FM 7-100.2 OPFOR Opposing Forces Tactics
FM 7-100.2 OPFOR Opposing Forces Tactics
OPFOR
Opposing Force
Tactics
Final Draft
September 2004
OPFOR
Opposing Force:
Tactics
FM 7-100.2
STATUS OF DRAFT
Note that the current update of FM 7-100.2 (September 04) is a Final Draft. It is
provided here in for any last comments from the field before we publish it.
MAXIE L. MCFARLAND
Deputy Chief of Staff for Intelligence
U.S. Army Training and Doctrine Command
Preface
This manual is one of a series that describes a contemporary Opposing Force
(OPFOR) for training U.S. Army commanders, staffs, and units. See the Refer-
ence section for a list of the manuals in this series. Together, these manuals out-
line an OPFOR than can cover the entire spectrum of military capabilities
against which the Army must train to ensure success in any future conflict.
Applications for this series of manuals include field training, training simula-
tions, and classroom instruction throughout the Army. All Army training venues
should use an OPFOR based on these manuals, except when mission rehearsal or
contingency training requires maximum fidelity to a specific country-based
threat. Even in the latter case, trainers should use appropriate parts of the
OPFOR manuals to fill information gaps in a manner consistent with what they
do know about a specific threat.
The proponent for this publication is HQ TRADOC. Send comments and recom-
mendations on DA Form 2028 directly to the OPFOR and Threat Integration Di-
rectorate of the TRADOC Office of Deputy Chief of Staff for Intelligence at the
following address: Director, OPFOR and Threat Integration Directorate, ATTN:
ATIN-T (Bldg 53), 700 Scott Avenue, Fort Leavenworth, KS 66027-1323.
This publication is available at Army Knowledge Online (AKO) at
http://www.us.army.mil and on the General Dennis J. Reimer Training and
Doctrine Digital Library (ADTDL) at http://www.adtdl.army.mil. Readers should
monitor those sites and also the TRADOC ADCSINT-Threats Knowledge Center
on AKO for the status of this manual and information regarding updates.
Periodic updates, subject to the normal approval process, will occur as a result of
the normal production cycle in accordance with TRADOC regulation 25-36,
paragraphs 2-17 and 4-7. The date on the cover and title page of the electronic
version will reflect the latest update.
Unless this publication states otherwise, masculine nouns or pronouns do not re-
fer exclusively to men.
v
FM 7-100.2 ________________________________________________________________________________
Introduction
This manual is part of the FM 7-100 series, which describes a contemporary
Opposing Force (OPFOR) that exists for the purpose of training U.S. forces
for potential combat operations. This OPFOR reflects the characteristics of
military and paramilitary forces that may be present in the contemporary
operational environment (COE). Like those real-world threats, the OPFOR
will continue to present new and different challenges for U.S. forces. The COE is
constantly changing, and it is important for U.S. Army training environments
to keep pace with real-world developments.
vi
______________________________________________________________________________ Introduction
CRITICAL VARIABLES
Any OE, in the real world or in the
training environment, can be defined Critical Variables of COE
in terms of eleven critical variables. Nature and Stability of the State.
While these variables can be useful in Regional and Global Relation-
describing the overall (strategic) ships.
environment, they are most useful in Economics.
defining the nature of specific OEs. Sociological Demographics.
Each of these conditions, Information.
circumstances, and influences and Physical Environment.
their possible combinations will vary Technology.
according to the specific situation. In External Organizations.
this sense, they are variables. These National Will.
variables are interrelated and
Time.
sometimes overlap. Different variables
will be more or less important in
different situations. Each OE is different, because the content of the variables is
different. Only by studying and understanding these variablesand incorporat-
ing them into its trainingwill the U.S. Army be able to keep adversaries from
using them against it or to find ways to use them to its own advantage.
vii
FM 7-100.2 ________________________________________________________________________________
Economics
The economic variable establishes the boundaries between the haves and the
have-nots. This gap of economic differences among nation-states and other ac-
tors can cause conflict. Economic superiority, rather than military superiority,
may be the key to power or dominance within a region. However, economic posi-
tion often represents a nation or non-state actors ability to buy military technol-
ogy or to conduct prolonged operations.
Economics help define the relationship between a nation or non-state actor and
other actors at the regional or global level. These regional or global economic re-
lationships could result in military or political assistance.
Sociological Demographics
The demographics variable includes the cultural, religious, and ethnic makeup of
a given region, nation, or non-state actor. Extreme devotion to a particular cause
or significant hatred of a particular group may provide an enemy with an un-
shakable will and a willingness to die for the cause. U.S. forces may also find
that large segments of the population around them are sympathetic to the same
cause as the enemy force. The needs of the local population can create heavy de-
mands on U.S. military units, particularly their supply and medical systems.
Refugees and internally displaced persons may increase the complexity of the
environment. The enemy may use civilians as shields or obstacles or as cover for
hostile intelligence services.
Information
Media and other information means can make combat operations transparent to
the world, visible to all who have access to data. Various actors seek to use per-
ception management to control and manipulate how the public sees things. They
will exploit U.S. mistakes and failures and use propaganda to sway the local
population to support their cause. Media coverage can impact on U.S. political
decision making, international opinion, or the sensitivities of coalition members.
Even without sophisticated sensors and information systems, actors native to the
area or region often have greater situational awareness than U.S. forces. Various
actors are able to access commercial systems (such as satellite communications
and imagery) for the larger picture. For a more detailed view, they can use hu-
man networks operating over normal telephone lines or with cellular telephones
to maintain situational awareness.
Physical Environment
The main elements in the physical environment are terrain and weather. Poten-
tial enemies clearly understand that less complex and open environments favor a
U.S. force with its long-range, precision-guided weapons and sophisticated re-
connaissance capability. So they will try to avoid the types of operations and en-
vironments for which such U.S. forces are optimized. They will try to operate in
urban areas and other complex terrain and in weather conditions that may ad-
versely affect U.S. military operations and mitigate technological advantages.
viii
______________________________________________________________________________ Introduction
Technology
The technology that nations or non-state actors can bring to the OE includes
what they can develop and produce, as well as what they could import. Access to
technological advances available on the global market is slowly eating away at
the technological advantage the United States has enjoyed in the past.
It is likely that some high-end forces in a particular region of the world could
field a few systems that are more advanced than those of the U.S. force deployed
there. Easy access to new technology allows potential adversaries to achieve
equality or even overmatch U.S. systems in selected niche areas. Many countries
are trying to acquire relatively low-cost, high-payoff, new technologies. In addi-
tion, upgrades and hybridization allow older systems to compete with more mod-
ern capabilities, thus neutralizing the technical advantage of many modern
forces. In urban areas or other complex terrain, less advanced systems may still
find effective uses. Various actors may find adaptive and innovative ways of us-
ing systems for other than their originally intended applications.
External Organizations
When the U.S. Army goes into a failed state or into areas torn by conflict, it is
likely to find international humanitarian relief organizations at work there.
These external organizations continue to grow in influence and power, as well as
in willingness to become involved in crisis situations that were previously purely
military operations. These external organizations can have both stated and hidden
interests and objectives that can either assist or hinder U.S. mission accomplish-
ment. The presence of transnational corporations operating in a country or region
can also place added pressure on U.S. forces to avoid collateral damage to civilian
life and property. U.S. forces may have to divert troops and resources from their as-
signed missions to conduct rescues or provide security for various external organiza-
tions.
National Will
The variable of national will reflects how much each countrys people and gov-
ernment are behind what the military or paramilitary forces are doing. This can
influence the objectives of a conflict, its duration, and the conditions for ending it.
A country will try to attack its opponents national will and still preserve its own.
Clearly, most foreign countries view U.S. national will as a point of vulnerability.
Thus, a potential adversary may perceive the collective will of his people as a
comparative advantage against the United States.
History has proven that battlefield victory does not always go to the best-trained,
best-equipped, and most technologically advanced force. Victory often goes to the
side that most wants to win, needs to win, and is willing to sacrifice to do so.
Time
In most cases, potential opponents of the United States view time as being in
their advantage. When U.S. forces have to deploy into the area over long time
and distance, the opponent can use this time to adjust the nature of the conflict
to something for which the U.S. forces are not prepared.
ix
FM 7-100.2 ________________________________________________________________________________
First, the opponent will try to control the entry of U.S. forces into the area. If ac-
cess control fails, the enemy still has the opportunity to oppose lightly equipped
U.S. early-entry units and try to prevent full deployment of the rest of the force.
The opponent will try to speed up the tempo, to rapidly defeat its local or re-
gional enemy or to defeat U.S. early-entry forces before the United States can
deploy overwhelming military power. If that fails, the opponent will try to pro-
long the conflict and to outlast the U.S. will to continue.
Military Capabilities
Military capabilities of a nation-state or non-state actor are measured in relative
terms, in comparison to the capabilities of other actors against which they might
be applied. Most of the military forces in the world continue to operate in conven-
tional ways, which remain sufficient against other local and regional actors.
However, once the United States becomes involved, these same military forces
may have to use adaptive or asymmetric approaches. Various nations and other
foreign entities around the world study the United States and its military forces.
They generally view the United States as a major powerthe worlds only super-
powerwith an overall advantage in technology and warfighting capability. De-
spite these strengths, other actors see some weaknesses that they may be able to
exploit. They can use these perceptions as a guide to optimizing the effectiveness
of their own forces and to find ways to negate current U.S. advantages.
Military capabilities may be the most critical and the most complex variable that
affects military operations. However, the military variable does not exist in isola-
tion from the other variables that help determine the overall OE. It interacts
with the other variables, and all the other variables can affect military capabilities.
Potential enemies can use any or all of these factors against the Army as it tries to
accomplish its missions in various parts of the world or in various training environ-
ments.
REAL WORLD
In the real world, the COE is the entire set of conditions, circumstances, and influ-
ences that U.S. Armed Forces can expect to face when conducting military opera-
tions to further the national interests of the United States, its friends, and allies.
The COE is contemporary in the sense that it does not represent conditions that
existed only in the past or that might exist only in the remote future, but rather
those conditions that exist today and in the clearly foreseeable, near future. This
COE consists not only of the military and/or paramilitary capabilities of potential
real-world adversaries, but also of the manifestations of the ten other variables that
help define any OE.
TRAINING
In training environments, the COE is the OE created to approximate the de-
mands of the real-world COE and to set the conditions for desired training out-
comes. This involves the appropriate combination of an OPFOR (with military
and/or paramilitary capabilities representing a composite of a number of potential
adversaries) and other OE variables in a realistic, feasible, and plausible manner.
x
______________________________________________________________________________ Introduction
The purpose of the COE in training simulations is to produce the necessary training
outcomes. 1
Even in the COE for training, it is possible to speak of an overall COE that ad-
dresses the qualities of virtually any OE in which the units or individuals being
trained might be called upon to operate. In this sense, there are the same con-
stants as in the real-world COE.
ENEMY
The U.S. Army defines enemy as the individual, group of individuals (organized
or not organized), paramilitary or military force, national entity, or national alli-
ance that is in opposition to the United States, its allies, or multinational partners.
1
The same type of COE conditions can be created to support some combat development activities that do not re-
quire simulation of a specific real-world potential adversary. However, some combat development activities may
require portrayal of an OE that extends further into the future than is typical for the COE.
xi
FM 7-100.2 ________________________________________________________________________________
In other words, the enemy is whoever is actually opposing the United States in a
particular conflict. 2 Thus, this term is synonymous with adversary or opponent.
THREAT
A potential adversary is sometimes designated as a threat. In this sense, the
Army defines threat as any specific foreign nation or organization with inten-
tions and military capabilities that suggest it could become an adversary or chal-
lenge the national security interests of the United States or its allies. Once hos-
tilities actually begin, the threat becomes the enemy.
OPPOSING FORCE
An Opposing Force (OPFOR) is a training tool that should allow the U.S. Army to
train against a challenging and plausible sparring partner that represents the wide
range of possible opponents the Army could face in actual conflict. It enables train-
ing of all arms of the Army and prepares the Army for potential combat operations. 3
During the road to war leading up to events in a training scenario, the OPFOR
may play the role of a threat (potential enemy) that is on the verge of becoming
an enemy. However, the actual training event usually deals with a state of hos-
tilities. Thus, once hostilities begin in the training event, the OPFOR acts as the
enemy of the U.S. force in the training environment. 4
During the Cold War period, the Army employed OPFORs based on specific real-
world threats. However, the Army needs a different type of OPFOR to meet its
training requirements for the COE.
2
This definition of enemy is from the U.S. point of view. After this Introduction, the chapters of this manual address
their topics from the OPFOR point of view. So, friendly refers to the OPFOR and its allies, and enemy refers to the
enemy of the OPFOR, which may be an opponent within its own country or region or an extraregional opponent
(normally the United States or a U.S.-led coalition).
3
Although the OPFOR is primarily a training tool, it may be used for other purposes. For example, some combat de-
velopment activities that do not require simulation of a specific real-world potential adversary may use an OPFOR to
portray the threat or enemy.
4
From the OPFOR point of view, its leadership plans and develops forces and methods to deal with one or more
threats to its own interests, goals, or survival.
xii
______________________________________________________________________________ Introduction
In its time, the threat-based OPFOR served the Army very well, particularly for
units targeted against specific threats. The benefits of this training were borne out,
for example, in Operation Desert Storm. Techniques and doctrine, including deep at-
tack and the intelligence preparation of the battlefield, developed to cope with spe-
cific threats and honed against the OPFOR, enabled the Army to achieve decisive
results on the battlefield. However, the OE is dynamic, and the pace of that dynamism
has increased with the end of the Cold War and the rapid advancement of informa-
tion technology.
Contemporary OPFOR
Training U.S. forces for the COE re- Contemporary OPFOR
quires a different kind of OPFOR from
that of the past. The contemporary A plausible, flexible military and/or
OPFOR must be less predictable and paramilitary force representing a
not based on the armed forces of a par- composite of varying capabilities of
ticular country. In todays world, the actual worldwide forces, used in
U.S. Army must be prepared to go into lieu of a specific threat force, for
any OE and perform its full range of training and developing U.S. forces.
missions. It must be ready to do so in
the face of a wide variety of possible threats and at the same time be prepared to
deal with third-party actors that may have other interests. Not all threats are
purely military in nature. Therefore, the U.S. Army now defines an OPFOR as a
plausible, flexible military and/or paramilitary force representing a composite of
varying capabilities of actual worldwide forces, used in lieu of a specific threat
force, for training and developing U.S. forces.
Thus, in some training environments, a military force alone may be the OPFOR.
In other cases, military forces may have paramilitary forces acting in loose af-
filiation with them, or acting separately from them within the same training en-
vironment. These relationships depend on the scenario, which is driven by train-
ing requirements.
Various agencies and experts have different lists of real-world threats the United
States might have to face. If the U.S. Army were to pick any one of these threats
as the threat against which to train, that threat would almost certainly not be
the one it would actually fight. What is needed is a composite that is representa-
tive of the full range and variety of possible threats and OEs. It must have a bit
of everythingit could be virtually anybody, anywhere. Therefore, this manual
defines this representative composite in a way that is flexible enough to fit the
most demanding U.S. Army training requirements and provides a framework for
training that creates the leaders, soldiers, and unit skills necessary for success
on the next battlefield.
xiii
FM 7-100.2 ________________________________________________________________________________
Of course, not all actors are threats. To be a threat, a nation or organization must
have both the capabilities and the intention to challenge the United States. The
capabilities in question are not necessarily purely military, but encompass all the
elements of power available to the nation or organization.
NATION-STATE ACTORS
Nation-states fall into four basic categories according to their roles in the inter-
national community. The categories are core states, transition states, rogue
states, and failed or failing states.
The category of core states includes more than half of the nearly 200 countries in
the world today. These are basically democratic (although to varying degrees)
and share common values and interests. Within this larger group, there is an
inner core of major powers. These are the advanced countries, including the
United States, that generally dominate world politics. Most conflict with global
consequences will involve the core states in some fashion or another.
Transition states are other larger, industrial-based countriesmostly emerging
regional powersthat are striving to become major powers. High-end transition
states are moving from an industrial-based society to an information-based soci-
ety. Low-end transition states are seeking to move from an agricultural-based so-
ciety to an industrial base. As states try to make this transition, there are cycles
of political stability and instability, and the outcome of the transition is uncer-
tain. Some transition states may successfully join the ranks of core states and
even become major powers within that context; others may become competitors.
Rogue states are those that are hostile to their neighbors or to core states inter-
ests. These countries can sponsor international terrorism or even confront U.S.
military forces operating in the region. Failed or failing states are fragmented in
such a way that a rule of law is absent; their instability is a threat to their neigh-
bors and the core states.
Countries can move from one category to another, as conditions change. Some-
times countries join together in multinational alliances and coalitions. Together,
they have more strength and can become a power to be reckoned with.
NON-STATE ACTORS
Non-state actors are those that do not represent the forces of a particular nation-
state. Such non-state elements include rogue actors as well as third-party actors.
Like rogue states, rogue actors are hostile to other actors; however, they may be
present in one country or extend across several countries. Examples include in-
surgents, guerrillas, mercenaries, and transnational or subnational political
movements. Particular sources of danger are terrorists and drug-trafficking or
criminal organizations, since they may have the best technology, equipment, and
weapons available, simply because they have the money to buy them. These non-
state rogue actors may use terror tactics and militarily unconventional methods
to achieve their goals.
Third-party actors may not be hostile to other actors. However, their presence,
activities, and interests can affect the ability of military forces to accomplish
their mission when operating in a foreign country. These third-party actors can
be refugees, internally displaced persons, and other civilians on the battlefield,
xiv
______________________________________________________________________________ Introduction
CONTEMPORARY OPFOR
This manual introduces the baseline tactical doctrine of a flexible, thinking,
adaptive, contemporary OPFOR that applies its doctrine with considerable ini-
tiative. (See the definition of contemporary OPFOR above.) It is applicable to the
entire training community, including the OPFORs at all of the combat training
centers (CTCs), the TRADOC schools, and units in the field. It provides an
OPFOR that believes that, through adaptive use of all available forces and capa-
bilities, it can create opportunities that, properly leveraged, can allow it to fight
and win, even against a technologically superior opponent such as the United
States.
BASELINE
As a baseline for developing specific OPFORs for specific training environments,
this manual describes an OPFOR that is representative of the forces of contem-
porary nation-states. This composite of the characteristics of real-world military
and paramilitary forces provides a framework for the realistic and relevant por-
trayal of capabilities and actions that U.S. armed forces might face in the COE.
For this composite of real-world threats, the manual refers to the country in
question as the State. 5 As the baseline for the contemporary OPFOR that is
representative of real-world forces, the State is not a peer competitor of the
United States. However, it is a dominant power in its region of the world and is
capable of challenging U.S. interests there. The general characteristics of the
State could fit a number of different types of potential adversaries in a number of
different scenarios.
