6. The OPFOR decision-making process consists of five phases: assess,
orient, decide, act, and adapt. (See the section on Decision Making for more
detail.) |
7-100.1 | 51 | _________________________________________________________________________________Chapter 2
COMMAND AND CONTROL STRUCTURES
2-7. C2 at each level of command is very similar, designed with the same ba-
sic structure and emphasis on survivability through mobility, redundancy,
and security. The higher the level of command, the larger and more complex
the staff. Supporting each staff is a series of multiple CPs and communica-
tions systems, providing the flexibility required on a highly fluid, lethal
battlefield.
2-8. The professional training of commanders and staffs emphasizes consis-
tency in staff planning procedures at all levels of command. Emphasis on re-
sponsive planning (assisted by automation) in the C2 process has produced a
cadre of professional, highly-trained staff officers. Thoroughly educated in all
aspects of strategy, operations, and tactics, these officers are capable of func-
tioning from the General Staff down to tactical level.
2-9. Operational commanders must be equipped to control the full scope of
combined arms, joint, interagency, and multinational activity. The OPFOR
operational C2 structure is designed to facilitate this control.
COMMAND AND SUPPORT RELATIONSHIPS
2-10. OPFOR units are organized using four command and support relation-
ships, summarized in Figure 2-1 and described in the following paragraphs.
These relationships may shift during the course of an operation in order to
best align the force with the tasks required. The general category of subordi-
nate units includes both constituent and dedicated relationships; it can also
include interagency and multinational (allied) subordinates.
Relationship Commanded by Logistics from Positioned by Priorities from
Constituent Gaining Gaining Gaining Gaining
Dedicated Gaining Parent Gaining Gaining
Supporting Parent Parent Supported Supported
Affiliated Self Self or “Parent” Self Mutual Agreement
Figure 2-1. Command and Support Relationships
2-11. Constituent. Constituent units are those forces assigned directly to a
unit and forming an integral part of it. They may be organic to the table of
organization and equipment of the administrative structure forming the ba-
sis of a given unit, assigned at the time the unit was created, or attached to it
after its formation.
2-12. Dedicated. Dedicated is a command relationship identical to constitu-
ent with the exception that a dedicated unit still receives logistics support
from a parent organization of similar type. An example of a dedicated unit
would be the case where one or two surface-to-surface missile (SSM) battal-
ions from an SSM brigade could be dedicated to an operational-strategic
command (OSC). Since the OSC does not otherwise possess the technical experts |
7-100.1 | 52 | FM 7-100.1________________________________________________________________________________
or transloading equipment for missiles, the dedicated relationship permits
the SSM battalion(s) to fire exclusively for the OSC while still receiving its
logistics support from the parent SSM brigade. In OPFOR plans and orders,
the dedicated command and support relationship is indicated by (DED) next
to a unit title or symbol.
2-13. Supporting. Supporting units continue to be commanded by and re-
ceive their logistics from their parent headquarters, but are positioned and
given mission priorities by their supported headquarters. This relationship
permits supported units the freedom to establish priorities and position sup-
porting units while allowing higher headquarters to rapidly shift support in
dynamic situations. The supporting unit does not necessarily have to be
within the supported unit’s area of responsibility (AOR). An example of a
supporting unit would be a fighter-bomber regiment supporting an OSC for a
particular phase of the strategic campaign plan (SCP) but ready to rapidly
transition to a different support relationship when the OSC becomes the
theater reserve in a later phase. In OPFOR plans and orders, the supporting
command and support relationship is indicated by (SPT) next to a unit title
or symbol.
2-14. Affiliated. Affiliated organizations are those operating in a unit’s AOR
that the unit may be able to sufficiently influence to act in concert with it for
a limited time. No “command relationship” exists between an affiliated or-
ganization and the unit in whose AOR it operates. Affiliated organizations
are typically nonmilitary or paramilitary groups such as criminal cartels, in-
surgencies, terrorist cells, or mercenaries. In some cases, affiliated forces
may receive support from the OSC as part of the agreement under which
they cooperate. Although there would typically be no formal indication of this
relationship in OPFOR plans and orders, in rare cases (AFL) is used next to
unit titles or symbols.
STRATEGIC-LEVEL ORGANIZATION
2-15. The National Command Authority (NCA) is responsible for the prepa-
ration and conduct of strategic campaigns. It also resolves issues regarding
the overall wartime situation of the State and the allocation of strategic re-
sources. The NCA allocates forces and establishes general plans for the con-
duct of national strategic campaigns.
General Staff
2-16. The General Staff is a major link in the centralization of military com-
mand at the national level, since it provides staff support and acts as the ex-
ecutive agency for the NCA. Together with the Ministry of Defense (MOD),
the General Staff forms the Supreme High Command (SHC) in wartime. (See
Figure 2-2.) The General Staff has direct control over the six services, and all
military forces report through it to the NCA. The Chief of the General Staff
(CGS) commands the SHC. The General Staff consists of three functional
directorates. These are the Operations, Intelligence, and Organization and
Mobilization directorates. |
7-100.1 | 53 | _________________________________________________________________________________Chapter 2
NATIONAL
COMMAND
AUTHORITY
MINISTRY OF
DEFENSE
SUPREME
HIGH COMMAND
GENERAL
STAFF
ORGANIZATION &
OPERATIONS INTELLIGENCE
MOBILIZATION
DIRECTORATE DIRECTORATE
DIRECTORATE
STRATEGIC SPF INTERNAL
ARMY NAVY AIR FORCE SECURITY
FORCES COMMAND
FORCES
AIR
DEFENSE
FORCES
Figure 2-2. Supreme High Command
2-17. Working with the staffs of each of the services, the Operations Direc-
torate of the General Staff drafts the military SCP for the CGS. Once the
CGS approves the military SCP, it becomes part of the national SCP, and the
General Staff issues it to appropriate operational-level commanders. During
peacetime and preparation for war, the Operations Directorate continues to
review and refine the plan. The military SCP assigns forces to operational-
level commands and designates AORs for those commands.
2-18. During combat operations, the Operations Directorate is responsible,
along with the Intelligence Directorate, for maintaining a continuous esti-
mate of the situation for the SHC. Because of the uncertainties of combat, the
Operations Directorate continually reevaluates the military SCP and modifies it
or develops a new plan based on guidance from the CGS. The Organization and
Mobilization Directorate determines the assets that each component of the mili-
tary needs to execute its portion of the national strategic campaign.
Theater Headquarters
2-19. For the State, a theater is a clearly defined geographic area in which
the OPFOR plans to conduct or is conducting military operations. Within its
region, the State may plan or conduct a strategic campaign in a single thea-
ter or in multiple theaters, depending on the situation. The General Staff
may create one or more separate theater headquarters, even in peacetime,
for planning purposes. However, no forces would be subordinated to such a
headquarters until the activation of a particular SCP. |
7-100.1 | 54 | FM 7-100.1________________________________________________________________________________
2-20. A theater headquarters provides flexible and responsive control of all
theater forces. When there is only one theater, as is typical, the theater head-
quarters may also be the field headquarters of the SHC, and the CGS may
also be the theater commander. Even in this case, however, the CGS may
choose to focus his attention on national strategic matters and to create a
separate theater headquarters, commanded by another general officer, to
control operations within the theater.
2-21. When parts of the strategic campaign take place in separated geographi-
cal areas and there is more than one major line of operations, the OPFOR
may employ more than one theater headquarters, each of which could have
its own theater campaign plan. In this case, albeit rare, the SHC field
headquarters would be a separate entity exercising control over the multiple
theater headquarters.
2-22. Theater command provides flexibility to the OPFOR, since the exis-
tence of one or more separate theater headquarters enables the SHC to fo-
cus on the strategic campaign and sustaining the forces in the field. A
theater headquarters acts to effectively centralize and integrate General
Staff control over theater-wide offensive and/or defensive operations. The
chief responsibility of this headquarters is to exercise command over all
forces assigned to a theater in accordance with mission and aim assigned by
the SHC. A theater headquarters links the operational efforts of the OPFOR
to the strategic efforts and reports directly to the SHC.
Administrative Force Structure
2-23. The OPFOR has an administrative force structure that manages its
military forces in peacetime. This structure is the aggregate of various military
headquarters, organizations, facilities, and installations designed to man,
train, and equip the forces. In peacetime, forces are commonly grouped into
corps, armies, or army groups for administrative purposes. An army group
can consist of several armies, corps, or separate divisions and brigades. The
administrative force structure also has responsibility for disaster manage-
ment and support to other State agencies. In some cases, forces may be
grouped administratively under geographical commands designated as
military regions or military districts.1 Normally, these administrative group-
ings differ from the OPFOR’s go-to-war (fighting) force structure.
2-24. The administrative force structure includes all components of the
Armed Forcesnot only regular, standing forces (active component), but also
reserve and militia forces (reserve component). For administrative purposes,
both regular and reserve forces come under the headquarters of their respec-
tive service component. Each of the six service components is responsible for
manning, equipping, and training of its forces and for organizing them within
the administrative force structure.
2-25. If the General Staff or SHC elects to create more than one theater
headquarters, it may allocate parts of the administrative force structure to
each of the theaters, normally along geographic lines. One example would be
to divide Air Force assets into theater air armies. Another would be to assign
1 A military district may or may not coincide with a political district within the State government. |
7-100.1 | 55 | _________________________________________________________________________________Chapter 2
units from the Special-Purpose Forces (SPF) Command to each theater, ac-
cording to theater requirements.
2-26. The administrative force structure also includes some assets centrally
controlled at the national level. For instance, major portions of the Air Force,
Navy, Strategic Forces, and the SPF Command often remain under the direct
control of their respective service component headquarters. The Army com-
ponent headquarters may retain centralized control of certain elite units of
the ground forces, including airborne units and Army SPF. This permits
flexibility in the employment of these relatively scarce assets in response to
national-level requirements. In peacetime, the internal security forces are
under the administrative control of the Ministry of the Interior. The pool of
national assets also includes major logistics facilities and installations.
2-27. In wartime, the normal role of administrative commands is to serve as
force providers during the creation of operational- and tactical-level fighting
commands. After transferring control of its major fighting forces to one or
more task-organized fighting commands, an administrative headquarters, facil-
ity, or installation continues to provide depot- and area support-level adminis-
trative, supply, and maintenance functions. (See Chapter 12.) A geographically-
based administrative command also provides a framework for the continuing
mobilization of reserves to complement or supplement regular forces.
2-28. In rare cases, an administrative command could function as a fighting
command. This could occur, for instance, when a particular administrative
command happens to have just the right combination of forces for executing a
particular SCP. Another case would be in times of total mobilization, when
an administrative command has already given up part of its forces to a fight-
ing command and then is called upon to form a fighting command with what-
ever forces remain under the original administrative headquarters.
2-29. Operational-level commands in the administrative force structure that
are called upon to fight will employ the doctrine in this manual. However,
they will not be able to employ joint or interagency forces effectively without
additional training, staff, and C2 systems.
OPERATIONAL-LEVEL ORGANIZATION
2-30. An SCP always contains both military and nonmilitary subordinate actions.
The operational level of command is that which executes military tasks as-
signed directly by an SCP. Operational-level commands translate actions di-
rectly supporting the SCP into an operation plan. The most common OPFOR
operational-level commands are field groups (FGs) and operational-strategic
commands (OSCs).2 Figure 2-3 shows one example of FG and OSC missions
within such a hypothetical SCP.
2 For the OPFOR, military actions above the tactical level will most commonly involve one or more OSCs, but could
possibly involve an FG as an additional level of operational command. In most cases, the statements about an
OSC in this manual would also apply to an FG, if one is created. Therefore, for the sake of brevity, references to
FG will appear only where it is important to make a distinction between the OSC and FG levels. |
7-100.1 | 56 | FM 7-100.1________________________________________________________________________________
Neutral Allied
Country Country
Sea
U
nre
st
Are a
of
OSC AOR
Strategic Goal 3
Hostile
Strategic Goal 1
Country
“THE STATE”
OSC AOR
OSC AOR OSC AOR
Sea
Strategic Goal 1
Strategic Goals 1+2
FG AOR
LEGEND
Strategic Goals
Sea
1: Coastal Defense
2: Invasion of Hostile Country
3: Neutralization of Unrest
Figure 2-3. Example of FGs and OSCs in an SCP
2-31. There is also the possibility that a division or division tactical group
(DTG) could be directly subordinate to the SHC in the fighting force structure
and thus perform tasks assigned directly by an SCP. In such cases, the OPFOR
would consider the divisions or DTGs to be operational-level commands. More
typically, however, they perform tactical missions as subordinates of an FG or
OSC. (For more detail of divisions and DTGs and their tactics, see FM 7-100.2.)
2-32. The SCP specifies the geographic AOR within which the operational-
level command’s allocated forces are intended to operate. A single SCP could
include more than one strategic goal. Thus, a particular FG or OSC could be
task organized to achieve one or more goals within its assigned AOR.
Field Group
2-33. A field group is the largest operational-level organization, since it has one
or more smaller operational-level commands subordinate to it. An FG is a group-
ing of subordinate organizations with a common headquarters, a common AOR,
and a common operation plan. FGs are always joint and interagency organiza-
tions and are often multinational. However, this level of command may or may
not be necessary in a particular SCP. An FG may be organized when the num-
ber of forces and/or the number of major military efforts in a theater exceeds the
theater commander’s desired or achievable span of control. This can facilitate |
7-100.1 | 57 | _________________________________________________________________________________Chapter 2
the theater commander’s remaining focused on the theater-strategic level of war
and enable him to coordinate effectively the joint forces allocated for his use.
Sea Neutral Country
XXX
OSC
F
G
L
O
R
“THE STATE” Mountains
XXX Strategic Goal 2: Invasion of
OSC F G Neighboring Country Hostile Country
/O
S
C
L
O
Sea
R
XXX
OSC
Strategic Goal 1:
Defense of
Homeland
Field Group AOR
OSC AOR
Neutral Country
Figure 2-4. Field Group in Control of Multiple OSCs in a Major Military Effort
2-34. The General Staff does not normally form standing FG headquarters,
but may organize one or more during full mobilization, if necessary. An FG
can be assigned responsibilities in controlling forces in the field during adap-
tive operations in the homeland, or forward-focused functionally (an FG may
be assigned an access-control mission). However, FGs may exist merely to ac-
commodate the number of forces in the theater.
2-35. FGs are typically formed for one or more of the following reasons:
• An SCP may require a large number of OSCs and/or operational-level
commands from the administrative force structure. When the number
of major military efforts in a theater exceeds the theater commander’s
desired or achievable span of control, he may form one or more FGs.
(See Figure 2-4.)
• In the rare cases when multiple operational-level commands from the
administrative force structure become fighting commands, they could
come under the command of an FG headquarters. (See Figure 2-5.) |
7-100.1 | 58 | FM 7-100.1________________________________________________________________________________
• Due to modifications to the SCP, a standing operational-level head-
quarters that was originally designated as an OSC headquarters may
receive one or more additional major operational-level commands from
the administrative force structure as fighting commands. Then the
OSC headquarters would transition into an FG headquarters.
In the first two cases, a separate FG staff would be formed and identified as
having control over two or more OSCs (or operational-level commands from
the administrative force structure) as part of the same SCP. In the third case,
the original OSC headquarters would be redesignated as an FG headquar-
ters. In any case, the FG command group and staff would be structured in
the same manner as those of an OSC.
“THE STATE”
Field
Field
Group
Group
Sea
XXXX
XXX XXXX XXXX XXXX
Neutral XXXX XXX XXX XXXX XXX
Country
Hostile Country Sea
Figure 2-5. Field Groups Consisting of Multiple Operational-Level Commands from
the Administrative Force Structure
Operational-Strategic Command
2-36. The OPFOR’s primary operational organization is the OSC. Once the
General Staff writes a particular SCP, it forms one or more standing OSC
headquarters. Each OSC headquarters is capable of controlling whatever
combined arms, joint, interagency, or multinational operations are necessary
to execute that OSC’s part of the SCP. However, the OSC headquarters does
not have any forces permanently assigned to it. |
7-100.1 | 59 | _________________________________________________________________________________Chapter 2
2-37. Figure 2-6 shows an example of allocation of forces to an OSC. The
units allocated from the administrative force structure to form the OSC typi-
cally come from an army group, army, or corps (or perhaps a military district
or military region) or from forces directly subordinate to a service headquar-
ters. There can also be cases where forces from the services have initially
been allocated to a theater headquarters and are subsequently re-allocated
down to the OSC. The organizations shown under the OSC, like those shown
under the theater headquarters in this example, indicate a pool of assets
made available to that command. The commander receiving these assets may
choose to retain them at his own level of command, or he may choose to sub-
allocate them down to one or more of his subordinates for their use in their
own task organization.
THEATER
AT IH RE AA RT MER Y BRS IGP AF DE T AO H SET SH A ETE TER SR GO A RT R OH M UE Y PR S
ARMY
OTHER FIGHTER-BOMBER
AIR FORCE AVIATION GROUP
ASSETS DIVISION
FIGHTER-BOMBER
RA EV GIA IMTI EO NN T ARMY OTHER ARMO YT H GE RR OUP AIRBORNE
ARMIES ASSETS BRIGADE
ARTILLERY
OTHER OTHER MECHANIZED TANK BRIGADE
DIVISIONS AA SR SM ETY S I DN IF VA ISN IT OR NY DIVISION
UAV HEC LO ICM OB PA TT ER SAM SSM
SQUADRON BRIGADE BRIGADE BRIGADE
ANTITANK OSC
BRIGADE
OSC MECHANIZED TANK AIRBORNE
HQ I DN IF VA ISN IT OR NY DIVISION BRIGADE
LEGEND
Theater assets
resubordinatedto
the OSC SPF ARTILLERY SSM SAM
Army group assets BRIGADE BRIGADE BRIGADE BRIGADE
resubordinated to
the OSC
A rer sm uy b oa rs ds inet as t ed to FIGH AT VE IR A- TB IO OM NBER ANTITANK HEC LO ICM OB PA TT ER UAV
the OSC REGIMENT BRIGADE BRIGADE SQUADRON
Figure 2-6. Allocation of Forces to an OSC (Example)
2-38. When the NCA decides to execute a particular SCP, each OSC partici-
pating in that plan receives appropriate units from the OPFOR’s administra-
tive force structure, as well as interagency and/or multinational forces.
Forces subordinated to an OSC may continue to depend on the administra-
tive force structure for support. |
7-100.1 | 60 | FM 7-100.1________________________________________________________________________________
2-39. If a particular OSC has contingency plans for participating in more
than one SCP, it could receive a different set of forces under each plan. In
each case, the forces would be task organized according to the mission re-
quirements in the given plan. Thus, each OSC consists of those division-,
brigade-, and battalion-size organizations allocated to it by the SCP currently
in effect. These forces also may be allocated to the OSC for the purpose of
training for a particular SCP. When an OSC is neither executing tasks as
part of an SCP nor conducting exercises with its identified subordinate
forces, it exists as a planning headquarters.
OSC
INTEGRATED INTEGRATED
DTGs DIVISIONS FIRES SUPPORT
COMMAND COMMAND
AIR FORCE MARITIME INTERAGENCY
BTGs BRIGADES UNITS UNITS UNITS
Figure 2-7. Possible OSC Organization (Example)
2-40. Figure 2-7 shows an example of the types of organizations that could
make up a particular OSC organization. The numbers of each type of
subordinate and whether they actually occur in a particular OSC can vary.
As shown in this example, the composition of an OSC is typically joint,
with Air Force and possibly maritime (naval or naval infantry) units,
and it can also be interagency. If some of the allocated forces come
from another, allied country, the OSC could be multinational. The
simplified example of an OSC shown here does not show all the combat
support and combat service support units that would be present in such an
organization. Many of these support units are found in the integrated fires
command (outlined below) and the integrated support command (outlined
below and in Chapter 12). Other support units could be allocated initially
from the administrative force structure to the OSC, which further allocates
them to its tactical subordinates. |
7-100.1 | 61 | _________________________________________________________________________________Chapter 2
2-41. Once allocated to an OSC, a division or brigade often receives augmen-
tation that transforms it into a DTG or brigade tactical group (BTG), respec-
tively. However, an OSC does not have to task organize subordinate divisions
and brigades into tactical groups. Most divisions would become DTGs, but
maneuver brigades in the administrative force structure may be sufficiently
robust to accomplish their mission without additional task organization.
2-42. The OPFOR has great flexibility regarding possible OSC organizations
for different missions. There is virtually no limit to the possible permutations
that could exist. The allocation of organizations to an OSC depends on what
is available in the State’s administrative force structure, the mission re-
quirements of that OSC, and the requirements of other operational-level
commands.
TACTICAL-LEVEL ORGANIZATIONS
2-43. In the OPFOR’s administrative force structure, the largest tactical-
level organizations are divisions and brigades. In wartime, they are often
subordinate to a larger, operational-level command. However, they may also
be directly subordinate to a theater headquarters or to the SHC. In either
wartime role, a division or brigade may receive additional assets that trans-
form it into a tactical group.
