Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
TRADOC G2: ACE Threats – Integration
Threat Tactics Course
US Army TRADOC G2: ACE Threats - Integration Distribution authorized to DoD and DoD contractors. Further dissemination only as directed by ACE
Threats-Integration, TRADOC G2 or higher DoD authority, as determined on 12 February 2015.
Hybrid Threat Offensive Tactics
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Terminal Learning Objective
Action: Discuss Hybrid Threat offensive tactics at the Brigade Tactical Group level and below.
Condition: Given a professional education seminar; threat training literature (U.S. Army TC 7-100 series); tactical vignettes that illustrate operational environment (OE) conditions and PMESII-PT variables; motivations, behavior, and characteristics of a threat; and probable-possible functional actions and enablers to achieve a mission task.
Standard: Understand the threat functional organizations and offensive actions of assault, ambush, raid, and reconnaissance attack by threat tactical groups and detachment; know how to access threat products from ATN.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Offensive Purposes Gain freedom of movement
Creates a situation where other friendly forces can maneuver in a method of their own choosing with little or no opposition.
Restrict freedom of movement Prevents the enemy from maneuvering as he chooses.
Gain control of key terrain/personnel/equipment Not necessarily terrain focused – a raid with the objective of
taking prisoners is an attack to gain control. Gain information
Used to answer important questions about the enemy’s dispositions and capabilities. (also called reconnaissance attack)
Dislocate Prevents the enemy from being able to execute an optimal
course of action.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Limited Objective Attacks
• Spoiling Attack
• Counterattack
Integrated Attack• Overmatch• Fix, attack key systems• Synchronized action of
enabling elements
Dispersed Attack• No overmatch/unable to C2• Continuous, multi-directional• Coordinated asynchronous
attacks by enabling elements
Tactical Offensive Actions
These are generally at BTG and higherX
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Assault • Red has actual (or temporary)
overmatch• Seize / destroy
Ambush• Red chooses location, means• Blue determines time• Destroy/acquire key system
Raid• Red chooses location, means• Blue determines time• Destroy/acquire key system
Reconnaissance Attack
• Find & fix/destroy• Prevent obstruction of main
force
Tactical Offensive Actions
These are generally at BDET and belowII
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Offensive Tasks
Screen – provides early warning to the protected forceDisrupt – direct and indirect fires, terrain, and obstacles to upset an enemy’s formation or tempo, interrupt his timetable, or cause enemy forces to commit prematurely or attack in piecemeal fashion.Block – denies the enemy access to an area or prevents his advance in a direction or along an avenue of approach.Fix – prevents the enemy from moving any part of his force from a specific location for a specific period…or obstacle effect with fires and obstacles to slow movement.
SYMBOL
B
F
SS
D
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Tactics
Action Force or Element―responsible to performing primary function or task that accomplishes the overall mission goal or objective of an action such as but not limited to:
Attack, Ambush, Raid, Exploitation, and/orMain Defense, Shielding, Contact…Counterattack
Enabling Force or Element―in relation to the action force or element, provides enabling functions which may include but are not limited to:
Disruption and/or Security, Fixing, Deception, and Support and Specialist…e.g., C2, CSS, Reserve…
Determine Functions
1
Allocate resources
2
Synchronize
3
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Brigade Offensive Tasks
Limited Objective Attack Spoiling Attack Counterattack
Integrated Attack Dispersed Attack
DisruptionMain DefenseSupportReserve
Raid Assault Ambush Reconnaissance Attack
ElementsForcesDisruptionMain DefenseSupportReserve
Planned Defense or
Situational Defense
BTG and HigherTactical Actions
BDET and Lower EchelonsTactical Actions
Brigade Tactical Group
X
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Limited-Objective Attack
A limited-objective attack seeks to achieve results to the battle or operation plan by destroying or denying the enemy key capabilities thru primarily military means. (TC 7-100.2, p. 3-17)
Characterized by: Attacking soft targets like C2 and logistics. Denying the enemy a capability critical in accomplishing their plan. Focus on using systems warfare. Reliance on planned or seized window of opportunity.
This is common while fighting a stronger enemy with the objective of preserving forces and wearing down the enemy, rather than achieving a decision.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Spoiling Attack Purpose of this attack is preempt or seriously impair an enemy
attack while the enemy is in the process of planning, forming, assembling, or preparing to attack. (TC 7-100.2, p. 3-17)
Characterized by: Independent, small unit action. Highly focused objectives. Possible windows of opportunity for other combat actions. Clear picture of enemy preparations and dispositions.