Like most countries in the world, the State does not design its forces just to fight
the United States. It designs them principally to deal with regional threats and
to take advantage of regional opportunities. Therefore, the States national secu-
rity strategy (including its doctrine, force design, and investment strategy) fo-
5
In specific U.S. Army training environments, the generic name of the State may give way to other (fictitious)
country names such as Atlantis, Upper Flambokia, or Westland.
xv
FM 7-100.2 ________________________________________________________________________________
xvi
______________________________________________________________________________ Introduction
FLEXIBILITY
As a training tool, the OPFOR must be a challenging, uncooperative sparring
partner, capable of stressing any or all battlefield operating systems of the U.S.
force. However, it also must be tailored to meet training requirements.
In the OPFOR baseline presented in this manual, the FM authors often say that
the State or the OPFOR may be able to do something or might or could do
something. They often use the progressive forms of verbs to say that the State
has a growing economy or is developing a capability or is continually mod-
ernizing. The State participates in the global market, which can allow it to ac-
quire things it cannot produce domestically. Such descriptions give scenario
writers considerable flexibility in determining what the State or the OPFOR ac-
tually has at a given point in time or a given place on the battlefieldin a particu-
lar scenario.
The composite example of this baseline may meet the OPFOR requirements for
many U.S. Army training environments. For cases that require an OPFOR based
on a type of nation-state with characteristics different from those of the State de-
scribed in this manual, this baseline provides a framework from which trainers
can develop an OPFOR appropriate for their particular training requirements.
The OPFOR must be flexible enough to fit various training requirements. It must
be scalable and tunable. Depending on the training requirement, the OPFOR
may be a large, medium, or small force. Its technology may be state-of-the-art,
relatively modern, obsolescent, obsolete, or an uneven combination of those cate-
gories. Its ability to sustain operations may be limited or robust.
THINKING
This manual describes how the OPFOR thinks, especially how it thinks about
fighting its regional neighbors and/or the United States. This thinking deter-
mines basic OPFOR tacticsas well as strategy and operations, which are the
subjects of other manuals in this series. It drives OPFOR organizational struc-
tures and equipment acquisition or adaptation. It also determines how the na-
tion-state OPFOR that represents the armed forces of the State would interact
with other, non-state actors that may be present in the COE.
Just because the U.S. force knows something about how the OPFOR has fought
in the past does not mean that the OPFOR will always continue to fight that
way. A thinking OPFOR will learn from its own successes and failures, as well as
those of its potential enemies. It will adapt its thinking, its makeup, and its way
of fighting to accommodate these lessons learned. It will continuously look for in-
novative ways to deal with the United States and its armed forces.
ADAPTABILITY
Like all military forces, the OPFOR has a basic, conventional design for dealing
with forces with capabilities equal to or inferior to its own. Prior to a U.S. force
becoming involved, therefore, the OPFOR can use the application or threat of ap-
plication of that conventional design to dominate or influence its regional
neighbors. The OPFOR plans these operations well in advance and tries to exe-
cute them as rapidly as possible, in order to preclude regional alliances or outside
intervention.
xvii
FM 7-100.2 ________________________________________________________________________________
The OPFOR has developed its doctrine, force structure, and capabilities with an
eye toward employing them against both regional and extraregional opponents, if
necessary. It has thought about and trained for how to adapt once an extrare-
gional force becomes engaged. It has included this adaptability in its doctrine in
the form of general principles, based on its perceptions of the United States and
other threats to its goals and aspirations. It will seek to avoid types of operations
and environments for which U.S. forces are optimized. During the course of con-
flict, it will make further adaptations, based on experience and opportunity.
When a U.S. force or a U.S.-led coalition first begins to deploy into theater, the
OPFOR will seek to disrupt the deployment and thus create opportunity. In such
cases, the conventional design the OPFOR used in regionally-focused operations
may still provide the framework for military operations against an advanced ex-
traregional force. The OPFOR will not shy away from the use of military means
against such an opponent, so long as the risk is commensurate with potential
gains. As a U.S. or coalition force builds up power in the region, the OPFOR must
rely on adaptive applications of its basic design in order to mitigate its disadvan-
tages and exploit its advantages compared to this new opponent.
In general, the contemporary OPFOR will be less predictable than OPFORs in
the past. It will be difficult to template as it adapts and attempts to create oppor-
tunity. Its patterns of operation will change as it achieves success or experiences
failure. OPFOR doctrine might not change, but its way of operating will.
INITIATIVE
Like U.S. Army doctrine, OPFOR doctrine must allow sufficient freedom for bold,
creative initiative in any situation. OPFOR doctrine is descriptive, but not pre-
scriptive; authoritative, but not authoritarian; definitive, but not dogmatic. The
OPFOR that U.S. units encounter in various training venues will not apply this
doctrine blindly or unthinkingly, but will use its experience and assessments to
interpolate from this baseline in light of specific situations. Thus, U.S. units can
no longer say that the OPFOR has to do certain things and cannot do anything
that is not expressly prescribed in established OPFOR doctrine. Doctrine guides
OPFOR actions in support of the States objectives; OPFOR leaders apply it with
judgment and initiative.
xviii
Chapter 1
NATIONAL-LEVEL ORGANIZATION
1-1. The State intends to achieve its strategic goals and objectives through
the integrated use of four instruments of national power, which are interre-
lated and complementary:
Diplomatic-political.
Informational.
Economic.
Military.
A clear-cut line of demarcation between military, economic, and political mat-
ters does not exist. The informational element cuts across the other three.
Thus, the State believes that its national security strategy must include all
the instruments of national power, not just the military. Power is a combina-
tion of many elements, and the State can use them in varying combinations
as components of its overall national security strategy. See FM 7-100 for
more detail on these instruments of power and the State ministries associ-
ated with each.
1-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
PRESIDENT
MINISTER OF
NATIONAL
SECURITY
STRATEGIC
INTEGRATION
DEPARTMENT
GENERAL
STAFF
SUPREME
HIGH COMMAND
NATIONAL
COMMAND
AUTHORITY
MINISTRY OF
DEFENSE
SUPREME
HIGH COMMAND
GENERAL
STAFF
AIR
DEFENSE
FORCES
ARMED FORCES
1-4. The NCA exercises command and control of the States Armed Forces
via the Supreme High Command (SHC), which includes the Ministry of De-
fense (MOD) and a General Staff drawn from all the service components. (See
Figure 1-2.) In peacetime, the MOD and General Staff operate closely but
1-2
_________________________________________________________________________________Chapter 1
separately. The MOD is responsible for policy, acquisitions, and financing the
Armed Forces. The General Staff promulgates policy and supervises the ser-
vice components; its functional directorates are responsible for key aspects of
defense planning. During wartime, the MOD and General Staff merge to form
the SHC, which functions as a unified headquarters.
1-5. The State organizes its Armed Forces into six service components. The
Army is the largest of the six services, although it relies on mobilization of
reserve and militia forces to conduct sustained operations. These ground
forces, along with a relatively large Navy and Air Force, are sufficient to
dominate the States regional neighbors militarily. The Internal Security
Forces are subordinate to the Ministry of the Interior in peacetime, but are
resubordinated to the SHC as a sixth service in time of war.
1-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
change its position within the global community. These are the long-term
aims of the State. Supporting the overall, long-term, strategic goals, there may
be one or more specific goals, each based on a particular threat or opportunity.
Peace War
STRATEGIC OPERATIONS
Against Enemy Strategic Centers of Gravity
REGIONAL
OPERATIONS
TRANSITION
OPERATIONS
ADAPTIVE
OPERATIONS
Figure 1-3. Conceptual Framework for Implementing the States National Security Strategy
1-4
_________________________________________________________________________________Chapter 1
Strategic Operations
1-12. What the State calls strategic operations is actually a universal stra-
tegic course of action the State would use to deal with all situationsin
peacetime and war, against all kinds of opponents, potential opponents, or
neutral parties. The nature of strategic operations at any particular time cor-
responds to the conditions perceived by the NCA. Depending on the situation,
the State may first try to achieve its ends through strategic operations alone,
without having to resort to armed conflict. It may be able to achieve the desired
goal through pressure applied by other-than-military instruments of power, per-
haps with the mere threat of using its superior military power against a regional
opponent. These actions would fall under the general framework of strategic op-
erations.
1-13. Once war begins, the State will employ all means available against the
enemys strategic centers of gravity: diplomatic initiatives, information war-
fare (IW), economic pressure, terrorist attacks, State-sponsored insurgency,
direct action by SPF, long-range precision fires, and even weapons of mass
destruction (WMD) against selected targets. These efforts allow the enemy no
sanctuary and often place noncombatants at risk.
Regional Operations
1-14. When nonmilitary means are not sufficient or expedient, the State may
resort to armed conflict as a means of creating conditions that lead to the de-
sired end state. However, strategic operations continue even if a particular
regional threat or opportunity causes the State to undertake regional opera-
tions that include military means.
1-15. Prior to initiating armed conflict and throughout the course of armed
conflict with its regional opponent, the State would continue to use strate-
gic operations to preclude intervention by outside playersby other re-
gional neighbors or by an extraregional power that could overmatch the
States forces. However, the overall strategy always includes branches and
sequels for dealing with the possibility of intervention by an extraregional
power.
1-16. At the military level, regional operations are combined arms, joint, in-
teragency, and/or multinational operations. They are conducted in the States
1-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
region and, at least at the outset, against a weaker regional opponent. The
States doctrine, organization, capabilities, and national security strategy al-
low the OPFOR to deal with regional threats and opportunities primarily
through offensive action.
1-17. Regionally-focused operations typically involve conventional patterns
of operation. However, the term conventional does not mean that the OPFOR
will use only conventional forces and conventional weapons in such a conflict,
nor does it mean that the OPFOR will not use some adaptive approaches.
Transition Operations
1-18. When unable to limit the conflict to regional operations, the State is
prepared to engage extraregional forces through a series of transition and
adaptive operations. Usually, the State does not shift directly from regional
to adaptive operations. Thus, a period of transition operations overlaps both
regional and adaptive operations. The transition can begin concurrently with
regional operations. Transition operations allow the State to shift gradually
to adaptive operations or back to regional operations. At some point, the
State either seizes an opportunity to return to regional operations, or it
reaches a point where it must complete the shift to adaptive operations. Even
after shifting to adaptive operations, the State tries to set conditions for tran-
sitioning back to regional operations.
1-19. When an extraregional force starts to deploy into the region, the bal-
ance of power begins to shift away from the State. Although the State may
not yet be overmatched, it faces a developing threat it will not be able to han-
dle with normal, conventional patterns of operation designed for regional
conflict. Therefore, the State must begin to adapt its operations to the chang-
ing threat.
1-20. While the State and the OPFOR as a whole are in the condition of transi-
tion operations, an operational- or tactical-level commander will still receive a
mission statement in plans and orders from higher headquarters stating the
purpose of his actions. To accomplish that purpose and mission, he will use as
much as he can of the conventional patterns of operation that were available to
him during regional operations and as much as he has to of the more adaptive-
type approaches dictated by the presence of an extraregional force. Transition
operations serve as a means for the State to retain the initiative and still
pursue its overall strategic goal of regional expansion despite its diminishing
advantage in the balance of power.
1-21. There are two possible outcomes to transition operations. If the ex-
traregional force suffers sufficient losses or for other reasons must withdraw
from the region, the OPFORs operations may begin to transition back to re-
gional operations, again becoming primarily offensive. If the extraregional
force is not compelled to withdraw and continues to build up power in the re-
gion, the OPFORs transition operations may begin to gravitate in the other di-
rection, toward adaptive operations.
Adaptive Operations
1-22. Once an extraregional force intervenes with sufficient power to over-
match the State, the full conventional design used in regionally-focused op-
1-6
_________________________________________________________________________________Chapter 1
erations is no longer sufficient to deal with this threat. The State has devel-
oped its doctrine, organization, capabilities, and strategy with an eye toward
dealing with both regional and extraregional opponents. It has already
planned how it will adapt to this new and changing threat and has included
this adaptability in its doctrine.
1-23. The OPFOR still has the same forces and technology that were avail-
able to it for regional operations, but must use them in creative and adaptive
ways. It has already thought through how it will adapt to this new or
changing threat in general terms. (See Principles of Operation versus an
Extraregional Power below.) It has already developed appropriate branches
and sequels to its basic SCP and does not have to rely on improvisation. Dur-
ing the course of combat, it will make further adaptations, based on experi-
ence and opportunity.
1-24. Even with the intervention of an advanced extraregional power, the State
will not cede the initiative. It will employ military means so long as this does not
either place the regime at risk or risk depriving it of sufficient force to remain a
regional power after the extraregional intervention is over. The primary objec-
tives are to preserve combat power, to degrade the enemys will and capability to
fight, and to gain time for aggressive strategic operations to succeed.
1-25. The types of adaptive actions that characterize adaptive operations at
the strategic level can also serve the OPFOR well in regional or transition
operationsat least at the tactical and operational levels. However, once an
extraregional force becomes fully involved in the conflict, the OPFOR will
conduct adaptive actions more frequently and on a larger scale.
1-26. The State believes that adaptive operations can lead to several possible
outcomes. If the results do not completely resolve the conflict in the States
favor, they may at least allow the State to return to regional operations. Even
a stalemate may be a victory for the State, as long as it preserves enough of
its instruments of power to preserve the regime and lives to fight another
day.
STRATEGIC CAMPAIGN
1-27. To achieve one or more specific strategic goals, the NCA would develop
and implement a specific national strategic campaign. Such a campaign is the
aggregate of actions of all the States instruments of power to achieve a spe-
cific set of the States strategic goals against internal, regional, and/or ex-
traregional opponents. There would normally be a diplomatic-political cam-
paign, an information campaign, and an economic campaign, as well as a
military campaign. All of these must fit into a single, integrated national
strategic campaign.
1-28. The campaign could include more than one specific strategic goal. For
instance, any strategic campaign designed to deal with an insurgency would
include contingencies for dealing with reactions from regional neighbors or an
extraregional power that could adversely affect the State and its ability to
achieve the selected goal. Likewise, any strategic campaign focused on a goal
that involves the States invasion of a regional neighbor would have to take
into consideration possible adverse actions by other regional neighbors, the
1-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
possibility that insurgents might use this opportunity to take action against
the State, and the distinct possibility that the original or expanded regional
conflict might lead to extraregional intervention. Figure 1-4 shows an exam-
ple of a single strategic campaign that includes three strategic goals. (The
map in this diagram is for illustrative purposes only and does not necessarily
reflect the actual size, shape, or physical environment of the State or its
neighbors.)
Neutral Allied
Country Country Sea
t
res
f Un
ao
Are
al:
Hostile ic Go ency
g r g
ate nsu
Country Str nteri
u Strategic Goal:
Co
Defense Against Invasion
THE STATE
Strategic Goal:
Annexation of Territory
Sea
Sea
1-8
_________________________________________________________________________________Chapter 1
1-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Decision-Making Staff
Executing
(Plan-Approval) Planning Plan
Organizations
Authority Organization
Strategic Level
National
National Strategic
Strategic All State
Command Integration
Campaign Ministries
Authority Department
Plan
Military
Chief of Operations Strategic Armed
General Staff Directorate Campaign Forces
Plan
Theater Forces
Theater Operations
Campaign Allocated to
Commander Directorate
Plan Theater
Operational Level
Forces
Field Group Operations Operation
Allocated to
Commander Section Plan
Field Group
Forces
OSC Operations Operation
Allocated to
Commander Section Plan
OSC
Tactical Level
Forces
Tactical-Level Operations Allocated to
Battle Plan
Commander Section Tactical-Level
Command
1-10
_________________________________________________________________________________Chapter 1
Strategic Preclusion
1-40. Strategic preclusion seeks to completely deter extraregional involve-
ment or severely limit its scope and intensity. The State would attempt to
achieve strategic preclusion in order to reduce the influence of the extrare-
gional power or to improve its own regional or international standing. It
would employ all its instruments of power to preclude direct involvement by
the extraregional power. Actions can take many forms and often contain sev-
eral lines of operation working simultaneously.
1-41. The primary target of strategic preclusion is the extraregional powers
national will. First, the State would conduct diplomatic and perception man-
agement activities aimed at influencing regional, transnational, and world
opinion. This could either break apart ad hoc coalitions or allow the State to
establish a coalition of its own or at least gain sympathy. For example, the
State might use a disinformation campaign to discredit the legitimacy of dip-
lomatic and economic sanctions imposed upon it. The extraregional powers
economy and military would be secondary targets, with both practical and
symbolic goals. This might include using global markets and international fi-
nancial systems to disrupt the economy of the extraregional power, or con-
ducting physical and information attacks against critical economic centers.
Similarly, the military could be attacked indirectly by disrupting its power
projection, mobilization, and training capacity. Preclusive actions are likely
to increase in intensity and scope as the extraregional power moves closer to
military action. If strategic preclusion fails, the State will turn to operational
methods that attempt to limit the scope of extraregional involvement or cause
it to terminate quickly.
1-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Operational Exclusion
1-42. Operational exclusion seeks to selectively deny an extraregional force
the use of or access to forward bases of operation within the region or even
outside the theater defined by the NCA. For example, through diplomacy,
economic or political connections, information campaigns, and/or hostile ac-
tions, the State might seek to deny the enemy the use of bases in other foreign
nations. It might also attack population and economic centers for the intimida-
tion effect, using long-range surface-to-surface missiles (SSMs), WMD, or SPF.
1-43. Forces originating in the enemys homeland must negotiate long and
difficult air and surface lines of communication (LOCs) merely to reach the
region. Therefore, the State will use any means at its disposal to also strike
the enemy forces along routes to the region, at transfer points en route, at ae-
rial and sea ports of embarkation (APOEs and SPOEs), and even at their
home stations. These are fragile and convenient targets in support of transi-
tion and adaptive operations.
Access Limitation
1-44. Access limitation seeks to affect an extraregional enemys ability to in-
troduce forces into the theater. Access-control operations do not necessarily
have to deny the enemy access entirely. A more realistic goal is to limit or in-
terrupt access into the theater in such a way that the States forces are capa-
ble of dealing with them. By controlling the amount of force or limiting the
options for force introduction, the State can create conditions that place its
conventional capabilities on a par with those of an extraregional force. Capa-
bility is measured in terms of what the enemy can bring to bear in the thea-
ter, rather than what the enemy possesses.
1-45. The States goal is to limit the enemy accumulation of applicable com-
bat power to a level and to locations that do not threaten the accomplishment
of a strategic campaign. This may occur through many methods. For example,
the State may be able to limit or interrupt the enemys deployment through
actions against his aerial and sea ports of debarkation (APODs and SPODs)
in the region. Hitting such targets also has political and psychological value.