2-44. A tactical group is a task-organized division or brigade that has re-
ceived an allocation of additional land forces in order to accomplish its mis-
sion. These additional forces may come from within the Ministry of Defense,
from the Ministry of the Interior, or from affiliated forces. Typically, these
assets are initially allocated to an OSC or FG, which further allocates them
to its tactical subordinates. If the tactical group operates as a separate com-
mand, it may receive additional assets directly from the theater headquar-
ters or the SHC that are necessary for it to carry out an operational-level
mission. The same higher command that augments a division or brigade to
transform it into a tactical group can also use some units from one divi-
sion or brigade to augment tactical groups based on other divisions or bri-
gades.
2-45. The purpose of a tactical group is to ensure unity of command for all
land forces in a given AOR. Tactical groups formed from divisions are divi-
sion tactical groups (DTGs), and those from brigades are brigade tacti-
cal groups (BTGs).
2-46. If a DTG has a mission directly assigned by an SCP, it acts as an op-
erational-level command. If a DTG has a mission assigned by an intermedi-
ate operational-level command (such as an FG or an OSC), then it acts as a
tactical-level command. In either of those cases, the original division head-
quarters becomes the DTG headquarters. |
7-100.1 | 62 | FM 7-100.1________________________________________________________________________________
INTEGRATED FIRES COMMAND
2-47. The integrated fires command (IFC) is a combination of a standing C2
structure and task organization of constituent and dedicated fire support
units. (See Figure 2-8.) All division-level and above OPFOR organizations
possess an IFC C2 structurestaff, CP, communications and intelligence ar-
chitecture, and automated fire control system (AFCS). The IFC exercises
command of all constituent and dedicated fire support assets retained by its
level of command. This includes aviation, artillery, and missile units. It also
exercises command over all reconnaissance, intelligence, surveillance, and
target acquisition (RISTA) assets allocated to it.3
OSC
IFC
IFC
HEADQUARTERS
ARTILLERY AVIATION MISSILE SPF
COMPONENT COMPONENT COMPONENT COMPONENT
INTEGRATED
SUPPORT
GROUP
Figure 2-8. Possible IFC Components in an OSC
2-48. The mission of the IFC is to execute all fire support tasks required to
accomplish the unit mission. It is designed to
• Exploit the combat power inherent in carefully integrated ground and
air fire support actions.
• Reduce the amount of time from target acquisition to attack to the ab-
solute minimum.
• Permit fire support assets to mass their effects without having to oper-
ate in concentrated formations.
3 Based on mission requirements, the commander may also allocate maneuver forces to the IFC. This is most often
done when he chooses to use the IFC CP to provide C2 for a strike, but can also be done for the execution of other
missions. |
7-100.1 | 63 | _________________________________________________________________________________Chapter 2
• Ensure the optimal fire support asset(s) are assigned any given mission.
• Ensure the commander’s priorities for fire support are adhered to.
• Act, if necessary, as the organization’s alternate command structure.
• Integrate the effects of fires from units placed in support of the
organization.
2-49. The number and type of fire support and RISTA units allocated to an
IFC is mission-dependent. The IFC is not organized according to a table of
organization and equipment, but is task organized to accomplish the mis-
sions assigned.
IFC Headquarters
2-50. The OSC IFC headquarters, like the overall OSC headquarters, exists
in peacetime in order to be ready to accommodate and exercise C2 over all
forces made subordinate to it in wartime. The IFC headquarters is composed
of the IFC commander and his command group, a RISTA and IW section, an
operations section, and a resources section. (See Figure 2-9.)
IFC
COMMANDER
IFC
COMMAND GROUP
DEPUTY
COMMANDER
CHIEF
OF
STAFF
RISTA/IW OPERATIONS RESOURCES
SECTION SECTION SECTION
FIRE SUPPORT
COORDINATION
CENTER
Figure 2-9. IFC Headquarters
2-51. The deputy commander (DC) of the OSC serves as IFC commander.
The RISTA and IW section provides the complete spectrum of intelligence
and IW support for the IFC. The operations section provides the control, co-
ordination, and communications for the headquarters. Located within the op-
erations section is the fire support coordination center (FSCC). To ensure the |
7-100.1 | 64 | FM 7-100.1________________________________________________________________________________
necessary coordination of fire support and associated RISTA, the operations
section of the IFC headquarters also includes liaison teams from subordinate
units. The resources section provides control and coordination of various
logistics and administrative support functions.
Artillery Component
2-52. The artillery component is a task organization tailored for the conduct
of artillery support during combat operations. In an OSC’s IFC, it is typically
organized around one or more artillery brigades, or parts of these that are
not allocated in a constituent or dedicated relationship to tactical-level sub-
ordinates. The artillery component includes appropriate target acquisition,
C2, and logistics support assets.
2-53. The number of artillery battalions assigned to an IFC varies according
such factors as mission of friendly units, the enemy situation, and terrain.
However, the number of artillery units also can vary based on the capabili-
ties of the supporting AFCS. For example, a multiple rocket launcher (MRL)
brigade AFCS can have enough command and staff vehicles for the brigade
commander and his chief of staff, as well as the subordinate commanders of
battalions and up to 18 batteries (6 battalions). An AFCS supporting a can-
non, MRL, or mortar battalion may consist of enough command and staff ve-
hicles to support 3 to 4 batteries (each consisting of 4 to 8 systems).
Aviation Component
2-54. The aviation component is a task organization tailored for the conduct
of aviation operations. The aviation component is task organized to provide a
flexible and balanced air combat organization capable of providing air support to
the OSC commander. It may be organized around an Air Force aviation
regiment or an air army, or parts of these, as required by the mission. It may
also include rotary-wing assets from army aviation. It includes ground attack
aviation capability as well as requisite ground and air service support assets.
The IFC commander exercises control through facilities provided by the airspace
operations subsection of the OSC staff and/or the aviation unit(s).
Missile Component
2-55. The missile component is a task organization consisting of long-range
missiles or rockets capable of delivering conventional or nuclear, biological,
and chemical (NBC) munitions. It is organized around an SSM or rocket bat-
talion or brigade and includes the appropriate logistics support assets. Mis-
sile and rocket units may come from the Strategic Forces or from other parts
of the administrative force structure (where they may be part of a corps,
army, or army group).
2-56. The State considers the long-range rocket and missile capability, even
when delivering conventional munitions, the responsibility of the NCA. For
example, the SHC or theater commander may allocate Strategic Forces as-
sets to an IFC in order to use long-range missiles and rockets to advance
State political ends during regional, transition, or adaptive operations. Un-
able to mount robust air campaigns, the State can use these weapons to
mount an equivalent effort. |
7-100.1 | 65 | _________________________________________________________________________________Chapter 2
Special-Purpose Forces Component
2-57. The SPF component normally consists of assets from an SPF brigade.
Personnel of such a brigade are specially trained for insertion in small SPF
teams. These assets provide the OPFOR the ability to attack both regional
and extraregional enemies throughout their tactical, operational, and strate-
gic depth. SPF assets are inserted in advance of regional operations and in
support of transition and adaptive operations. They are an essential part of
the concept of using all means necessary and are critical to access-control
operations. SPF assigned to the Army, Air Force, and Navy are designed for
use at the operational level. The national-level SPF Command has its own
SPF units.
2-58. The SPF conduct operations to achieve strategic military, political, eco-
nomic, and/or psychological objectives or achieve tactical or operational goals
in support of strategic objectives. Such operations may have either long-
range or immediate impact on the enemy. The OPFOR concept of SPF opera-
tions includes reconnaissance, direct action, and diversionary measures. The
SPF component of the IFC has a capability to support terrorist and irregular
forces operations.
2-59. If an OSC has received SPF units, it may further allocate some of these
units to supplement the long-range reconnaissance assets a division or DTG
has in its own IFC. However, the scarce SPF assets normally would remain
at OSC level.
Integrated Support Group
2-60. The integrated support group (ISG) is a compilation of units perform-
ing logistics tasks that support the IFC. Other combat support and combat
service support units may be grouped in this component for organizational ef-
ficiency although they may support only one of the major units of the IFC.
The ISG is discussed in detail in Chapter 12. It can perform the same func-
tions as the integrated support command (see below and in Chapter 12), but
on a different scale and tailored to the support requirements of the IFC.
INTEGRATED SUPPORT COMMAND
2-61. The integrated support command (ISC) is the aggregate of combat ser-
vice support units (and perhaps some combat support units) allocated from
the administrative force structure to an OSC and not suballocated in a con-
stituent or dedicated command relationship to a subordinate headquarters
within the OSC. The OSC further allocates part of its combat service support
units to its tactical-level subordinates and some, as an ISG, to support its
IFC. The rest remain in the ISC at OSC level to provide overall support of
the OSC. For organizational efficiency, other combat service support units
may be grouped in this ISC, although they may support only one of the major
units of the OSC. Sometimes, an ISC might also include units performing
combat support tasks (such as chemical warfare, IW, or law enforcement)
that support the OSC. (See Chapter 12 for more detail on the ISC.) |
7-100.1 | 66 | FM 7-100.1________________________________________________________________________________
ORGANIZING THE OPERATIONAL BATTLEFIELD
2-62. The OPFOR organizes the battlefield in such a way that it can rapidly
transition between offensive and defensive operations and between linear
and nonlinear operations. This flexibility can help the OPFOR adapt and
change the nature of the conflict to something for which the enemy is not
prepared.
Battlefield Geometry
2-63. The OPFOR recognizes the complexity of the modern battlefield. This
will often lead to situations where part of the OPFOR may be able to effec-
tively operate in a linear fashion, while other parts may be able to (or need
to) conduct nonlinear operations. The OPFOR’s understanding of what makes
a battlefield linear or nonlinear is based on general military theory accepted
by the armed forces of many countries. Battlefield geometry can be described
in two dimensions: the relationship of units to each other, the enemy, and
their support base; and the expected effects of that relationship.
2-64. Linear Operations. Some military operations develop along a secure
line from a base toward a geographically-based objective. These linear opera-
tions are characterized by an easily definable front and rear across the entire
force. Orientation of the bulk of the force is in one general direction, defined
as the front, normally facing the enemy and/or the objective. (See Figure 2-
10.) During linear operations, the flanks of units are normally protected by
other units, natural terrain features, or manmade obstacles.
Rear Front
X
Base
Objective
X
Enemy
Figure 2-10. Linear Operations |
7-100.1 | 67 | _________________________________________________________________________________Chapter 2
Objective X
Enemy
Base Enemy
X
Objective
Figure 2-11. Nonlinear Operations
2-65. Nonlinear Operations. Military operations that seek to complete a
force- or systems-based mission, with no secure connection to a base and no
easily defined front and rear across the force, are nonlinear. Orientation of
the force is determined by the location of the immediate threat or the objec-
tive. (See Figure 2-11.) In most cases, units in a nonlinear environment rely
on movement, deception, cover, and concealment to provide protection for po-
tentially exposed portions of the force.
2-66. Expected Effects. The OPFOR considers the difference between lin-
ear and nonlinear operations less in terms of geography and more in terms of
effects desired. Linear operations normally produce small effects from small
actions and large effects from large actions (or perhaps large effects from an
aggregation of small actions)a linear relationship. Linear operations are
proportional and additive, and typically produce a predictable, measurable
effect. In contrast, this relationship may not always be present in nonlinear
operations, which can produce large effects from small actions. In some cases,
small actions produce small effects or no effects at all. Thus, nonlinear opera-
tions produce disproportionate, often unpredicted effects.
2-67. The OPFOR believes the worst of all possible situations is for a force to
be operating in a linear mode against an enemy that can operate freely
throughout the battlespace with excellent situational awareness and signifi-
cant forces and fires. The OPFOR seeks, as a base case, to create such a
situation for its enemies. |
7-100.1 | 68 | FM 7-100.1________________________________________________________________________________
Areas of Responsibility
2-68. OPFOR organizations are given a specific area of responsibility. An
AOR is a clearly defined geographic area with associated airspace. An AOR is
bounded by a limit of responsibility (LOR) beyond which the organization
may not operate or fire without coordination through the next-higher head-
quarters. AORs may be linear or nonlinear in nature (see Figures. 2-12 and
2-13 for examples; see Chapters 3 and 4 for additional examples). Linear
AORs may contain subordinate nonlinear AORs and vice versa.
2-69. AORs normally consist of three basic zones: the battle zone, the
disruption zone, and the support zone. An AOR may also contain one or
more attack and/or kill zones. Zones may be linear or nonlinear in nature.
These zones have the same basic purposes within each type of offensive and
defensive operation (see Chapters 3 and 4). The size of these zones depends
on the size of the OPFOR units involved, engagement ranges of weapon sys-
tems, the terrain, and the nature of the enemy’s operation.
2-70. An AOR is not required to have all of these zones in any particular
situation. A particular command might have a battle zone and no disruption
zone. It might not have a battle zone, if it is the disruption force of a higher
command. If it is able to forage, it might not have a support zone. (See exam-
ples in Figure 2-13.)
OSC
LOR
Support Battle Disruption
Zone Zone Zone
OSC AREA OF RESPONSIBILITY
OSC
LOR
Attack Zone
OSC
LOR Axis Objective
Kill
Zone
Support Battle
Line Line
OSC
LOR
Figure 2-12. Linear AOR Example
2-71. Within the overall LOR, the OPFOR normally refers to two types of
control lines. The battle line separates the battle zone from the disruption
zone. The support line separates the support zone from the battle zone. LORs
give maximum latitude to the subordinate commander. Within the LOR, the |
7-100.1 | 69 | _________________________________________________________________________________Chapter 2
commander has the flexibility to do as he sees fit unless the higher com-
mander also assigns a kill zone, which he proposes to support with additional
resources.
2-72. An operation plan or directive normally defines AORs and zones by
specifying boundary lines in terms of distinct local terrain features through
which a line passes, specifying whether each terrain feature is included or
excluded from the unit’s AOR or zones within it. Normally, a specified terrain
feature is included unless the order identifies it as “excluded.”
2-73. In either linear or nonlinear operations, military reason normally dic-
tates a contiguous force deployment. The OPFOR does not recognize the idea
of “‘noncontiguous operations.” Senior OPFOR commanders ensure that all
parts of a theater are within the assigned AOR of some subordinate organiza-
tion, whether or not ground forces are actually present or expected to operate
in any given area. A given AOR or zone might be not be contiguous with
other AORs of its level of command or with other zones of the same type, but
the geographic area between such control measures will be identified as be-
ing in the AOR of some other organization.
DTG OSC
Battle Line LOR
DTG OSC
Support Line
LOR
DTG
AD OTG R
B Sa Zutt
p
ole
p n o
eZ ro tne DTG LOR ZA ott na eck
Objective
AD OTG R
Enemy
SPOD
Highway Support
Enemy DTG Zone Kill
APOD Battle Zone Zone Sea
OSC AREA OF RESPONSIBILITY
DTG/BTG
LOR
DTG
Dis Zr ou np etion
DTG/
LBT ORG
Dis
ZO
r
ouS npC
etion
Kill Zone
BTG
AOR
way
High
OSC
LOR
Figure 2-13. OSC Nonlinear AOR Example
2-74. In his operation plan, the commander specifies the organization of the
battlefield from the perspective of his level of command. Within his unit’s
AOR, as defined by the next-higher commander, he designates AORs for his
subordinates, along with zones, objectives, and axes related to his own over-
all mission. (See Chapter 3 for further discussion of objectives and axes.)
Whether the overall operation plan is offensive or defensive in nature, some |
7-100.1 | 70 | FM 7-100.1________________________________________________________________________________
subordinate units are likely to be occupying defensive battle positions. (See
Chapter 4 for further discussion of simple and complex battle positions.)
2-75. Disruption Zone. The disruption zone is where the OPFOR sets the
conditions for successful operations by beginning the attack on the compo-
nents of the enemy combat system. A successful disruption zone operation
can create a window of opportunity that is exploitable in the battle zone. In
the disruption zone, the OPFOR attacks specific components of the enemy’s
combat system in order to begin the breakdown of the system. For example,
attack of all enemy engineer forces can leave a maneuver force unable to con-
tinue effective combat operations in complex terrainexposing them to de-
struction by forces in the battle zone. Actions of forces in the disruption zone
are detailed in Chapters 3 and 4. Disruption zones may be contiguous or non-
contiguous with other disruption zones, or they may be “layered.”
2-76. Battle Zone. The battle zone is the portion of the AOR where the
OPFOR expects to conduct decisive operations. Using all components of its
combat power, the OPFOR will engage the enemy and defeat him in this
zone. Units operating in the battle zone can have various missions and objec-
tives, depending on the nature of the overall offensive or defensive operation
(see Chapters 3 and 4).
2-77. An FG or OSC does not form an operational-level battle zone per
sethat zone is the aggregate of the battle zones of its subordinate units. In
a nonlinear operation, multiple, noncontiguous battle zones may exist, and
within each a certain task would be assigned to the OPFOR unit or units
charged to operate in that space. The battle zone provides the commander of
each of those units the battlespace in which to frame his operations.
2-78. Support Zone. The support zone is that area of the battlespace de-
signed to be free of significant enemy action and to permit the effective logis-
tics and administrative support of forces. Security forces operate in the sup-
port zone in a combat role to defeat enemy special operations forces and other
threats. Camouflage, concealment, cover, and deception (C3D) measures oc-
cur throughout the support zone to protect the force from standoff RISTA and
precision attack. The OSC support zone may be dispersed within the support
zones of subordinate tactical units, or the OSC may have its own support
zone that is separate from subordinate AORs. The support zone may be in a
sanctuary that is noncontiguous with other zones of the AOR.
2-79. Attack Zone. An attack zone is given to a subordinate unit with an of-
fensive mission, to delineate clearly where forces will be conducting offensive
maneuver. Attack zones are often used to control offensive action by a subor-
dinate unit inside a larger defensive operation.
2-80. Kill Zone. A kill zone is a designated area on the battlefield where the
OPFOR plans to destroy a key enemy target, usually by fires. A kill zone may
be within the disruption zone or the battle zone. In defensive operations, it
could also be in the support zone. |
7-100.1 | 71 | _________________________________________________________________________________Chapter 2
COMMAND GROUP AND STAFF
2-81. Within the C2 structure, the headquarters includes the command group
and the staff. (See Figure 2-14.) These elements perform the functions re-
quired to control the activities of forces preparing for and conducting combat.
The primary functions of headquarters are to
• Make decisions.
• Plan combat actions that accomplish those decisions.
• Acquire and process the information needed to make and execute effec-
tive decisions.
• Support the missions of subordinates.
The commander exercises C2 functions through his staff and subordinate
commanders.
Command Group
2-82. The command group consists of the commander, deputy commander,
and chief of staff. Together, they direct and coordinate the activities of the
staff and of subordinate forces.
2-83. Commander. The commander directs subordinate commanders and,
through his staff and liaison teams, controls any supporting units. OPFOR
commanders have complete authority over their subordinates and overall re-
sponsibility for those subordinates’ actions. This centralized authority en-
ables the commander to maintain troop discipline and unity and to act deci-
sively. Under the fluid conditions of modern warfare, even in the course of
carefully planned operations, the commander must accomplish assigned mis-
sions on his own initiative without constant guidance from above.
2-84. The commander is responsible for the combat capability of subordinate
units, the organization of combat operations, the maintenance of uninter-
rupted C2, and the successful conduct of combat missions. He examines and
analyzes the mission he receives (that is, he determines his forces’ place in
the senior commander’s concept of operations). He may do this alone or
jointly with the chief of staff. He then gives instructions to the chief of staff
on preparing his forces and staff for combat. He also provides instructions
about the timing of preparations. The commander makes his own assessment
of intelligence data supplied by the intelligence officer. Then, with advice
from the primary staff officers, he makes an assessment of his own forces.
After discussing his deductions and proposals with the operations officer
and his staff, the commander reaches a decision, issues combat missions to
subordinates, and gives instructions about planning the operation. He then
directs coordination within his organization and with adjacent forces and
other units operating in his AOR.
2-85. During the course of operations, the commander must constantly
evaluate the changing situation, predict likely developments, and issue new
combat missions in accordance with his vision of the battlefield. He also
keeps his superiors informed as to the situation and character of friendly and
enemy actions and his current decisions. |
7-100.1 | 72 | FM 7-100.1________________________________________________________________________________
COMMANDER
CommandGroup
Deputy
Commander
Commanders of
Chief Subordinate
of Forces
Staff
Primary Staff
Intelligence Operations Resources
Officer Officer Officer
Secondary Staff
Chief of
Chief of Chief of
Current
Reconnaissance Operations Logistics
Chief of Chief of Chief of
Information Future
Warfare Operations Administration
Chief of Chief of
Airspace
Communications Operations
Functional Staff
Chief of Chief of Chief of
Integrated Special-Purpose Population
Fires Operations Management
Chief of Chief of
Chief of
Force WMD Infrastructure
Protection Management
Chief of
Littoral
Warfare
Figure 2-14. OSC Command Group and Staff |
7-100.1 | 73 | _________________________________________________________________________________Chapter 2
2-86. Deputy Commander. In the event the commander is killed or inca-
pacitated, the DC would assume command. Barring that eventuality, the
DC’s primary responsibility is to command the OSC’s IFC. As IFC com-
mander, he is responsible for executing operational-level fire support in a
manner consistent with the commander’s intent.
2-87. Chief of Staff. Preeminent among OPFOR staff officers is the chief of
staff position (found at every level from the General Staff down to battalion).