Main Defense Force
X
IIII
XX
MSBII
Spoiling Attack
Spoiling Attack
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Counterattack Counterattack is a form of attack by part or all of a defending
force against an enemy attacking force with the general objective of denying the enemy their goal. (TC 7-100.2, p. 3-17)
Characterized by: Shifting in command/support relationships to assume
an offensive posture force for the counterattack force. Confirmation that the enemy is at or near culmination. Rapid transition of the remainder of the force to the offense. Possibility of the counterattack providing opportunities for other
follow-on combat actions.
Fixing Force
X
IIII
XX
F
Counterattack Force
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Integrated Attack An integrated attack is an offensive action that destroys the
enemy’s will and/or ability to continue fighting through combined arms effects. Employed when the OPFOR has overmatch and is able to bring all elements of offensive combat power to bear. (TC 7-100.2, p. 3-10)
Characterized by: Using flank attacks and envelopment. Fixing with minimum force necessary. Often focused on C2 and logistics not ground maneuver forces. Deception and other INFOWAR elements to degrade situational
understanding and ability to target.
Fixing Force
IIII
Assault Force
F
X
F
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
PAA
OBJ
X
II
II FIXING FORCE
IIIIII
II
IIMP
II FIXING FORCE
IIFIXINGFORCE
F
FF
DISRUPTION FORCES
IDF
DISRUPTION FORCES
IDF
D
G
II (-)DISRUPTION FORCE
D
DISRUPTION FORCES
IDF
DD
D
D
IISECURITY FORCE
II
IIBSB
II
X
1. Counter-Recon•Security BDETs conduct Counter-Recon against screening elements to neutralize and reduce obstacles, neutralize forward Fire Control
•UAV Recon to identify, support IDF targeting
2. Neutralize PAA•Guerrilla BDET (w/SPF) assaults PAA from the north to neutralize Counter-Btry and Supporting Fires
•SSM BTRY and Atk UAV assaults ARTY
3. Fix Forward Battle Positions•MECH BNs fix CABs in forward BPs to prevent CABs’ support to Reinforcements or OBJ
•INFOWAR conducts jamming, deception•Insurgents conduct IED ambushes as needed to block rearward movement towards OBJ
4. Isolate Reinforcements•Mech BN fixes reinforcements, supports Tank BN•Tank BN Isolates Reinforcements
5. Assault Objective•Small irregular element, supported by SPF assaults from the north C2/SUST vic OBJ
•Insurgent cells, INFOWAR conducts deception, perception management to disrupt OBJ security elements
5
4
3
2
1
1
2
33
4
I
BTG Integrated Attack ExamplePurpose: • Destroy C2, Atk AVN, SUST on OBJ
G
IASSAULT
FORCESPF
IIISOLATION FORCE 5 BSA
Key: Synchronized action of enabling elements
I
SECURITY FORCE
XX
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
PAA
OBJ
X
II IIIIII
IIMP
D
DISRUPTION FORCES
IDF
II
IIBSB
II
X
BTG Integrated Attack ExamplePurpose: • Destroy C2, Atk AVN, SUST on OBJ
G
IASSAULT
FORCESPF
BSA
Key: Synchronized action of enabling elements
5. Assault Objective•Small irregular element, supported by SPF assaults from the north C2/SUST vic OBJ
•Insurgent cells, INFOWAR conducts deception, perception management to disrupt OBJ security elements
5
Relatively small assault force
Build-Backwards Technique
XX
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
PAA
OBJ
X
II IIIIII
II
IIMP
IIFIXINGFORCE
D
DISRUPTION FORCES
IDF
D
II
IIBSB
II
X
4
I
BTG Integrated Attack ExamplePurpose: • Destroy C2, Atk AVN, SUST on OBJ
G
IASSAULT
FORCESPF
IIISOLATION FORCE 5
F
BSA
Key: Synchronized action of enabling elements
5. Assault Objective•Small irregular element, supported by SPF assaults from the north C2/SUST vic OBJ
•Insurgent cells, INFOWAR conducts deception, perception management to disrupt OBJ security elements
5
4. Isolate Reinforcements•Mech BN fixes reinforcements, supports Tank BN•Tank BN Isolates Reinforcements
4
Protection for the Assault Force
Build-Backwards Technique
XX
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
XX
PAA
OBJ
X
II
II FIXING FORCE
IIIIII
II
IIMP
II FIXING FORCE
IIFIXINGFORCE
FF
DISRUPTION FORCES
IDF
DISRUPTION FORCES
IDF
D
DISRUPTION FORCES
IDF
DD
D
D
II
IIBSB
II
X
33
4
I
BTG Integrated Attack ExamplePurpose: • Destroy C2, Atk AVN, SUST on OBJ
G
IASSAULT
FORCESPF
IIISOLATION FORCE 5
F
BSA
Key: Synchronized action of enabling elements