The State will try to disrupt and isolate enemy forces that are in the region or
coming into it, so that it can destroy them piecemeal. It might exploit and
manipulate international media to paint foreign intervention in a poor light,
decrease international resolve, and affect the force mix and rules of engage-
ment (ROE) of the deploying extraregional forces.
1-12
_________________________________________________________________________________Chapter 1
Dispersion.
Fortifications.
IW.
1-47. Operational shielding generally cannot protect the entire force for an
extended time period. Rather, the State will seek to protect selected elements
of its forces for enough time to gain the freedom of action necessary to prose-
cute important elements of a strategic campaign.
CONTROL TEMPO
1-48. The OPFOR initially employs rapid tempo to conclude regional opera-
tions before an extraregional force can be introduced. It will also use rapid
tempo to set conditions for access-control operations before the extraregional
force can establish a foothold in the region. Once it has done that, it needs to
be able to control the tempoto ratchet it up or down, as is advantageous to
its own operational or tactical plans.
1-49. During the initial phases of an extraregional enemys entry into the re-
gion, the OPFOR may employ a high operational tempo. Taking advantage of
the weaknesses inherent in enemy power projection, it seeks to terminate the
conflict quickly before main enemy forces can be brought to bear. If the
OPFOR cannot end the conflict quickly, it may take steps to slow the tempo and
prolong the conflict, taking advantage of enemy lack of commitment over time.
1-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
1-14
_________________________________________________________________________________Chapter 1
elements of the OPFOR will move out of sanctuaries and attack when they
can create a window of opportunity or when opportunity is presented by
physical or natural conditions that limit or degrade the enemys systems.
1-59. The OPFOR elements do not avoid contact; rather, they often seek con-
tact, but on their own terms. Their preferred tactics under these conditions
would be the ambush and raid as a means of avoiding decisive combat with
superior forces. They will also try to mass fires from dispersed locations to
destroy key enemy systems or formations. However, when an opportunity
presents itself, the OPFOR can rapidly mass forces and execute decisive com-
bat at the time and place of its choosing.
ALLOW NO SANCTUARY
1-60. Along with dispersion, decoys, and deception, the OPFOR uses urban
areas and other complex terrain as sanctuary from the effects of enemy
forces. Meanwhile, its intent is to deny enemy forces the use of such terrain.
This forces the enemy to operate in areas where the OPFORs long-range fires
and strikes can be more effective.
1-61. The OPFOR seeks to deny enemy forces safe haven during every phase
of a deployment and as long as they are in the region. It is prepared to attack
enemy forces anywhere on the battlefield, as well as to his strategic depth.
The resultant drain on manpower and resources to provide adequate force-
protection measures can reduce the enemys strategic, operational, and tacti-
cal means to conduct war and erode his national will to sustain conflict. The
goal is to present the enemy with a nonlinear, simultaneous battlefield. Such
actions will not only deny the enemy sanctuary, but also weaken his national
will, particularly if the OPFOR or affiliated forces can strike targets in the
enemys homeland.
OPERATIONAL-LEVEL ORGANIZATION
1-62. In peacetime, tactical-level commands belong to parent organizations in
the administrative force structure. In wartime, they typically serve as part of
a field group (FG) or an OSC. In rare cases, they might also fight as part of
their original parent units from the administrative force structure.
FIELD GROUP
1-63. A field group is the largest operational-level organization, since it has
one or more smaller operational-level commands subordinate to it. An FG is a
grouping of subordinate organizations with a common headquarters, a com-
mon AOR, and a common operation plan. FGs are always joint and inter-
agency organizations and are often multinational. However, this level of
command may or may not be necessary in a particular SCP. An FG may be
organized when the span of control at theater level exceeds four or five sub-
ordinate commands. This can facilitate the theater commanders remaining
focused on the theater-strategic level of war and enable him to coordinate ef-
fectively the joint forces allocated for his use.
1-64. The General Staff does not normally form standing FG headquarters,
but may organize one or more during full mobilization, if necessary An FG
can be assigned responsibilities in controlling forces in the field during adap-
1-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
1-16
_________________________________________________________________________________Chapter 1
OPERATION PLAN
1-69. Operational-level commands prepare operation plans to control execu-
tion of their portion of an SCP. The operation plan must
Optimally allocate forces and resources to each mission.
Provide concrete methods to coordinate the actions of maneuver, fire
support, and logistics support.
Provide for a specific sequence and methods for conducting each sub-
task required to assure mission success.
From the completed operation plan, the operational-level staff creates opera-
tional directives or combat orders to inform subordinates of their missions,
roles, and time requirements for executing the plan. Tactical-level subordi-
nates create their own battle plans and combat orders for their missions
within the operation plan.
1-70. The operation plan details the commanders thinking and reflects the
input of various subordinates and staff elements according to their functional
responsibilities. It normally includes the following specific areas:
Assessment of the enemy situation and probable intentions.
Scope, aim, and concept of operations.
Organization of forces.
Organization of the battlefield.
Results of force analysis.
Plan for commitment of reserves.
Missions of subordinate units.
Missions of supporting and adjacent units.
Plan for logistics support.
Locations of command posts.
1-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
BATTLEFIELD GEOMETRY
1-73. The OPFOR organizes the battlefield in such a way that it can rapidly
transition between offensive and defensive operations and between linear
and nonlinear operations. This flexibility can help the OPFOR adapt and
change the nature of the conflict to something for which the enemy is not
prepared.
1-74. The OPFOR recognizes the complexity of the modern battlefield. This
will often lead to situations where part of the OPFOR may be able to effec-
tively operate in a linear fashion, while other parts may be able to (or need
to) conduct nonlinear operations. The OPFORs understanding of what makes
a battlefield linear or nonlinear is based on general military theory accepted
by the armed forces of many countries. Battlefield geometry can be described
in two dimensions: the relationship of units to each other, the enemy, and
their support base; and the expected effects of that relationship.
LINEAR OPERATIONS
1-75. Some military operations that develop along a secure line from a base
toward a geographically-based objective. These linear operations are charac-
terized by an easily definable front and rear across the entire force. Orienta-
tion of the bulk of the force is in one general direction, defined as the front,
normally facing the enemy and/or the objective. (See Figure 1-6.) During lin-
ear operations, the flanks of units are normally protected by other units,
natural terrain features, or manmade obstacles.
1-18
_________________________________________________________________________________Chapter 1
Rear Front
X
Base
Objective
X
Enemy
Objective X
Enemy
Base Enemy
Objective
NONLINEAR OPERATIONS
1-76. Military operations that seek to complete a force- or systems-based
mission, with no secure connection to a base and no easily defined front and
rear across the force, are nonlinear. Orientation of the force is determined by
the location of the immediate threat or the objective. (See Figure 1-7.) In
most cases, units in a nonlinear environment rely on movement, deception,
cover, and concealment to provide protection for potentially exposed ele-
ments.
1-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
EXPECTED EFFECTS
1-77. The OPFOR considers the difference between linear and nonlinear op-
erations less in terms of geography and more in terms of effects desired. Lin-
ear operations normally produce small effects from small actions and large ef-
fects from large actions (or perhaps large effects from an aggregation of small
actions)a linear relationship. Linear operations are proportional and addi-
tive, and produce and typically produce a predictable, measurable effect. In
contrast, this relationship may not always be present in nonlinear operations,
which can produce large effects from small actions. In some cases, small ac-
tions produce small effects or no effects at all. Thus, nonlinear operations
produce disproportionate, often unpredicted effects.
SYSTEMS WARFARE
1-78. The OPFOR defines a system as a set of different elements so connected
or related as to perform a unique function not performable by the elements or
components alone. The essential ingredients of a system include the compo-
nents, the synergy among components and other systems, and some type of
functional boundary separating it from other systems. Therefore, a system of
systems is a set of different systems so connected or related as to produce re-
sults unachievable by the individual systems alone. The OPFOR views the
operational environment, the battlefield, the States own instruments of
power, and an opponents instruments of power as a collection of complex,
dynamic, and integrated systems composed of subsystems and components.
1-79. Systems warfare serves as a conceptual and analytical tool to assist in
the planning, preparation, and execution of warfare. With the systems ap-
proach, the intent is to identify critical system components and attack them
in a way that will degrade or destroy the use or importance of the overall sys-
tem.
PRINCIPLE
1-80. The primary principle of systems warfare is the identification and iso-
lation of the critical subsystems or components that give the opponent the
capability and cohesion to achieve his aims. The focus is on the disaggrega-
tion of the system by rendering its subsystems and components ineffective.
While the aggregation of these subsystems or components is what makes the
overall system work, the interdependence of these subsystems is also a poten-
tial vulnerability. Systems warfare has applicability or impact at all three
levels of warfare.
1-20
_________________________________________________________________________________Chapter 1
COMBAT LOGISTICS
FORCES FORCES
Examples: Examples:
Tanks, Transportation,
IFVs/APCs, Ammunition,
Infantry Fuel,
Rations,
Maintenance,
COMBAT Medical
SYSTEM
COMBAT C2 AND
SUPPORT
FORCES RISTA
Examples: Examples:
Artillery, Headquarters,
SSMs, Signal Nodes,
Air Defense, Satellite Downlinks,
Engineers, Reconnaissance Sensors
Direct Air Support
Combat System
1-85. A combat system (see Figure 1-8) is the system of systems that results
from the synergistic combination of four basic subsystems that are integrated
to achieve a military function. The subsystems are as follows:
Combat forces (such as main battle tanks, IFVs and/or APCs, or infantry).
1-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
1-22
_________________________________________________________________________________Chapter 1
nerable. Therefore, the OPFOR can greatly reduce a military forces combat
power by attacking a logistics system that depends on just-in-time delivery.
1-90. For the operational commander, the systems warfare approach to com-
bat is not an end in itself. It is a key component in his planning and sequenc-
ing of tactical battles and engagements aimed toward achieving assigned
strategic goals. Systems warfare supports his concept; it is not the concept.
The ultimate aim is to destroy the enemys will and ability to fight.
1-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
gree of control the OPFOR has over these organizations varies from absolute,
in the case of the Internal Security Forces, to tenuous when dealing with ter-
rorist and drug and criminal organizations. In the case of those organizations
not formally tied to the OPFOR structure, control can be enhanced through
the exploitation of common interests and ensuring that these organizations
see personal gain in supporting OPFOR goals.
1-97. The OPFOR views the creative use of these organizations as a means of
providing depth and continuity to its operations. A single attack by a terrorist
group will not in itself win the war. However, the use of paramilitary organi-
zations to carry out a large number of planned actions, in support of strategy
and operations, can play an important part in assisting the OPFOR in achiev-
ing its goals. These actions, taken in conjunction with other adaptive actions,
can also supplement a capability degraded due to enemy superiority.
1-24
Chapter 2
In modern war, victory is likely to go to the side that acts most quickly.
The overriding need for speedy decisions to seize fleeting opportunities
drastically reduces the time available for decision making and for issuing
and implementing orders. The need to seize opportunities on the battle-
field, coupled with dispersion to avoid the threat of precision weapons,
dictates the replacement of concentration in terms of space by concentra-
tion in terms of time and effects. Moreover, the tactical situation is sub-
ject to sudden and radical changes, and the results of combat are more
likely to be decisive than in the past. OPFOR C2 participants, processes,
and systems are designed to operate effectively and efficiently in this new
environment. The successful execution of an information warfare (IW)
plan is critical to victory.
This chapter focuses on tactical command and control. All OPFOR levels
of command share a common decision-making and planning process. They
also share a parallel staff organization and command post (CP) structure,
tailored to match the differences in scope and span of control.
CONCEPT
2-1. The OPFORs Tactical C2 concept is based on the following key princi-
ples.
2-2. Mission tactics. OPFOR tactical units focus on the purpose of their
tactical missions and continue to act on that purpose even when the details of
an original plan have become irrelevant through enemy action or unforeseen
events.
2-3. Flexibility through battle drill. The OPFOR does not see battle drill Formatted: Bullets and Numbering
as a restrictive methodology. Rather, it believes that true flexibility comes
from soldiers in tactical units understanding basic battlefield functions to
such a degree that they are second nature. Only when common battlefield
functions can be performed rapidly without further guidance or orders do tac-
tical commanders achieve the flexibility to modify the plan on the move.
2-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2-4. Accounting for mission dynamics. The OPFOR recognizes that en-
emy action and battlefield conditions may make the originally selected mis-
sion irrelevant and require an entirely new mission be acted upon without an
intermediate planning session. An example would be an OPFOR fixing force
that finds itself the target of an enemy fixing action. To continue solely as a
fixing force would actually assist the enemy in achieving its mission. In this
case, the OPFOR unit might choose to re-task organize on the move and allo-
cate a part of the fixing force to the exploitation force and use a smaller
amount of combat power to keep the enemy fixing force from being able to in-
fluence the fight. OPFOR tactical headquarters constantly evaluate the
situation to determine if the mission being executed is still relevant, and if
not, to advise the commander on how best to shift to a relevant course of ac-
tion. It requires the commander at each level of command to act flexibly, ex-
ercising his judgment as to what best meets and sustains the aim of his supe-
rior.
2-2
_________________________________________________________________________________Chapter 2
Constituent
2-10. Constituent units are those forces assigned directly to a unit and form-
ing an integral part of it. They may be organic to the table of organization
and equipment of the administrative structure forming the basis of a given unit,
assigned at the time the unit was created, or attached to it after its formation.
Dedicated
2-11. Dedicated is a command relationship identical to constituent with the
exception that a dedicated unit still receives logistics support from a parent
headquarters of similar type. An example of a dedicated unit would be the
case where a specialized unit, such as an attack helicopter company, is allo-
cated to a BTG. The base brigade does not otherwise possess the technical
experts or repair facilities for the aviation units equipment, the dedicated re-
lationship permits the company to execute missions exclusively for the BTG
while still receiving its logistics support from its parent organization. In
OPFOR plans and orders, the dedicated command and support relationship is
indicated by (DED) next to a unit title or symbol.
Supporting
2-12. Supporting units retain a command and logistics relationship with
their parent headquarters, but are positioned and given mission priorities by
their supported headquarters. This relationship permits supported units the
freedom to establish priorities and position supporting units while allowing
higher headquarters to rapidly shift support in dynamic situations. An ex-
ample of a supporting unit would be an MRL battalion supporting a BTG for
a particular phase of an operation but ready to rapidly transition to a differ-
ent support relationship when the BTG becomes the DTG reserve in a later
phase. In OPFOR plans and orders, the supporting command and support re-
lationship is indicated by (SPT) next to a unit title or symbol.
Affiliated
2-13. Affiliated organizations are those operating in a units AOR that the
unit may be able to sufficiently influence to act in concert with it for a limited
time. No command relationship exists between an affiliated organization
and the unit in whose AOR it operates. Affiliated organizations are typically
nonmilitary or paramilitary groups such as criminal cartels, insurgencies,
2-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
TACTICAL-LEVEL ORGANIZATIONS
2-14. OPFOR tactical organizations fight battles and engagements. They exe-
cute the combat actions described in the remainder of this manual.
Divisions
2-15. In the OPFORs administrative force structure, the largest tactical for-
mation is the division. Divisions are designed to be able to
Sustain independent combat operations over a period of several days.
Exert control over an important geographic area or medium-size urban
area (population 20,000 to 100,000).
Integrate interagency forces up to brigade or group size.
Accept constituent flame weapons, artillery (cannon and rocket), engi-
neer, air defense, chemical defense, antitank, medical, logistics, signal,
and electronic warfare (EW) units.
Accept dedicated and supporting surface-to-surface missile (SSM), Spe-
cial-Purpose Forces (SPF), aviation (combat helicopter, transport heli-
copter) and unmanned aerial vehicle (UAV) units. A division may ac-
cept these type units as constituent if it is also allocated their essential
logistics support.
Execute all of the actions discussed in this manual.
Serve as the basis for forming a division tactical group (DTG), if neces-
sary. (See discussion of Tactical Groups below.)
Fight as part of an OSC or an organization in the administrative force
structure (such as army or military region) or as a separate unit in an
FG.
Maneuver Brigades
2-16. The OPFORs basic combined arms unit is the maneuver brigade. In
the administrative force structure, maneuver brigades are typically constitu-
ent to divisions, but some are organized as separate brigades with a greater
ability to accomplish independent missions without further allocation of
forces. Maneuver brigades are designed to be able to
Sustain independent combat operations over a period of 1 to 3 days.
Exert control over a small geographic area or small urban area (popu-
lation 1,000 to 20,000).
Integrate interagency forces up to battalion size.
Accept constituent flame weapons, artillery (cannon and rocket), engi-
neer, air defense, antitank, logistics, and signal units.
2-4
_________________________________________________________________________________Chapter 2
1
Any division or brigade receiving additional assets from a higher command becomes a DTG or BTG. Therefore,
2
references to C of a DTG or BTG throughout the remainder of this chapter may also apply to division or brigade,
respectively, unless specifically stated otherwise.
2-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
DTG
INTERAGENCY
COMPANIES UNITS IFC ISC
AFFILIATED
FORCES
BTG
INTERAGENCY AFFILIATED
UNITS FORCES
2-6
_________________________________________________________________________________Chapter 2
2-19. The division that serves as the basis for a DTG may have some of its
brigades task organized as BTGs. However, just the fact that a division be-
comes a DTG does not necessarily mean that it forms BTGs. A DTG could
augment all of its brigades, or one or two brigades, or none of them as BTGs.
A division could augment one or more brigades into BTGs, using the divi-
sions own constituent assets, without becoming a DTG. If a division receives
additional assets and uses them all to create one or more BTGs, it is still des-
ignated as a DTG.
Battalions
2-20. In the OPFORs force structure, the basic unit of action is the battalion.
Battalions are designed to be able to
Execute basic combat missions as part of a larger tactical force.
Exert control over a small geographic area or village-sized urban area
(population 100 to 1000).
Execute all of the tactical actions discussed in this manual.
Plan for operations expected to occur 6-24 hours in the future.
Serve as the basis for forming a detachment (DET), if necessary. (See
discussion of detachments below.)
Fight as part of an BTG or DTG.
2-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
MECHANIZED
INFANTRY
BN (IFV)
Companies
2-21. In the OPFORs force structure, the largest unit without a staff is the
company. Companies are designed to be able to
Execute tactical tasks. A company will not normally be asked to per-
form two or more tactical tasks simultaneously. OPFOR tactical tasks
are listed in Appendix A.
Exert control over a very small geographic area or small village-sized
urban area (population 1-300).
Serve as the basis for forming a detachment (DET), if necessary. (See
discussion of detachments below.)