He exercises direct control over the primary staff. During combat, he is in
charge of the main CP when the commander moves to the forward CP. He
has the power to speak in the name of the commander and DC, and he nor-
mally countersigns all written orders and combat documents originating from
the commander’s authority. He alone has the authority to sign orders for the
commander or DC and to issue instructions in the commander’s name to sub-
ordinate units. In emergency situations, he can make changes in the tasks
given to subordinate commanders. Thus, it is vital that he understands
not merely the commander’s specific instructions but also his general con-
cept and train of thought. He controls the battle during the commander’s ab-
sences.
2-88. The chief of staff is a vital figure in the C2 structure. His role is to serve
as the director of staff planning and as coordinator of all staff inputs that as-
sist the commander’s decision making. He is the commander’s and DC’s focal
point for knowledge about the friendly and enemy situation. He has overall
responsibility for providing the necessary information for the commander to
make decisions. Thus, he plays a key role in structuring the overall recon-
naissance effort to meet the commander’s information requirements.
Staff
2-89. A staff provides rapid, responsive planning for combat activity, and
then coordinates and monitors the execution of the resulting plans on behalf
of the commander. Proper use of this staff allows the commander to focus on
the most critical issues in a timely manner and to preserve his energies.
2-90. The staff releases the commander from having to solve administrative
and technical problems, thereby allowing him to concentrate on the battle.
The primary function of the staff is to plan and prepare for combat. Evalua-
tion and knowledge of the situational elements of combat is fundamental to
the decision-making process and the direction of troops. After the commander
makes the decision, the staff must organize, coordinate, disseminate, and
support the missions of subordinates. Additionally, it is their responsibility to
train and prepare troops for combat, and to monitor the pre-combat and combat
situations.
2-91. In the decision-making and planning process, the staff—
• Prepares the data and estimates the commander uses to make a deci-
sion.
• Plans and implements the basic measures for comprehensive support
of a combat action.
• Organizes communications with subordinate and adjacent headquar-
ters and the next-higher staff. |
7-100.1 | 74 | FM 7-100.1________________________________________________________________________________
• Monitors the activities of subordinate staffs.
• Coordinates ongoing activity with higher-level and adjacent staffs
during an operation.
2-92. All operational-level headquarters have the same basic organization,
although each differs in size and complexity. The higher the level, the larger
and more complex the staff. Therefore, the organization of command and
staff elements is similar at theater, FG, or OSC.
2-93. The staff consists of three elements: the primary staff, the secondary
staff and the functional staff. Figure 2-14 depicts the primary, secondary,
and functional staff officers of an OSC headquarters; it does not show the li-
aison teams, which support the primary, secondary, and functional staff.
Primary and Secondary Staff
2-94. Each member of the primary staff heads a staff section. Within each
section are two or three secondary staff officers heading subsections subordi-
nate to that primary staff officer.
2-95. Operations Officer. The operations officer heads the operations
section, and conducts planning and prepares operation plans and operational
directives. Thus, the operations section is the principal staff section. It
includes current operations, future operations, and airspace operations
subsections, as well as the functional staff.
2-96. The operations officer is responsible for training and the formulating of
plans and orders. He monitors the work of all other staff sections, remains
knowledgeable of the current situation, and is ready to present information
and recommendations concerning the situation. He writes combat orders and
important combat reports. In coordination with the information section, the
operations officer keeps the commander informed on the progress of the op-
eration. Specific duties of the operations section include—
• Assisting the commander in the making and execution of combat decisions.
• Collecting information concerning the situation of friendly forces.
• Preparing and disseminating operational directives, plans and reports,
summaries, and situation overlays.
• Providing liaison for the exchange of information within the headquar-
ters and with higher, subordinate, and adjacent units.
• Organizing the main CP.
• Organizing troop movement and traffic control.
• Coordinating the organization of reconnaissance with the information section.
2-97. The chief of current operations is a secondary staff officer who proac-
tively monitors the course of current operations and coordinates the actions of
forces to ensure execution of the commander’s intent. He serves as the represen-
tative of the commander, chief of staff, and operations officer in their absence
and has the authority to control forces in accordance with the operation plan.
2-98. The chief of future operations is a secondary staff officer who heads the
planning staff and ensures continuous development of future plans and pos-
sible branches, sequels, and contingencies. While the commander and the |
7-100.1 | 75 | _________________________________________________________________________________Chapter 2
chief of current operations focus on the current operation, the chief of future op-
erations and his subsection monitor the friendly and enemy situations and their
implications for future operations. They try to identify any developing situations
that require command decisions and/or adaptive measures. They advise the
commander on how and when to make adjustments to the operation plan during
the fight. Planning for various contingencies and anticipated opportunities can
facilitate immediate and flexible response to changes in the situation.
2-99. The chief of airspace operations (CAO) is a secondary staff officer who
is responsible for the control of the OSC’s airspace. See Chapters 8 and 9 for
further information on his duties.
2-100. Intelligence Officer. The intelligence officer heads the intelligence
and information section, which consists of the reconnaissance subsection, the
IW subsection, and the communications subsection. The intelligence officer is
responsible for the acquisition, synthesis, analysis, dissemination, and protec-
tion of all information and intelligence related to and required by the OSC’s
operations. He ensures the commander’s intelligence requirements are met.
He provides not only intelligence on the current and future operational envi-
ronment, but also insight on opportunities for adaptive and creative re-
sponses to ongoing operations. The intelligence officer works in close coordi-
nation with the chief of future operations to establish feedback and input for
future operations and the identification of possible windows of opportunity.
2-101. The intelligence officer also formulates the OSC’s IW plan and must
effectively task organize his staff resources to conduct and execute IW in a
manner that supports the strategic IW plan. He is responsible for the coordi-
nation of all necessary national or theater level assets in support of the IW
plan and executes staff supervision over the IW and communications plans.
He is supported by three secondary staff officers: the chief of reconnaissance,
the chief of IW, and the chief of communications.
2-102. The chief of reconnaissance develops collection plans, gathers
information, and evaluates data on the battlefield situation. During combat,
he directs the efforts of subordinate reconnaissance units and reconnaissance
staff subsections of subordinate units. Specific responsibilities of the
reconnaissance subsection include—
• Collecting, analyzing and disseminating information on the enemy, terrain,
and weather to the commander and subordinate, higher, and adjacent units.
• Organizing reconnaissance missions, including requests for aerial re-
connaissance, in coordination with the operations section and in sup-
port of the IW plan.
• Preparing the reconnaissance plan, in coordination with the operations section.
• Preparing the reconnaissance portion of operation plans and opera-
tional directives.
• Preparing intelligence reports.
• Supervising the exploitation of captured enemy documents and materiel.
• Supervising interrogation and debriefing operations throughout the command.
• Providing targeting data for long-range fires. |
7-100.1 | 76 | FM 7-100.1________________________________________________________________________________
2-103. The chief of information warfare is responsible supervising the execu-
tion of the OSC’s IW plan. (Chapter 5 details the components of the IW plan.)
These responsibilities include
• Coordinating the employment of IW assets, both those constituent to
the OSC and those available at the national or theater level.
• Planning for and supervising all information protection and security
measures.
• Supervising the implementation of the deception and perception man-
agement plans.
• Working with the operations staff to ensure that targets scheduled for
destruction support the IW plan, and if not, resolving conflicts between
IW needs and operational needs.
• Recommending to the intelligence officer any necessary actions re-
quired to implement the IW plan.
2-104. The chief of communications develops a communications plan for the
command that is approved by the intelligence officer and chief of staff. He or-
ganizes communications with subordinate, adjacent, and higher headquarters.
The communications subsection plans the use of all forms of communications, to
include satellite communications (SATCOM), wire, radio, digital, cellular, and
couriers, to ensure that the commander has continuous and uninterrupted
control. Specific responsibilities of the communications subsection include
• Establishing SATCOM and radio nets.
• Establishing call signs and radio procedures.
• Organizing courier and mail service.
• Operating the command’s message center.
• Supervising the supply, issue, and maintenance of signal equipment.
2-105. An additional and extremely important role of the communications of-
ficer is to ensure the thorough integration of joint, interagency, and allied
forces into the OSC’s C2 structure. The OSC headquarters is permanently
equipped with a full range of C2 systems compatible with each of the services
of the State’s Armed Forces as well as with government agencies commonly
operating as part of OSCs (such as special police or border guard units that
were originally subordinate to the Ministry of the Interior). Other govern-
ment agencies and allied partners are also the responsibility of the communi-
cations officer and he plans and provides for their C2 integration.
2-106. Resources Officer. The resources officer is responsible for the requi-
sition, acquisition, distribution, and care of all of the command’s resources,
both human and materiel. He ensures the commander’s logistics and admin-
istrative requirements are met and executes staff supervision over the com-
mand’s logistics and administrative procedures. (Sustainment procedures are
detailed in Chapter 12.) He is supported by two secondary staff officers: the
chief of logistics and the chief of administration. One additional major task of
the resources officer is to free the commander from the need to bring his
influence to bear on priority logistics and administrative functions. He is also
the officer in charge of the sustainment CP. |
7-100.1 | 77 | _________________________________________________________________________________Chapter 2
2-107. The chief of logistics heads the logistics system. He is responsible for
managing the order, receipt, and distribution of supplies to sustain the com-
mand. He is responsible for the condition and combat readiness of armaments
and related combat equipment and instruments. He is also responsible for their
supply, proper utilization, repair, and evacuation. He oversees the supply and
maintenance of the command’s combat and technical equipment. These respon-
sibilities encompass the essential wartime tasks of organizing and controlling
the command’s recovery, repair, and replacement system. During combat, he
keeps the commander informed on the status of the command’s equipment.
2-108. The chief of administration supervises all personnel actions and
transactions in the command. His subsection maintains daily strength re-
ports and TO&E changes; assigns personnel; requests replacements; records
losses; administers awards and decorations; and collects, records, and dis-
poses of war booty.
Functional Staff
2-109. The functional staff consists of experts in a particular type of military
operation or function (see Figure 2-15). These experts advise the command
group and the primary and secondary staff on issues pertaining to their indi-
vidual areas of expertise.
Operations
Officer
Chief of Chief of Chief of
Chief of
Integrated Force Special-Purpose
WMD
Fires Protection Operations
Chief of Chief of Chief of
Population Infrastructure Littoral
Management Management Warfare
Figure 2-15. OSC Functional Staff
2-110. In peacetime, the functional staff is a cadre with personnel assigned
from appropriate branches and services. It has enough personnel to allow
continuous 24-hour capability and the communications and information
management tools to allow them to support the commander’s decision-
making process and exercise staff supervision over their functional areas
throughout the AOR. In wartime, the functional staff receives liaison teams
from subordinate and supporting units that perform tasks in support of those
functional areas. |
7-100.1 | 78 | FM 7-100.1________________________________________________________________________________
2-111. Chief of Integrated Fires. The chief of integrated fires is responsi-
ble for integrating C2 and RISTA means with fires and maneuver. He works
closely with the OSC chief of reconnaissance and the IFC staff. He also coor-
dinates with the chief of IW to ensure that deception and protection and se-
curity measures contribute to the success of the fire support to offensive and
defensive operations.
2-112. Chief of Force Protection. The chief of force protection is responsi-
ble for coordinating activities to prevent or mitigate the effects of hostile ac-
tions against OPFOR personnel, resources, facilities, and critical information.
This protection includes air, space, and missile defense; NBC defense; defensive
IW; counterterrorism; counterreconnaissance; and engineer survivability
measures. This subsection works closely with those of the chief of weapons of
mass destruction (WMD) and the chief of IW. Liaison teams from internal se-
curity, air defense, chemical defense, and engineer forces provide advice within
their respective areas of protection.
2-113. Chief of Special-Purpose Operations. The chief of special-purpose
operations is responsible for planning and coordinating the actions of SPF
units allocated to an OSC. When possible, this subsection receives liaison
teams from any affiliated forces that act in concert with the SPF.
2-114. Chief of Weapons of Mass Destruction. The chief of WMD is re-
sponsible for planning the offensive use of WMD. This functional staff ele-
ment receives liaison teams from any subordinate or supporting units that
contain WMD delivery means.
2-115. Chief of Population Management. The chief of population man-
agement is responsible for coordinating the actions of Internal Security
Forces, as well as psychological warfare, perception management, civil affairs,
and counterintelligence activities. There is always a representative of the Minis-
try of the Interior, and frequently one from the Ministry of Public Information.
This subsection works closely with the chief of IW and receives liaison teams
from psychological warfare, civil affairs, counterintelligence, and Internal Secu-
rity Forces units allocated to the OSC or operating within the OSC’s AOR.
2-116. Chief of Infrastructure Management. The chief of infrastructure
management is responsible for establishing and maintaining roads, airfields,
railroads, hardened structures (warehouses and storage facilities), inland
waterways, ports, and pipelines. He coordinates with the OSC resources offi-
cer regarding improvement and maintenance of supply and evacuation
routes. He exercises staff supervision or cognizance over the route construc-
tion and maintenance functions of both civil and combat engineers operating
in the OSC’s AOR. He coordinates with civilian agencies and the OSC chief of
communications to ensure adequate telecommunications support.
2-117. Chief of Littoral Warfare. The chief of littoral warfare is responsi-
ble for planning and coordinating coastal defense and amphibious operations.
His subsection includes liaison teams from not only naval and naval infantry
units, but also any ground forces, aviation, air defense, airborne, SPF, or af-
filiated forces that participate in or support the coastal defense or amphibi-
ous operation. He also coordinates with border guard units assigned to patrol
coastal border areas. |
7-100.1 | 79 | _________________________________________________________________________________Chapter 2
Liaison Teams
2-118. Liaison teams support the staff with detailed expertise in the mission
areas of their particular branch or service and provide direct communications
to subordinate and supporting units executing missions in those areas. Liaison
team leaders speak for the commanders of their respective units. Liaison teams
to OSCs are organized with a liaison team leader, two current operations officers
or senior NCOs and two plans officers or senior NCOs. This gives liaison teams
the ability to conduct continuous operations and simultaneously execute current
plans and develop future plans. The staff would also receive liaison teams from
multinational and interagency subordinates and from affiliated forces.
COMMAND AND CONTROL PROCESS
2-119. C2 is a continuous process at all levels of command. The OPFOR rec-
ognizes five elements in this process:
• Acquiring and processing information.
• Decision making.
• Planning.
• Preparation.
• Execution.
ACQUIRING AND PROCESSING OF INFORMATION
2-120. Acquiring and processing information is always the first function in
the C2 process. This function is a continuous, active process of requesting, re-
ceiving, collating, analyzing, and disseminating information commanders and
staffs need for decision making and planning. However, the physical collec-
tion of information is not actually part of the C2 process.
2-121. An operational-level commands receives information collected at
higher and lower levels, as the information relates to its own requirements.
Likewise, operational-level commands pass information to both those levels
to meet strategic or tactical information requirements.
Strategic-Level Information Requirements
2-122. At the General Staff level and above, military and political informa-
tion requirements are global in scope. The OPFOR has a continuous re-
quirement to evaluate changes in the military or political capabilities and in-
tentions of foreign nations in relation to the State. The accuracy of these as-
sessments can directly influence the selection of strategic military and politi-
cal goals, the structure of the State’s Armed Forces, and the strategic concept
for using military power.
Operational-Level Information Requirements
2-123. FG and OSC staffs are the focal points for detailed situation evalua-
tion and large-scale planning for combat units. Therefore, they have a par-
ticularly heavy demand for information to support the decision-making and
planning process. To function efficiently, operational-level staffs require high-
resolution data on both enemy and friendly forces. Required periodic and special
reporting is the primary source of detailed, accurate, and timely information on |
7-100.1 | 80 | FM 7-100.1________________________________________________________________________________
friendly forces. The availability and timeliness of such friendly force data de-
pends largely on the availability and efficiency of the necessary communica-
tions links. On the other hand, acquiring information on the enemy involves
collecting and reporting in a hostile environment. Operational staffs must
analyze conflicting and incomplete data and assess and correlate intelligence
provided by higher headquarters.
Tactical-Level Information Requirements
2-124. The commander and staff must bring together all available data ap-
plicable to their mission and use the data skillfully to achieve their objec-
tives. At a minimum, these data include information on enemy and friendly
forces, the combat environment, and the population in the AOR.
2-125. Enemy. Of these elements, information about the enemy is the most
important. An OPFOR commander must have continuous, reliable informa-
tion about the enemy’s effective combat strength and organization to conduct
forces analysis. He must receive information concerning enemy locations, re-
inforcing units, C2 systems, and defensive positions. Information pertaining
to the disposition and potential use of precision weapons is important. The
required degree of detail will vary in different situations and at various lev-
els of command. Constant attention is given to identifying enemy deception
efforts. The OPFOR emphasizes multi-spectral collection efforts to reduce the
potential effects of the enemy’s deceiving a single RISTA asset.
2-126. Friendly Forces. Information about friendly forces is necessary to
help the commander determine how best to use them and to identify re-
quirements for coordination. OPFOR planners consider training status when
making qualitative calculations of relative strengths of their own and enemy
forces. In addition, they must consider how missions of other friendly forces
may affect the accomplishment of their own assigned tasks.
2-127. Combat Environment. The NBC environment, terrain, weather,
and climatic and seasonal conditions also provide OPFOR planners insight as
to what they can and cannot do effectively during a combat action. Planners use
this information to determine routes, use of NBC weapons, and types of camou-
flage. This information can also help determine the effects these factors could
have on friendly actions and on the enemy’s possible courses of action.
2-128. Population. The economic and sociopolitical makeup of the AOR in-
terests OPFOR military planners. Information about potentially hostile, neu-
tral, and friendly populations in the AOR enables the OPFOR to exploit local
resources and to plan appropriate levels of security and perception manage-
ment strategies to manipulate the population.
DECISION MAKING
2-129. The military decision-making process consists of five phases: assess,
orient, decide, act, and adapt. These phases are not completely independent
processes or stages of thought. Each phase overlaps and relies on the others. |
7-100.1 | 81 | _________________________________________________________________________________Chapter 2
Assess
2-130. The command group and staff develop estimates across the compo-
nents of the combat system, including combat, combat support, C2, RISTA,
and logistics forces. There are three separate purposes served by the assess-
ment process, including
• Develop situational awareness of forces and means at the disposal of
the OPFOR and the enemy.
• Determine possible enemy weaknesses.
• Develop an understanding of OPFOR requirements.
2-131. The assessment phase requires the staff elements responsible for the
discrete components of the combat system to conduct analysis and synthesis.
Typically the analysis includes
• Mission. The commander must understand the senior commander’s
concept of the campaign or operation and his own command’s role in it.
• Time and Space. The OPFOR considers time a factor it can use to its
advantage and prefers to exercise patience if that will achieve the goal.
The OPFOR views time as an ally in developing a strategy of exhaust-
ing the enemy in pursuit of the State’s goals.
• Environment. In the assessment of the environment, the OPFOR
includes terrain, population, and other physical dimensions of the
battlespace.
• Capabilities and Intentions. This is not limited to the immediate
opponent, but includes all relevant regional and global actors.
• Opportunities and Risks. In its decision making, the OPFOR at-
tempts to identify both risks and opportunity posed by the environ-
ment, time and space, or capabilities and intentions of other actors.
Orient
2-132. The orientation step or phase in the process enables the commander to
direct preparatory steps prior to determining his aim or making his final de-
cision. He first examines the mission given his unit and determines what
tasks must be performed to accomplish this mission. This phase also includes
activating RISTA assets to develop information requirements identified in
the assessment of the situation. Typically, the orientation phase would in-
clude preliminary instructions appropriate to the assessment of the situation.
If the assessment phase reveals shortfalls or information requirements es-
sential to reaching a final decision, orienting the command group, staff, and
units enables the OPFOR to develop “pace” prior to final decision. This phase
requires coordination with appropriate civilian authorities at the higher
echelons, particularly in support of transition operations or adaptive operations.
During the orientation phase, the commander and his staff develop several
courses of action and compare them, attempting to refine the information re-
quired for decision.
Decide
2-133. In the “decide” step, the commander determines his aim or decision
and communicates his concept for execution. He includes his directions for |
7-100.1 | 82 | FM 7-100.1________________________________________________________________________________
sustaining the aim. Typically, sustaining the aim involves assigning re-
sources and developing parameters for execution that define the limits of
subordinates’ discretion. In communicating his thinking, the commander al-
ways includes branches and sequels that he is able to anticipate. In establishing
the aim, he remains focused on the mission that he was assigned, but does so
in the context of the systems warfare approach to combat and how he may best
achieve the ends envisioned in his mission. He attempts to reach a choice that
enables the OPFOR to operate successfully by defeating an opponent through
disaggregating one or more components of the enemy combat system. Conse-
quently, the OPFOR is not very interested in classic calculations of correlation of
military forces, but more in finding a way to produce disproportionate effects.
2-134. When the commander has selected a base course of action with appro-
priate branches and sequels, he provides this decision to his staff for further
planning and for dissemination of the finalized missions to the troops. The
decision includes the concept, missions for major subordinates, the organiza-
tion of forces, and the organization of the AOR. The components of the deci-
sion are the following:
2-135. Objective (Subordinate Unit Missions). The commander deter-
mines the objective of the operation and the missions to be assigned to con-
stituent and dedicated forces. This part of the decision defines the priorities
for supporting and affiliated forces.