5. Assault Objective•Small irregular element, supported by SPF assaults from the north C2/SUST vic OBJ
•Insurgent cells, INFOWAR conducts deception, perception management to disrupt OBJ security elements
5
4. Isolate Reinforcements•Mech BN fixes reinforcements, supports Tank BN•Tank BN Isolates Reinforcements
4
3. Fix Forward Battle Positions•MECH BNs fix CABs in forward BPs to prevent CABs’ support to Reinforcements or OBJ
•INFOWAR conducts jamming, deception•Insurgents conduct IED ambushes as needed to block rearward movement towards OBJ
3
Protection for the Isolation Force; Prevents
reinforcement of OBJ
Build-Backwards Technique
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
XX
PAA
OBJ
X
II
II FIXING FORCE
IIIIII
II
IIMP
II FIXING FORCE
IIFIXINGFORCE
FF
DISRUPTION FORCES
IDF
DISRUPTION FORCES
IDF
D
G
II (-)DISRUPTION FORCE
D
DISRUPTION FORCES
IDF
DD
D
D
II
IIBSB
II
X
2
33
4
I
BTG Integrated Attack ExamplePurpose: • Destroy C2, Atk AVN, SUST on OBJ
G
IASSAULT
FORCESPF
IIISOLATION FORCE 5
F
BSA
Key: Synchronized action of enabling elements
5. Assault Objective•Small irregular element, supported by SPF assaults from the north C2/SUST vic OBJ
•Insurgent cells, INFOWAR conducts deception, perception management to disrupt OBJ security elements
5
4. Isolate Reinforcements•Mech BN fixes reinforcements, supports Tank BN•Tank BN Isolates Reinforcements
4
3. Fix Forward Battle Positions•MECH BNs fix CABs in forward BPs to prevent CABs’ support to Reinforcements or OBJ
•INFOWAR conducts jamming, deception•Insurgents conduct IED ambushes as needed to block rearward movement towards OBJ
3
2. Neutralize PAA•Guerrilla BDET (w/SPF) assaults PAA from the north to neutralize Counter-Btry and Supporting Fires
•SSM BTRY and Atk UAV assaults ARTY
2
Reduces IDF risk to Isolation & Fixing Forces
Build-Backwards Technique
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
XX
PAA
OBJ
X
II
II FIXING FORCE
IIIIII
II
IIMP
II FIXING FORCE
IIFIXINGFORCE
FF
DISRUPTION FORCES
IDF
DISRUPTION FORCES
IDF
D
G
II (-)DISRUPTION FORCE
D
DISRUPTION FORCES
IDF
DD
D
D
II
IIBSB
II
X
1. Counter-Recon•Security BDETs conduct Counter-Recon against screening elements to neutralize and reduce obstacles, neutralize forward Fire Control
•UAV Recon to identify, support IDF targeting
1
IISECURITY FORCE
1
2
33
4
I
BTG Integrated Attack ExamplePurpose: • Destroy C2, Atk AVN, SUST on OBJ
G
IASSAULT
FORCESPF
IIISOLATION FORCE 5
F
BSA
Key: Synchronized action of enabling elements
5. Assault Objective•Small irregular element, supported by SPF assaults from the north C2/SUST vic OBJ
•Insurgent cells, INFOWAR conducts deception, perception management to disrupt OBJ security elements
5
4. Isolate Reinforcements•Mech BN fixes reinforcements, supports Tank BN•Tank BN Isolates Reinforcements
4
3. Fix Forward Battle Positions•MECH BNs fix CABs in forward BPs to prevent CABs’ support to Reinforcements or OBJ
•INFOWAR conducts jamming, deception•Insurgents conduct IED ambushes as needed to block rearward movement towards OBJ
3
2. Neutralize PAA•Guerrilla BDET (w/SPF) assaults PAA from the north to neutralize Counter-Btry and Supporting Fires
•SSM BTRY and Atk UAV assaults ARTY
2
Reduces resistance to Fixing Forces; prevents
surprise on flank
I
SECURITY FORCE
Build-Backwards Technique
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Red-Speak Blue-Speak
AttackAn attack is an offensive task that destroys or defeats enemy forces, seizes and secures terrain, or both. Attacks incorporate coordinated movement supported by fires. They may be either decisive or shaping operations. Attacks may be hasty or deliberate, depending on the time available for assessing the situation, planning, and preparing.(ADRP 3-90)
Integrated AttackIntegrated attack is an offensive action where the OPFOR seeks military decision by destroying the enemy’s will and/or ability to continue fighting through the application of combined arms effects. Integrated attack is often employed when the OPFOR enjoys overmatch with respect to its opponent and is able to bring all elements of offensive combat power to bear. It may also be employed against a moresophisticated and capable opponent, if the appropriate window of opportunity is created or available. (TC 7-100.2, para. 3-64)