Fight as part of a battalion, or BTG.
2-8
_________________________________________________________________________________Chapter 2
ANTITANK
GUN
BATTERY
MOTOR
BATTERY CONTROL FIRING
TRANSPORT
HQ SECTION PLATOON SECTION
Platoons
2-22. In the OPFORs force structure, the smallest unit typically expected to
conduct independent fire and maneuver is the platoon. Platoons are de-
signed to be able to
Execute tactical tasks. A platoon will not be asked to perform two or
more tactical tasks simultaneously. OPFOR tactical tasks are listed in
Appendix A.
Exert control over a small riot/crowd/demonstration.
Serve as the basis for forming a reconnaissance or fighting patrol.
Fight as part of a company, battalion, or detachment.
Historical Designations
2-23. The terms regiment, squadron, troop, and battery are historical desig-
nations without any further implied meaning. In this manual, the use of the
common term for a unit type will include any historical designations for a
unit of the same size. (See Figure 2-4.)
Regiment Brigade
Squadron Battalion
2-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Detachment
2-10
_________________________________________________________________________________Chapter 2
DET
DET
Element
Patrol
2-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2
Based on mission requirements, the commander may also allocate maneuver forces to the IFC. This is most often
2
done when he chooses to use the IFC CP to provide C for a strike, but can also be done for the execution of other
missions.
2-12
_________________________________________________________________________________Chapter 2
2-34. A combat order normally defines AORs and zones by specifying bound-
ary lines in terms of distinct local terrain features through which a line
passes, specifying whether each terrain feature is included or excluded from
the units AOR or zones within it. Normally, a specified terrain feature is in-
cluded unless the order identifies it as excluded. For example, the left
boundary of a units AOR could run from hill 108, to hill 250 (excluded), to
junction of roads 52 and 98.
Areas of Responsibility
2-35. OPFOR organizations are given a specific area of responsibility. An
OPFOR AOR is the geographical area and associated airspace within which a
commander has the authority to plan and conduct combat operations.
2-36. An AOR is bounded by a limit of responsibility (LOR) beyond which the
organization may not operate or fire without coordination through the next-
higher headquarters. AORs may be linear or nonlinear in nature. Linear
AORs may contain subordinate nonlinear AORs and vice versa.
2-37. A higher commander may retain control of airspace over a lower com-
manders AOR. This is done through the use of standard airspace control
measures.
Zones
2-38. AORs typically consist of three basic zones: battle, disruption, and sup-
port. An AOR may also contain one or more attack and/or kill zones. The
various zones in an AOR have the same basic purposes within each type of of-
fensive and defensive action (see Chapters 3 and 4). Zones may be linear or
nonlinear in nature. The size of these zones depends on the size of the
OPFOR elements involved, engagement ranges of weapon systems, the ter-
rain, and the nature of the enemys operation. Within the LOR, the OPFOR
normally refers to two types of control lines. The support line separates the
support zone from the battle zone. The battle line separates the battle zone
from the disruption zone.
2-39. An AOR is not required to have any or all of these zones in any particu-
lar situation. A command might have a battle zone and no disruption zone. It
might not have a battle zone, if it is the disruption force of a higher com-
mand. If it is able to forage, it might not have a support zone. The intent of
this method of organizing the battlefield is to preserve as much flexibility as
possible for subordinate units within the parameters that define the aim of
the senior commander. An important feature of the basic zones in an AOR is
the variations in actions that can occur within them in the course of a specific
battle.
2-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
BTG
LOR
Attack Zone
Axis Objective
Kill
Zone
Battalion
AOR
BTG
2-14
_________________________________________________________________________________Chapter 2
BTG Battalion
Battle Line Attack
Zone Objective
BTG
Support Line
BTG
Objective BTG
Battle Zone
Disruption
Axis Zone
Support
Zone
Battalion
AOR
BTG
Zo l
ne
Kil
Disruption
Zone
BTG
Disruption
Zone
BTG
LOR
2-40. Disruption Zone. The disruption zone is the AOR of the disruption
force. The disruption zone is that geographical area and airspace in which
the units disruption force will conduct disruption operations. It is where the
OPFOR will set the conditions for successful combat actions by fixing enemy
forces and placing long-range fires on them. Units in this zone begin the at-
tack on specific components of the enemy combat system, to begin the disag-
gregation of that system. Successful actions in the disruption zone will create
a window of opportunity that is exploitable in the battle zone. For example,
attacking enemy engineer elements can leave his maneuver force unable to
continue effective operations in complex terrainexposing them to destruc-
tion by forces in the battle zone. The disruption force also strips away the en-
emys reconnaissance assets while denying him the ability to acquire and en-
gage OPFOR targets with deep fires. This includes an air defense effort to
deny aerial attack and reconnaissance platforms from targeting OPFOR
forces. Disruption zones may be contiguous, noncontiguous, or layered.
2-41. Battalions and below do not typically have their own disruption zones,
but may be conducting operations within the disruption zone of a higher
command.
2-42. Disruption operations are the deliberate conduct of missions in support
of the overall tactical task: disrupt. Disruption operations are comprised of
five key actions:
Initiating systems attack
Destroying enemy reconnaissance.
2-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2-43. The disruption zone is bounded by the battle line and the LOR of the
overall AOR. In linear offensive combat, the higher headquarters may move
this LOR forward as the force continues successful offensive actions. Thus,
the boundaries of the disruption zone will also move forward during the
course of a battle. The higher commander can push the disruption zone for-
ward or outward as forces adopt a defensive posture while consolidating
gains at the end of a successful offensive battle and/or prepare for a subse-
quent offensive battle.
2-44. Battle Zone. The battle zone is the portion of the AOR where the
OPFOR expects to conduct decisive operations. Using all elements of combat
power, the OPFOR will engage the enemy and defeat him in this zone. The
battle zone is where the OPFOR will engage the enemy in close combat to
achieve tactical decision. Forces in the battle zone will exploit opportunities
created by actions in the disruption zone. The linkage of these tactical suc-
cesses to the operation plan allows the accomplishment of operational and/or
strategic objectives.
2-45. In the battle zone, the OPFOR is typically trying to accomplish one or
more of the following:
Create a penetration in the enemy defense through which exploitation
forces can pass.
Draw enemy attention and resources to the action.
Seize terrain.
Inflict casualties on a vulnerable enemy unit.
Prevent the enemy from moving a part of his force to impact OPFOR
actions elsewhere on the battlefield.
2-46. A DTG does not always form a DTG-level battle zone per sethat zone
may be the aggregate of the battle zones of its subordinate units. In nonlin-
ear situations, there may be multiple, noncontiguous brigade or BTG battle
zones, and within each the DTG would assign a certain task to the unit
charged to operate in that space. The brigade or BTG battle zone provides
each of those subordinate unit commanders the battlespace in which to frame
his actions.
2-47. The battle zone is separated from the disruption zone by the battle line
and from the support zone by the support line. The commander may adjust
the location of these lines in order to accommodate successful offensive ac-
tion. In a linear situation, those lines can shift forward during the course of a
successful attack. Thus, the battle zone would also shift forward.
2-16
_________________________________________________________________________________Chapter 2
2-48. Battalion and below units often have AORs that are almost entirely
battle zones with a small support zone contained within.
2-49. Support Zone. The support zone is that area of the battlespace de-
signed to be free of significant enemy action and to permit the effective logis-
tics and administrative support of forces. Security forces will operate in the
support zone in a combat role to defeat enemy special operations forces. Cam-
ouflage, concealment, cover, and deception (C3D) measures will occur
throughout the support zone to protect the force from standoff RISTA and
precision attack. A DTG support zone may be dispersed within the support
zones of subordinate brigades or BTGs, or the DTG may have its own support
zone that is separate from subordinate AORs. If the battle zone moves during
the course of a battle, the support zone would move accordingly. The support
zone may be in a sanctuary that is noncontiguous with other zones of the
AOR.
2-50. Attack Zone. An attack zone is given to a subordinate unit with an of-
fensive mission, to delineate clearly where forces will be conducting offensive
maneuver. Attack zones are often used to control offensive action by a subor-
dinate unit inside a larger defensive battle or operation.
2-51. Kill Zone. A kill zone is a designated area on the battlefield where the
OPFOR plans to destroy a key enemy target. A kill zone may be within the
disruption zone or the battle zone. In the defense, it could also be in the sup-
port zone.
2-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
COMMANDER
Command Group
Deputy
Commander
Commanders of
Chief Subordinate
of Forces
Staff
Primary Staff
Secondary Staff
Chief of Chief of
Airspace
Communications Operations
Functional Staff
2-18
_________________________________________________________________________________Chapter 2
Command Group
2-54. The command group consists of the commander, deputy commander
(DC), and chief of staff. Together, they direct and coordinate the activities of
the staff and of subordinate forces.
2-55. Commander. The commander directs subordinate commanders and,
through his staff and liaison officers, controls any supporting elements.
OPFOR commanders have complete authority over their subordinates and
overall responsibility for those subordinates actions. This centralized author-
ity enables the commander to maintain troop discipline and unity and to act
decisively. Under the fluid conditions of modern warfare, even in the course
of carefully planned actions, the commander must accomplish assigned mis-
sions on his own initiative without constant guidance from above.
2-56. The commander is responsible for the combat capability of subordinate
units, the organization of combat actions, the maintenance of uninterrupted
C2, and the successful conduct of combat missions. He examines and analyzes
the mission he receives (that is, he determines his forces place in the senior
commanders concept of the battle or operation). He may do this alone or
jointly with the chief of staff. He then gives instructions to the chief of staff
on preparing his forces and staff for combat. He also provides instructions
about the timing of preparations. The commander makes his own assessment
of intelligence data supplied by the chief of reconnaissance. Then, with advice
from the primary staff officers, he makes an assessment of his own forces. Af-
ter discussing his deductions and proposals with the operations officer and
his staff, the commander reaches a decision, issues combat missions to sub-
ordinates, and gives instructions about planning the battle. He then directs
coordination within his organization and with adjacent forces and other ele-
ments operating in his AOR.
2-57. During the course of combat, the commander must constantly evaluate
the changing situation, predict likely developments, and issue new combat
missions in accordance with his vision of the battlefield. He also keeps his
superiors informed as to the situation and character of friendly and enemy
actions and his current decisions.
2-58. Deputy Commander. In the event the commander is killed or inca-
pacitated, the DC would assume command. Barring that eventuality, the
primary responsibility of the DC of a DTG or division is to command the IFC.
As IFC commander, he is responsible for executing tactical-level fire support
in a manner consistent with the commanders intent.
2-59. Chief of Staff. Preeminent among OPFOR staff officers is the chief of
staff position (found at every level from the General Staff down to battalion).
He exercises direct control over the primary staff. During combat, he is in
charge of the main CP when the commander moves to the forward CP. He
has the power to speak in the name of the commander and DC, and he nor-
mally countersigns all written orders and combat documents originating from
the commanders authority. He alone has the authority to sign orders for the
commander or DC and to issue instructions in the commanders name to sub-
ordinate units. In emergency situations, he can make changes in the tasks
given to subordinate commanders. Thus, it is vital that he understands not
merely the commanders specific instructions but also his general concept
2-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
and train of thought. He controls the battle during the commanders ab-
sences.
2-60. The chief of staff is a vital figure in the C2 structure. His role is to serve
as the director of staff planning and as coordinator of all staff inputs that as-
sist the commanders decision making. He is the commanders and DCs focal
point for knowledge about the friendly and enemy situation. He has overall
responsibility for providing the necessary information for the commander to
make decisions. Thus, he plays a key role in structuring the overall recon-
naissance effort, which is a combined arms task, to meet the commanders in-
formation requirements.
Staff
2-61. A staff provides rapid, responsive planning for combat activity, and
then coordinates and monitors the execution of the resulting plans on behalf
of the commander. Proper use of this staff allows the commander to focus on
the most critical issues in a timely manner and to preserve his energies.
2-62. The staff releases the commander from having to solve administrative
and technical problems, thereby allowing him to concentrate on the battle.
The primary function of the staff is to plan and prepare for combat. Evalua-
tion and knowledge of the situational elements of combat is fundamental to
the decision-making process and the direction of troops. After the commander
makes the decision, the staff must organize, coordinate, disseminate, and
support the missions of subordinates. Additionally, it is their responsibility to
train and prepare troops for combat, and to monitor the pre-combat and com-
bat situations.
2-63. In the decision-making and planning process, the staff
Prepares the data and estimates the commander uses to make a deci-
sion.
Plans and implements the basic measures for comprehensive support
of a combat action.
Organizes communications with subordinate and adjacent headquar-
ters and the next-higher staff.
Monitors the activities of subordinate staffs.
Coordinates ongoing activity with higher-level and adjacent staffs dur-
ing a battle or operation.
2-64. The staff consists of three elements: the primary staff, the secondary
staff, and the functional staff. Figure 2-12 depicts the primary, secondary,
and functional staff officers of a DTG or division headquarters; it does not show
the liaison teams, which support the primary, secondary, and functional staff.
2-20
_________________________________________________________________________________Chapter 2
2-66. Operations Officer. The operations officer heads the operations sec-
tion, and conducts planning and prepares plans and orders. Thus, the opera-
tions section is the principal staff section. It includes current operations, fu-
ture operations, and aerospace operations subsections, as well as the functional
staff.
2-67. The operations officer also serves as deputy chief of staff. He is respon-
sible for training and the formulating of plans and orders. He monitors the
work of all other staff sections, remains knowledgeable of the current situa-
tion, and is ready to present information and recommendations concerning
the situation. He writes combat orders and important combat reports. In co-
ordination with the information section, the operations officer keeps the
commander informed on the progress of the battle and the overall operation.
Specific duties of the operations section include
Assisting the commander in the making and execution of combat deci-
sions.
Collecting information concerning the situation of friendly forces.
Preparing and disseminating orders, plans and reports, summaries,
and situation overlays.
Providing liaison for the exchange of information within the headquar-
ters and with higher, subordinate, and adjacent units.
Organizing the main CP.
Organizing troop movement and traffic control.
Coordinating the organization of reconnaissance with the information
section.
2-68. The chief of current operations is a secondary staff officer who proac-
tively monitors the course of current operations and coordinates the actions
of forces to ensure execution of the commanders intent. He serves as the rep-
resentative of the commander, chief of staff, and operations officer in their
absence and has the authority to control forces in accordance with the battle plan.
2-69. The chief of future operations is a secondary staff officer who heads the
planning staff and ensures continuous development of future plans and pos-
sible branches, sequels, and contingencies. While the commander and the
chief of current operations focus on the current battle, the chief of future op-
erations and his subsection monitor the friendly and enemy situations and
their implications for future battles. They try to identify any developing
situations that require command decisions and/or adaptive measures. They
advise the commander on how and when to make adjustments to the battle
plan during the fight. Planning for various contingencies and anticipated opportu-
nities can facilitate immediate and flexible response to changes in the situation.
2-70. The chief of airspace operations (CAO) is a secondary staff officer who
is responsible for the control of the DTGs airspace. See Chapters 9 and 10 for
further information on his duties.
2-71. Intelligence Officer. The intelligence officer heads the intelligence
and information section, which consists of the reconnaissance subsection, the
IW subsection, and the communications subsection. The intelligence officer is
2-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2-22
_________________________________________________________________________________Chapter 2
Working with the operations staff to ensure that targets scheduled for
destruction support the IW plan, and if not, resolving conflicts between
IW needs and operational needs.
Recommending to the intelligence officer any necessary actions re-
quired to implement the IW plan.
2-75. The chief of communications develops a communications plan for the
command that is approved by the intelligence officer and chief of staff. He or-
ganizes communications with subordinate, adjacent, and higher headquar-
ters. The communications subsection plans the use of all forms of communi-
cations, to include satellite communications (SATCOM), wire, radio, digital,
cellular, and couriers, to ensure that the commander has continuous and un-
interrupted control. Specific responsibilities of the communications subsec-
tion include
Establishing SATCOM and radio nets.
Establishing call signs and radio procedures.
Organizing courier and mail service.
Operating the commands message center.
Supervising the supply, issue, and maintenance of signal equipment.
2-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2-79. The chief of administration supervises all personnel actions and trans-
actions in the DTG. His subsection maintains daily strength reports; records
changes in table of organization and equipment of units in the administrative
force structure; assigns personnel; requests replacements; records losses; admin-
isters awards and decorations; and collects, records, and disposes of war booty.
Functional Staff
2-80. The functional staff consists of experts in a particular type of military
operation or function. (See Figure 2-13.) These experts advise the command
group and the primary and secondary staff on issues pertaining to their indi-
vidual areas of expertise. The functional staff consists of the following ele-
ments:
Integrated fires.
Force protection.
Special operations.
Weapons of mass destruction (WMD).
Population management.
Infrastructure management.
2-24
_________________________________________________________________________________Chapter 2
Operations
Officer
Chief of Chief of
Population Infrastructure
Management Management
2-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Liaison Teams
2-88. Liaison teams support brigade and division staffs (as well as those of
tactical groups and detachments) with detailed expertise in the mission areas
of their particular branch or service and provide direct communications to
subordinate and supporting units executing missions in those areas. Liaison
team leaders speak for the commanders of their respective units. Liaison
teams to DTGs and divisions are organized with a liaison team leader, two
current operations officers or senior NCOs, and two plans officers or senior
NCOs. This gives liaison teams the ability to conduct continuous operations
and simultaneously execute current plans and develop future plans. The staff
will also receive liaison teams from multinational and interagency subordi-
nates and from affiliated forces.
Command Group
2-90. The BTG or brigade command group consists of the commander, DC,
and chief of staff. The primary difference is that the DC does not serve as IFC
commander, since there is no IFC at this level of command.
2-91. Commander. Brigade commanders typically spend more of the fight-
ing at the forward CP or with subordinate units than division commanders.
Much more of the brigade commanders fight is the direct fire battle.
2-92. Deputy Commander. At the brigade (and below) the DC is not also
the commander of the IFC, as IFCs do not exist at those levels.
2-93. Chief of Staff. At brigade level, the chief of staff position retains all
the characteristics of the division CofS position.
2-26
_________________________________________________________________________________Chapter 2
Staff
2-94. BTG and brigade staffs are naturally smaller and less capable than
DTG and division staffs. In particular, the sections responsible for planning
are much reduced, providing the BTG or brigade with the ability to plan com-
bat actions only 24 to 48 hours into the future.
2-95. Another key difference from the DTG or division staff is that the func-
tional staff is organized differently. A BTG or brigade functional staff con-
sists of the following elements:
Fire support.
Force protection.
WMD.
Population management.
Infrastructure management.
There is no chief of integrated fires or functional staff element for integrated
fires at the BTG or brigade level, since this level of command has no IFC.