2-136. Opportunity. The commander describes how the unit will achieve
the necessary window of opportunity to execute the plan. This includes meas-
ures for protecting the force from standoff attack as well as creating or taking
advantage of an enemy vulnerability.
2-137. Method (Concept of Operations). The commander describes by
what means to accomplish the task or mission. He organizes the battlefield
and his forces. He lays out the method by which the OSC will support the
theater or national IW campaign.
2-138. End State. The commander describes his vision for how the operation
ends on OPFOR terms. He also describes how this operation sets the stage
for follow-on operations.
Act
2-139. On the basis of the available data and the recommendations from the
staff, the commander makes a decision. The decision may be one of the rec-
ommended courses of action, a combination of two or more recommendations,
or a new solution. The commander can also keep the more promising non-
selected variants as contingency plans.
2-140. Commanders avoid using stereotyped patterns that would make en-
emy templating and targeting easier. To aid in deception, they may create
courses of action that appear on the surface as established fighting methods
but are actually something else.
Adapt
2-141. Operational-level decision making is highly flexible. This flexibility
comes from mission-type orders from the General Staff (or SHC or theater |
7-100.1 | 83 | _________________________________________________________________________________Chapter 2
headquarters) to the operational-level commands. The staff structure pro-
vides operational-level commanders the capability for rapid situation as-
sessment and decision making.
2-142. Since operational planning occurs well in advance, it would be difficult
for the enemy to disrupt the initial decision making and planning. However,
the operational-level commanders and staffs are continually updating and
adapting the operation plan. The OPFOR uses IW measures to help ensure
that the OPFOR commander has sufficient time to acquire and process in-
formation on the combat situation.
PLANNING
2-143. The commander conveys his decision to the chief of staff, who, with his
subordinates, fleshes it out with detailed planning tailored to the circum-
stances of the operation and the terrain. The chief of staff issues detailed,
precise orders for the initial phase of an operation only. At this point, there
usually is not enough hard data to allow an accurate forecast of how the
situation will develop. The plan includes intelligence, the commander’s deci-
sion, limits of responsibility, the missions of flanking forces, the missions of
combat support and combat service support units, coordinating instructions,
and the deployment of CPs.
2-144. Planning usually begins with the receipt of preliminary instructions
for execution of the SCP. The planning process is continuous and will be af-
fected by changes in the battlefield situation, amendments to orders and di-
rectives, or assignment of new missions. Situational intensity dictates the
planning method used.
2-145. Central to OPFOR planning is the concept of opportunity. In transition
or adaptive operations, the OPFOR recognizes that it will often be operating
in conditions where it is overmatched by enemy technological superiority. In
these conditions, the OPFOR will plan and conduct deliberate operations to
create windows of opportunity in which to operate proactively with freedom
of maneuver from enemy RISTA and standoff attack. Each OPFOR plan in-
cludes specific instructions to subordinate units concerning how this oppor-
tunity will be achieved and utilized.
2-146. Examples of means by which the OPFOR can create opportunity are
• IW activities, including selective denial of enemy situational understanding.
• Use of complex terrain.
• Freedom-of-movement operations (such as feints, ruses, demonstra-
tions, or ambushes).
Planning Framework
2-147. The military SCP developed and issued by the General Staff directs
operational-level military forces. Each operational-level command identified in the
SCP prepares an operation plan that supports the execution of its role in that SCP.
2-148. From the General Staff down through the operational and tactical lev-
els, the staff of each military headquarters has an operations directorate or
section that is responsible for planning. The plan at each level specifies the
AOR and task organization of forces allocated to that level of command, in |
7-100.1 | 84 | FM 7-100.1________________________________________________________________________________
order to best accomplish the mission assigned by a higher headquarters.
Once the commander at a particular level approves the plan, he issues it to
the subordinate commanders who will execute it. Figure 2-16 illustrates the
framework for planning from the national level down through military chan-
nels to the operational and tactical levels.
Decision-Making Staff
Executing
(Plan-Approval) Planning Plan
Organizations
Authority Organization
Strategic Level
National
National Strategic
Strategic All State
Command Integration
Campaign Ministries
Authority Department
Plan
Military
Chief of Operations Strategic Armed
General Staff Directorate Campaign Forces
Plan
Theater Forces
Theater Operations
Campaign Allocated to
Commander Directorate
Plan Theater
Operational Level
Forces
Field Group Operations Operation
Allocated to
Commander Section Plan
Field Group
Forces
OSC Operations Operation
Allocated to
Commander Section Plan
OSC
Tactical Level
Forces
Tactical-Level Operations Allocated to
Battle Plan
Commander Section Tactical-Level
Command
Figure 2-16. State and OPFOR Planning Framework |
7-100.1 | 85 | _________________________________________________________________________________Chapter 2
Planning Factors
2-149. Planning factors serve as a basis for staff calculations and as meas-
ures against which to test and assess troops and units. The OPFOR sees
these planning factors as guides in planning rather than figures to which one
must adhere rigidly in all circumstances.
2-150. The OPFOR views planning factors as practical expressions of the re-
lationships dictated by military common sense and the principles of war. Op-
erations planning factors include space and time factors concerning the mis-
sions of forces and their areas of combat activity. For example, such planning
factors establish parameters for the time available to take advantage of a
window of opportunity, the space required to disperse forces, and the number
of ambushing forces necessary to ensure a key target is destroyed. The basis
for these planning factors is a close study of potential adversaries, military
history, field training exercises, and military simulations. The resulting plan-
ning factors are tailored to the makeup of OPFOR organizations, their
capabilities, enemy capabilities, and conditions on the modern battlefield.
2-151. Planning factors also express timeliness and quantitative and qualita-
tive factors. Examples include normal expenditures of ammunition to destroy
a given target, rates of fuel consumption under specific conditions, and the
number of halts in a road march of a given duration. Such factors ensure a
uniform and objective approach to expected performance in combat and a
standard for evaluating the training level of personnel and units.
Forces Analysis
2-152. For determining the amount and type of force required to accomplish
a given mission (for planning purposes), OPFOR planners use a very detailed
method known as forces analysis. This involves qualitative calculations of the
relative strengths of their own and enemy forces. Forces analysis includes study
of opponents previous military operations and the historical trends for application
of military power at all levels. Vulnerabilities and strengths are assessed for
potential exploitation by OPFOR operational forces. Forces analysis is seldom a
simple one-to-one comparison of combat systems. It involves an examination of
the enemy’s entire combat system and the linkages of military forces to national
strategies. By determining the relationships of the systems that give a military
force its strength the OPFOR can determine where, and now much combat
power to apply for desired effects. The results of forces analysis are used to rec-
ommend to the commander the organization of forces and the battlefield, as well
as to identify any shortfalls in the available components of combat power.
Advances in Planning
2-153. Advances in information technology have resulted in changes in the
OPFOR’s planning process. Some of the advances have resulted in the fielding of
new hardware providing increased capabilities, while others caused changes in how
the OPFOR conducts operations. The following paragraphs address these factors.
2-154. Timeliness. The high pace of modern combat imposes time con-
straints on the OPFOR decision-making process and planning cycle.
Commanders must expect the situation to be subject to sudden, sharp |
7-100.1 | 86 | FM 7-100.1________________________________________________________________________________
changes, or to be shrouded in obscurity and ambiguity. As a result, there may
be insufficient time to produce and disseminate intelligence and to formulate
and issue plans and orders.
2-155. Timely and rapid information collection and reporting are critical to
ensuring that commanders have constant, up-to-date knowledge of the situa-
tion. To be successful, the commander must be able to react swiftly to
changes, while updating subordinate unit missions.
2-156. To OPFOR decision makers and planners, time assumes a role of un-
paralleled importance on the battlefield. The effectiveness of their C2 is in-
separably linked to the ability to make and implement decisions that allow
the OPFOR to control the pace of combat.
2-157. Commanders and staffs must plan their available time carefully. The
OPFOR emphasizes parallel planning and action at all levels. Even when less
time is available for planning, it works out plans in as much detail as possible.
2-158. Staff Procedures. While the time available for making and commu-
nicating decisions has decreased, the quantity of information collected has
increased dramatically. Improved reconnaissance systems have increased the
volume of information to be processed and analyzed. Despite this information
explosion, commanders must still be able to make rapid decisions while
guarding against information overload and a resulting slowdown of the
decision-making process.
2-159. The OPFOR has increased automation of the staff calculations sup-
porting the decision-making and planning processes. Automation extends the
use of prepared calculations and formulas, while reducing paperwork.
OPFOR staff procedures are streamlined to provide commanders with more
time to prepare their forces for combat. The issuance of preliminary instruc-
tions outlining the broad concept of operations, along with the acceptance of
subordinates’ initiative, allows subordinate staffs to use parallel planning.
2-160. Detailed Planning. When the commander decides on the final con-
cept of operations, the staff begins detailed planning. Detailed planning is a
prerequisite for success. Modern combined arms, joint, interagency, and multi-
national operations integrate the actions of many types of forces and combat
equipment, as well as diverse support requirements. In terms of detail, OPFOR
planning considers forces an echelon below the immediately subordinate units to
which it assigns tasks in the operation plan. Thus, planning in an OSC with
division-size subordinates looks at brigade-level requirements in detail.
PREPARATION
2-161. Preparation links planning and execution. The commander supervises
the preparations of his subordinates, either personally or through his DC or
chief of staff. He issues instructions and directives.
Dissemination of Missions
2-162. The dissemination of missions to subordinates is a critical C2 task.
The commander usually establishes the general procedures of staffs and
other headquarters for disseminating missions to the troops. However, the chief
of staff is the main organizer for carrying out this work. He must accomplish |
7-100.1 | 87 | _________________________________________________________________________________Chapter 2
this quickly, in order to give subordinate commanders and staffs, and units
as well, sufficient time to prepare for their combat missions. In order to de-
crease the time this task requires, the OPFOR applies technology, such as
graphic display panels and other sophisticated signal equipment.
2-163. Disseminating mission-type information concerning upcoming or
planned combat activity occurs at several points in the decision-making and
planning process. At any level, preliminary instructions from higher-level
commanders first present this information in general outline, allowing sub-
ordinate commanders and staffs to begin preliminary planning (as part of the
decision-making process). Only when they receive the senior commander’s fi-
nal decision in operational directives can lower-level commanders decide on
their own final concept of the operation. The process at a given level ends
when commanders issue combat orders to their own subordinates.
2-164. Preliminary Instructions. The means by which commanders can
make the earliest possible dissemination of information concerning an up-
coming operation are preliminary instructions. These instructions contain the
missions of the subordinate units and the higher commander’s general concept
of operations. These normally serve as a vehicle to provide the outline of the
commander’s decision, basic information on the situation, and the mission for
which the receiving headquarters should begin planning. These instructions
may revise a previous order or issue a new, time-sensitive mission. Similar to a
warning order in the U.S. Army, they allow subordinate units to prepare for the
flurry of activity demanded of headquarters on receipt of a new mission. They
enable subordinate headquarters to begin their planning process concurrently
with the higher command levels. The commander may issue preliminary in-
structions to subordinates in either oral or written form. However, it is normal
to transmit preliminary instructions by electronic, secure-voice means rather
than in written form.
2-165. Operation Plan. Operational-level commands prepare operation
plans to control execution of their portion of an SCP. The operation plan must
• Optimally allocate forces and resources to each mission.
• Provide concrete methods to coordinate the actions of maneuver, fire
support, and logistics support.
• Provide for a specific sequence and methods for conducting each sub-
task required to assure mission success.
From the completed operation plan, the staff creates operational directives or
combat orders to inform subordinates of their missions, roles, and time re-
quirements for executing the plan.
2-166. The operation plan details the commander’s thinking and reflects the
input of various subordinates and staff elements according to their functional
responsibilities. It normally includes the following specific areas:
• Assessment of the enemy situation and probable intentions.
• Scope, aim, and concept of operations.
• Organization of forces.
• Organization of the battlefield.
• Results of forces analysis. |
7-100.1 | 88 | FM 7-100.1________________________________________________________________________________
• Plan for commitment of reserves.
• Missions of subordinate units.
• Missions of supporting and adjacent units.
• Plan for logistics support.
• Locations of CPs.
2-167. The operation plan includes a varying number of annexes. There are
normally annexes for C2, SPF, airborne landings, preparation and occupation
of assembly areas, and movement routes, among others.
Execution Orders
2-168. After planning and preparation, it is time to issue directives and or-
ders for execution of the planned operation. The commander may continue to
revise and re-issue these during the course of the operation.
2-169. Operational Directive. An operational directive contains complete
information for accomplishing a particular mission. Commanders issue op-
erational directives during the course of an operation to implement upcoming
phases of the operation plan, implement a foreseen contingency, or to effect
changes in the operation plan. Time constraints necessitate heavy dependence
on verbal dissemination of missions and planning guidance. The operational-
level staff usually issues a formal, written directive to supplement the verbal
instructions the commander has already issued.
2-170. The operational-level staff may also prepare and issue annexes to op-
erational directives. If annexes are incomplete when the staff transmits the
directive, it sends them out separately to prevent delay in dissemination of
the directive. Types of annexes include coordination requirements, recon-
naissance, IW, force protection, communications, fire support, logistics, and
counterattack plans.
2-171. Combat Orders. Commanders at all levels issue combat orders both
during combat and during the preparation for combat. The orders are de-
signed to direct a unit to perform a specific task or to adjust a former mis-
sion. Combat orders typically include an estimate of the enemy situation, the
new (or revised) mission, the support available from the commander for the
mission, and the time when the unit must be ready to execute the task. Be-
cause they are time-sensitive, combat orders are usually disseminated orally
either by radio or in person.
Rehearsals
2-172. Rehearsals are an integral part of OPFOR preparation for combat.
OPFOR commanders expect all key phases of an operation to be well re-
hearsed using the most realistic means possible. OPFOR staffs take action to
relieve subordinate units of other time pressures to permit the maximum
time for rehearsals and other combat checks during preparation. OPFOR
commanders often forego planning detail in order to spend time with key
subordinates during their rehearsals. |
7-100.1 | 89 | _________________________________________________________________________________Chapter 2
EXECUTION
2-173. Planning and preparation are important, but they alone are not suffi-
cient for success. The enemy’s actions can have a dynamic effect on executing
plans. Friction and uncertainty can distort the best of plans, imposing new
realities on the situation. Dealing with those realities is the art of execution.
Planned Flexibility
2-174. Operational-level C2 is highly flexible. This flexibility comes from mis-
sion-type orders from the General Staff (or SHC or theater headquarters) to
the operational-level commands. The staff structure provides operational-
level commanders the capability for rapid situation assessment and decision
making. A standardized, streamlined process, using automated support, pro-
duces the decision and the accompanying plans to implement it.
2-175. Since operational planning occurs well in advance, it would be difficult
for the enemy to disrupt the initial decision making and planning. However,
the operational-level commanders and staffs are continually updating of the
operation plan. By limiting a commander’s time to plan, an enemy could force
the OPFOR staff to forsake the preferable parallel or sequential planning
methods for less desirable executive planning. The OPFOR uses IW meas-
ures to help ensure that the OPFOR commander has sufficient time to ac-
quire and process information on the combat situation.
2-176. Planning continues during execution. The process of forecasting and
modeling the commander began in his decision process usually has produced
a series of variants, or contingency plans, which the commander can imple-
ment without completely changing his concept of operations. Such planning
also accounts for a range of probable enemy responses to OPFOR combat
actions. Each variant, however, must allow the achievement of the assigned
mission by the designated time; this aspect of the plan is not subject to
contingency planning.
Monitoring Execution and Sustaining the Aim
2-177. Issuing directives does not ensure they will be carried out or under-
stood. The OPFOR places great emphasis on supervision after the directive is
issued. The chief of staff is responsible to the commander for the overall or-
ganization of staff supervision. Each staff section is responsible for checking
on the execution of the directives it prepares and also ensuring that subordi-
nates have correctly understood the directives. The chief of staff may issue
additional directives, with the operational commander’s approval, to resolve
any misunderstandings.
2-178. Proper supervisory control takes many forms. These include observa-
tion from air and ground observation points, and instructions and questions
passed by radio, wire, or messenger. The preferred method is personal
contact. The OSC commander may personally supervise the most important
combat action. In fast-moving situations, control is somewhat looser. Subor-
dinate commanders then react as the situation dictates, realizing they are re-
sponsible for acting in accordance with the commander’s concept. |
7-100.1 | 90 | FM 7-100.1________________________________________________________________________________
COMMAND POSTS
2-179. The OPFOR plans to exercise strategic, operational, and tactical con-
trol over its wartime forces from an integrated system of CPs. It has designed
this system to ensure uninterrupted control of forces.
2-180. CPs are typically formed in three parts: a control group, a support
group, and a communications group. The control group includes members of
the command group and staff. The support group consists of the transport
and logistics units. Whenever possible, the communications group, is remoted
from the control and support groups, because of its large number of signal vans,
generators, and other special vehicles that would provide a unique signature.
2-181. Because the OPFOR expects its C2 to come under heavy attack in war-
time, its military planners have created a CP structure that emphasizes sur-
vivability through dispersal, stringent security measures, redundancy, and
mobility. They have constructed a CP system that can sustain damage with
minimum disruption to the actual C2 process. In the event of disruption, they
can quickly reestablish control. This extensive system of CPs extends from
the hardened command facilities of the NCA to the specially designed com-
mand vehicles from which OPFOR tactical commanders control their units.
Most operational-level CPs have been designed to be very mobile and smaller
than comparable enemy CPs. The number, size, and types of CPs depend on
the level of command.
COMMAND POST TYPES
2-182. OPFOR ground forces use five basic and three special types of CPs.
Not all levels of command use all types at all times. (See Figure 2-17, where
parentheses indicate that a type of CP may or may not be employed at a cer-
tain level.) The redundancy provided by multiple CPs helps to ensure that
the C2 process remains survivable.
Basic Special
Level of
Command
2-42
PC
niaM
PC
CFI
PC
drawroF
PC
tnemniatsuS PC
enrobriA
PC
etanretlA
PC
yrailixuA
PC
noitpeceD
OSC X X X X (X) (X) (X) (X)
Field Group* X X (X) X X (X) (X) (X)
Theater* X X (X) X X (X) (X) (X)
* When formed. |
7-100.1 | 91 | _________________________________________________________________________________Chapter 2
2-183. FGs and OSCs can use the same basic types of CPs (main, IFC, for-
ward, sustainment, and airborne). FG and OSC airborne CPs may be aboard
fixed-wing aircraft. However, helicopters are more likely to serve this pur-
pose at OSC level.
2-184. A theater headquarters normally deploys main, IFC, and sustainment
CPs. An airborne CP will always be available to the theater commander. A
theater forward CP may be established. The main CP at this level may ini-
tially be in permanent, hardened bunkers; the other CP types may be at less-
protected sites. The airborne CP is most likely aboard fixed-wing aircraft.
2-185. For brevity, OPFOR plans and orders may use acronyms for the
various types of CP. Thus, main CP may appear as MCP, integrated fires
command CP as IFC CP, forward CP as FCP, sustainment CP as SUSCP,
airborne CP as AIRCP, alternate CP as ALTCP, auxiliary CP as AUXCP,
and deception CP as DCP.
Main Command Post
2-186. The main CP generally is located in a battle zone or in a key sanctu-
ary area or fortified position. It contains the bulk of the staff. The chief of
staff directs its operation. Its primary purpose is to simultaneously coordi-
nate the activities of subordinate units not yet engaged in combat and plan
for subsequent missions. The particular emphasis on planning in the main
CP is on the details of transitioning between current and future operations.
The main CP is the focus of control. It is less mobile and much larger than
the forward CP. It makes use of hardened sites when possible.
2-187. The chief of staff directs the staff in translating the commander’s deci-
sions into plans, directives, and orders. He also coordinates the movement
and deployment of all subordinate units not yet in combat and monitors their
progress and combat readiness. In addition to the chief of staff, personnel
present at the main CP include the liaison teams from subordinate, supporting,
allied, and affiliated units, unless their presence is required in another CP.
IFC Command Post
2-188. The DC directs the IFC from the IFC CP. The IFC CP possesses the
communications, airspace control, and automated fire control systems re-
quired to integrate RISTA means and execute long-range fires. Each secon-
dary staff subsection and some functional staff subsections have an element
dedicated to the IFC CP. The IFC CP includes liaison teams from fire sup-
port, army aviation, and Air Force units. The IFC CP is typically separated from
the main CP. Also for survivability, the various sections of the IFC headquarters
that make up the IFC CP do not necessarily have to be located in one place.
Forward Command Post
2-189. An OSC commander often establishes a forward CP with a small
group of selected staff members. Its purpose is to provide the commander
with information and communications that facilitate his decisions. The for-
ward CP is deployed at a point from which he can more effectively and per-
sonally observe and influence the operation. The need for this is less likely at |
7-100.1 | 92 | FM 7-100.1________________________________________________________________________________
the FG and theater levels. This CP is mobile, but at the operational level may
consist of a large number of command vehicles.