For Discussion
Employed when OPFOR has Overmatch METT-TC determine which form of attack to employ
IW
G
F
SS
D
Fixing Force
Striking Force
Support Force
F
SS
Enabling
Isolation Security
Support
Assault
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
A dispersed attack may be used when threatened by a superior enemy and/or when unable to mass or provide integrated C2 to an attack. This type of attack is continuous and comes from multiple directions. (TC 7-100.2, p. 3-13)
Characterized by: Fixing and isolating enemy combat power. Using deception and other INFOWAR elements to degrade
situational understanding and ability to target. Focusing on destroying key combat system rather the complete
destruction of ground combat power. Conducting rapid, simultaneous attacks from dispersed
locations. Massing at the last possible moment
Dispersed Attack
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
BTG Dispersed Attack ExamplePurpose: • Disperse/disrupt BCT forces IOT
destroy/degrade enemy key combat system
GO
MKT
BSA
I
II
II
IIBSB
XI
I
INFOWAR
FIXINGFORCE
II
• • •
G
• • •
• • •
I
I• • •
X
DISRUPTION FORCES
IDFII
II
I IED
(Multiple) DISRUPTION ELEMENTS
(Multiple) DISRUPTION ELEMENTS
•Disrupt & Fix-INFOWAR deception, IDF, conventional feint attacks reinforce BCT perception of imminent threat from the west- Effect: BCT forces in the west fixed
•Disrupt & Ambush- Multiple small groups of guerillas conduct baited anti-armor ambushes against positions and forces in the northern sector- Effect: BCT forces in the north harden defenses, reduce patrols
•Disrupt & Distract- Multiple small groups of insurgents conduct drive-by and IED attacks against government and civilian targets throughout the southern sector.- Effect: BCT forces in the south are dispersed and occupied responding to attacks
•Limited Objective Attack- Guerillas attack the BSA using VBIED to breach perimeter. - Guerillas and criminal elements destroy or seize BCT SUST and C2 assets
3
2
1
4
1
2
3
SAFE
G
• • •
GANG
IED4
INT
Key: Coordinated asynchronous attacks by enabling elements
Deception to Disrupt & Fix
Attacks to Disrupt & Ambush
Attacks to Disrupt & Distract
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Red-Speak Blue-SpeakAttackAn attack is an offensive task that destroys or defeats enemy forces, seizes and secures terrain, or both. Attacks incorporate coordinated movement supported by fires. They may be either decisive or shaping operations. Attacks may be hasty or deliberate, depending on the time available for assessing the situation, planning, and preparing. (ADRP 3-90)
Shaping Operation An operation that establishes conditions for the decisive operation through effects on the enemy, other actors, and the terrain. (ADRP 3-0)
Dispersed AttackDispersed attack is the primary manner in which the OPFOR conducts offensive action when threatened by a superior enemy and/or when unable to mass or provide integrated C2 to an attack. The primary objective of dispersed attack is to take advantage of a window of opportunity to bring enough combined arms force to bear to destroy the enemy’s will and/or capability to continue fighting. (TC 7-100.2, para. 3-74)
For Discussion
Relies on INFOWAR and dispersion of forces May involve any combination of forces and capabilities
Fixing Force
Striking Force
Assault Element
Fixing Element
Fixing Element
F
F
Assault Element
Fixing Element
IW
IW
F
IW
Support Force
F
SS
G
G
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Assault
An assault is an attack that destroys an enemy force through
firepower and the physical occupation of and/or destruction of
his position. (TC 7-100.2, p. 3-20)
An assault is the basic form of OPFOR tactical action.
Decisive assaults are characterized by: Isolation of the objective.
Effective tactical security.
Effective suppression of the enemy force.
Violent fire and maneuver against the enemy.
Tactical Task 1.0 Assault Subtasks:• Isolate.• Suppress.• Assault.
TC 7-101, Exercise Design, APP B
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Organization: Assault
Typical functional organization for an assault: Action Element (Assault). The assault element is the action
element. It maneuvers to and seizes the enemy position, destroying any forces there.