However, the staff at brigade level does include a chief of fire support. Fire
support is controlled by the FSCC.
2-96. Brigades do not prepare IW plans of their own, per se. The brigade
performs limited deception tasks of its own but primarily it executes its por-
tion of an overall IW plan prepared by its parent division or OSC. The intel-
ligence officer, through his IW chief, must effectively task organize his staff
resources to conduct and execute IW in a manner that supports the overall
IW plan. He is responsible for the coordination of all necessary national or
theater-level assets in support of the IW plan that are under the control of
his brigade.
Command Group
2-98. The battalion command group consists of the commander, the deputy
commander, their vehicle drivers and RTOs. In maneuver units where the
battalion command group employ combat vehicles, the command group may
include vehicle gunners as well. Often a staff officer or NCO from the opera-
tions and/or intelligence section accompanies the battalion command group
on the battlefield.
2-99. The battalion commander positions himself where he can best influence
the critical action on the battlefield. The deputy commander is typically su-
pervising the execution of the battalions second most critical operation and
separate from the BC so that both are not killed by the same engagement.
Staff
2-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2-100. At battalion level, the staff consists of two elements: the primary staff
and the secondary staff. There is no functional staff below BTG level. Fig-
ure 2-13 depicts the staff of a combat battalion headquarters and the liaison
teams which support it.
2-101. At battalion, typically each member of the primary staff heads a small
staff section consisting of themselves and two other soldiers of the correct
specialty. Two staff NCOs serve as day and night shift leaders in the main
command post. The leaders of the battalions specialty platoons serve in a
staff command role to coordinate key battlefield functions. Liaison teams
from other units are attached to the operation section.
The battalion staff has the mission to coordinate battlefield functions and to
anticipate the battalions needs 6-12 hours into the future. It supports the
commander in the completion of combat orders and ensures his intent is be-
ing executed. It is not capable of executing long-range planning or support-
ing complex, joint or interagency operations without augmentation.
Staff Command
2-102. At brigade level and above, the OPFOR does not use the concept of
commanders of combat support units acting as senior staff officers. But at
battalion, in order to streamline staff functions, the OPFOR relies on com-
manders of supporting arms units to exercise staff supervision over their ar-
eas.
2-103. At battalion level, the reconnaissance platoon leader serves as the
chief of reconnaissance, the signal platoon leader serves as the chief of com-
munications and the material support platoon leader as the chief of logistics.
The chiefs of reconnaissance and communications coordinate with the main
and forward command posts and the chief of logistics operates the battalion
trains.
2-104. The OPFOR will only employ staff command functions :
In secondary staff areas (admin, logistics, recon, communications,
aerospace ops)
With commanders who have sufficient control over the area that the
additional staff supervision functions are not a serious burden to
their command responsibilities
2-28
_________________________________________________________________________________Chapter 2
COMMANDER
Command Group
Deputy
Commander
Commanders of
Chief Subordinate
of Forces
Staff
Primary Staff
Secondary Staff
Aviation Liaison
Officer
COMMAND POSTS
2-105. The OPFOR plans to exercise tactical control over its wartime forces
from an integrated system of CPs. It has designed this system to ensure un-
interrupted control of forces.
2-106. CPs are typically formed in three parts: a control group, a support
group, and a communications group. The control group includes members of
the command group and staff. The support group consists of the transport
and logistics elements. Whenever possible, the communications group is re-
moted from the control and support groups, because of its large number of
2-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
signal vans, generators, and other special vehicles that would provide a
unique signature.
2-107. Because the OPFOR expects its C2 to come under heavy attack in war-
time, its military planners have created a CP structure that emphasizes sur-
vivability through dispersal, stringent security measures, redundancy, and
mobility. They have constructed a CP system that can sustain damage with
minimum disruption to the actual C2 process. In the event of disruption, they
can quickly reestablish control. This extensive system of CPs extends from
the hardened command facilities of the National Command Authority to the
specially designed command vehicles from which OPFOR tactical command-
ers control their units. Tactical CPs and most operational-level CPs have
been designed to be very mobile and smaller than comparable enemy CPs.
The number, size, and types of CPs depend on the level of command.
2-30
_________________________________________________________________________________Chapter 2
Basic Special
Sustainment CP
Deception CP
Alternate CP
Auxiliary CP
Airborne CP
Forward CP
Main CP
IFC CP
Trains
Level of
Command
Company
2-109. For brevity, OPFOR plans and orders may use acronyms for the vari-
ous types of CP. Thus, main CP may appear as MCP, integrated fires com-
mand CP as IFC CP, forward CP as FCP, sustainment CP as SUSCP, trains
as TR, airborne CP as AIRCP, alternate CP as ALTCP, auxiliary CP as
AUXCP, and deception CP as DCP.
2-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Trains
2-117. The battalions material support platoon leader creates the battalion
trains from his platoon HQ and other assets constituent to his unit. The
trains is the focal point of the battalions logistic effort. Companies that are
executing logistic operations away from the battalion may also form trains
for a limited time from their own logistics assets.
2-32
_________________________________________________________________________________Chapter 2
2-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
distance from the control and support groups. Because of dispersion in a mo-
bile environment, CPs are often responsible for their own local ground de-
fenses.
2-124. During the movement of a main CP, the OPFOR maintains continuity
of control by handing over control to either the forward or airborne CP or,
more rarely, to the alternate CP. Key staff members often move to the new
location by helicopter to reduce the time spent away from their posts. Before
any move, headquarters troops carefully reconnoiter and mark the new loca-
tion. Engineer preparation provides protection and concealment.
2-34
_________________________________________________________________________________Chapter 2
2-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
COMMUNICATIONS
2-132. The chief characteristics of communications supporting the C2 struc-
ture are security, survivability, and flexibility. In the OPFOR view, centrali-
zation of operational planning is a prerequisite to achieving the flexibility re-
quired to ensure timely concentration of forces and fires. Redundancy in
equipment, as well as communications links and CPs, is the primary means
of ensuring the control structures security and survivability.
2-133. The organization of communications to meet operational and tactical
requirements is the responsibility of the commander at each level. Prior to
combat, the chief of communications, under the personal direction of the in-
telligence officer, prepares the communications plan. After approval by the
chief of staff, it becomes an annex to the combat order for implementation by
subordinate signal units. OPFOR communications reflect the concern of
commanders to maintain uninterrupted C2, flexibility, and security.
Signal Assets
2-134. Communication systems employed include
Manportable high-frequency (HF) and very-high-frequency (VHF) ra-
dios.
HF radio stations.
VHF and ultra-high-frequency (UHF) multichannel radio relay.
Super-high-frequency (SHF) troposcatter systems.
Satellite communications (SATCOM).
Wire and cable (landline as far forward as possible).
Commercial communications networks (including cellular, microwave,
radio, wire, digital, and satellite)
Local area networks (LANs) and wide area networks (WANs).
Internet and Intranet.
Encrypted communications are common from brigade upward, but may ex-
tend to the lowest levels in modernized OPFOR units.
2-36
_________________________________________________________________________________Chapter 2
gence, direction finding, and communications jamming. Also, wire and cable
are often not practical in fast-moving situations.
2-139. During periods of radio silence or disruption of radio communications,
the OPFOR employs messengers, liaison officers, and visual and sound sig-
nals. Messengers are the preferred method for delivering combat orders at
any time. Representatives from the staff may observe and supervise the exe-
cution of orders. Whenever possible, the OPFOR prefers personal contact be-
tween commanders (or their representatives) and subordinates.
Communications Nets
2-140. C2 of OPFOR organizations relies on extensive and redundant com-
munications. The OPFOR primarily uses UHF/SHF SATCOM, radio relay
multichannel, HF radio stations, HF and VHF single-channel radios, and
wire or cable.
2-141. Tactical commands operate two command nets. The commander nor-
mally controls the primary command net from the forward CP, while the
chief of staff maintains control of the alternate net from the main CP. De-
pending on the distances involved, the primary net may be either HF or
VHF. All of the commands constituent and dedicated units monitor the
command nets. The DTG or division IFC CP also monitors the command
nets.
2-142. The operations officer maintains an operations net monitored by the
commander, subordinate and supporting units, and any alternate or auxil-
iary CP created. The resources officer also monitors this net from the sustain-
ment CP.
2-143. The DTG or division DC, as IFC commander, maintains the integrated
fires net. This net is monitored by the elements of the IFC.
2-144. The resources officer maintains the support net. Materiel support,
maintenance, and medical units monitor this net. Subordinate combat arms
units may also use this net when requiring additional, immediate assistance
that constituent support assets are unable to provide.
2-145. The chief of reconnaissance maintains an intelligence net, monitored
by reconnaissance units, maneuver units, the commander, DC, chief of staff,
and resources officer.
2-146. The CAO maintains the airspace control net for the purpose of control-
ling the commands airspace. Elements on this net include aviation units, air
defense assets, and army aviation liaison teams.
2-147. When required, the commander will create a special mission net,
monitored by the chief of staff, that is employed to control the activities of
units conducting a special mission, such as a reconnaissance detachment or
an airborne or heliborne landing force deployed behind enemy lines. Specific
communications systems employed are dependent on the depth and type of
mission.
2-148. The command maintains an air defense and NBC warning communi-
cations net, monitored by all constituent, dedicated, and supporting units.
This net is used for passing tactical alerts, NBC, and air warning notices.
2-37
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
The chief of staff maintains a watch on the division-level warning nets at the
main CP; he then disseminates warning where appropriate.
2-149. The command establishes multichannel links between the main and
sustainment CPs and the CPs of subordinate units. These links are used for
high-capacity voice and data transmissions. The DTG also establishes mul-
tichannel links between the main and sustainment CPs.
2-150. The primary responsibility for maintaining communications of a tacti-
cal command with its parent headquarters rests with the main CP. With the
larger staffs and greater communications capabilities of the main CP, the
commander is allowed to focus more on the actual conduct of the battle from
the forward CP. Obviously, when staff members, such as the CAO or chief of
reconnaissance, accompany the commander, they will establish control over
their respective nets as required.
2-151. The chief of IW may also control one or more deception nets designed
to mislead enemy signals intelligence analysis. Integrated into the IW plan
are a description of these nets and procedures for their use.
Procedures
2-152. Before making contact with the enemy, most radio and radio-relay
systems maintain a listening watch with transmission forbidden or strictly
controlled. OPFOR units usually observe radio silence when defending or de-
parting assembly areas. During radio silence, wire and courier are the pri-
mary communications means. While moving toward the enemy, units nor-
mally limit radio transmissions to various code words informing commanders
they have accomplished assigned tasks or have encountered unexpected diffi-
culties. The OPFOR also uses visual signals, such as flags and flares, to a
great extent during movement. Usually only the commander and reconnais-
sance elements have permission to transmit.
2-153. In the offense, OPFOR units maintain radio silence until the outbreak
of battle, when those authorized to transmit may do so without restriction.
When contact with the enemy occurs, units initiate normal radio procedures.
Subordinate commanders inform the commanderusually by code
wordwhen they reach objectives, encounter NBC contamination, make con-
tact with the enemy, or have important information to report.
2-38
_________________________________________________________________________________Chapter 2
Mobility
2-156. C2 elements must be highly mobile, due to the emphasis on maintain-
ing combat at a rapid tempo. Because of their proximity to the enemy, CPs
and supporting communications must frequently relocate to avoid detection
and subsequent destruction.
2-157. CPs are usually mobile (that is, in vehicles) but may also be fixed. By
emphasizing the use of multiple, mobile CPs, planners minimize the disrup-
tion of C2 that would occur with the enemys destruction of this element of
the C2 structure. Highly mobile signal units employing transportable com-
munications equipment support mobile CPs. This gives OPFOR commanders
great flexibility in organizing and deploying their C2 elements. Thus, they
are able to provide effective control in varied situations.
Redundancy
2-158. The OPFOR has built extensive redundancy into the C2 structure.
Multiple CPs are fielded as low as possible. For communications between lev-
els of command, multiple communications types are employed. Providing a
variety of single- and multichannel links, these systems operate over a wide
frequency spectrum.
2-39
Chapter 3
Offense
The offense carries the fight to the enemy. The OPFOR sees this as the de-
cisive form of combat and the ultimate means of imposing its will on the en-
emy. While conditions at a particular time or place may require the OPFOR
to defend, defeating an enemy force ultimately requires shifting to the of-
fense. Even within the context of defense, victory normally requires some
sort of offensive action. Therefore, OPFOR commanders at all levels seek to
create and exploit opportunities to take offensive action, whenever possible.
3-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Security operations such as screen, guard and cover may have one or more
attacks to gain freedom of movement as a component of their scheme of ma-
neuver.
ATTACK TO DISLOCATE
An attack to dislocate is used to prevent the enemy from being able to execute
an optimal course of action. Attacks to dislocate often have a strong informa-
tion warfare (IW) component. Dislocation attacks typically focus on a key en-
emy capability or vulnerability. Tactical tasks associated with dislocation are
ambush, disrupt, interdict and neutralize.
3-6. Offensive actions during transition and adaptive operations will not be
able to rely simply on massing combat power at a decisive point. Such actions
will typically include
Increased use of infiltration.
3-2
_________________________________________________________________________________Chapter 3
3-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Disruption Force
3-17. In the offense, the disruption force would typically include the disrup-
tion force that already existed in a preceding defensive situation (see Chapter
3-4
_________________________________________________________________________________Chapter 3
4). It is possible that forces assigned for actions in the disruption zone in the
defense might not have sufficient mobility to do the same in the offense or
that targets may change and require different or additional assets. Thus, the
disruption force might require augmentation. A DTG disruption force is typi-
cally a BTG, while a BTG disruption force is typically an independent mis-
sion detachment (IMD).
3-18. Battalions and below often serve as disruption forces for BTGs. Typi-
cally, this mission is complex enough for them to be task organized as de-
tachments.
Fixing Force
3-19. OPFOR offensive operations are founded on the concept of fixing enemy
forces so that they are not free to maneuver. The OPFOR recognizes that
units and soldiers can be fixed in a variety of ways. For example
They find themselves without effective communication with higher
command.
Their picture of the battlefield is unclear.
They are (or believe they are) decisively engaged in combat.
They have lost mobility to complex terrain, obstacles, or weapons of
mass destruction (WMD).
3-20. In the offense, planners will identify which enemy forces need to be
fixed and the method by which they will be fixed. They will then assign this
responsibility to a force that has the capability to fix the required enemy
forces with the correct method. The fixing force may consist of a number of
units separated from each other in time and space, particularly if the enemy
forces required to be fixed are likewise separated. A fixing force could consist
entirely of affiliated irregular forces. It is possible that a discrete attack on
logistics or C2 (or other systems) could fix an enemy without resorting to de-
ploying large fixing forces.
3-21. Battalions and below often serve as fixing forces for BTGs and are also
often capable of performing this mission without significant task organiza-
tion. This is particularly true in those cases where simple suppressive fires
are sufficient to fix enemy forces.
Assault Force
3-22. The assault force is charged with creating the conditions that allow the
exploitation force the freedom to operate. In order to create a window of op-
portunity for the exploitation force to succeed, the assault force may be re-
quired to operate at a high degree of risk and may sustain substantial casu-
alties. However, an assault force may not even make contact with the enemy,
but instead conduct a demonstration.
3-23. Battalions and below serving as an assault force are often required to
breaching or obstacle clearing operations, but it is important to remember
that the requirements laid on the assault force are tied directly to the type
and mission of the exploitation force.
3-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
3-24. Within a detachment, the force that seizes an enemy position is often
termed an assault element. This is not precisely the same as the concept
behind assault force. An assault element has the mission of seizing an en-
emy held position.
Exploitation Force
3-25. The exploitation force is assigned the task of achieving the objective of
the mission. It typically exploits a window of opportunity created by the as-
sault force. However, effective IW, a mismatch in system capabilities, or even
the enemys own dispositions may create a situation in which the exploitation
force is able to achieve the objective without a formal assault force.
Security Force
3-26. The security force conducts activities to prevent or mitigate the effects
of hostile actions against the overall tactical-level command and/or its key
components. If the commander chooses, he may charge this security force
with providing force protection for the entire AOR, including the rest of the
functional forces; logistics and administrative elements in the support zone;
and other key installations, facilities, and resources. The security force may
include various types of unitssuch as infantry, SPF, counter-
reconnaissance, and signals reconnaissance assetsto focus on enemy spe-
cial operations and long-range reconnaissance forces operating throughout
the AOR. It can also include internal security forces units allocated to the
tactical-level command, with the mission of protecting the overall command
from attack by hostile insurgents, terrorists, and special operations forces.
The security force may also be charged with mitigating the effects of WMD.
Deception Force
3-27. When the IW plan requires combat forces to take some action (such as
a demonstration or feint), these forces will be designated as deception forces
in close-hold executive summaries of the plan. Wide-distribution copies of the
plan will refer to these forces according to the designation given them in the
deception story.
Reserves
3-28. At the commanders discretion, forces may be held out of initial action
so that he may influence unforeseen events or take advantage of developing
opportunities. OPFOR offensive reserve formations will be given priorities in
terms of whether the staff thinks it most likely that they will act as a fixing,
assault, or exploitation force. The size and composition of an offensive reserve
is entirely situation-dependent.
3-6
_________________________________________________________________________________Chapter 3
ESTABLISH CONTACT
3-34. The number one priority for all offensive actions is to gain and main-
tain contact with key enemy forces. As part of the decision-making process,
the commander and staff identify which forces must be kept under watch at
all times. The OPFOR will employ whatever technical sensors it has at its
disposal to locate and track enemy forces, but the method of choice is ground
reconnaissance. It may also receive information on the enemy from the civil-
ian populace, local police, or affiliated irregular forces.
3-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
MAINTAIN CONTACT
3-39. The OPFOR will go to great lengths to ensure that its forces maintain
contact with key elements of the enemy force throughout the battle. This in-
cludes rapid reconstitution of reconnaissance assets and units and the use of
whatever combat power is necessary to ensure success.
3-8
_________________________________________________________________________________Chapter 3
SEIZE OPPORTUNITIES
3-43. The OPFOR places maximum emphasis on decentralized execution, ini-
tiative, and adaptation. Subordinate units are expected to take advantage of
fleeting opportunities so long as their actions are in concert with the purpose
of the combat order or operational directive.
ATTACK
3-46. An attack seeks to achieve tactical decision through primarily military
means by defeating the enemys military power. This defeat does not come
through the destruction of armored weapons systems but through the disrup-
tion, dislocation, and subsequent paralyzation that occurs when combat
forces are rendered irrelevant by the loss of the capability or will to continue
the fight. Attack is the method of choice for OPFOR offensive action. There
are two types of attack: integrated attack and dispersed attack.