2-190. The personnel at the forward CP are not permanent. The assignment
of officers to accompany the commander is dependent on the mission, situa-
tion, availability of officers, communications, and transport means. Officers
who may accompany the commander include the operations officer and the
chief of reconnaissance. Other primary and or secondary staff officers may
also deploy with the forward CP, depending on the needs of the situation.
The secondary staff contains enough personnel to man the forward CP with-
out degrading its ability to man the main or IFC CPs.
2-191. When formed, and when the commander is present, the forward CP is
the main focus of command, though the chief of staff (remaining in the main
CP) has the authority to issue directives in the commander’s absence.
Sustainment Command Post
2-192. The resources officer establishes and controls the sustainment CP.
This CP is deployed in a position to permit the supervision of execution of
sustainment procedures and the movement of support troops, typically in the
support zone. It contains staff officers for fuel supply, medical support, com-
bat equipment repair, ammunition supply, clothing supply, food supply, pris-
oner-of-war, and other services. It interacts closely with the subordinate
units to ensure sustained combat capabilities. In nonlinear operations, mul-
tiple sustainment CPs may be formed.
Airborne Command Post
2-193. To maintain control in very fluid situations, when subordinates are
operating over a wide area, or when the other CPs are moving, a commander
may use an airborne CP. This is very common in higher-level commands and
typically employs fixed-wing aircraft above OSC level.
Alternate Command Post
2-194. The alternate CP provides for the assumption of command should the
CP containing the commander be incapacitated. The alternate CP is a desig-
nation given to an existing CP and is not a separately established entity. The
commander establishes which CP will act as an alternate CP to take com-
mand if the main (or forward) CP is destroyed or disabled. For example, the
commander might designate the IFC CP as the alternate CP during an op-
eration where long-range fires are critical to mission success. For situations
that require reconstituting, he might designate the sustainment CP instead.
Alternate CPs are also formed when operating in complex terrain, or if the
organization is dispersed over a wider area than usual and lateral communi-
cation is difficult.
Auxiliary Command Post
2-195. At OSC and FG levels, the operational commander may create an aux-
iliary CP to provide C2 over subordinate units operating on isolated or remote
axes. He may also use it in the event of disrupted control or when he cannot
adequately maintain control from the main CP. An officer appointed at the |
7-100.1 | 93 | _________________________________________________________________________________Chapter 2
discretion of the commander mans it. The auxiliary CP may also find uses at
the theater level, when subordinate forces may be far from the main CP.
Deception Command Post
2-196. As part of the overall IW plan, the OPFOR very often employs decep-
tion CPs. These are complex, multi-sensor-affecting sites integrated into the
overall deception plan to assist in achieving battlefield opportunity by forcing
the enemy to expend command and control warfare (C2W) effort against
meaningless positions.
COMMAND POST MOVEMENT
2-197. Plans for relocating the CPs are prepared by the operations section.
The CPs are deployed and prepared in order to ensure that they are reliably
covered from enemy ground and aerial reconnaissance, or from attack by en-
emy raiding forces.
2-198. Commanders deploy OSC CPs in depth to facilitate control of their
AORs. During lengthy moves, CPs may bound forward along parallel routes,
preceded by reconnaissance parties that select the new locations. Normally,
the main and forward CPs do not move at the same time, with one moving
while the other is set up and controlling operations. During an administra-
tive movement, when there is little or no likelihood of contact with the en-
emy, a CP may move into a site previously occupied by another CP. However,
during a tactical movement or when contact is likely, the OPFOR does not
occupy a site twice, because to do so would increase the chances of an enemy
locating a CP. While on the move, CPs maintain continuous contact with
subordinates, higher headquarters, and flanking organizations. During
movement halts, the practice is to disperse the post in a concealed area, cam-
ouflaging it if necessary and locating radio stations and special vehicles some
distance from the control and support groups. Because of dispersion in a mobile
environment, CPs are often responsible for their own local ground defenses.
2-199. During the movement of a main CP, the OPFOR maintains continuity
of control by handing over control to either the forward or airborne CP or,
more rarely, to the alternate CP. Key staff members often move to the new
location by helicopter to reduce the time spent away from their posts. Before
any move, headquarters’ troops carefully reconnoiter and mark the new
location. Engineer preparation provides protection and concealment.
COMMAND POST LOCATION
2-200. The OPFOR locates CPs in areas affording good concealment, with
good road net access being a secondary consideration. It situates CPs so that
no single weapon can eliminate more than one. Remoting communications
facilities lessens the chance of the enemy’s locating the actual CP by radio
direction finding.
2-201. During some particularly difficult phases of an operation, where close
cooperation between units is essential, the forward CP of one unit may be col-
located with the forward or main CP of another. Examples are the commit-
ment of an exploitation force, the execution of a strike, or the passing of one
organization through another. |
7-100.1 | 94 | FM 7-100.1________________________________________________________________________________
COMMAND POST SECURITY
2-202. Security of CPs is important, and the OPFOR takes a number of
measures to ensure it. CPs are a high priority for air defense protection. Ideally,
main CPs also locate near reserve forces to gain protection from ground at-
tack. Nevertheless, circumstances often dictate that they provide for their
own local defense. Engineers normally dig in and camouflage key elements.
2-203. Good camouflage, the remoting of communications facilities, and the
deployment of alternate CPs make most of the C2 structure fairly survivable.
Nevertheless, one of the most important elements, the forward CP, often re-
mains vulnerable. It forms a distinctive, if small, grouping, well within en-
emy artillery range, even at OSC level. The OPFOR therefore typically pro-
vides key CPs with sufficient engineer and combat arms support to protect
them from enemy artillery or special operations raids.
COMMAND AND CONTROL SYSTEMS
2-204. The OPFOR commander’s C2 requirements are dictated generally by
the doctrine, tactics, procedures, and operational responsibilities applicable
to commanders at higher echelons. Battlefield dispersion, mobility, and in-
creasing firepower under conventional or WMD conditions require reliable,
flexible, and secure command and control.
2-205. Expanding C2 requirements include the need for
• High mobility of combat headquarters and subordinate units.
• Rapid collection, analysis, and dissemination of information as the ba-
sis for planning and decision making.
• Maintaining effective control of forces operating in a hostile IW envi-
ronment.
Supporting communications systems, which are the principal means of C2,
must have a degree of mobility, reliability, flexibility, security, and surviv-
ability comparable to the C2 elements being supported.
2-206. Modern warfare has resulted in a shift away from large formations
arrayed against one another in a linear fashion, to maneuver warfare con-
ducted across large areas with more lethal, yet smaller, combat forces. C2 must
provide the reliable, long-range communications links necessary to control
forces deployed over greater distances. In order to move with the maneuver
forces, the communications systems must be highly mobile.
COMMUNICATIONS
2-207. The chief characteristics of communications supporting the C2 struc-
ture are security, survivability, and flexibility. In the OPFOR view, centrali-
zation of operational planning is a prerequisite to achieving the flexibility re-
quired to ensure timely concentration of forces and fires. Redundancy in
equipment, as well as communications links and CPs, is the primary means
of ensuring the control structure’s security and survivability.
2-208. The organization of communications to meet operational requirements
is the responsibility of the commander at each level. Prior to combat, the OSC
chief of communications, under the personal direction of the intelligence officer, |
7-100.1 | 95 | _________________________________________________________________________________Chapter 2
prepares the communications plan. After approval by the chief of staff, it be-
comes an annex to the operational directive for implementation by subordi-
nate signal units. OPFOR communications reflect the concern of commanders
to maintain uninterrupted C2, flexibility, and security.
Signal Assets
2-209. Communication systems employed include
• Manportable high-frequency (HF) and very-high-frequency (VHF)
radios.
• HF radio stations.
• VHF and ultra-high-frequency (UHF) multichannel radio relay.
• Super-high-frequency (SHF) troposcatter systems.
• Satellite communications (SATCOM).
• Wire and cable (landline as far forward as possible).
• Commercial communications networks (including cellular, microwave,
radio, wire, digital, and satellite)
• Local area networks (LANs) and wide area networks (WANs).
• Internet and Intranet.
Encrypted communications are common from brigade upward, but may ex-
tend to the lowest levels in the most modern OPFOR units.
2-210. At the operational level, headquarters normally task-organize their
signal assets to support the formation of forward, main, IFC, and sustain-
ment CPs. The numbers and types of signal units can vary greatly depending
on the size and makeup of the operational force grouping under a particular
headquarters.
2-211. Signal communications are organized through the communications
groups that are established to provide communications for the CPs. Telephone
exchanges and cable are used extensively to integrate the control and sup-
port groups of the CPs with the communications groups. It is possible to ex-
tend mobile communications through the integration of wire and wireless
and by connecting with fixed military and civil communications facilities.
2-212. The OPFOR also stresses the use of non-electronic means of communi-
cations. While radio must be the principal means of communication in a fluid,
mobile battle, the OPFOR is aware of the threat from enemy signals intelli-
gence, direction finding, and communications jamming. Also, wire and cable
are often not practical in fast-moving situations.
2-213. During periods of radio silence or disruption of radio communications,
the OPFOR employs messengers, liaison teams, and visual and sound signals.
Messengers are the preferred method for delivering combat orders at any
time. Representatives from the OSC staff may observe and supervise the exe-
cution of directives. Whenever possible, the OPFOR prefers personal contact
between commanders (or their representatives) and subordinates. |
7-100.1 | 96 | FM 7-100.1________________________________________________________________________________
Communications Nets
2-214. C2 of OPFOR organizations relies on extensive and redundant com-
munications. The OPFOR primarily uses UHF/SHF SATCOM, radio relay
multichannel, HF radio stations, HF and VHF single-channel radios, and
wire or cable. In modernized OPFOR units, the command, operations, intelli-
gence, and logistics nets may operate over a digital network of linked com-
puters, obviating the need for voice communications.
2-215. The OSC operates two command nets. The commander normally con-
trols the primary command net from the forward CP, while the chief of staff
maintains control of the alternate net from the main CP. Depending on the
distances involved, the primary net may be either HF or VHF. All of the
command’s constituent and dedicated units monitor the command nets. The
IFC CP also monitors the command nets
2-216. The operations officer maintains an operations net monitored by
the commander, subordinate and supporting units, and any alternate or
auxiliary CP created. The resources officer also monitors this net from the
sustainment CP.
2-217. The DC, as IFC commander, maintains the integrated fires net. This
net is monitored by the subordinates of the IFC and RISTA assets assigned
IFC missions.
2-218. The resources officer maintains the support net. The OSC’s materiel
support, maintenance, and medical units monitor this net. Subordinate com-
bat arms units may also use this net when requiring additional, immediate
assistance that constituent support assets are unable to provide.
2-219. The chief of reconnaissance maintains an intelligence net, monitored
by reconnaissance units, maneuver units, the commander, DC, chief of staff,
and resources officer.
2-220. The CAO maintains the airspace control net for the purpose of control-
ling the command’s airspace. Organizations on this net include aviation
units, air defense assets, and army aviation and Air Force liaison teams.
2-221. When required, the commander can create a special mission net,
monitored by the chief of staff, that is employed to control the activities of
units conducting a special mission, such as a reconnaissance detachment or
an airborne or heliborne landing force deployed behind enemy lines. Specific
communications systems employed are dependent on the depth and type of
mission.
2-222. The chief of force protection maintains an air defense and NBC warn-
ing communications net, monitored by all constituent, dedicated, and sup-
porting units. This net is used for passing tactical alerts or NBC and air
warning reports. The chief of staff maintains a watch on the OSC-level warning
nets at the main CP; he then disseminates warning where appropriate.
2-223. The command establishes multichannel links between the main and
sustainment CPs and the CPs of subordinate units. These links are used for
high-capacity voice and data transmissions. The OSC also establishes
multichannel links between the main and sustainment CPs. |
7-100.1 | 97 | _________________________________________________________________________________Chapter 2
2-224. The primary responsibility for maintaining communications of an
OSC with the General Staff or SHC (or a parent FG or theater headquarters)
rests with the main CP. With the larger staffs and greater communications
capabilities of the main CP, the commander is allowed to focus more on the
actual conduct of the operation from the forward CP. Obviously, when staff
members, such as the CAO or chief of reconnaissance, accompany the com-
mander, they will establish control over their respective nets as required.
2-225. The chief of IW may also control one or more deception nets designed
to mislead enemy signals intelligence analysis. Integrated into the IW plan
are a description of these nets and procedures for their use.
Procedures
2-226. Before making contact with the enemy, most radio and radio-relay
systems maintain a listening watch with transmission forbidden or strictly
controlled. OPFOR units usually observe radio silence when defending or de-
parting assembly areas. During radio silence, wire and courier are the pri-
mary communications means. While moving toward the enemy, units nor-
mally limit radio transmissions to various code words informing commanders
they have accomplished assigned tasks or have encountered unexpected diffi-
culties. The OPFOR also uses visual signals, such as flags and flares, to a
great extent during movement. Usually only the commander and reconnais-
sance forces have permission to transmit.
2-227. In the offense, OPFOR units maintain radio silence until the outbreak
of battle, when those authorized to transmit may do so without restriction.
When contact with the enemy occurs, units initiate normal radio procedures.
Subordinate commanders inform the OSC commander—usually by code
wordwhen they reach objectives, encounter NBC contamination, make con-
tact with the enemy, or have important information to report.
COMMAND AND CONTROL SYSTEMS SURVIVABILITY
2-228. Survivability of C2 systems is of great concern, since the C2 elements
are typically located within range of enemy standoff systems, with increased
potential for disruption or destruction. The OPFOR stresses the need to
maintain continuous, reliable control of its forces and has undertaken a
number of measures to prevent disruption and enhance survivability,
while remaining flexible enough to retain control of units in combat. These
include
• High mobility of C2 systems and facilities.
• Redundancy of the C2 elements and networks.
• Adherence to operations- and information-security measures.
• Deception
2-229. IW activities contribute to C2 survivability. So does the principle of
centralized planning and decentralized execution. The survivability of the
headquarters’ command group is facilitated by the fact that the commander,
DC, and chief of staff can be in separate CPs (forward, IFC, and main CPs,
respectively). |
7-100.1 | 98 | FM 7-100.1________________________________________________________________________________
Mobility
2-230. C2 elements must be highly mobile, due to the emphasis on maintain-
ing combat at a rapid tempo. Because of their proximity to the enemy, CPs
and supporting communications must frequently relocate to avoid detection
and subsequent destruction.
2-231. CPs are usually mobile (that is, in vehicles) but may also be fixed. By
emphasizing the use of multiple, mobile CPs, planners minimize the disrup-
tion of C2 that would occur with the enemy’s destruction of this element of
the C2 structure. Highly mobile signal units employing transportable com-
munications equipment support mobile CPs. This gives OPFOR commanders
great flexibility in organizing and deploying their C2 elements. Thus, they
are able to provide effective control in varied situations.
Redundancy
2-232. The OPFOR has built extensive redundancy into the C2 structure.
Multiple CPs are fielded as low as possible. For communications between
levels of command, multiple communications types are employed. Providing a
variety of single- and multichannel links, these systems operate over a wide
frequency spectrum.
Operations and Information Security
2-233. The consistent adherence to operations- and information-security
measures is especially critical, given the increased capabilities of enemy re-
connaissance, the increased role of surprise, and the proliferation of precision
weapons. Given the high priority the enemy places on C2 elements as targets,
maintaining operations security is an important requirement for C2 nodes.
This is achieved by the stringent adherence to information-security proce-
dures and extensive use of C3D. |
7-100.1 | 99 | Chapter 3
Offensive Operations
The OPFOR sees the offensive as the decisive form of operations and the
ultimate means of imposing its will on the enemy. While conditions at a
particular time or place may require the OPFOR to defend, defeating an
enemy force ultimately requires shifting to offensive operations. Even
within the context of defense, victory normally requires some sort of of-
fensive action. Therefore, OPFOR commanders at all levels seek to create
and exploit opportunities to take offensive action, whenever possible.
In the context of the theater strategic or operational level of war, offensive
operations are often “conventional” in nature. Conventional operations
are not, however, the only form of offensive operations. Accordingly, this
chapter includes discussions of operational-level offensive actions that
do not rely only on large formations of mechanized or motorized units.
Offensive operations may include operations done by paramilitary or
irregular forces. The OPFOR recognizes the traditional forms of ma-
neuver: envelopment, turning movement, infiltration, penetration, and
frontal attack.
STRATEGIC CONTEXT
3-1. Offensive operations are an important component of all OPFOR strate-
gic campaigns. However, the scale and purpose of offensive actions may differ
during the various types of strategic-level actions.
REGIONAL OPERATIONS
3-2. Offensive operations during regional operations attempt to achieve stra-
tegic political or military decision by destroying the enemy’s will and capabil-
ity to fight. This is brought about by destroying components of the enemy’s
combat system. This may include discrete attacks on any of the four compo-
nents of an enemy’s combat system: combat forces, combat support forces, lo-
gistics forces, and command and control (C2) and reconnaissance, intelli-
gence, surveillance, and target acquisition (RISTA). It may also include an
attempt to destroy one or more of the enemy’s systems simultaneously.
3-3. Due to its military superiority over a regional adversary in regional op-
erations, the State is able to pursue primarily offensive military courses of
action. It is also prepared to use offensive means against internal and possi-
ble extraregional threats.
3-4. The State’s military forces are sufficient to overmatch any single re-
gional neighbor, but may not be a match for the forces an extraregional
power can bring to bear. Thus, the State seeks to exploit its numerical and |
7-100.1 | 100 | FM 7-100.1________________________________________________________________________________
technological overmatch against one regional opponent rapidly, before other
regional neighbors or an extraregional power can enter the fight. Thus, a
characteristic of regional operations is a rapid tempo of offensive combat.
3-5. The State’s military goal during regional operations is to destroy its re-
gional opponents’ military power in order to achieve specific ends. The State
plans regional operations well in advance and executes them as rapidly as is
feasible in order to preclude intervention by outside forces. Still, at the very
outset of these operations, it lays plans and positions forces to conduct ac-
cess-control operations in the event of outside intervention. Extraregional
forces may also be vulnerable to conventional operations during the time they
require to build combat power and create support at home for their intervention.
3-6. In comparison to the forces of the State’s regional neighbors, the OPFOR
is a relatively large and modern force. Therefore, it is capable of offensive op-
erations against such opponents. The OPFOR will use armor, mechanized in-
fantry, airborne, and heliborne forces, when available. Generally, it will use
infantry forces suitable for operating in the complex terrain that dominates por-
tions of the region. When the OPFOR is dependent on infantry forces or ir-
regular forces, it will attack by infiltration or maneuver to conduct ambushes
of more capable enemy forces.
3-7. The OPFOR may attack along a suboptimal approach to exploit an en-
emy vulnerability or to achieve surprise. To maintain a high tempo of opera-
tions and reach key targets, the OPFOR often accepts the risk of bypassing
pockets of resistance.
TRANSITION OPERATIONS
3-8. Offensive operations play two key roles in transition operations. First,
they are used to continue to achieve the State’s regional goals as rapidly
as possible, to make the act an extraregional power is trying to prevent a fait
accompli. Second, they are a component of access-control operations to ex-
clude the extraregional power from key areas and contain him in areas of the
OPFOR’s choosing. The OPFOR uses offensive operations to preclude or put a
quick end to expansion of the conflict and to either consolidate its previous
gains or conduct further operations against the original regional enemy.
3-9. During transition operations, military forces solidify gains made during
regional operations. However, the central aim is to prevent or defeat outside
intervention. Although transition operations are primarily defensive in
nature, attacks will continue. As a minimum, the OPFOR will maintain
counterattack forces at virtually all levels of command and will attempt to
physically attack one or more components of an enemy’s combat system. A
combination of operational and tactical offensive and defensive actions help
the OPFOR control tempo.
3-10. Military forces in the immediate vicinity of the point of intervention
move into sanctuary as opportunity allows, making use of existing C2 and
logistics. They conduct limited-objective attacks to secure positions, protect
flanks, and control access. They may attack vulnerable early-entry forces
before the enemy can bring his technological overmatch to bear. Even at this
stage, the State may be able to inflict politically unacceptable casualties that
could cause the extraregional power to terminate its intervention. |
7-100.1 | 101 | _________________________________________________________________________________Chapter 3
3-11. During transition operations, the OPFOR plans and conducts sophisti-
cated ambushes to destroy high-visibility enemy systems or cause mass casu-
alties. These ambushes are not always linked to maneuver or ground objec-
tives, but are designed to have a huge psychological and political impact by
demonstrating enemy vulnerability. The OPFOR may use niche technology it
has acquired to achieve technological surprise and limited-duration over-
match in specific areas.
3-12. The OPFOR can use weapons of mass destruction (WMD) to deny an
extraregional opponent the use of complex terrain for a period of time. This
creates opportunities for operational forces to destroy key enemy systems
with precision fires or to engage the enemy forces with fires and maneuver.
3-13. Transition operations are combined arms and/or joint efforts, although
the air and naval forces increasingly revert to defensive measures to preserve
their capability. Ground forces or, more often, Special-Purpose Forces (SPF)
conduct raids against logistics sites, lines of communication (LOCs), and
other vulnerable military targets in the region, along the routes to the region,
and to the enemy’s strategic depth. Occasionally, if the risks are worth the
costs, the OPFOR attacks such targets by air and sea. It may also use long-
range missiles or rockets to deliver conventional warheads or WMD against
these kinds of targets. Paramilitary forces, air defense forces, and precision
attack can also play important roles. The OPFOR may also use long-range
weapons or SPF to conduct attacks outside the theater, to divert enemy re-
sources to protect politically or ecologically sensitive targets.