Enabling Elements (Fixing, Support, & Security). The support element provides the assaulting detachment with one or more of the following:
Command and Control (C2). Combat Service Support (CSS). Supporting direct or indirect fires. Mobility support.
The security element provides early warning, of approaching enemy forces and prevents them from reinforcing the assaulted unit.
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Mission: What is the end state?
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Example
Build Forward Starts with indicators, first thing
someone may see on the ground Follows Appendix B OPFOR
Tactical Task List subtask sequence Enabling Element(s) first; Action
Element second ID action form, executable task,
and purpose
Build Backward Facilitate Functional Tactics
and/or Analysis discussion Start with success Action Element first; Enabling
Element(s) second ID action form, executable
task, and purpose
Functional Tactics: Methods
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
F
F
D
RES
D
D
S
S S
S S
Assault Vignette
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Total Personnel - 107 10xBMP-2M50xAK-74M4x12.7mm NSV9x7.62 PKM9xATGL, Panzerfaust 3-T60013xRPG-27
Assault Vignette – Forces
From TC 7-100.4
Order of Battle (Mech IFV Company – CDET)
Assault Element
Fixing Elements
IFires Elements
Security Elements
Functional Task Organization
54x HAROP
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Assault Vignette - Build Backward
Facilitate Functional Tactics and/or Analysis discussion
Start with success
Action Element first; Enabling Element(s) second
ID action form, executable task, and purpose
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Mission: Seize Crit. Infrastructure
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Assault Vignette Functional Tactics
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
What is the objective?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Action• Accomplishes the mission• How do I seize?
Assault Element• T: Destroy C2• P: Gain key terrain
Mission: Seize Crit. Infrastructure
Assault Vignette Functional Tactics
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
D
Action Function: Assault ElementTask: DestroyPurpose: Achieve OBJ
RES
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Action• Accomplishes the mission• How do I seize?
Enabling• Assists mission accomplishment• How do assist seizure?
Assault Element• T: Destroy C2• P: Gain key terrain
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Mission: Seize Crit. Infrastructure
Fires Element• T: Destroy/suppress• P: Restrict FOM
Assault Vignette Functional Tactics
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
Enabling Function: Fires ElementTask: DestroyPurpose: Achieve OBJ
RES
D
D
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Action• Accomplishes the mission• How do I seize?
Enabling• Assists mission accomplishment• How do assist seizure?
Assault Element• T: Destroy C2• P:Gain key terrain
Fixing Element• T: Fix• P: Enable FOM
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Fixing Element• T: Fix and Disrupt• P: Enable FOM
Mission: Seize Crit. Infrastructure
Fires Element• T: Destroy/suppress• P: Restrict FOM
Assault Vignette Functional Tactics
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
F
F
D
RES
D
D
Enabling Function: Fixing ElementTask: FixPurpose: Enable FOM
Enabling Function: Fixing ElementTask: Disrupt; Task: FixPurpose: Enable FOM
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Action• Accomplishes the mission• How do I seize?
Enabling• Assists mission accomplishment• How do assist seizure?
Assault Element• T: Destroy C2• P: Gain key terrain
Fixing Element• T: Fix• P: Enable FOM
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Fixing Element• T: Fix and Disrupt• P: Enable FOM
Fires Element• T: Suppress• P: Enable FOM
Mission: Seize Crit. Infrastructure
Fires Element• T: Destroy/suppress• P: Restrict FOM
Assault Vignette Functional Tactics
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
F
F
D
RES
D
D
Enabling Function: Fires ElementTask: SuppressPurpose: Enable FOM
S
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Action• Accomplishes the mission• How do I seize?
Enabling• Assists mission accomplishment• How do assist seizure?
Assault Element• T: Destroy C2• P: Gain key terrain
Fixing Element• T: Fix• P: Enable FOM
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Fixing Element• T: Fix and Disrupt• P: Enable FOM
Fires Element• T: Suppress• P: Enable FOM
Security Element• T: Screen• P: Isolate Battlefield
Security Element• T: Screen• P: Isolate Battlefield
Mission: Seize Crit. Infrastructure
Fires Element• T: Destroy• P: Restrict FOM
Assault Vignette Functional Tactics
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
F
F
D
RES
D
D
S
Enabling Function: Security ElementTask: ScreenPurpose: Isolate Battlefield
Enabling Function: Security ElementTask: ScreenPurpose: Isolate Battlefield
S S
S S
UNCLASSIFIED
UNCLASSIFIED
I(+)
Not to Scale
N
RES
S
S
F
F
D
RES
D
D
S
Enabling Function: Security ElementTask: ScreenPurpose: Isolate Battlefield
Enabling Function: Security ElementTask: ScreenPurpose: Isolate Battlefield
S S
S S
Enabling Function: Fires ElementTask: SuppressPurpose: Enable FOM
Enabling Function: Fixing ElementTask: FixPurpose: Enable FOM
Enabling Function: Fixing ElementTask: Disrupt; Task: FixPurpose: Enable FOM
Enabling Function: Fires ElementTask: DestroyPurpose: Achieve OBJ
Action Function: Assault ElementTask: DestroyPurpose: Achieve OBJ
BATTLE ZONE
DISRUPTIONZONE
SUPPORTZONE
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Action• Accomplishes the mission• How do I seize?