3-47. The OPFOR does not have a separate design for exploitation as a dis-
tinct offensive course of action. Exploitation is considered a central part of all
integrated and dispersed attacks.
3-48. The OPFOR does not have a separate design for pursuit as a distinct
offensive course of action. A pursuit is conducted using the same basic
course-of-action framework as any other integrated or dispersed attack. The
fixing force gains contact with the fleeing enemy force and slows it or forces it
to stop while the assault and exploitation forces create the conditions for and
complete the destruction of the enemys C2 and logistics structure or other
systems.
3-49. The OPFOR recognizes that moving forces that make contact must rap-
idly choose and implement an offensive or defensive course of action. The
OPFOR methodology for accomplishing this is discussed in Chapter 5.
Integrated Attack
3-50. Integrated attack is an offensive action where the OPFOR seeks mili-
tary decision by destroying the enemys will and/or ability to continue fight-
ing through the application of combined arms effects. Integrated attack is of-
ten employed when the OPFOR enjoys overmatch with respect to its oppo-
nent and is able to bring all elements of offensive combat power to bear. It
may also be employed against a more sophisticated and capable opponent, if
3-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
I BTG
II
II
I
II
Exploitation Force
X
Assault Force
I
I
Fixing Force
Fixing Force I
Enemy
Reserve
I I (+)
Fixing Force
Disruption
Zone
Battle
Zone
BTG
3-10
_________________________________________________________________________________Chapter 3
II I
Fixing
Force
II I
Fixing
Force
Road
I
II
II
X
II I
R Enemy
oa
d Reserve I
Fixing BSA
Force
X
II Assault I
Force
II I
I Exploitation
I Force
Fixing
Force
3-53. The OPFOR prefers to conduct integrated attacks when most or all of
the following conditions exist:
The OPFOR possesses significant overmatch in combat power over en-
emy forces.
It possesses at least air parity over the critical portions of the battle-
field.
It is sufficiently free of enemy standoff reconnaissance and attack sys-
tems to be able to operate without accepting high levels of risk.
3-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
I
Exploitation
Force
Fixing
Assault Force
I I Force
II
Forest
II
Fixing
Force
Forest
3-12
_________________________________________________________________________________Chapter 3
Dispersed Attack
3-58. Dispersed attack (also known as decentralized attack) is the primary
manner in which the OPFOR conducts offensive action when threatened by a
superior enemy and/or when unable to mass or provide integrated C2 to an
attack. This is not to say that the dispersed attack cannot or should not be
used against peer forces, but as a rule integrated attack will more completely
attain objectives in such situations. Dispersed attack relies on IW and dis-
persion of forces to permit the OPFOR to conduct tactical offensive actions
while overmatched by precision standoff weapons and imagery and signals
sensors. The dispersed attack is continuous and comes from multiple direc-
tions. It employs multiple means working together in a very interdependent
way. The attack can be dispersed in time as well as space. See Figures 3-6
through 3-8 for examples of dispersed attacks.
3-59. The primary objective of dispersed attack is to take advantage of a win-
dow of opportunity to bring enough combined arms force to bear to destroy
the enemys will and/or capability to continue fighting. To achieve this, the
OPFOR does not necessary have to destroy the entire enemy force, but often
just a key portion of that force.
3-60. Selecting the appropriate portion of the enemy to destroy is the first
step in planning the dispersed attack. This element is chosen because of its
importance to the enemy and varies depending on the force involved and the
current military situation. For example, an enemy force dependent on one
geographical point for all of his logistics support and reinforcement would be
most vulnerable at that point. Disrupting this activity at the right time and
to the right extent may bring about tactical or operational decision on the
current battlefield or it may open further windows of opportunity to attack
the enemys weakened forces at little cost to the OPFOR. In another example,
an enemy force preparing to attack may be disrupted by an OPFOR attack
whose purpose is to destroy long-range missile artillery, creating the oppor-
tunity for the OPFOR to achieve standoff with its own missile systems. In a
final example, the key system chosen may be the personnel of the enemy
force. Attacking and causing mass casualties among infantrymen may delay
an enemy offensive in complex terrain while also being politically unaccept-
able for the enemy command structure.
3-61. Dispersed attacks are characterized by
Not being focused on complete destruction of ground combat power but
rather on destroying a key portion of the enemy force (often targeting
enemy C2 and logistics).
Fixing and isolating enemy combat power.
Using smaller, independent subordinate elements.
Conducting rapid moves from dispersed locations.
3-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
LZ Fixing
Exploitation Force
Force I Exploitation
Assault Force
Force
Fixing
Force
Exploitation
Force
Assault
Force
I
Fixing
Force
Exploitation
Force
Bn
Reserve
Fixing
Force
I Assault
Force
3-14
_________________________________________________________________________________Chapter 3
II Exploitation Mountains
Force
II LZ
LZ
Prep
II
X
Exploitation
Force
Exploitation I I
Force LZ
LZ LZ
Prep
LZ Brigade
Prep Reserve
I
Road
II
Fixing
I Force
II
II
II II
Assault
Force I
Assault Assault
I I
Force Force
Fixing II
Force I I
I I
I
Fixing
Force
3-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
and air-delivered weapons are also suited to this mission. Dispersed attacks
often make use of multiple assault forces separated in time and/or space.
3-66. Exploitation Force. The exploitation force in a dispersed attack must
be capable, through inherent capabilities or positioning relative to the en-
emy, of destroying the target of the attack. A tank brigade may be the
weapon of choice to maneuver throughout the battlefield as single platoons in
order to have one company reach a vulnerable troop concentration or soft C2
node. Alternatively, the exploitation force may be a widely dispersed group of
SPF teams set to strike simultaneously at exposed logistics targets. Dis-
persed attacks often make use of multiple exploitation forces separated in
time and/or space, but often oriented on the same objective or objectives.
Disruption
Zone
IMDR
LO D
LO
Enemy
R
IM
Enemy
Base Camp Base Camp
Fixing
Force
MSR 1 Fix by
MSR 2 Fire
ttle
Ba one
Z
Enemy
Support Area
& APOD
Fixing
Force
Laser Target
Exploitation Designator
Force MSR 3 Team
Assault
Battle Force
Zone
Enemy
Base Camp
Exploitation
Fixing Force
Force
Disruption
Zone
IMD
LOR
3-16
_________________________________________________________________________________Chapter 3
LIMITED-OBJECTIVE ATTACK
3-67. A limited-objective attack seeks to achieve results critical to the opera-
tion plan or even the strategic campaign plan (SCP) by destroying or denying
the enemy key capabilities through primarily military means. The results of
a limited-objective attack typically fall short of tactical or operational deci-
sion on the day of battle, but may be vital to the overall success of the opera-
tion or campaign. Limited-objective attacks are common during adaptive
operations in which the objective is to preserve forces and wear down the
enemy, rather than achieving decision.
3-68. The primary objective of a limited-objective attack is a particular en-
emy capability. This may or may not be a particular man-made system or
group of systems, but may also be the capability to take action at the enemys
chosen tempo.
3-69. Limited-objective attacks are characterized by
Not being focused solely on destruction of ground combat power but of-
ten on C2 and logistics.
Denying the enemy the capability he most needs to execute his plans.
Maximal use of the systems warfare approach to combat (see Chapter
1).
Significant reliance on a planned or seized window of opportunity.
3-70. There are two types of tactical limited-objective attack: spoiling attack,
and counterattack.
Spoiling Attack
3-71. A spoiling attack is designed to control the tempo of combat by disrupt-
ing the timing of enemy operations. This is accomplished by attacking during
the planning and preparation for the enemys own offensive operations. Spoil-
ing attacks do not have to accomplish a great deal to be successful. Con-
versely, planners must focus carefully on what effect the attack is trying to
achieve and how the attack will achieve that effect. In some cases, the pur-
pose of the attack will be to remove a key component of the enemys force ar-
ray or combat system so it is unavailable for the planned attack and there-
fore reduces his overall chances of success. More typically, the attack is de-
signed to slow the development of conditions favorable to the enemys
planned attack. See Figure 3-7 for an example of a spoiling attack.
3-72. Quite often, the spoiling attack develops as a situational attack (see
above). This occurs when an unclear picture of enemy dispositions suddenly
clarifies to some extent and the commander wishes to take advantage of the
knowledge he has gained to disrupt enemy timing. This means that spoiling
attacks are often conducted by reserve or response forces that can rapidly
shift from their current posture to strike at the enemy.
3-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
I I
I
I
I
I
Spoiling I
Attack I
I
I
I
I
II XX
Main
Defense
MSB
X Force
KILL
I ZONE
Spoiling
Attack I
I
I I
I I
I I
Marsh KILL
I ZONE
I I
Forest
I
3-74. The OPFOR seeks to have the following conditions met in order to con-
duct a spoiling attack:
RISTA establishes a picture of enemy attack preparations.
Enemy security, reserve, and response forces are located and tracked.
Enemy ground reconnaissance in the attack zone is destroyed or ren-
dered ineffective.
3-75. Spoiling attacks are actually executed using one of the other types of
offensive action as the base method: integrated attack, dispersed attack, so-
phisticated ambush, or raid. Thus, the forces engaged in a spoiling attack
3-18
_________________________________________________________________________________Chapter 3
Counterattack
3-76. A counterattack is designed to cause an enemy offensive operation to
culminate and allow the OPFOR to return to the offense. A counterattack is
designed to control the tempo of combat by returning the initiative to the
OPFOR. See Figure 3-8 for an example of a counterattack.
DTG
DTG BTG BTG DTG
Disruption Disruption Battle Zone II
Support Zone
Zone Zone
Fixing X
II Force
KIL E
ZO
KI NE
L
ZO
N
LL
II
XX
Enemy Main Attack XX
II BTG DTG
Battle Zone
KIL E
ZO
L
N
II
II X
Assault
Force LL
KI NE II II
II
ZO Exploitation
II Force
II
X
ZO L
DTG
NE
KIL
Antilanding
Reserve
DTG (Former DTG
Counterattack Reserve)
II
II
BTG
Battle Zone
DTG
3-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
3-79. The OPFOR seeks to set the following conditions for a counterattack:
Locate and track enemy reserve forces and cause them to be commit-
ted.
Destroy enemy reconnaissance forces that could observe counterattack
preparations.
Organizing Forces for a Counterattack
3-80. A counterattack employs fixing, assault, and exploitation forces. The
disruption force was generally part of a previous OPFOR defensive posture.
3-81. Fixing Force. The fixing force in a counterattack is that part of the
force engaged in defensive action with the enemy. These forces continue to
fight from their current positions and seek to account for the key parts of the
enemy array and sure they are not able to break contact and reposition. Ad-
ditionally, the fixing force has the mission of making contact with and de-
stroying enemy reconnaissance forces and any combat forces that may have
penetrated the OPFOR defense.
3-82. Assault Force. In a counterattack, the assault force (if one is used) is
assigned the mission of forcing the enemy to commit his reserve so that the
enemy commander has no further mobile forces with which to react. If the
fixing force has already forced this commitment, the counterattack design
may forego the creation of an assault force.
3-83. Exploitation Force. The exploitation force in a counterattack maneu-
vers through or bypasses engaged enemy forces to attack and destroy the en-
emys support infrastructure before he has time or freedom to react. An ar-
mored or attack helicopter unit is often best suited to be the core of an exploi-
tation force in a counterattack due to the combination of mobility, protection,
and firepower possessed by such forces.
3-20
_________________________________________________________________________________Chapter 3
ASSAULT
3-85. An assault is the basic form of OPFOR tactical offensive combat. An
assault is an attack that destroys an enemy force through firepower and the
physical occupation and/or destruction of his position.
3-86. Assaults at any level of command and with any type forces have the
same basic characteristics:
Suppression of the enemy force to permit the action element to move
against the enemy position without receiving destructive fire.
Use of surprise, limited visibility, complex terrain and C3D by the as-
sault element to attain the enemy position while remaining combat ef-
fective.
Isolation of the enemy position so that it cannot be reinforced during
the battle.
3-87. The OPFOR does not have a separate design for mounted and dis-
mounted assaults as the same basic principles apply to any assault action.
A situational assault may have to make use of whatever forces can take ad-
vantage of a window of opportunity, but the OPFOR views all assaults as
combined arms actions.
3-89. Action Element. The action element of an assault (also called the as-
sault element) maneuvers to and seizes the enemy position, destroying any
forces there.
3-90. Support Element. The support element provides the assaulting de-
tachment with one or more of the following:
CSS
C2
Supporting direct fire (HMG, ATGM, recoilless rifle, AGL, etc.)
Supporting indirect fire (mortar, artillery, etc.)
Mobility Support
3-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Security Element
Security Element
Support Element
Assault Element
Support Element
3-22
_________________________________________________________________________________Chapter 3
Security Element
Assault Element
Support Element
Support Element
Security Element
3-92. The AOR will often identify the enemy position being assaulted as the
primary objective, with associated attack routes and/or axes. Support by fire
positions will typically be assigned for use by the support element. The se-
curity element will have battle positions that over watch key enemy air and
ground avenues of approach with covered and concealed routes to and from
those positions.
3-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Support Element
Sniper
Observer
Action Element
Rioting Crowd
Gate
Security Element
Guard House
Sniper
Support Element
Observer
3-24
_________________________________________________________________________________Chapter 3
mally gets a screen, guard or cover overall mission, but may also be called
upon to perform other tactical tasks in support of its purpose:
Ambush
Block
Canalize
Contain
Delay
Disrupt
Fix
Interdict
Isolate
3-95. Tasks of the Support Element. The support element can have a
wide range of functions in an assault. Typically the detachment commander
exercises C2 from within a part of the support element, unless his analysis
deems success requires he leads the assault element personally. The support
element controls all combat support and CSS functions as well as any sup-
porting fires. The support element typically does not become decisively en-
gaged but parts of it may employ direct suppressive fires. Tasks typically ex-
pected of support elements in the assault are:
Attack by Fire
Disrupt
Fix
Neutralize
Support by Fire
3-96. Tasks of the Assault Element. The assault element must be able to
maneuver from its assault position to the objective and destroy the enemy lo-
cated there. It can conduct attack by fire, but this is not an optimal method-
ology and should only be used when necessary. Tactical tasks expected of
the assault element are:
Clear
Occupy
Secure
Seize
3-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
has begun maneuvering. Therefore, the OPFOR prefers as much of the ac-
tion of the three elements of an assault to be simultaneous as possible.
OPFOR small units practice the assault continually and have clear battle
drills for all of the key tasks required in an assault.
3-26
_________________________________________________________________________________Chapter 3
to cross some distance at speed over open ground and AT systems along the
attack axis have been destroyed or suppressed.
3-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
that significant resupply does not have to occur within the detachment prior
to the completion of the mission.
AMBUSH
3-117. An ambush is a surprise attack from concealed positions on a moving
or temporarily halted enemy.
3-28
_________________________________________________________________________________Chapter 3
Executing an Ambush
3-124. There are three types of OPFOR ambushannihilation, harassment,
or containmentbased on the desired effects and the resources available.
Ambushes are frequently employed because they have a great chance of suc-
cess and provide force protection. The OPFOR conducts ambushes to kill or
capture personnel, destroy or capture equipment, restrict enemy freedom of
movement, and collect information and supplies.
3-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
3-30
_________________________________________________________________________________Chapter 3
Support Element
Action Element
Security Element
3-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Kill Zone
X
X
X
X Enemy
X
X
S
E l up p Security
Security em or
Element en t Action Element
t
Element
Security
Element
Mines
XXX Obstacles
Withdrawal Routes
3-32
_________________________________________________________________________________Chapter 3
Action Element
Support Element
(disabled bus)
Enemy Convoy
Security Element
Observer
3-127. Many times, the assault and support elements are combined to pro-
vide better control of fires throughout the kill zone, which may be quite wide.
The assault element does not normally perform the role of assaulting the kill
zone, but may if conditions permit. The assault and support elements concen-
trate massive direct and indirect fires in the kill zone. The security element
provides early warning.
3-128. Harassment ambushes may be accomplished with very little in the
way of resources. The action and security elements may be as little as two-
four personnel combined. In cases where the primary weapon system is one
or more explosive devices, the ambush may be conducted by one-two person-
nel or even by a time delayed fusing system.
3-129. While the assault and support elements withdraw, the security ele-
ment may remain to provide warning and to delay enemy forces if necessary.
As in all ambushes, the detachment may emplace mines and plan for indirect
fires to cover withdrawal routes.
3-130. Containment Ambush. A containment ambush is a security meas-
ure that is usually part of a larger action. It is used to prevent the enemy
from using an avenue of approach or interdicting another action, such as a
raid. The assault element may assault to secure the kill zone, as described in
3-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
the annihilation ambush, although this is not required for success. The sup-
port and security elements perform the same functions as those described in
the annihilation ambush.
Action
Element
Security Element
Security Element
QRF
Security Element
Containment
Ambush on QRF
Enemy
Base Camp
Attack on Enemy
Base Camp
Action
Element
I
3-34
_________________________________________________________________________________Chapter 3
3-137. When the ambush target is a ground unit, air defense is most likely
found in the security element(s) where it can provide early warning and fires
against aerial response forces.
IW Support to an Ambush
3-140. IW primarily supports ambushes by concealing the action through de-
ception and information protection. Successful ambushes may be used by an
IW campaign as tools to show the failure of enemy force protection efforts.
3-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RAID
3-143. A raid is an attack against a stationary target for the purposes of its
capture or destruction that culminates in the withdrawal of the raiding de-
tachment to friendly territory.
3-36
_________________________________________________________________________________Chapter 3
3-37
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
3-155. Fire support units (and combat helicopters acting in this role) may be
the action element of a raid with or without additional ground forces.
IW Support to a Raid
3-159. IW primarily supports raids by concealing the action through decep-
tion and information protection. Successful raids may be used by an IW cam-
paign as tools to show the failure of enemy force protection efforts.
3-161. Raids in urban terrain often have the objective of seizing one or more
enemy personnel. As these are extremely mobile targets and easy to conceal,
effective intelligence on the target is an absolute prerequisite for such a mis-
sion.
3-38
_________________________________________________________________________________Chapter 3
RIVER
Assault
Element
Power Plant
II
Objective
Exfiltration
I LZ
RO
I
AD
Security
Element
I ROAD
Security
Element
Support
Element
R
VE
RI
Not to Scale
3-39
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Security Element
?
?
Action Element
Security Element
I Security Element
I
?
Support Element
Action Element
3-40
_________________________________________________________________________________Chapter 3
3-170. Depending on the situation, armor may be used in any of the elements
of a search and attack. In the reconnaissance element, armor system ther-
mal imagers and other EO aids assist in the detection and identification of
enemy forces.
3-171. Armor forces could provide the security element in a search and at-
tack with a combination of firepower and protection that significantly en-
hances the mission of fixing the enemy.