ADAPTIVE OPERATIONS
3-14. Once an extraregional power commits forces in the region, the OPFOR
does not avoid battle. It seeks it often, but on its own terms. Battles will occur at
a place and time of the OPFOR’s choosing and involve dispersed maneuver,
precision fires, and simultaneous actions by all services of the Armed Forces as
well as affiliated forces. Tactical counterattacks characterize adaptive opera-
tions, and larger counteroffensive operations are undertaken when feasible.
3-15. During adaptive operations, the OPFOR may conduct limited-objective
operational- and tactical-level offensive actions to prevent buildup of inter-
vening forces, to facilitate the defense, or to take advantage of an opportunity
to counterattack.
3-16. When the OPFOR can create a window of opportunity or exploit oppor-
tunity created by natural conditions that limit or degrade enemy capabilities, its
forces move out of sanctuary and attack. They try to force the enemy to operate
in areas where OPFOR interdiction fire can be most effective. The OPFOR uses
windows of opportunity to destroy key enemy systems or cause mass casualties.
PURPOSE OF THE OFFENSE
3-17. All offensive operations are designed to achieve the goals of a strategic
campaign through active measures. However, the purpose of any given offen-
sive operation varies with the situation. The primary distinction among types
of offensive operations is their purpose. Thus, the OPFOR recognizes three
general types of offensive operations according to their purpose: to destroy,
seize, or expel. |
7-100.1 | 102 | FM 7-100.1________________________________________________________________________________
ATTACK TO DESTROY
3-18. An attack to destroy is designed to eliminate a target entity as a useful
fighting force. Operational-level attacks to destroy usually focus on key en-
emy combat formations or capabilities. Not every soldier or system need be
destroyed for such an attack to be successful. Attacks to destroy are often fo-
cused on a single component of an enemy’s combat system. For example, it
may be enough to remove the enemy force’s ability to sustain itself or exer-
cise effective command and control. Therefore, attacks to destroy are often fo-
cused on the logistics and C2 systems of the target entity. Such attacks are
most often conducted during regional operations. However, an attack to de-
stroy may also occur during transition or adaptive operations, whenever the
OPFOR can recognize and exploit a window of opportunity.
ATTACK TO SEIZE
3-19. An attack to seize is designed to gain control of a key terrain feature or
man-made facility. The OPFOR does not adhere to the idea that seizure may
be accomplished simply by placing a feature in weapons range. In the
OPFOR lexicon, seize means to have OPFOR soldiers on and/or in the feature
in question. Attacks to seize can occur as part of all strategic-level courses of
action during OPFOR strategic campaigns. In regional operations, the sei-
zure may facilitate the movement of an exploitation force. In transition or adap-
tive operations, the seizure may be part of a campaign to control access into the
theater.
ATTACK TO EXPEL
3-20. An attack to expel is used to force the defender to vacate an area. At-
tacks to expel often have a strong information warfare (IW) component, so
that the enemy removes himself from the area largely through a loss of re-
solve. Attacks to expel typically focus on a key enemy capability or vulner-
ability. Attacks to expel are primarily conducted within the context of transi-
tion or adaptive operations.
PLANNING OFFENSIVE OPERATIONS
3-21. For the OPFOR, the key elements of planning offensive operations are
• Determining the level of planning possible (planned versus situational
offense).
• Organizing the battlefield.
• Organizing forces.
• Organizing IW activities (see Chapter 5).
• Determining the objective of the offensive operation.
3-22. Offensive actions during transition and adaptive operations are not
able to rely simply on massing combat power at a decisive point. Such actions
typically include increased use of
• Infiltration.
• Perception management (see Chapter 5) in support of operations.
• Affiliated forces in support of operations. |
7-100.1 | 103 | _________________________________________________________________________________Chapter 3
PLANNED OFFENSE
3-23. A planned (deliberate) offense is an offensive operation or action under-
taken when there is sufficient time and knowledge of the situation to prepare
and rehearse forces for specific tasks. Typically, the enemy is in prepared de-
fensive positions and in a known location. The OPFOR plans an offense using
the method described in Chapter 2. Key considerations in offensive planning
are
• Selecting a clear and appropriate objective.
• Determining which enemy forces (security, reaction, or reserve) must
be fixed.
• Developing a reconnaissance plan that locates and tracks relevant en-
emy targets and elements.
• Creating or taking advantage of a window of opportunity to free
friendly forces from any enemy advantages in precision standoff and
situational awareness.
• Determining which component or components of an enemy’s combat
system to attack.
SITUATIONAL OFFENSE
3-24. The OPFOR may also conduct a situational (hasty) offense. It recog-
nizes that the modern battlefield is chaotic. Fleeting opportunities to at-
tack an enemy weakness continually present themselves and just as
quickly disappear. Although detailed planning and preparation greatly
mitigate risk, they are often not achievable if a window of opportunity is
to be exploited.
3-25. The following are examples of conditions that might lead to a situ-
ational offense:
• A key enemy unit, system, or capability is exposed.
• The OPFOR has an opportunity to conduct a spoiling attack to disrupt
enemy defensive preparations.
• An OPFOR unit makes contact on favorable terms for subsequent of-
fensive action.
3-26. In a situational offense, the commander develops his assessment of the
conditions rapidly and without a great deal of staff involvement. He provides
a basic course of action to the staff, who then quickly turn that course of ac-
tion into an executable operational directive. The situational offense relies
heavily on implementation of battle drills by subordinate tactical units (see
FM 7-100.2).
3-27. Organization of the battlefield in a situational offense is normally lim-
ited to minor changes to existing control measures. Organization of forces in
a situational offense typically requires the use of detachments or tactical
groups (see FM 7-100.2). The nature of situational offense is such that it of-
ten involves smaller, independent forces accomplishing discrete missions dis-
persed from the main body of the operational-strategic command (OSC). |
7-100.1 | 104 | FM 7-100.1________________________________________________________________________________
ORGANIZING THE BATTLEFIELD FOR THE OFFENSE
3-28. In his operation plan, the commander specifies the organization of the
battlefield from the perspective of his level of command. Within his unit’s
area of responsibility (AOR), as defined by the next-higher commander, he
designates AORs for his subordinates, along with zones, objectives, and axes
related to his own overall mission.
Enemy Main Line of
Resistance
OSC
LOR
Initial Initial
Support Initial Battle Zone Disruption
Zone Zone
OSC AREA OF RESPONSIBILITY Kill
Zone
OSC
LOR
Objective
Axis
Attack Zone
Kill
Zone
OSC
LOR
Initial Subsequent Initial Initial Subsequent
Support Support Battle LOR LOR
Line Line Line Subsequent
Battle Line
Figure 3-1. Example of an AOR (Linear Battlespace)
Areas of Responsibility
3-29. OPFOR AORs normally consist of three basic zones: the disruption
zone, the battle zone, and the support zone. These zones have the same basic
purposes in all types of offense. In the offense, AORs also may contain one
or more attack zones, kill zones, objectives, and/or axes. Zones may be linear
or nonlinear in nature. See Figures 3-1 and 3-2 for generalized examples of
AORs and zones. |
7-100.1 | 105 | _________________________________________________________________________________Chapter 3
Kill G Battle Zone
Zone BTR II
O LOS RC AD OTG R
Attack
DTG/ LO S Zup op neort L O RO S C
Zone
Disruption
Zone BTG
AOR
Axis
X
X OSC AREA OF RESPONSIBILITY
S Zup op no ert LB OT RG
Battle Zone
BTG
G Battle Zone AOR
DTG/B LT
OR
Support
Zone
OSC
LOR
Figure 3-2. Example of AOR (Nonlinear Battlespace)
3-30. The intent of this method of organizing the battlefield is to preserve as
much flexibility as possible for subordinate units within the parameters that
define the aim of the senior commander. An important feature of the basic
zones in an AOR is the variations in actions that can occur within them in
the course of a specific offensive operation.
Disruption Zone
3-31. In the offense, the disruption zone is that battlespace in which the
OPFOR seeks to use direct and indirect fires to destroy the integrity of en-
emy forces and capabilities without decisive engagement. In general, this
zone is the space between the battle line and the limit of responsibility (LOR). In
linear operations, it typically begins at what the OPFOR anticipates to be the
enemy main line of resistance and extends to the LOR. The dimensions of this
zone are based on OPFOR weapons envelopes and the targets the OPFOR
wishes to affect. For example, counterreconnaissance activity may draw the at-
tention of enemy forces and cause them to enter the kill zone of a sophisticated
ambush (described later in this chapter) executed by long-range precision fires.
3-32. The OSC disruption zone may be the aggregate of the disruption zones
of subordinates, such as division and brigade tactical groups (DTGs and
BTGs). However, assets directly controlled by the OSC could also operate
throughout the OSC disruption zone. In that case, each subordinate would be
responsible for a portion of the OSC disruption zone, and that portion would
constitute the subordinate’s disruption zone within its own AOR. In other |
7-100.1 | 106 | FM 7-100.1________________________________________________________________________________
cases, an OSC disruption zone may extend beyond those of its subordinates,
to include an area occupied by forces sent out under direct control of the
OSC. OSC-level forces could include SPF and affiliated forces, which could be
operating in enemy-held territory even before the beginning of hostilities.
There could also be stay-behind forces in areas seized by the enemy. A field
group (FG) or theater commander controlling multiple OSCs can have a disrup-
tion zone and may assign an OSC to operate in that zone.
3-33. In the offense, the disruption zone exists to
• Disrupt defensive works and preparations.
• Delay or fix enemy counterattacks or response forces.
• Attack lucrative targets (key systems or vulnerable troops).
3-34. Disruption forces often maneuver to fix enemy forces and place long-
range fire on key enemy units. They can also strip away the enemy’s recon-
naissance assets (to deceive him of the location and configuration of the at-
tack) while denying him the ability to acquire and engage the OPFOR with
deep fires. This includes an air defense effort to deny aerial attack and re-
connaissance platforms from targeting forces in the zone. A disruption force
seeks to conduct highly damaging local attacks. It ensures that a covered
withdrawal route exists to avoid decisive engagement.
3-35. Typical systems, units, or facilities to be attacked by a disruption force
are
• C2 systems.
• RISTA assets.
• Aviation assets.
• Precision fire systems.
• Logistics support areas.
• LOCs.
• Mobility and countermobility assets.
• Casualty evacuation routes and means.
3-36. The disruption zone is bounded by the battle line and the LOR of the
overall AOR. In linear offensive operations, the higher headquarters may
move this LOR forward as the force continues successful offensive operations.
Thus, the boundaries of the disruption zone will also move forward during
the course of an operation. The higher commander can push the disruption
zone forward or outward as forces adopt a defensive posture while consolidat-
ing gains at the end of a successful offensive operation and/or prepare for a
subsequent offensive operation.
Battle Zone
3-37. In the offense, the battle zone is that battlespace in which the OPFOR
seeks to fix and/or destroy enemy forces through simultaneous or sequential
application of all components of combat power. The dimensions of this zone
are based on OPFOR objectives and the time-space relationships for the
forces involved. |
7-100.1 | 107 | _________________________________________________________________________________Chapter 3
3-38. The battle zone is separated from the disruption zone by the battle line
and from the support zone by the support line. The commander may adjust
the location of these lines in order to accommodate successful offensive op-
erations. In a linear situation, those lines can shift forward during the course
of a successful attack. Thus, the battle zone would also shift forward.
3-39. In the offense, the battle zone exists to
• Control forces in proximity to the enemy.
• Define objectives.
• Support understanding of roles and missions.
3-40. Forces operating in the battle zone engage the enemy in close combat to
achieve a specific operational objective. This objective is typically one of the
following:
• Create a penetration in the enemy defense, through which exploitation
forces can pass.
• Draw enemy attention and resources to the action.
• Seize operationally significant geographic areas.
• Inflict casualties on a vulnerable enemy unit.
• Prevent the enemy from moving a part of his force to impact OPFOR
actions elsewhere on the battlefield.
3-41. In nonlinear offensive operations, multiple battle zones may exist, and
within each a certain task would be assigned to the OPFOR unit or units
charged to operate in that space. The tasks given to the units that operate in
the zone can range from demonstration to attack. The battle zone provides
the commander of those units the battlespace in which to frame his operations.
Support Zone
3-42. The support zone is that area of the battlespace designed to be free of
significant enemy action and to permit the effective logistics and administra-
tive support of forces. Security forces operate in the support zone in a combat
role to defeat enemy special operations forces and other threats. Camouflage,
concealment, cover, and deception (C3D) measures throughout the support
zone aim to protect the force from standoff RISTA and precision attack. If the
battle zone moves during the course of an operation, the support zone would
move accordingly.
Attack Zone
3-43. The attack zone is the assigned zone of action for an attacking force. In
operation plans and directives, the senior commander assigns attack zones to
subordinate units.
Kill Zone
3-44. A kill zone is a designated area on the battlefield where the OPFOR
plans to destroy a key enemy target. Kill zones are tied to enemy targets and
the OPFOR weapon systems that will engage them, and not a particular zone |
7-100.1 | 108 | FM 7-100.1________________________________________________________________________________
of the AOR. They may be designated by a senior commander in order to focus
combat power.
Objectives and Axes
3-45. An objective is a geographic location or physical object, the seizing
and/or holding of which is a goal of an offensive operation.1 An axis is a con-
trol measure showing the location through which a force will move as it pro-
ceeds from its starting location to its objective.
ORGANIZING FORCES FOR THE OFFENSE
3-46. In planning and executing offensive actions, the OPFOR organizes and
designates various forces according to their function. This provides a common
language for how the OPFOR fights functionally, rather than geometrically.
The functions do not change, regardless of where the force might happen to
be located on the battlefield. Thus, functional forces that perform the common
operational and tactical tasks of disrupting, fixing, assaulting, exploiting,
providing security, and deceiving are logically designated as disruption, fix-
ing, assault, exploitation, security, and deception forces, respectively. A force
held in reserve is designated as a reserve, until it receives a mission to per-
form a specific function.
3-47. In his operation plan, the operational-level commander specifies the
organization of the forces within his level of command. Thus, subordinate
forces understand their roles within the overall operation. However, the or-
ganization of forces can shift dramatically during the course of an operation,
if part of the plan does not work or works better than anticipated. For exam-
ple, a unit that started out being part of a fixing force might split off and be-
come an exploitation force, if the opportunity presents itself.
3-48. Each of the separate functional forces has an identified commander.
This is often the senior commander of the largest subordinate unit assigned
to that force. For example, if two DTGs are acting as the OSC’s fixing force,
the senior of the two DTG commanders is the fixing force commander. Since,
in this option, each force commander is also a subordinate unit commander,
he controls the force from his unit’s command post (CP). Another option is to
have one of the OSC’s or FG’s CPs be in charge of a functional force. For ex-
ample, the forward CP could control a disruption force or a fixing force. An-
other possibility would be for the IFC CP to command the disruption force or
the exploitation force or any other force whose actions must be closely coordi-
nated with fires delivered by the IFC.
3-49. In any case, the force commander is responsible to the OSC or FG
commander to ensure that combat preparations are made properly and to
take charge of the force during the operation. This frees the operational-level
commander from decisions specific to the force’s mission. Even when tactical-
level subordinates of an OSC or FG have responsibility for parts of the dis-
ruption zone, there is still an overall OSC or FG disruption force commander.
1 The term objective may also refer to the defined aim(s) of a particular operation. It is not always tied to ground or
places. It could be a desired effect on a particular enemy formation or capability. |
7-100.1 | 109 | _________________________________________________________________________________Chapter 3
Disruption Force
3-50. In the offense, the disruption force would include the disruption force
that already existed in a preceding defensive situation (see Chapter 4). It is
possible that forces assigned for operations in the disruption zone in the de-
fense might not have sufficient mobility to do the same in the offense or that
targets may change and require different or additional assets. Thus, the dis-
ruption force might require augmentation.
Fixing Force
3-51. OPFOR offensive operations are founded on the concept of fixing enemy
forces so that they are not free to maneuver. The OPFOR recognizes that
units and soldiers can be fixed in a variety of ways. For example
• They find themselves without effective communication with higher
command.
• Their picture of the battlefield is unclear.
• They are (or believe they are) decisively engaged in combat.
• They have lost mobility to due to complex terrain, obstacles, or WMD.
3-52. In the offense, planners identify which enemy forces need to be fixed
and the method by which they will be fixed. They then assign this responsi-
bility to a force that has the capability to fix the required enemy forces with
the correct method. The fixing force may consist of a number of units sepa-
rated from each other in time and space, particularly if the enemy forces re-
quired to be fixed are likewise separated. A fixing force could consist entirely of
affiliated irregular forces. It is possible that a discrete attack on logistics or
C2 (or other systems) could fix an enemy without resorting to deploying large fix-
ing forces.
Assault Force
3-53. The assault force is charged with creating the conditions that allow the
exploitation force the freedom to operate. In order to create a window of op-
portunity for the exploitation force to succeed, the assault force may be re-
quired to operate at a high degree of risk and may sustain substantial casu-
alties. However, an assault force may not even make contact with the enemy,
but instead conduct a demonstration.
Exploitation Force
3-54. The exploitation force is assigned the task of achieving the objective of
the mission. It typically exploits a window of opportunity created by the as-
sault force. However, effective IW, a mismatch in system capabilities, or even
the enemy’s own dispositions may create a situation in which the exploitation
force is able to achieve the objective without a formal assault force. An exploi-
tation force could engage the ultimate objective with fires only.
Security Force
3-55. The security force conducts activities to prevent or mitigate the effects
of hostile actions against the overall operational-level command and/or its
key components. If the commander chooses, he may charge this security force |
7-100.1 | 110 | FM 7-100.1________________________________________________________________________________
with providing force protection for the entire AOR, including the rest of the
functional forces; logistics and administrative elements in the support zone;
and other key installations, facilities, and resources. The security force may
include various types of unitssuch as infantry, SPF, counterreconnais-
sance, and signals reconnaissance assetsto focus on enemy special opera-
tions and long-range reconnaissance forces operating throughout the AOR. It
can also include internal security forces units allocated to the operational-
level command, with the mission of protecting the overall command from at-
tack by hostile insurgents, terrorists, and special operations forces. The secu-
rity force may also be charged with mitigating the effects of WMD.
Deception Force
3-56. When the IW plan requires combat forces to take some action (such as
a demonstration or feint), these forces are designated as deception forces in
close-hold executive summaries of the plan. However, wide-distribution cop-
ies of the plan refer to these forces according to the designation given them in
the deception story.
Reserves
3-57. At the commander’s discretion, forces may be held out of initial action
so that he may influence unforeseen events or take advantage of developing
opportunities. OPFOR offensive reserve formations are given priorities in
terms of whether the staff thinks it most likely that they will act as a fixing,
assault, or exploitation force. The size and composition of an offensive reserve
is entirely situation-dependent. (See Chapter 4 for more detail on the various
types of reserves, some of which are more common in defensive operations.)
PREPARING FOR THE OFFENSE
3-58. In the preparation phase, the OPFOR focuses on ways of applying all
available resources and the full range of actions to place the enemy in the
weakest condition and position possible. Commanders prepare their forces for
all subsequent phases of the offensive operation. They organize their forces
and the battlefield with an eye toward capitalizing on conditions created by
successful attacks.
ESTABLISH CONTACT
3-59. The number one priority for all offensive operations is to gain and
maintain contact with key enemy forces. As part of the decision-making proc-
ess (see Chapter 2), the commander and staff identify which forces must be
kept under watch at all times. The OPFOR will employ whatever technical
sensors it has at its disposal to locate and track enemy forces, but the method
of choice is ground reconnaissance. It may also receive information on the en-
emy from the civilian populace, local police, or affiliated irregular forces.
MAKE THOROUGH LOGISTICS ARRANGEMENTS
3-60. The OPFOR understands that there is as much chance of an offensive
operation being brought to culmination by a lack of sufficient logistics support |
7-100.1 | 111 | _________________________________________________________________________________Chapter 3
as by enemy action. Careful consideration is given to carried days of supply
and advanced caches to obviate the need for easily disrupted LOCs.
MODIFY THE PLAN WHEN NECESSARY
3-61. The OPFOR takes into account that, while it might consider itself to be
in the preparation phase for one operation, it is continuously in the execution
phase. Plans are never considered final. Plans are checked throughout the
course of their development to ensure they are still valid in light of battlefield
events.
REHEARSE CRITICAL ACTIONS IN PRIORITY
3-62. The commander establishes the priority for the critical actions expected
to take place during the operation. The force rehearses those actions in as re-
alistic a manner as possible for the remainder of the preparation time.
EXECUTING THE OFFENSE
3-63. The degree of preparation often determines the nature of the attack in
the execution phase. Successful execution depends on forces that understand
their roles in the operation and can swiftly follow preparatory actions with
the maximum possible shock and violence and deny the enemy any opportu-
nity to recover. A successful execution phase often ends with transition to the
defense in order to consolidate gains, defeat enemy counterattacks, or avoid
culmination. In some cases, the execution phase is followed by continued of-
fensive action to exploit opportunities created by the operation just completed.