Enabling• Assists mission accomplishment• How do assist seizure?
Assault Element• T: Destroy C2• P: Gain key terrain
Fixing Element• T: Fix• P: Enable FOM
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Fixing Element• T: Fix and Disrupt• P: Enable FOM
Fires Element• T: Suppress• P: Enable FOM
Security Element• T: Screen• P: Isolate Battlefield
Security Element• T: Screen• P: Isolate Battlefield
• 1X Mech. INF PLT
• 1X Mech. INF SQD • 1X Mech. INF SQD • 3x120mm Mortar
• 2X Mech. INF SQD
• 1X Mech. INF SQD Battl
e Zo
neDisruption Zone
Supp
ort Z
one
Disr
uptio
n Zo
ne
Mission: Seize Crit. Infrastructure
Fires Element• T: Destroy• P: Restrict FOM• 1X UAV 54x Cutlass
Assault Vignette Functional Tactics
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Ambush
An ambush is a surprise attack from a concealed position used against moving or temporarily halted targets. (TC 7-100.2)
The purpose of an annihilation ambush is to destroy the enemy.
In an ambush, enemy action determines the time and the threat and the threat sets the location.
Ambushes may be conducted to— Destroy or capture personnel or supplies. Harass and demoralize the enemy. Delay or block logistics. Canalize enemy movement. …other mission tasks… Attacker selects location and means;
Victim determines time
Tactical Task 3.0 AmbushSubtasks:• Occupy ambush site• Isolate kill zone• Contain enemy• Destroy• Exfiltrate.
TC 7-101, Exercise Design, APP B
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Organization: AmbushTypical functional organization for an ambush: Action Element (Ambush). The mission to attack and
destroy enemy elements in the kill zone(s). Enabling Element (Support and Security). Has varied
functions, to include: fires (may include direct and indirect fires) command and control (C2) location of leader unless mission requires different
location combat support (CS) functions combat service support (CSS) functions
Provide early warning, isolates the ambush site, prevents the ambush elements from becoming decisively engaged, and covers withdrawal.
UNCLASSIFIED
UNCLASSIFIED
G
KILLZONE
Not to Scale
IED
G
N
KILL ZONE
KILL ZONE
KILL ZONE
G
G 60mmG
G
G
7.62mm G
82mm RGG
7.62mm G
12.7mmG
AT-13
IED
IED
IED
D
DD
D
D
Exfiltrate
Exfiltra
te
Exfiltrate
Exfiltrate
Exfiltrate
Exfiltrate Ambush Vignette
UNCLASSIFIED
UNCLASSIFIED
Ambush Vignette – Forces
From TC 7-100.4
Order of Battle (Guerilla Platoon)
Assault Elements
Supporting Elements
Security Elements
Functional Task Organization
G G G
G G
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Ambush Vignette - Build Forward
Starts with indicators, first thing someone may see on the
ground
Follows Appendix B OPFOR Tactical Task List subtask
sequence
Enabling Element(s) first; Action Element second
ID action form, executable task, and purpose
UNCLASSIFIED
UNCLASSIFIEDNot to Scale
N
KILLZONE
KILL ZONE
KILL ZONE
KILL ZONEKill Zone(s) selected
UNCLASSIFIED
UNCLASSIFIED
KILLZONE
KILL ZONE
KILL ZONE
KILL ZONE
Not to Scale
N
G
Enabling Function: Security ElementTask: Support by firePurpose: Isolate battlefield
Enabling Function: Security ElementTask: AmbushPurpose: Isolate battlefield
G
Isolate kill zone(s)
UNCLASSIFIED
UNCLASSIFIED
KILLZONE
KILL ZONE
KILL ZONE
KILL ZONE
Enabling Function: Security ElementTask: Support by firePurpose: Isolate battlefield
G
Not to Scale
N Enabling Function: Security ElementTask: AmbushPurpose: Isolate battlefield
G
G
Contain enemy movement within the area
UNCLASSIFIED
UNCLASSIFIED
KILLZONE
KILL ZONE
KILL ZONE