3-172. Armor forces mobility and speed permit them to serve in the action
element of a search and attack, rapidly orienting on fixed enemy forces and
moving to a position of advantage to destroy them.
3-41
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
3-42
Chapter 4
Tactical Defense
While the OPFOR sees the offense as the decisive form of military action,
it recognizes defense as the stronger form of military action, particularly
when faced with a superior, extraregional foe. Defensive operations can
lead to strategic victory if the extraregional enemy abandons his mission.
It may be sufficient for the OPFOR simply not to lose. Even when an op-
erational-level commandsuch as a field group (FG) or operational-
strategic command (OSC)as a whole is conducting an offensive opera-
tion, it is likely that one or more subordinate units may be executing de-
fensive missions to preserve offensive combat power in other areas, to
protect an important formation or resource, or to deny access to key facili-
ties or geographic areas. The same is true of subordinate units within a
tactical group.
4-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-8. Defensive actions during transition and adaptive operations will not be
able to rely simply on attrition-based tactics in layered engagement areas.
Such actions will typically include increased use of
Infiltration to conduct spoiling attacks and ambushes.
Perception management (see Chapter 7) in support of defensive opera-
tions.
4-2
_________________________________________________________________________________Chapter 4
SITUATIONAL DEFENSE
4-10. The OPFOR may also conduct a situational (hasty) defense. It recog-
nizes that the modern battlefield is chaotic. Circumstances will often change
so that the OPFOR is not afforded the opportunity to conduct offensive ac-
tion, thus forcing the OPFOR over to a defensive posture. If the OPFOR de-
termines that a situational window of opportunity is closing, it may assume a
situational (or hasty) defense. Although detailed planning and preparation
greatly mitigate risk, they are often not achievable if enemy action has taken
away the initiative.
4-11. The following are examples of conditions that might lead to a situ-
ational defense:
The enemy is unexpectedly striking an exposed key OPFOR unit, sys-
tem, or capability.
The enemy is conducting a spoiling attack to disrupt OPFOR offensive
preparations.
An OPFOR unit makes contact on unfavorable terms for subsequent of-
fensive action.
The enemy gains or regains air superiority sooner than anticipated.
An enemy counterattack was not effectively fixed
4-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
a basic course of action to the staff, which then quickly turns that course of
action into an executable combat order. Even more than other types of
OPFOR defensive action, the situational defense relies on implementation of
battle drills by subordinate tactical units
4-13. Organization of the battlefield in a situational defense will normally be
limited to minor changes to existing control measures. Organizing forces in a
situational defense will typically rely on minor modifications to existing struc-
ture.
Disruption Force
4-18. The size and composition of forces in the disruption zone depends on
the level of command involved, the commanders concept of the battle, and
the circumstances in which the unit adopts the defense. A tactical com-
mander will always make maximum use of stay-behind forces and affiliated
4-4
_________________________________________________________________________________Chapter 4
forces existing within his AOR. Subordinate commanders can employ forces
in the higher disruption zone with tactical group approval.
4-19. A DTG disruption force is typically a BTG, while a BTG disruption
force is typically an IMD. However, a disruption force has no set order of bat-
tle. It may contain
Ambush teams (ground and air defense).
Long-range reconnaissance patrols and/or SPF teams.
RISTA assets and forces.
Counterreconnaissance detachments.
Artillery systems.
Target designation teams.
Elements of affiliated forces (such as terrorists, insurgents, or crimi-
nals).
Anti-landing reserves.
4-20. The purpose of the disruption force is to prevent the enemy from con-
ducting an effective attack. The disruption force does this by initiating the at-
tack on components of the enemys combat system. Successful attack of des-
ignated components or subsystems begins the disaggregation of the enemys
combat system and creates vulnerabilities for exploitation in the battle zone.
Skillfully conducted disruption operations will effectively deny the enemy the
synergy of effects of his combat system.
4-21. For example, the tactical group commander may determine that de-
struction of the enemys mobility assets will create an opportunity to destroy
maneuver units in the battle zone. The disruption force would be given the
mission of seeking out and destroying enemy mobility assets while avoiding
engagement with maneuver forces.
4-22. The disruption force may also have a counter-reconnaissance mission
(see Chapter 6). It may selectively destroy or render irrelevant the enemys
RISTA forces and deny him the ability to acquire and engage OPFOR targets
with deep fires. It employs RISTA assets to locate and track enemy RISTA
forces and then directs killing systems to destroy them. For this purpose, the
disruption force may include OSC-level RISTA assets, SPF, and helicopters.
There will be times, however, when the OPFOR wants enemy reconnaissance
to detect something that is part of the deception plan. In those cases, the dis-
ruption force will not seek to destroy all of the enemys RISTA assets.
4-23. The disruption force may deceive the enemy as to the location and con-
figuration of the main defense in the battle zone, while forcing him to show
his intent and deploy early. Some other results of actions in the disruption
zone can include delaying the enemy to allow time for preparation of the de-
fense or a counterattack, canalizing the enemy onto unfavorable axes, or am-
bushing key systems and vulnerable troop concentrations.
4-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Protected Force
4-25. The protected force is the force being kept from harm by covering or de-
laying forces. It may be in the battle zone or the support zone.
Security Force
4-26. The security force conducts activities to prevent or mitigate the effects
of hostile actions against the overall command and/or its key components. If
the commander chooses, he may charge this security force with providing
force protection for the entire AOR, including the rest of the functional forces;
logistics and administrative elements in the support zone; and other key in-
stallations, facilities, and resources. The security force may include various
types of unitssuch as infantry, SPF, counter-reconnaissance, and signals
reconnaissance assetsto focus on enemy special operations and long-range
reconnaissance forces operating throughout the AOR. It can also include in-
ternal security forces with the mission of protecting the overall command
from attack by hostile insurgents, terrorists, and special operations forces.
The security force may also be charged with mitigating the effects of weapons
of mass destruction (WMD). The security force commander can be given con-
trol over one or more reserve formations, such as the anti-landing reserve.
(See also Tactical Security in Chapter 6.)
Counterattack Forces
4-27. A defensive battle may include a planned counterattack scheme. This is
typical of a maneuver defense, but could also take place within an area de-
fense. In these cases, the tactical commander will designate one or more
counterattack forces. He will also shift his task organization to create a coun-
terattack force when a window of opportunity opens that leaves the enemy
vulnerable to such an action. The counterattack force can have within it fix-
ing, assault, and exploitation forces (as outlined in Chapter 3). It will have
the mission of causing the enemys offensive operation to culminate. The tac-
tical group commander uses counterattack forces to complete the defensive
mission and regain the initiative for the offense.
Types of Reserves
4-28. At the commanders discretion, forces may be held out of initial action
so that he may influence unforeseen events or take advantage of developing
opportunities. He may employ a number of different types of reserve forces of
varying strengths, depending on the situation.
4-29. Maneuver Reserve. The size and composition of a reserve force is en-
tirely situation-dependent. However, the reserve is normally a force strong
enough to respond to unforeseen opportunities and contingencies at the tacti-
cal level. A reserve may assume the role of counterattack force to deliver the
4-6
_________________________________________________________________________________Chapter 4
final blow that ensures the enemy can no longer conduct his preferred course
of action. Reserves are almost always combined arms forces.
4-30. A reserve force will be given a list of possible missions for rehearsal and
planning purposes. The staff assigns to each of these missions a priority,
based on likelihood that the reserve will be called upon to execute that mis-
sion. Some missions given to the reserve may include
Conducting a counterattack. (The counterattack goal is not limited to
destroying enemy forces, but may also include recovering lost positions
or capturing positions advantageous for subsequent combat actions.)
Conducting counterpenetration (blocking or destroying enemy penetra-
tions).
Conducting antilanding missions (eliminating vertical envelopments).
Assisting forces heavily engaged on a defended line to break contact
and withdraw.
Act as a deception force.
Deception Force
4-34. When the IW plan requires the creation of nonexistent or partially ex-
isting formations, these forces will be designated deception forces in close-
hold executive summaries of the battle plan. Wide-distribution copies of the
plan will make reference to these forces according to the designation given
them in the deception story. The deception force in the defense is typically
given its own command structure both to replicate the organization(s) neces-
4-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
sary to the deception story and to execute the multidiscipline deception re-
quired to replicate an actual military organization. Tactical group command-
ers can use deception subordinate tactical group and detachment command
structures to deny enemy forces information on operation plans for the de-
fense.
4-8
_________________________________________________________________________________Chapter 4
4-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
effects of its subsystems. Of course, such work is not just an engineer respon-
sibility; it is a combined arms task.
4-46. Engineer units specializing in rapid obstacle construction and minelay-
ing form mission-specific units known as ODs. These ODs normally deploy in
conjunction with reserves to block enemy penetrations or to protect the flanks
of counterattack forces. In the initial stages of the defense, engineer assets
concentrate on creating obstacles in the disruption zone, in gaps in the com-
bat formation, and to the flanks, and preparing lines for counterpenetration
and counterattack and routes to such lines. The obstacle plan ensures that
the effort is coordinated with fires and maneuver to produce the desired ef-
fects. In conjunction with other tasks, engineers support the IW plan through
activities such as constructing false defensive positions and preparing false
routes. See Chapter 12 for more information on countermobility and surviv-
ability planning.
4-10
_________________________________________________________________________________Chapter 4
4-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
to transition to a new mission quickly and break contact with sufficient com-
bat power to fix the maneuvering enemy force.
SEIZE OPPORTUNITIES
4-58. The OPFOR places maximum emphasis on decentralized execution, ini-
tiative, and adaptation. Subordinate units are expected to take advantage of
fleeting opportunities so long as their actions are in concert with the purpose
of the combat order or operational directive.
INTEGRATED DEFENSE
4-60. A tactical defensive action is integrated if the OPFOR has the ability to
achieve full combined arms synchronization through all levels of command
and throughout the battlespace. This requires a modernized C2 system, a ro-
bust logistics capability, and the ability to operate relatively free of enemy in-
fluence in the support zone and battle zones prior to the commencement of
full-fledged enemy offensive action. The OPFOR force structure possesses the
first two of these characteristics, at least in relation to regional opponents.
Thus, during regional operations and perhaps transition operations, it would
often be operating in an integrated fashion unless the enemy is able to
achieve a sufficient level of overmatch in RISTA and standoff attack capabil-
ity to deny the OPFOR freedom of action.
4-61. Integrated defenses are able to
Act, at least partially, without the requirement for windows of oppor-
tunity.
Maximize the effects of destructive fire and maneuver.
Achieve tactical decision through primarily military means.
DECENTRALIZED DEFENSE
4-62. A defensive action is decentralized if the OPFORs C2 and/or logistics
capability has been significantly degraded or it does not have the ability to
operate freely in the battlespace. This typically occurs when the enemy enjoys
significant technological overmatch, particularly in technical RISTA means
and standoff precision attack. Decentralized defenses do not achieve decision
in and of themselves. Rather, they focus on preserving combat power while
buying time for the execution of strategic operations (see Chapter 1).
4-63. In some cases, a tactical commander may chose to adopt a decentralized
defense to preserve his C2 and logistics, understanding that his ability to syn-
chronize operations will be degraded. Tactical commanders are constantly es-
timating the situation to determine risk versus reward for active measures. A
decentralized defense relies on initiative of subordinate commanders and the
4-12
_________________________________________________________________________________Chapter 4
MANEUVER DEFENSE
4-66. In situations where the OPFOR is not completely overmatched, it may
conduct a tactical maneuver defense. This type of defense is designed to
achieve tactical decision by skillfully using fires and maneuver to destroy key
elements of the enemys combat system and deny enemy forces their objec-
tive, while preserving the friendly force. Maneuver defenses cause the enemy
to continually lose effectiveness until he can no longer achieve his objectives.
They can also economize force in less important areas while the OPFOR
moves additional forces onto the most threatened axes.
4-67. Maneuver defenses are almost always integrated defenses. Decentral-
ized maneuver defenses typically occur as part of transition operations. As an
extraregional enemy builds combat power to overmatch levels, but before the
OPFOR is completely overmatched, maneuver defense can buy time for other
forces to move into sanctuary areas and prepare for adaptive operations.
4-68. Even within a maneuver defense, the tactical group commander may
use area defense on some enemy attack axes, especially on those where he
can least afford to lose ground. Conversely, he may employ maneuver defense
techniques to conduct actions in the disruption zone if it enhances the attack
on the enemys combat system and an area defense in the battle zone.
Method
4-69. Maneuver defense inflicts losses on the enemy, gains time, and protects
friendly forces. It allows the defender to choose the place and time for en-
gagements. Each portion of a maneuver defense allows a continuing attack on
the enemys combat system. As the system begins to disaggregate, more ele-
ments are vulnerable to destruction. The maneuver defense accomplishes this
through a succession of defensive battles in conjunction with short, violent
counterattacks and fires. It allows abandoning some areas of terrain when
responding to an unexpected enemy attack or when conducting the battle in
the disruption zone. In the course of a maneuver defense, the tactical com-
4-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
mander tries to force the enemy into a situation that exposes enemy forma-
tions to destruction. See Figures 4-4 and 4-5 for examples of maneuver de-
fense.
Disruption
Force
I
Enemy
KILL
ZONE Contact
Force
Disruption
Force Shielding
Force
KILL
Enemy
ZONE
Contact
Force
Contact
Force Forest
Shielding
Disruption Force
Force
KILL
ZONE
KILL
Enemy ZONE
4-70. A maneuver defense trades terrain for the opportunity to destroy por-
tions of the enemy formation and render the enemys combat system ineffec-
tive. The OPFOR might use a maneuver defense when
It can afford to surrender territory.
It possesses a mobility advantage over enemy forces.
Conditions are suitable for canalizing the enemy into areas where the
OPFOR can destroy him by fire or deliver decisive counterattacks.
4-71. Compared to area defense, the maneuver defense involves a higher de-
gree of risk for the OPFOR, because it does not rely heavily on the inherent
advantages of complex battle positions. Units conducting a maneuver defense
typically place smaller elements forward in defensive positions and retain
much larger reserves than in an area defense.
4-14
_________________________________________________________________________________Chapter 4
Defensive Lines
4-72. The basis of maneuver defense is for units to conduct maneuver from
position to position on a succession of defensive lines. In this case, the line
defended on is not a continuous line of defenses, but rather a notional line on
which one or more units have orders to defend for a certain time at a certain
depth within a units AOR. The OPFOR can accept large intervals between
defensive positions on such a line. Part of the line may consist of natural or
manmade obstacles or of deception defensive positions.
4-73. These lines are not necessarily linear, in the sense of forming a
straight line. Nor are they necessarily at regular intervals from one another.
A particular units position on a subsequent line may not be directly behind
its previous position. In the spaces between the lines, the defenders can or-
ganize reconnaissance fire, raids, and counterattacks. Thus, it is difficult for
the enemy to predict where he will encounter resistance.
4-74. The number of lines and duration of defense on each line depend on the
nature of the enemys actions, the terrain, and the condition of the defending
units. Lines are selected based on the availability of natural obstacles and
shielding terrain, with consideration of being able to leave the lines without
being observed.
Defensive Maneuver
4-75. Defensive maneuver consists of movement by bounds and the mainte-
nance of continuous fires on enemy forces. A disruption force and/or a main
defense force (or part of it) can perform defensive maneuver. In either case,
the force must divide its combat power into two smaller elements: a contact
force and a shielding force. The contact force is the element occupying the
forward-most defensive line at any point in time. The shielding force is the
element occupying the next line immediately to the rear.
4-76. At each line, the contact force ideally forces the enemy to deploy his
maneuver units and perhaps begin his artillery preparation for the attack.
Then, before the contact force becomes decisively engaged, it maneuvers to its
next preplanned line, behind the line occupied by the shielding force. While
the original contact force is moving, the shielding force is able to keep the enemy
under continuous attack. When the original contact force passes to the rear of
the original shielding force, the latter force becomes the new contact force. When
the original contact force occupies its next line, it becomes the shielding force for
the new contact force. In this manner, units continue to move by bounds to
successive lines, preserving their own forces while delaying and destroying
the enemy.
4-77. Subsequent lines are far enough apart to permit defensive maneuver by
friendly units. The distance should also preclude the enemy from engaging
one line and then the other without displacing his indirect fire weapons. This
means that the enemy, having seized one line, must change the majority of
his firing positions and organize his attack all over again in order to get to
the next line. However, the lines are close enough to allow the defending
units to maintain coordinated, continuous attack on the enemy while moving
from one to the other.
4-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-78. OPFOR commanders may require a unit holding a line to continue de-
fending, even if this means the unit becomes decisively engaged or enveloped.
This may be necessary in order to allow time for the construction of defenses
to the rear of the line this unit is defending. This may be the case when a unit
is conducting maneuver defense in the disruption zone while the main de-
fense force is preparing for an area defense in the battle zone. At some point,
a unit conducting maneuver defense as part of the main defense force may be
ordered to continue to defend on a line, if conditions are favorable for defeat-
ing the enemy or repelling the attack at that line.
4-79. The example in Figure 4-2 shows that the shielding force does not nec-
essarily have to remain in place to do its job. It can go out to meet the enemy
(perhaps in an ambush) and then fall back into another battle position. This
type of maneuver can force the enemy into a nonlinear fight.
II
Enemy
II
Contact Force
II
II II
II II
Shielding Force
En
em
y
y
em
En
Disruption Force
4-80. The disruption force initiates the attack on the enemys combat system
by targeting and destroying subsystems that are critical to the enemy. If suc-
cessful, the disruption force can cause culmination of the enemy attack before
the enemy enters the battle zone. In the worst case, the enemy would enter
the battle zone unable to benefit from an integrated combat system and vul-
nerable to defeat by the main defense force.
4-81. In a maneuver defense, the disruption force often occupies battle posi-
tions in the disruption zone and seeks to force the enemy to fight on disad-
vantageous ground and at a tempo of the OPFORs choosing. A maneuver de-
fense disruption force also can set the conditions for a strike (see Chapter 3).
4-16
_________________________________________________________________________________Chapter 4
The disruption force mission includes disaggregating the enemy attack and, if
possible, destroying the enemy force.
4-82. Maneuver units conduct the defense from successive battle positions.
Intervals between these positions provide space for deployment of mobile at-
tack forces, precision fire systems, and reserves.
4-83. The distance between successive positions in the disruption zone is
such that the enemy is forced to displace the majority of his supporting weap-
ons to continue the attack on the subsequent positions. This aids the force in
breaking contact and permits time to occupy subsequent positions. Long-
range fires, ODs, and ambushes to delay pursuing enemy units can assist
units in breaking contact and withdrawing.