MAINTAIN CONTACT
3-64. The OPFOR will go to great lengths to ensure that its forces maintain
contact with key elements of the enemy force throughout the operation. This
includes rapid reconstitution of reconnaissance assets and forces and the use
of whatever combat power is necessary to ensure success.
MODIFY THE PLAN WHEN NECESSARY
3-65. The OPFOR is sensitive to the effects of mission dynamics and realizes
that the enemy’s actions may well make an OPFOR unit’s original mission
achievable, but completely irrelevant. As an example, a unit of the fixing
force in an attack may be keeping its portion of the enemy force tied down while
another portion of the enemy force is maneuvering nearby to stop the exploita-
tion force. In this case, the OPFOR unit in question must be ready to transition
to a new mission quickly and break contact to fix the maneuvering enemy force.
SEIZE OPPORTUNITIES
3-66. The OPFOR places maximum emphasis on decentralized execution, ini-
tiative, and adaptation. Subordinate units are expected to take advantage of
fleeting opportunities so long as their actions are in concert with the purpose
of the operational directive. |
7-100.1 | 112 | FM 7-100.1________________________________________________________________________________
DOMINATE THE TEMPO OF OPERATIONS
3-67. Through all actions possible, the OPFOR plans to control the tempo
of operations. It will use continuous attack, IW, and shifting targets, objectives,
and axes to ensure that operational events are taking place at the pace it
desires.
TYPES OF OFFENSIVE ACTION
3-68. The types of offensive action in OPFOR doctrine are both tactical meth-
ods and guides to the design of operational courses of action. An FG or OSC of-
fensive operation plan may include subordinate units that are executing different
offensive and defensive courses of action within the overall offensive mission
framework.
ATTACK
3-69. An attack seeks to achieve operational decision through primarily mili-
tary means by defeating the enemy’s military power. This defeat does not
come through the destruction of armored weapons systems but through the
disruption, dislocation, and subsequent paralyzation that occurs when com-
bat forces are rendered irrelevant by the loss of the capability or will to con-
tinue the fight. Attack is the method of choice for OPFOR offensive action.
There are two types of attack: integrated attack and dispersed attack.
3-70. The OPFOR does not have a separate design for “exploitation” as a dis-
tinct offensive course of action. Rather, exploitation is considered a central
part of all integrated and dispersed attacks.
3-71. The OPFOR does not have a separate design for “pursuit” as a distinct
offensive course of action. A pursuit is conducted using the same basic
course-of-action framework as any other integrated or dispersed attack. The
fixing force gains contact with the fleeing enemy force and slows it or forces it
to stop while the assault and exploitation forces create the conditions for and
complete the destruction of the enemy’s C2 and logistics structure or other
systems.
Integrated Attack
3-72. Integrated attack is an offensive action where the OPFOR seeks
military decision by destroying the enemy’s will and/or ability to continue
fighting through the application of joint and combined arms effects.
Integrated attack is often employed when the OPFOR enjoys overmatch
with respect to its opponent and is able to bring all components of offensive
combat power to bear. It may also be employed against a more sophisticated
and capable opponent, if the appropriate window of opportunity is created or
available. See Figures 3-3 through 3-5 for examples of integrated attacks. |
7-100.1 | 113 | _________________________________________________________________________________Chapter 3
Enemy Main Line of
Resistance
OSC
XX
XX X
Enemy
Support
Area
Exploitation Assault Force
Force
X
X
Enemy Tactical
Fixing Force Airfield
OSC
Initial Subsequent Initial Initial Subsequent
Support Support Battle LOR LOR
Line Line Line Subsequent
Battle Line
Figure 3-3. Integrated Attack (Linear Battlespace Example1)
3-73. The primary objective of an integrated attack is the enemy’s will and
ability to fight. The OPFOR recognizes that modern militaries cannot con-
tinue without adequate logistics support and no military, modern or other-
wise, can function without effective command and control.
3-74. Integrated attacks are characterized by
• Not being focused solely on destruction of ground combat power but of-
ten on C2 and logistics.
• Fixing the majority of the enemy’s force in place with the minimum
force necessary.
• Isolating the targeted subcomponent(s) of the enemy’s combat system
from his main combat power.
• Using complex terrain to force the enemy to fight at a disadvantage.
• Using deception and other components of IW to degrade the enemy’s
situational understanding and ability to target OPFOR formations.
• Using flank attack and envelopment, particularly of enemy forces that
have been fixed. |
7-100.1 | 114 | FM 7-100.1________________________________________________________________________________
Initial
Battle Line
Subsequent
OBJ B Battle Line
I I
X
X
X
Highway
X
OSC
Enemy OBJ A Objective Red Sea
APOD
I I X X
ay
hw XX
X X Hig X
Assault Force
OSC Fixing Force
Assault
X
Force
X X
I I
Exploitation Force
I I
Fixing
Force
Figure 3-4. Integrated Attack (Linear Battlespace Example 2)
3-75. The OPFOR prefers to conduct integrated attacks when most or all of
the following conditions exist:
• The OPFOR possesses significant overmatch in combat power over en-
emy forces.
• It possesses at least air parity over the critical portions of the battle-
field.
• It is sufficiently free of enemy standoff reconnaissance and attack sys-
tems to be able to operate without accepting high levels of risk. |
7-100.1 | 115 | _________________________________________________________________________________Chapter 3
OOSSCC
(moves to capture the APOD
Exploitation X through the path created by assault
Force force)
X
Fixing
X X Force 2
Assault
Force
I I
Enemy
Base Enemy
Camp QRF
Enemy
Enemy Base
Support Camp
Area
APOD
X
Fixing
Force 1
Enemy
Base
Camp
OSC
Figure 3-5. Integrated Attack (Nonlinear Battlespace Example)
Organizing Forces for an Integrated Attack
3-76. An integrated attack employs fixing, assault, and exploitation forces. A
disruption forces exists, but is not created specifically for this type of offen-
sive action.
3-77. Fixing Force. The fixing force in an integrated attack is required to
prevent enemy defending forces, reserves, and quick-response forces (QRF)
from interfering with the actions of the assault and exploitation forces. The
battle will develop rapidly, and enemy forces not in the attack zone cannot be
allowed to reposition to influence the assault and exploitation forces. Maneu-
ver forces, precision fires, air defense units, long-range antiarmor systems,
situational obstacles, chemical weapons, and electronic warfare (EW) are
well suited to fix defending forces.
3-78. Assault Force. The assault force in an integrated attack is charged
with creating conditions that allow the exploitation force to rapidly penetrate
enemy defenses. Since the exploitation force is principally required to act
within the window of opportunity, the assault force may successfully employ in-
filtration of infantry to carefully pre-selected points to assist the exploitation |
7-100.1 | 116 | FM 7-100.1________________________________________________________________________________
force in its penetration. Smoke and suppressive artillery and rocket fires, com-
bat engineer units, and air-delivered weapons are also suited to this mission.
3-79. Exploitation Force. The exploitation force in an integrated attack
must be capable of penetrating or avoiding enemy defensive forces and at-
tacking and destroying the enemy’s support infrastructure before he has time
to react. An armored or attack helicopter unit is often best suited to be the
core of an exploitation force in an integrated attack due to the combination of
mobility, protection, and firepower possessed by such forces.
Dispersed Attack
3-80. Dispersed attack (also known as decentralized attack) is the primary
manner in which the OPFOR conducts offensive action when threatened by a
superior enemy and/or when unable to mass or provide integrated C2 to an
attack. This is not to say that the dispersed attack cannot or should not be
used against peer forces, but as a rule integrated attack will more completely
attain objectives in such situations. Dispersed attack relies on IW and dis-
persion of forces to permit the OPFOR to conduct tactical offensive opera-
tions while overmatched by precision standoff weapons and imagery and
signals sensors. The dispersed attack is continuous and comes from multi-
ple directions. It employs multiple means working together in a very in-
terdependent way. The attack can be dispersed in time as well as space.
See Figures 3-6 and 3-7 for examples of dispersed attacks.
3-81. The primary objective of dispersed attack is to take advantage of a win-
dow of opportunity to bring enough joint and combined arms force to bear to
destroy the enemy’s will and/or capability to continue fighting. To achieve
this, the OPFOR does not necessarily have to destroy the entire enemy force,
but often just a key portion of that force.
3-82. Selecting the appropriate portion of the enemy to destroy is the first
step in planning the dispersed attack. This element is chosen because of its
importance to the enemy and varies depending on the force involved and the
current military situation. For example, an enemy force dependent on one
geographical point for all of his logistics support and reinforcement would be
most vulnerable at that point. Disrupting this activity at the right time and
to the right extent may bring about operational decision on the current bat-
tlefield or it may open further windows of opportunity to attack the enemy’s
weakened forces at little cost to the OPFOR. In another example, an enemy
force preparing to attack may be disrupted by an OPFOR attack whose purpose
is to destroy long-range missile artillery, creating the opportunity for the
OPFOR to achieve standoff with its own missile systems. In a final example, the
key system chosen may be the personnel of the enemy force. Attacking and caus-
ing mass casualties among infantrymen may delay an enemy offensive in com-
plex terrain while also being politically unacceptable for the enemy command
structure.
3-83. Dispersed attacks are characterized by
• Not being focused on complete destruction of ground combat power but
rather on destroying a key portion of the enemy force (often targeting
enemy C2 and logistics).
• Fixing and isolating enemy combat power. |
7-100.1 | 117 | _________________________________________________________________________________Chapter 3
• Using smaller, independent subordinate elements.
• Conducting rapid moves from dispersed locations.
• Massing at the last possible moment.
• Conducting simultaneous attack at multiple, dispersed locations.
• Using deception and other components of IW to degrade the enemy’s
situational understanding and ability to target OPFOR formations.
Neutral Country Hostile Country
Sea
XX X
X X
X X
X Enemy X
APOD
X
X
Mountains
OSC X
X
Sea “THE STATE” X
X
XX
Neutral Country
Figure 3-6. Dispersed Attack (Example 1)
3-84. The window of opportunity needed to establish conditions favorable to
the execution of a dispersed attack may be one created by the OPFOR or one
that develops due to external factors in the operational environment. When
this window must be created, the OPFOR keys on several tasks that must be
accomplished:
• Destroy enemy ground reconnaissance.
• Deceive enemy imagery and signals sensors.
• Create an uncertain air defense environment.
• Selectively deny situational awareness.
• Maximize use of complex terrain. |
7-100.1 | 118 | FM 7-100.1________________________________________________________________________________
Neutral Allied
X
Enemy Country Country
APOD
Sea
X
CH oo us nti tl re
y
Area of
Unre st
NSX
F X X
XX
Mountains
X
XX
X
OSC
XX X XX “THE STATE”
Mountains
XX X X
X X City
City
OSC
X
XX
X X Sea
Enemy X LEGEND
SPOD
NSF = National Security
Forces
Sea
Figure 3-7. Dispersed Attack (Example 2)
Organizing Forces for a Dispersed Attack
3-85. A dispersed attack employs fixing, assault, and exploitation forces. A dis-
ruption force exists, but is not created specifically for this type of offensive action.
Deception forces can also play an important role in dispersed attack operations.
3-86. Fixing Force. The fixing force in a dispersed attack is primarily fo-
cused on fixing enemy response forces. Enemy reserves, response forces, and
precision fire systems that can reorient rapidly will be those elements most
capable of disrupting a dispersed attack. Maneuver forces, precision fires, air
defense and antiarmor ambushes, situational obstacles, chemical weapons,
and EW are well suited to fix these kinds of units and systems.
3-87. Assault Force. The assault force in a dispersed attack is charged with
creating favorable conditions for the exploitation force to rapidly move from
dispersed locations and penetrate or infiltrate enemy defenses. Since it is the
exploitation force that is principally required to act within the window of op-
portunity, the assault force may successfully employ infiltration of infantry
to carefully pre-selected points to assist the exploitation force in its penetra-
tion. Smoke and suppressive artillery and rocket fires, combat engineer
units, and air-delivered weapons are also suited to this mission. Dispersed
attacks often make use of multiple assault forces separated in time and/or space. |
7-100.1 | 119 | _________________________________________________________________________________Chapter 3
3-88. Exploitation Force. The exploitation force in a dispersed attack must
be capable, through inherent capabilities or positioning relative to the en-
emy, of destroying the target of the operation. An armored force may be the
weapon of choice to maneuver throughout the battlefield as single platoons in
order to have one company reach a vulnerable troop concentration or soft C2
node. Alternatively, the exploitation force may be a widely dispersed group of
SPF teams set to attack exposed logistics targets simultaneously. Dispersed
attacks often make use of multiple exploitation forces separated in time
and/or space, but often oriented on the same objective(s).
LIMITED-OBJECTIVE ATTACK
3-89. A limited-objective attack seeks to achieve results critical to the strate-
gic campaign plan (SCP) by destroying or denying the enemy key capabilities
through primarily military means. The results of a limited-objective attack
typically fall short of operational decision on the day of battle, but may be vi-
tal to the overall success of the SCP. Limited-objective attacks are common
during adaptive operations in which the objective is to preserve forces and
wear down the enemy, rather than achieving a military decision.
3-90. The primary objective of a limited-objective attack is a particular enemy
capability. This may or may not be a particular man-made system or group of
systems, but may also be the capability to take action at the enemy’s chosen
tempo.
3-91. Limited-objective attacks are characterized by
• Not being focused solely on destruction of ground combat power but of-
ten on C2 and logistics.
• Denying the enemy the capability he most needs to execute his plans.
• Maximal use of the systems warfare approach to combat (see Chapter 1).
• Significant reliance on a planned or seized window of opportunity.
3-92. At the operational level, there are three types of limited-objective at-
tack: sophisticated ambush, spoiling attack, and counterattack. One of these
types, the sophisticated ambush, requires conditions similar to those needed
for a dispersed attack, but is executed by autonomous tactical-level forces
with the OSC providing coordination and support. The other two types, the
spoiling attack and counterattack, share some common characteristics, but
differ in purpose.
Sophisticated Ambush
3-93. A sophisticated ambush is the linking in time and task of RISTA, at-
tacking forces, and window of opportunity to destroy key enemy systems or
cause politically unacceptable casualties. What makes a sophisticated am-
bush “sophisticated” is not the actual attack means. In fact, the actual am-
bush is executed by tactical-level forces. (See FM 7-100.2 for examples.) What
makes it “sophisticated,” however, is the linking of sensor, ambusher, window
of opportunity, and a target that affects an enemy center of gravity. This
typically requires sophisticated ambushes to be planned, coordinated, and
resourced at the operational level. |
7-100.1 | 120 | FM 7-100.1________________________________________________________________________________
3-94. Like any other ambush, a sophisticated ambush is conducted against a
moving or temporarily halted target. In this case, however, the IW plan is de-
signed to facilitate infiltration or positioning of the ambushing forces and ex-
pose the target. The OSC will be involved in IW planning and the coordina-
tion of operational-level assets needed to support the ambush.
3-95. A sophisticated ambush is conducted by forces autonomous on the bat-
tlefield, but linked by C2 and purpose. It can often involve affiliated forces,
particularly when conducted as part of adaptive operations. A sophisticated
ambush is not necessarily tied to scheme of maneuver in that the larger part
of the OPFOR force may be involved in an operation not directly related to
the ambush.
3-96. Sophisticated ambushes are characterized by
• A key enemy target that, if destroyed, would significantly degrade the
enemy’s will or ability to fight.
• OPFOR sensor(s) with capability and mission to find and track the
target. Sensors are often ground reconnaissance, but may include un-
manned aerial vehicles (UAVs) or satellites.
• A C2 method to link the ambushing forces and sensors.
• Supporting operation(s)usually primarily IWto create a window of
opportunity for the ambushing forces to act.
3-97. A sophisticated ambush requires conditions similar to those needed for
a dispersed attack. However, since less combat power is typically at risk in a
sophisticated ambush, the window of opportunity does not need to be as ex-
tensive. The window of opportunity needed to establish conditions favorable
to the execution of a sophisticated ambush may be one created by the OPFOR
or one that develops due to external factors in the operational environment.
When this window must be created, the OPFOR keys on several tasks that
must be accomplished:
• Destroy enemy ground reconnaissance in the ambush area.
• Deceive enemy imagery and signals sensors.
• Establish effective air defense protection for ambushing forces.
• Selectively deny situational awareness.
• Maximize use of complex terrain.
• Locate and track enemy security and response forces that could inter-
fere with the ambush.
• Locate and track ambush target.
Spoiling Attack
3-98. A spoiling attack is designed to control the tempo of combat by disrupt-
ing the timing of enemy operations. This is accomplished by attacking during
the planning and preparation for the enemy’s own offensive operations. Spoil-
ing attacks do not have to accomplish a great deal to be successful. Con-
versely, planners must focus carefully on what effect the attack is trying to
achieve and how the attack will achieve that effect. In some cases, the pur-
pose of the attack is to remove a key component of the enemy’s force array or |
7-100.1 | 121 | _________________________________________________________________________________Chapter 3
combat system so it is unavailable for the planned attack and therefore re-
duces his overall chances of success. More typically, the attack is designed to
slow the development of conditions favorable to the enemy’s planned attack.
See Figure 3-8 for an example of a spoiling attack.
3-99. Quite often, the spoiling attack develops as a situational attack (see
above). This occurs when an unclear picture of enemy dispositions suddenly
clarifies to some extent and the commander wishes to take advantage of the
knowledge he has gained to disrupt enemy timing. This means that spoiling
attacks are often conducted by reserve or response forces that can rapidly
shift from their current posture to attack the enemy.
OSC
DTG
X Battle
Zone X
Forest
Mountains
X
X X
X
Mountains
Marsh
DTG
Battle
I I Zone
Enemy X
PA ot sta itc iok n X Disruption
Zone
X
DTG
APOD Battle
X Zone
X
X
X
Mountains
X
X
OSC LEGEND
Complex
Battle
Position
Figure 3-8. Spoiling Attack (Example) |
7-100.1 | 122 | FM 7-100.1________________________________________________________________________________
3-100. Spoiling attacks are characterized by
• A requirement to have a clear picture of enemy preparations and dis-
positions.
• A number of independent subordinate unit actions.
• Highly focused objectives.
• The possibility that a spoiling attack may open a window of opportu-
nity for other operations.
3-101. The OPFOR seeks to have the following conditions met in order to
conduct a spoiling attack:
• RISTA establishes a picture of enemy attack preparations.
• Enemy security, reserve, and response forces are located and tracked.
• Enemy ground reconnaissance in the attack zone is destroyed or ren-
dered ineffective.
3-102. Spoiling attacks are actually executed using one of the other types of
offensive action as the base method: integrated attack, dispersed attack, or
sophisticated ambush. Thus, the forces engaged in a spoiling attack would be
organized accordingly. The primary difference between a spoiling attack and
the other types of limited-objective attack is the purpose of the attack.
Counterattack
3-103. A counterattack is designed to cause an enemy offensive operation to
culminate and allow the OPFOR to return to offensive operations. A counter-
attack is designed to control the tempo of operations by returning the initia-
tive to the OPFOR. Like a spoiling attack, a counterattack often develops as
a situational attack, when the commander wishes to take advantage of a
fleeting opportunity. The difference is that the counterattack occurs after the
enemy begins his attack. See Figure 3-9 for an example of a counterattack.
3-104. Counterattacks are characterized by
• A shifting in command and support relationships to assume an offen-
sive posture for the counterattacking force.
• A proper identification that the enemy is at or near culmination.
• The planned rapid transition of the remainder of the force to offensive
operations.
• The possibility that a counterattack may open a window of opportu-
nity for other operations.
3-105. The OPFOR seeks to set the following conditions for a counterattack:
• Locate and track enemy reserve forces and cause them to be committed.
• Destroy enemy reconnaissance forces that could observe counterattack
preparations. |
7-100.1 | 123 | _________________________________________________________________________________Chapter 3
OSC
LOR
Support Zone Battle Zone Disruption Zone
I I
X X
Main
Defense
Force
OSC
LOR
Assault I I
Force XX
XX
I I I
Exploitation
Force
X X
X X
Fixing X X
Force (Former X X
Main Defense
Force)
Figure 3-9. Counterattack (Example)
Organizing Forces for a Counterattack
3-106. Since counterattacks develop out of a defensive posture, the organiza-
tion of forces involves the rapid shifting of some forces from their previously
defensive roles to attack the enemy. Generally, the disruption force was al-
ready part of a previous OPFOR defensive posture and continues to perform
the same functions during a counterattack. Like other offensive actions, a
counterattack employs fixing, assault, and exploitation forces. Within the
context of a larger defensive action, these forces come from the main defense
force and/or the reserve, and they collectively make up the counterattack force.
Other forces in the AOR may continue to perform their original defensive roles.
3-107. Fixing Force. The fixing force in a counterattack is that part of the
force engaged in defensive action with the enemy. These forces continue to
fight from their current positions and seek to account for the key parts of the
enemy array and sure they are not able to break contact and reposition.
Additionally, the fixing force has the mission of making contact with and
destroying enemy reconnaissance forces and any combat forces that may
have penetrated the OPFOR defense.