KILL ZONE
G
Not to Scale
IED
G
N
IED
60mmG
82mm RGG
G
IED
Enabling Function: Support ElementTask: SuppressPurpose: Contain Enemy
Enabling Function: Fires ElementTask: SuppressPurpose: Contain Enemy
IED
Position fires to support ambush elements
UNCLASSIFIED
UNCLASSIFIED
KILLZONE
KILL ZONE
KILL ZONE
KILL ZONE
Action Function: Ambush Element Task: Attack by FirePurpose: Destroy Enemy
G
Not to Scale
IED
G
N
IED
IED
IEDG
G 60mmG
G7.62mm G
82mm RGG
7.62mm G
12.7mmG
AT-13
Action Function: Ambush Element Task: Attack by FirePurpose: Destroy Enemy G
Position ambush elements
UNCLASSIFIED
UNCLASSIFIED
G
KILLZONE
Not to Scale
IED
G
N
KILL ZONE
KILL ZONE
KILL ZONE
IEDG
G 60mmG
G
G
7.62mm G
82mm RGG
7.62mm G
12.7mmG
AT-13
IED
IED
Target movement into Kill Zones initiates ambush
IED
UNCLASSIFIED
UNCLASSIFIED
G
KILLZONE
Not to Scale
IED
G
N
KILL ZONE
KILL ZONE
KILL ZONE
G
G 60mmG
G
G
7.62mm G
82mm RGG
7.62mm G
12.7mmG
AT-13
IED
D
DD
D
D
Exfiltrate
Exfiltra
te
Exfiltrate
Exfiltrate
Exfiltrate
Action and Enabling Function Elements: Task: ExfiltratePurpose: Achieved success and/or conservation of resources
Exfiltrate
Elements exfiltrate
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Ambush Element• T: Attack by Fire• P: Restrict FOM
Ambush Element• T: Attack by Fire• P: Restrict FOM
Ambush Element• T: Attack by Fire• P: Restrict FOM
Fires Element• T: Suppress• P: Contain Enemy
Support Element• T: Support by Fire• P: Contain Enemy
Security Element• T: Support by Fire• P: Isolate battlefield
Security Element• T: Ambush• P: Isolate battlefield
• 2X Guerilla Sections
• 3X Guerilla Sections
• 2X Guerilla Sections
• 1X Guer. Sect 60mm
• 1X Guer Sect 82mm
• 1X Guerilla Section
• 1X Guerilla Section
Kill
Zone
Supp
ort Z
one
Disr
uptio
n Zo
ne
Mission: Disrupt Enemy Logistics Resupply
Action• Accomplishes the mission• How do I disrupt?
Enabling• Assists mission accomplishment• How do assist disruption?
Ambush Vignette - Functional Tactics
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Raid
A raid is an attack against a stationary target for the purpose of
its capture or destruction that culminates in the withdrawal of
the raiding force to safe territory.
Tactical Task 2.0 RaidSubtasks:• Infiltrate• Isolate• Seize/Destroy• Exfiltrate.
TC 7-101, Exercise Design, APP B
UNCLASSIFIED
UNCLASSIFIED
Tent
Tent
TentTent
Tent
Tent
Ambush Vignette
SecurityElementObserver Security
ElementObserver
RaidingElement
VideographerSupportElement
SecurityElement
Security-SupportElement
Elements infiltrate
UNCLASSIFIED
UNCLASSIFIED
Tent
Tent
TentTent
Tent
Tent
SecurityElementObserver Security
ElementObserver
RaidingElement
VideographerSupportElement
SecurityElement
Security-SupportElement
Elements move to isolate the area
UNCLASSIFIED
UNCLASSIFIED
Tent
Tent
TentTent
Tent
Tent
SecurityElementObserver Security
ElementObserver
RaidingElement
VideographerSupportElement
SecurityElement
Security-SupportElement
Raiding element attacks, seizes assets
UNCLASSIFIED
UNCLASSIFIED
Tent
Tent
TentTent
Tent
Tent
SecurityElementObserver Security
ElementObserver
RaidingElement
VideographerSupportElement
SecurityElement
Security-SupportElement
Elements exfiltrate
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Raid Video
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Reconnaissance Attack
A reconnaissance attack is a tactical
offensive action that locates moving,
dispersed, or concealed enemy elements
and either fixes or destroys them.
However, the purpose can be to find the
enemy, but not attack them.
A reconnaissance attack may be used to
gain information about the enemy’s location,
dispositions, military capabilities, and
intentions.
Tactical Task 4.0 Reconnaissance AttackSubtasks:• Find• Isolate• Fix• Destroy.
TC 7-101, Exercise Design, APP B
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Functional Organization: Reconnaissance Attack
Action Element (Reconnaissance). Locates enemy elements operating in the area of responsibility or zone of reconnaissance responsibility.
Action Element (Raid). Uses a functional designation that describes its action task, such as raiding element, to defeat or destroy the enemy.
Enabling Element (Support and Security). Support capabilities can include command and control (C2), combat service support (CSS), supporting direct or indirect fires, mobility support, SPF, and/or INFOWAR.
Security works with reconnaissance elements when they exist or conducts reconnaissance independently to locate enemy elements, and is capable of isolating enemy by blocking enemy withdrawal/reinforcement and/or fixing the enemy.
Note. In these functions, it is a blocking, fixing, or ambush element.
!
UNCLASSIFIED
UNCLASSIFIEDNot to Scale
N
Zang River
G
G
G
G
Reconnaissance Attack Vignette
?? ?
?
Enabling Function: Recon ElementTask: GuardPurpose: Protect, Observe, & Report ENY
G
G
Enabling Function: Deception ElementTask: DemonstrationPurpose: Deceive ENY targeting
Static OPs & deception protect assets, start collection
INFOWAR
Enabling Function: Support ElementTask: Neutralize ENY ISR Purpose: Protection and Security
INFOWAR
UNCLASSIFIED
UNCLASSIFIEDNot to Scale
N
G
G
G
G
GG
Sapper
G
G
?? ?
?
Enabling Function: Recon ElementTask: ReconPurpose: Detect, Observe, & Report
G
GG
G
Recon elements infiltrate to find enemy locations, destroy OPs
UNCLASSIFIED
UNCLASSIFIEDNot to Scale
N
G
G
G
GG
G
G
?? ?
?
G
GG
G
Raid elements maneuver to positions, ready to act
on intelligence
Action Function: Raid ElementTask: Attack by FirePurpose: Gain key terrain
G
G
G
Action Function: Raid ElementTask: Attack by FirePurpose: Gain key terrain
G
G
G
UNCLASSIFIED
UNCLASSIFIEDNot to Scale
N
G
G
G
GG
G
G
?? ?
?
G
GG
G
F F
G Enabling Function: Fires ElementTask: SuppressPurpose: Enable FOM
G
G
G
G
G
G
Once enemy positions are identified, Raid and Fires
elements destroy
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Step 1: Identify Functions• Start with success • Action Element first; Enabling Element(s) second• ID action form, executable task, and purpose
Step 2: Allocate Resources
• Who can do this?• What do they need?
Step 3: Synchronize• Where do I have to be to employ capability?
Action• Accomplishes the mission• How do I ID?
Raid Element• T: Attack by fire• P: Gain key terrain
Mission: Conduct Recon Enabling• Assists mission accomplishment• How do assist ID and Prot. RED?
Recon Elements• T: Recon• P: Detect & Observe
Recon Elements• T: Guard• P: Obs., Prot., & Rep.
Decept. Elements• T: Demonstration• P: Deceive ENY ISR
•2x Guer PLT (1 ea sector)
•4x Guer PLT
• 5x OP (SQD-sized)
•1x Guer CO + INFOWAR
Disr
uptio
n Zo
ne
Supp
ort
Zone
Disr
uptio
n Zo
ne
Reconnaissance Attack – Functional Tactics
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Red-Speak Blue-SpeakMovement to ContactMovement to contact is an offensive task designed to develop the situation and to establish or regain contact . The goal is to make initial contact with a small element while retaining enough combat power to develop the situation and mitigate the associated risk. It may also include preliminary diversionary actions and preparation fires.
-ADP 3-90
Reconnaissance AttackA reconnaissance attack is a tactical offensive action that locates moving, dispersed, or concealed enemy elements and either fixes or destroys them. It may also be used to gain information. The reconnaissance attack may involve multiple security and assault elements. The subtasks for a reconnaissance attack are—
Find • Isolate • Fix • Destroy
TC 7-100.2 ¶3-193 or TC 7-101, appendix B
For Discussion
Recon, make sure main body not impeded Find forward elements so main effort can attack
?
!
?Security ElementAction
Element
Security Element
Security Element
F
1
2
3?
!
MAIN EFFORT 12
3
Victory Starts Here!
UNCLASSIFIED
UNCLASSIFIED
Questions?