3-108. Assault Force. In a counterattack, the assault force (if one is used) is
assigned the mission of forcing the enemy to commit his reserve so that the
enemy commander has no further mobile forces with which to react. If the fixing |
7-100.1 | 124 | FM 7-100.1________________________________________________________________________________
force has already forced this commitment, the counterattack design may
forego the creation of an assault force.
3-109. Exploitation Force. The exploitation force in a counterattack ma-
neuvers through or bypasses engaged enemy forces to attack and destroy the
enemy’s support infrastructure before he has time or freedom to react. An
armored or attack helicopter unit is often best suited to be the core of an ex-
ploitation force in a counterattack due to the combination of mobility, protec-
tion, and firepower possessed by such forces.
STRIKE
3-110. A strike is an offensive course of action that rapidly destroys a key en-
emy organization through a synergistic combination of massed precision fires
and maneuver. The targeted enemy formation is usually a battalion task
force or larger. Defeat for the enemy does not come through the simple de-
struction of armored weapon systems or combat soldiers but through the sub-
sequent paralyzation that occurs when a key organization is completely dev-
astated in a small span of time. See Figures 3-10 and 3-11 for examples of
strikes. The overall objective is to destroy an enemy formation, typically after
carefully setting the conditions for its destruction. The strike can be em-
ployed in larger operations that are either defensive or offensive in nature.
3-26
Assault
Force
Enemy Main Line of
Resistance
OSC
Attack Zone
XX XX Kill
X Zone
X
Exploitation
Force
Enemy
Support
Area
X
X
Exploitation
Force Enemy Tactical
Airfield
X
X
Fixing Force
OSC
Initial Subsequent Initial Initial Subsequent
Support Support Battle LOR LOR
Line Line Line Subsequent
Battle Line |
7-100.1 | 125 | _________________________________________________________________________________Chapter 3
3-111. The primary objective of a strike is the enemy’s will and ability to
fight. The OPFOR recognizes that modern militaries cannot rapidly reconsti-
tute entire combat formations and that significant destruction is both capa-
ble of removing all momentum possessed by a combat formation and elimi-
nating support at home for continued combat operations.
3-112. Strikes are characterized by
• Being focused on the complete destruction of a particular enemy for-
mation.
• Typically following a period of reconnaissance fire (see Chapter 7).
• Requiring effective and integrated C2 and RISTA means.
• The use of complex terrain to force the enemy to fight at a dis-
advantage.
• Significant reliance on deception and other IW measures.
OSC
X
X
DTG DTG
Battle Battle
Zone Zone
Disruption X
Ki Zll
o
ne
Zone
Disruption
Zone
Axis
Enemy
Attack
X Zone
DTG
Battle
Zone
LEGEND
Complex
O
S C Battle
Position
Support Zone
Figure 3-11. Strike (Example 2) |
7-100.1 | 126 | FM 7-100.1________________________________________________________________________________
3-113. The window of opportunity needed to establish conditions favorable to
the execution of a strike may be one created by the OPFOR or one that devel-
ops due to external factors in the operational environment. When this window
must be created, the OPFOR keys on several tasks that must be accomplished:
• Destroy enemy ground reconnaissance.
• Deceive enemy imagery and signals sensors.
• Create an uncertain air defense environment.
• Selectively deny situational awareness.
• Maximize use of complex terrain.
Reconnaissance Fire
3-114. In addition to the above, the OPFOR will typically precede a strike
with significant reconnaissance fire (see Chapter 7) designed to remove one
or more key capabilities from the enemy force. The targeted capabilities could
be ground reconnaissance, effective C2, effective logistics, or casualty evacuation.
Organizing Forces for a Strike
3-115. A strike employs fixing, assault, and exploitation forces. The disrup-
tion force can play an important role in determining when the target forma-
tion will enter the kill zone for the strike.
3-116. Fixing Force. The fixing force in a strike is primarily focused on fix-
ing enemy forces that might come to the aid of the target formation. The bat-
tle will develop rapidly, and enemy forces cannot be allowed to reposition to
influence the assault and exploitation forces. Maneuver forces, precision
fires, air defense units, long-range antiarmor systems, situational obstacles,
chemical weapons, and EW are well suited to fix defending forces.
3-117. Assault Force. The assault force in a strike is charged with creating
the conditions that allow the exploitation force to complete the destruction of
the target formation. Since the exploitation force is principally required to
act within the window of opportunity, the assault force may successfully em-
ploy infiltration of infantry to carefully pre-selected points to assist the ex-
ploitation force in its action. Smoke and suppressive artillery and rocket
fires, combat engineer units, and air-delivered weapons are also suited to this
mission.
3-118. Exploitation Force. The exploitation force in a strike has the mis-
sion of completing the destruction of the target formation. Strike exploitation
forces are almost always combinations of highly lethal ground maneuver
formations and precision long-range fire systems. A strike must be capable of
eliminating the target enemy force before the higher enemy commander has
time to react. An armored or attack helicopter unit is often best suited to be
the core of an exploitation force in a strike, due to the combination of mobil-
ity, protection, and firepower possessed by such forces. However, a strike
may be successfully executed without any maneuver forces, and the exploita-
tion force may consist entirely of long-range fire systems. |
7-100.1 | 127 | Chapter 4
Defensive Operations
While the OPFOR sees the offense as the decisive form of military action,
it recognizes defense as the stronger form of military action, particularly
when faced with a superior, extraregional foe. Defensive operations can
lead to strategic victory if the extraregional enemy abandons his mission.
It may be sufficient for the OPFOR simply not to lose. Even when an
operational-level commandsuch as a field group (FG) or operational-
strategic command (OSC)as a whole is conducting an offensive operation,
it is likely that one or more subordinate units may be executing defensive
missions to preserve offensive combat power in other areas, to protect an
important formation or resource, or to deny access to key facilities or geo-
graphic areas.
OPFOR defenses can be characterized as a “shield of blows.” Each force
and zone of the defense plays an important role in the attack of the en-
emy’s combat system. An operational-level defense is structured around
the concept that destroying the synergy of the enemy’s combat system will
make enemy forces vulnerable to attack and destruction.
Commanders and staffs do not approach the defense with preconceived
templates. The operational situation may cause the commander to vary
his defensive methods and techniques. Nevertheless, there are basic
characteristics of defensive operations (purposes and types of action) that
have applications in all situations.
STRATEGIC CONTEXT
4-1. Defensive operations are an important component of all OPFOR stra-
tegic campaigns. However, the scale and purpose of defensive actions may
differ during the various types of strategic-level actions.
REGIONAL OPERATIONS
4-2. The State possesses an overmatch in all elements of power against
internal and regional opponents. It is able to employ that power in regional
operations in a conventional operational design. This overmatch does not
imply, however, that regional operations are entirely offensive. Consolidation
of gains, security actions, and economy-of-force measures can all produce de-
fensive courses of action inside a larger offensive design.
4-3. The State’s military forces are sufficient to overmatch any single re-
gional neighbor, but not necessarily an alliance or coalition of neighboring
countries. They may not be a match for the forces an extraregional power
can bring to bear. Thus, the OPFOR seeks to exploit its numerical and |
7-100.1 | 128 | FM 7-100.1________________________________________________________________________________
technological overmatch against one regional opponent rapidly, before other
regional neighbors or an extraregional power can enter the fight. In some
cases, this may require defensive operations against one or more regional
neighbors who are not the main target of the strategic campaign, to mitigate
their ability to disrupt an OPFOR offensive against the one that is.
4-4. Regional operations include essentially defensive security actions to
maintain internal stability. In addition, the Internal Security Forces help
control the population in territory the OPFOR seizes or engage enemy forces
that invade State territory.
4-5. The State’s military goal during regional operations is to destroy its re-
gional opponents’ military power in order to achieve specific ends. The State
plans regional operations well in advance and executes them as rapidly as is
feasible in order to preclude intervention by outside forces. Still, at the very
outset of these operations, it lays plans and positions forces to conduct access-
control operations in the event of outside intervention. Extraregional
forces may also be vulnerable to conventional operations during the time
they require to build combat power and create support at home for their
intervention.
TRANSITION OPERATIONS
4-6. If an extraregional force starts to deploy into the region, the balance of
power begins to shift away from the State. Although the OPFOR may not yet
be totally overmatched by the enemy force, it faces a threat it cannot handle
with normal, “conventional” patterns of operation designed for regional
conflict. Therefore, the OPFOR must begin to adapt its operations to the
changing threat.
4-7. As the State begins transition operations, its immediate goal is preser-
vation of its instruments of power while seeking transition back to regional
operations. Transition operations therefore feature a mixture of offensive and
defensive actions.
4-8. This combination of offensive and defensive actions can allow the State
to control the strategic tempo while changing the nature of conflict to
something for which the intervening force is unprepared. If these actions are
successful and the extraregional force is no longer a factor, the OPFOR may
be able to transition back to regional operations without having to complete
the shift to adaptive operations.
4-9. During transition operations, the State must decide whether to keep
its forces in any territory it has occupied in a neighboring country or to
withdraw them back to its home territory. The decision to stay or withdraw
at this point may be based on the presence or absence of complex terrain
suitable for defensive operations in the occupied territory against an
extraregional power with overmatch in technology and conventional forces.
The OPFOR is more likely to remain in the occupied territory if it has already
achieved its strategic goal in regional operations or at least achieved major
intermediate objectives leading toward that goal and can structure an
effective defense in that territory. Military forces in the immediate vicinity
of the point of intervention move into defensive positions as opportunity
allows, making use of existing command and control (C2) and logistics. |
7-100.1 | 129 | _________________________________________________________________________________Chapter 4
4-10. The OPFOR can use the time it takes the extraregional force to prepare
and deploy into the region to change the nature of the conflict into something
for which the intervening force is unprepared. The OPFOR tries to establish
conditions that force the new enemy to fight at less than full strength and on
terrain for which his forces are not optimized. It seeks to take advantage of
complex terrain whenever possible, while controlling the enemy’s access to
such terrain. It plans operations to exploit the opportunities created by the
presence of NGOs, PVOs, media, and other civilians on the battlefield.
4-11. Meanwhile, transition operations permit other key forces the time,
space, and freedom of action necessary to move into sanctuary in preparation
for a shift to adaptive operations. These forces preserve combat power and
prepare to defend the State homeland, if necessary. Transition operations
usually include mobilization of reserve and militia forces to assist in defending
the State.
4-12. At some point, the OPFOR may conclude that it cannot deny entry or
defeat the extraregional force by destroying his early-entry forces. The
OPFOR then shifts its emphasis to completing the transition to adaptive
operations as soon as possible, before the enemy can deploy overwhelming
forces into the region.
ADAPTIVE OPERATIONS
4-13. From the perspective of the extraregional power, any regional crisis has
the potential to expand into a major theater war. Therefore, it will try to
avoid crisis expansion by early engagement and rapid response. The longer
the State can delay effective extraregional response to the crisis in the region,
the greater its chances for success. Failing to limit or interrupt access to the
region, the State will attempt to degrade further enemy force projection, hold
initial gains, and extend the conflict, while preserving its own military capa-
bility and other instruments of national power.
4-14. When the OPFOR shifts to adaptive operations, these are more defensive
in nature than were regional or transition operations. When overmatched
in conventional power, the OPFOR seeks to preserve its own power and
apply it in adaptive ways. It expects its commanders to seize opportunity,
tailor organizations to the mission, and make creative use of existing
resourceseven more than they did in regional and transition operations.
4-15. Generally, the OPFOR conducts adaptive operations during the strate-
gic campaign as a consequence of intervention from outside the region. If it
cannot control the extraregional enemy’s access into the region or defeat his
forces before his combat potential in the region equals or exceeds its own, the
OPFOR must resort to adaptive operations. The primary objectives are to
preserve combat power, to degrade the enemy’s will and capability to fight,
and to gain time for aggressive strategic operations to succeed.
4-16. Adaptive operations occur as a result of an extraregional power
intervening with sufficient forces to thwart the OPFOR’s original of-
fensive operations in the region. The OPFOR disperses to the extent its C2
allows and conducts decentralized operations in both offense and defense.
The OPFOR views adaptive operations as temporary in nature, serving as a
means for the OPFOR to return to regional operations. |
7-100.1 | 130 | FM 7-100.1________________________________________________________________________________
4-17. Adaptive operations are often sanctuary-based. Sanctuaries are areas
that limit the ability of an opponent to apply his full range of capabilities.
The OPFOR can use physical and/or moral sanctuaries for preserving and
applying forces. It can defend in sanctuaries or attack out of them. It may
conduct limited-objective attacks from these positions to prevent buildup
of intervening forces, to facilitate the defense, or to take advantage of an
opportunity to counterattack. When defending, the OPFOR generally does
not employ fixed, contiguous defensive fronts.
4-18. The OPFOR uses flexible and unpredictable force structures task-
organized for particular missions. Forces may be combined arms, joint,
interagency, and possibly multinational. The State may fully mobilize all
available means to create large conventional force and paramilitary capability in
support of adaptive operations. Full mobilization involves all military and
paramilitary forces, including militia. During adaptive operations, the
State will use conventional forces in adaptive ways. It will also employ
unconventional and specialized forces tailored to the needs of combat against
an extraregional force with technological overmatch. Operations may also
involve various types of affiliated forces.
PURPOSE OF THE DEFENSE
4-19. Defensive operations are designed to achieve the goals of the strategic
campaign through active measures while preserving combat power. However,
the purpose of any given defensive operation depends on the situation.
4-20. The primary distinction among types of OPFOR defensive operations is
their purpose. Therefore, the OPFOR recognizes three general types of defen-
sive operations according to their purpose: to destroy, preserve, or deny.
DEFENSE TO DESTROY
4-21. A defense to destroy is designed to eliminate an attacking formation’s
ability to continue offensive operations while preserving friendly forces and
setting the military conditions for a favorable political settlement. Such a
defense may be the entirety of an operation or may be used to defeat a
counterattack during a larger OPFOR offensive action. An operational
defense to destroy often has one or more tactical offensive actions as
subcomponents.
DEFENSE TO PRESERVE
4-22. A defense to preserve is designed to protect key components of the
OPFOR from destruction by the enemy. Such a defense may occur
• To preserve combat power for future operations.
• Before the outbreak of a war, or in its early stages, to cover the mobili-
zation and deployment of the main forces.
• When facing numerically or qualitatively superior enemy forces.
• During an offense, to economize force in one area and achieve superior-
ity in another. |
7-100.1 | 131 | _________________________________________________________________________________Chapter 4
DEFENSE TO DENY
4-23. A defense to deny is intended to deny the enemy access to a geographic
area or use of facilities that could enhance his combat operations or provide
him substantial value for information operations. An example of this would
be enemy capture of a religious or cultural center. This type of defense is
most often used as part of an overall campaign of theater access control.
It may also be used to consolidate, retain, and protect critical positions that
attacking forces have captured.
PLANNING DEFENSIVE OPERATIONS
4-24. For the OPFOR, the key elements of planning defensive operations
are
• Determining the level of planning possible (planned versus situational
defense).
• Organizing the battlefield.
• Organizing forces.
• Organizing information warfare (IW) activities in support of the de-
fense (see Chapter 5).
4-25. Defensive actions during transition and adaptive operations will not be
able to rely simply on attrition-based operations in layered engagement
areas. Such actions will typically include increased use of
• Infiltration to conduct spoiling attacks and ambushes.
• Perception management (see Chapter 5) in support of defensive opera-
tions.
• Camouflage, concealment, cover, and deception (C3D) measures.
• Affiliated forces for reconnaissance, counterreconnaissance, security,
and attacks against key enemy systems.
PLANNED DEFENSE
4-26. A planned (or deliberate) defense is a defensive operation undertaken
when there is sufficient time and knowledge of the situation to prepare and re-
hearse forces for specific tasks. Typically, the enemy is in a staging or assembly
area and in a known location and status. The OPFOR plans a defense using the
method described in Chapter 2. Key considerations in defensive planning are
• Selecting operationally significant areas in complex terrain from which
to dominate surrounding avenues of approach.
• Determining the method that will deny the enemy his operational
objectives.
• Developing a plan for reconnaissance, intelligence, surveillance, and
target acquisition (RISTA) that locates and tracks major enemy forma-
tion and determines enemy patterns of operations and probable objectives.
• Creating or taking advantage of a window of opportunity that frees
friendly forces from any enemy advantages in precision standoff and
situational awareness. |
7-100.1 | 132 | FM 7-100.1________________________________________________________________________________
SITUATIONAL DEFENSE
4-27. The OPFOR recognizes that the modern battlefield is chaotic, and fleet-
ing opportunities to attack an enemy weakness will continually present
themselves and just as quickly disappear. If the OPFOR determines that, by
conserving resources in one area, it may be able to take advantage of a win-
dow of opportunity in another, it may assume a situational (or hasty) defense.
It may also do so when an OPFOR attack culminates prior to achieving the
objective.
4-28. The OPFOR may also be forced to employ a situational defense when it
has been conducting offensive operations against a regional neighbor and in-
tervention by a powerful extraregional force materializes more quickly than
anticipated. Thus, the OPFOR may have to make the transition from regional
to adaptive operations more rapidly than planned. Units may still be able to
move into preplanned positions in complex terrain, but without some meas-
ures they anticipated being able to take during transition operations. They
may or may not have fully-prepared, complex battle positions, with engineer
preparation, C3D measures, and logistics caches.
4-29. The commander develops his assessment of the conditions leading to a
situational defense rapidly and without a great deal of staff involvement. He
provides a basic course of action to the staff, who then quickly turn that
course of action into an executable operational directive.
4-30. Organization of the battlefield in a situational defense is normally lim-
ited to minor changes to existing control measures. Organization of forces in
a situational defense typically relies on minor modifications to existing
structure.
4-31. The following are examples of conditions that might lead to a
situational defense:
• The enemy gains or regains air superiority sooner than anticipated.
• An enemy counterattack was not effectively fixed.
• An attacking force makes contact with an enemy formation it did not
expect.
ORGANIZING THE BATTLEFIELD FOR THE DEFENSE
4-32. In his operation plan, the commander specifies the organization of the
battlefield from the perspective of his level of command. Within his unit’s
area of responsibility (AOR), as defined by the next-higher commander, he
designates AORs for his subordinates, along with zones related to his own
overall mission.
4-33. In organizing the defensive battlefield, the operational commander
organizes forces to begin attack of the combat system of the enemy force as
soon as feasible. By attacking subsystems or components of the enemy’s
combat system appropriate to the situation, the operational commander can
create windows of opportunity for offensive action. |
7-100.1 | 133 | _________________________________________________________________________________Chapter 4
Areas of Responsibility
4-34. OPFOR AORs normally consist of three principal zones: disruption,
battle, and support zones. Zones may be linear or nonlinear in nature and
are designed to facilitate rapid transition between linear and nonlinear
operations, as well as between offense and defense. These zones have the
same basic purposes in all types of defenses. In addition to the basic zones in an
AOR, the operational-level commander may also employ attack zones and kill
zones to control subordinate offensive operations conducted in support of the
overall defensive scheme. See Figures 4-1 and 4-2 for generalized examples of
AORs and zones in linear and nonlinear defensive operations.
OSC
OSC DTG DTG OSC
Disruption Disruption Battle Zone X X Support
Zone Zone Zone
(if employed)
X X
Z
OKILL
KILL N E
Enemy
ZONE
X
X
DTG DTG
Disruption Battle Zone X X XXX
Zone OSC
(if employed)
X
X
X
ZOK NIL EL KI
ZLL
O NE
OSC
X Reserve
X
BTG
Battle Zone I I
Enemy
KILL
ONE
X OSC
Z
Antilanding
Reserve
OSC
Figure 4-1. Example of AOR (Linear Battlespace) |
7-100.1 | 134 | FM 7-100.1________________________________________________________________________________
OSC
DTG
Battle
Zone
DTG
Battle
Ki Zll
o
ne
Zone
Disruption
Zone Disruption
Zone
DTG
Battle
Zone
LEGEND
Complex
Battle
O
S C Position
Support Zone
Figure 4-2. Example of AOR (Nonlinear Battlespace)
Disruption Zone
4-35. In the defense, the disruption zone is that battlespace where opera-
tional forces begin their attack on the designated component or subsystem of
the enemy’s combat system. It is located between the OSC’s battle zone and
the limit of responsibility (LOR) that defines the extent of the AOR. Within
this battlespace, the OPFOR seeks to set the conditions for the defeat of the
attacking force in the battle zone. For example, the operational-level com-
mander may determine that destruction of the enemy’s mobility assets will
create an opportunity to destroy maneuver units in the battle zone. The dis-
ruption force would be given the mission of seeking out and destroying enemy
mobility assets while avoiding engagement with maneuver forces.
4-36. The disruption zone is the primary area in which the operational-level
commander will employ long-range joint fires and strikes. He may establish
kill zones within his disruption zone for the purpose of integrating the actions
of long-range fire elements and disruption force elements.
4-37. The operational-level disruption zone may be the aggregate of the disrup-
tion zones of subordinates. For example, an FG’s disruption zone could include
the disruption zones of one or more OSCs and/or tactical-level commands directly
subordinate to the FG. An OSC’s disruption zone could include disruption zones |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.