4-84. If the disruption force has not succeeded in destroying or halting the at-
tacking enemy, but is not under too great a pressure from a pursuing enemy,
it may occupy prepared battle positions in the battle zone and assist in the re-
mainder of the defensive mission as part of the main defense force. A disruption
force may have taken losses and might not be at full capability; a heavily dam-
aged disruption force may pass into hide positions. In that case, main defense or
reserve forces occupy positions to cover the disruption forces disengagement.
Reserves
4-89. A unit in the maneuver defense can employ a number of reserve forces
of varying strengths. The maneuver reserve is a force strong enough to defeat
the enemys exploiting force. The commander positions this reserve in an as-
sembly area using C3D to protect it from observation and attack. From this
position, it can transition to a situational defense or conduct a counterattack.
The reserve must have sufficient air defense coverage and mobility assets to
allow maneuver. If the commander does not commit the reserve from its
4-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
AREA DEFENSE
4-90. In situations where the OPFOR must deny key areas (or the access to
them) or where it is overmatched, it may conduct a tactical area defense. Area
defense is designed to achieve a decision in one of two ways:
By forcing the enemys offensive operations to culminate before he can
achieve his objectives.
By denying the enemy his objectives while preserving combat power
until decision can be achieved through strategic operations or opera-
tional mission accomplishment.
4-91. The area defense does not surrender the initiative to the attacking
forces, but takes action to create windows of opportunity that permit forces to
attack key components of the enemy system and cause unacceptable casual-
ties. Area defense can set the conditions for destroying a key enemy force in a
strike. Extended windows of opportunity permit the action of maneuver
forces to prevent destruction of key positions and facilitate transition to a
larger offensive action. IW is particularly important to the execution of the
area defense in adaptive and transition operations. Deception is critical to the
creation of complex battle positions, and effective perception management is
vital to the creation of the windows of opportunity needed to execute maneu-
ver and fires.
Method
4-92. Area defense inflicts losses on the enemy, retains ground, and protects
friendly forces. It does so by occupying complex battle positions and dominat-
ing the surrounding battlespace with reconnaissance fire (see Chapter 9).
These fires attack designated elements of the enemys combat system to de-
stroy components and subsystems that create an advantage for the enemy.
The intent is to begin disaggregating the enemy combat system in the disrup-
tion zone. When enemy forces enter the battle zone, they should be incapable
of synchronizing combat operations. See Figures 4-6 through 4-8 for examples
of area defense.
4-93. Area defense creates windows of opportunity in which to conduct spoil-
ing attacks or counterattacks and destroy key enemy systems. In the course
of an area defense, the tactical commander uses terrain that exposes the en-
emy to continuing attack.
4-94. An area defense trades time for the opportunity to attack enemy forces
when and where they are vulnerable. The OPFOR might use an area defense
when
It is conducting access-control operations.
Enemy forces enjoy a significant RISTA and precision standoff advan-
tage.
Conditions are suitable for canalizing the enemy into areas where the
OPFOR can destroy him by fire and/or maneuver.
4-18
_________________________________________________________________________________Chapter 4
Road
II
ne I
Li Bat
BTG ttle tle L
Ba ine
Disruption
Zone
I
II
II
I
I
BTG
Reserve
Road
II
ne
Li
I
ttle
Ba
ttle
Ba
L ine BTG
Battle
Zone
Disruption Force
4-97. In an area defense, the disruption zone is that battlespace surrounding
its battle zone(s) where the OPFOR may cause continuing harm to the enemy
without significantly exposing itself. For example, counterreconnaissance ac-
tivity may draw the attention of enemy forces and cause them to enter the
4-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-20
_________________________________________________________________________________Chapter 4
II
I
II
I
Enemy
L
KIL
Z O LL
E
ZON
NE
KI
Enemy
II
I Forest
II
I
L
KIL E
N
ZO
Enemy
4-100. In an area defense, the disruption force often occupies and operates
out of battle positions in the disruption zone and seeks to inflict maximum
harm on selected enemy units and destroy key enemy systems operating
throughout the AOR. An area defense disruption force permits the enemy no
safe haven and continues to inflict damage at all hours and in all weather
conditions.
4-101. Disruption force units break contact after conducting ambushes and
return to battle positions for refit and resupply. Long-range fires, ODs, and
ambushes to delay pursuing enemy units can assist units in breaking contact
and withdrawing.
4-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Actual Positions
Deception
X
X
II
II
XX
Enemy II
X
Protected Force
on
pti
ce
II
X
De
LEGEND
II
Retain
X
Occupy
Contain
4-102. Even within the overall context of an operational area defense, the dis-
ruption force might employ a maneuver defense. In this case, the distance be-
tween positions in the disruption zone is such that the enemy will be forced to
displace the majority of his supporting weapons to continue the attack on the
subsequent positions. This aids the force in breaking contact and permits
time to occupy subsequent positions.
4-103. The disruption zone will often include a significant obstacle effort. En-
gineer effort in the disruption zone also provides mobility support to disrup-
tion force elements requiring maneuver to conduct attacks or ambushes. Non-
traditional obstacles such as booby traps and IEDs take on greater impor-
tance in an area defense during adaptive or transition operations.
4-104. Within the overall structure of the area defense, disruption force ele-
ments seek to conduct highly damaging local attacks. Units selected for mis-
sions in the disruption zone deploy on likely enemy avenues of approach.
They choose the best terrain to inflict maximum damage on the attacking en-
emy and use obstacles and barriers extensively. They defend aggressively by
fire and maneuver. When enemy pressure grows too strong, these forces can
conduct a maneuver defense, withdrawing from one position to another in or-
der to avoid envelopment or decisive engagement.
4-22
_________________________________________________________________________________Chapter 4
4-105. Since a part of the disruption force mission to attack the enemys com-
bat system, typical targets for attack by forces in the disruption zone are
C2 systems.
RISTA assets.
Precision fire systems.
Aviation assets in the air and on the groundat attack helicopter for-
ward arming and refueling points (FARPs) and airfields..
Logistics support areas.
LOCs.
Mobility and countermobility assets.
Casualty evacuation routes and means.
4-106. In some cases, the disruption force can have a single mission of detect-
ing and destroying a particular set of enemy capabilities. This does not mean
that no other targets will be engaged; it means that, given a choice between
targets, the disruption force will engage the targets that are the most damag-
ing to the enemy combat system.
Reserves
4-109. A unit in the area defense can employ a number of reserve forces of
varying strengths. In addition to its other functions, the maneuver reserve in
an area defense may have the mission of winning time for the preparation of
positions. This reserve is a unit strong enough to defeat the enemys exploita-
tion force in a maneuver battle during a strike. The unit positions its reserve
in an assembly area within one or more of the battle positions, based on the
commanders concept for the battle. (See the Reserves section above for dis-
cussion of other types of reserves.)
4-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
mission at a time, so it will be rare that such a unit will be employing more
than one of these methods simultaneously.
4-111. The types of defensive action in OPFOR doctrine are both tactical
methods and guides to the design of operational courses of action. The two
basic types are maneuver and area defense. A tactical commander may use
both forms of defense simultaneously across his AOR, however OPFOR units
at the battalion level and below generally participate as a part of a maneuver
defense as opposed to conducting one independently. A defensive battle plan
may include subordinate units that are executing various combinations of
maneuver and area defenses, along with some offensive courses of action,
within the overall defensive mission framework.
4-112. OPFOR battalions and their subordinate units normally fight both
area and maneuver defense actions employing simple battle positions. Alter-
natively, an area defense may employ complex battle positions.
4-24
_________________________________________________________________________________Chapter 4
Delay
Disrupt
Fix
4-116. Ambush A CSOP with this task generally will avoid contact with su-
perior enemy forces and only engage key enemy targets. When assigning this
task, the OPFOR commander must also describe desired effects on the enemy
(destroy, fix, suppress, etc.)
4-118. Delay A CSOP with this task will attempt to buy time for the
OPFOR to accomplish some other task such as defensive preparations,
launch a counter-attack, complete a withdrawal, etc. Normally the CSOP
will withdraw (remaining in the disruption zone, or moving to the battle or
support zones) after engaging for a set amount of time.
4-119. Disrupt A CSOP with this task will attempt to weaken an enemy at-
tack by using fires to cause premature commitment of the enemy, break
apart his formation, and desynchronize his plan.
4-120. Fix A CSOP with this task will use fires to prevent a key element of
the enemy force from moving from a specific place or halt them for a specific
amount of time.
4-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
BN Kill Zone
Enemy I (+)
Road
4-26
_________________________________________________________________________________Chapter 4
Simple Battle
II
Village
(-) Position
I (+)
Reserve
I
Road
Kill Zone
Road
4-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Company SBP
Forest
AT / AGL
Reserve
(+)
Kill Zone
e
Z on
ill
yK
ar
nd
co
Se
AT / AGL
Road
4-28
_________________________________________________________________________________Chapter 4
4-128. In some cases, the adoption of a reverse slope defense can prevent the
defenders weapon systems from exploiting their maximum range. However,
skilful OPFOR commanders will select defensive terrain that allows them to
maximize their weapons stand-off range. They do so by emplacing their sys-
tems at their maximum effective range behind the crest of the intervisibility
line that supports their kill zone - this may mean placing a weapon system on
the counterslope behind the terrain forming the intervisibility line.
4-129. Maintaining observation of the enemy while on the forward slope of an
intervisibility line can be difficult. To alleviate this disadvantage, OPFOR
commanders will employ reconnaissance assets to observe forward of the re-
verse slope defensive position.
4-130. The OPFOR commander will seek a defensive position behind a ter-
rain feature(s) that in addition to providing an intervisibility line, canalizes
attackers into narrow attack frontages which lead into the kill zone.
4-131. Fire Planning Fire is the basic means of destroying the enemy in the
defense. To perform this task, the OPFOR will employ lethal and non-lethal
weaponry in a unified manner, often directed into a kill zone. The normal ba-
sis of a battalions system of fire is the AT fire of its companies and attach-
ments, and supporting artillery. In areas that are not accessible to vehicles,
the basis of fire will primarily be machinegun, grenade launcher, mortar and
artillery fires. In this case, where possible AT systems will be employed in an
anti-personnel role.
4-132. During the OPFOR fire planning process the commander and staff de-
lineate key enemy targets. The planners then appoint reconnaissance ele-
ments to identify targets and weapons systems to engage them. The OPFOR
battalions fire planning includes sectors of concentrated fire and barrier fire
lines of artillery and mortars in the disruption zone, on flanks, and through-
out the depth of the battle zone. Subordinate units and weapons are expected
to coordinate with each other as well as flanks units in the coverage of kill
zones.
4-133. Kill zones will be covered by frontal and flanking / cross fires of the
OPFOR battalions and other supporting weapons systems. The OPFOR will
employ obstacles and fire concentrations to halt and hold the enemy within
kill zones. Terrain considerations and available weaponry will dictate the size
of the kill zone and the width of the OPFOR defense.
4-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-134. Support zone The support zone may contain C2, CSS, indirect, and
direct support fire assets, the reserve, as well as other supporting assets. The
support zone will normally locate itself behind the SBP. Support zones are
not typically found below the company level.
EXECUTING A SBP
4-135. SBP defenders will conduct aggressive counter-reconnaissance
throughout their occupation of the battle position. Such counter-
reconnaissance will occur primarily in the disruption zone, but measures will
also be taken in the battle and support zones. OPFOR electronic warfare as-
sets will attempt to detect the presence and location of enemy recon elements.
The reserve element may act as a quick-response force to destroy any enemy
reconnaissance assets discovered in the battle or support zones. Once a sig-
nificant attacking force is detected, the OPFOR will employ fires (direct / in-
direct) to delay and attrit attackers in the disruption zone.
4-136. Defenders in the battle zone will attempt to defeat attacking forces.
Should the enemy penetrate the main defenses or capture a position, defend-
ers will take measures to defeat the penetration or recapture the position, to
include the commitment of reserves and repositioning forces from other areas
within the SBP.
4-137. Defenders in the support zone will provide support to defenders in the
disruption and battle zones as required. In the event of the defeat or penetra-
tion of the SBP, they will maneuver as needed to avoid destruction or to sup-
port counterattacks.
4-138. Deception To keep the enemy from discovering the nature of the
OPFOR defenses and to draw PGM fire away from actual units, defenders
will establish dummy firing positions. In addition to enhancing force protec-
tion, the OPFOR will employ deception positions as an economy of force
measure to portray strength. These measures will include the creation of
false entrenchments, heat signatures, and dummy vehicles.
Reconnaissance in a SBP
4-140. SBP defenders will perform aggressive counter-reconnaissance activi-
ties to prevent the enemy from remaining in reconnaissance contact with the
SBP. The OPFOR will observe avenues of approach to provide early warning;
determine location, composition, and disposition of attackers; and direct fires
against key enemy systems or components of systems.
4-30
_________________________________________________________________________________Chapter 4
SWAMP
R&S in a SBP (-) Reserve
Woods
(+)
Enemy
CSOP Kill Zone
CSOP
With
dra wal
Rou Road
te
er
Riv
C
(-)
(-)
Kill Zone
C
e Village
ut
Ro
al
aw
dr
ith
I
Village W
C
Woods
Enemy
4-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
forces
4-32
_________________________________________________________________________________Chapter 4
Tasks of Engineers
Emplace additional obstacles on the most likely axes of enemy attack in front of the forward edge, in gaps
between units, on their flanks, and in the depth of the strongpoint.
Deepen sections of trenches and communication trenches, and provide covered shelters for equipment on
terrain that provides concealment from enemy observation and fire and permits the use of engineer mecha-
nized equipment.
Prepare lines of firing positions for reserve counterattack forces and prepare forward movement routes to
these lines and to lines of deployment for counterattacks.
Prepare routes for movement to the lines of deployment for the counterattack, lines of deployment of reserves,
and firing positions.
Set up water supply or distribution points.
Figure 4-11 shows tasks that are typically the second priority in the sequence of OPFOR position
preparation.
Tasks of Engineers
Connect individual emplacements into emplacements for squads with sections of trench dug with mechanized
equipment.
Prepare a continuous trench in the battalion defensive area.
Make bunkers for each company/battery and at battalion command posts.
Make shelters for vehicles, weapons, equipment, missiles, ammunition, and other supplies.
Improve or create additional obstacles ahead of the forward edge, on the flanks, and in gaps between adja-
cent strongpoints.
Prepare main dummy objects in the company strongpoint or battalion defensive area.
Prepare for demolition of roads, bridges, overpasses, and other important objectives in the depth of the
defense.
Prepare routes for maneuver, resupply, and evacuation.
4-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Figure 4-12 shows tasks that typically are the third priority in the sequence of position prepara-
tion. In addition to the addition and improvement of existing positions and obstacles, engineers
connect squad trenches until they run continuously across the entire platoon, company, and bat-
talion frontage.
Tasks of Engineers
Develop or improve a network of routes for unit maneuver, supply, and evacuation.
Expand the system of obstacles.
Improve fighting positions, firing lines, lines of deployment for counterattack, lines of deployment of reserves,
command posts, assembly areas of reserves, and logistics elements.
4-34
_________________________________________________________________________________Chapter 4
measures will attempt to convince the attacker to strike areas were he will
inflict minimal damage to the defenders, or maneuver himself to a position of
disadvantage, such as the center of a kill zone.
4-153. C3D measures are critical to the success of a CBP as the defender
generally wants to avoid enemy contact. Additionally, forces within a CBP
will remain dispersed to negate the effects of precision ordinance strikes.
Generally, once the defense is established, non-combat vehicles will be moved
away from troop concentrations to reduce their signature on the battlefield.
4-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-155. Main Defense Element The main defense element of a CBP is re-
sponsible for defeating an attacking force, and for covering the withdrawal of
the support force in the case of an evacuation of the CBP.
4-156. Reserve Element The reserve element of a CBP exists to provide
the OPFOR commander with tactical flexibility. During the counter-
reconnaissance battle the reserve may augment forces in the disruption zone,
in order to provide additional security to the main defense element. How-
ever, the reserve will rarely do so if such action would reveal the location of
the CBP to the enemy. Some typical additional tasks given to the CBP re-
serve may include-
Conducting a counter-attack.
Conducting counter-penetration (blocking or destroying enemy
penetration of the SBP).
Conducting anti-landing operations.
Assisting engaged forces in breaking contact.
Acting as a deception element.
4-157. Support Element The support element of a CBP has the mission of
providing one or more of the following to the defending force:
CSS
C2
Supporting direct fire (HMG, ATGM, recoilless rifle, AGL, etc.)
Supporting indirect fire (mortar, artillery, etc.)
Supporting non-lethal fires (Jamming, PSYOPS broadcasts, etc.)
Engineer Support
4-36
_________________________________________________________________________________Chapter 4
Position Anti-LZ
Anti-LZ (+)
Kill Zone
Mountains Exfiltration
Route Dismounted
Exfiltration Route Mountains
(+) II
I (+)
I
Reserve (+)
Alt. Exfiltration
(+) Kill Zone
Route (+)
Alt. Exfiltration
Route Anti-Armor
Village
Kill Zone
(+)
(+)
4-37
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Squad Battle
ine Position
Exfiltration
yL
Route
ilit
isib
er v
I nt
Kill Zone
Squad Battle
Position
Cave
Enemy
Squad Battle
Machine
Position
Gun w/ Pack
Mule
Air Ambush
Mountain
Cave
Mortar w/
Exfiltration
Pack Mule Route
Anti-Infiltration
Ambush
4-38
_________________________________________________________________________________Chapter 4
Enemy Enemy
Enemy CSOP Example
Supporting CBP
Village
(+)
Village
(+) CSOP
ne
Secondary
Ki
Zo
Road
ll
Zo CSOP
ll
Ki
ne
OPFOR BN
Battle and OPFOR BN
Support Zones Disruption Zone Primary Mountains
Road
ne
Zo
(+)
K
(+) Road
Village
CSOP
CSOP
ne
Zo
ll
Forest Ki
Enemy Enemy
EXECUTING A CBP
4-161. Most security / counter-recon will be passive measures unless attack is
imminent. In the event of an attack, fires (direct / indirect) will delay and at-
trit attackers.
4-39
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-162. Defenders in the battle zone will attempt to defeat attacking forces.
Should the defending commander determine that he lacks the capacity to de-
feat attackers, defenders in the battle zone will cover the withdrawal of the
rest of the unit before retiring themselves. Should the enemy penetrate the
main defenses, it is likely the defensive commander will determine further
resistance to be useless. In this case, he may commit reserves to delay further
penetration while the remainder of the defending force withdraws.
4-163. Defenders in the support zone will provide support to defenders in the
disruption and battle zones as required. In the event of a withdrawal, they
will be some of the first elements to withdraw via exfiltration routes.
4-164. C2 of a CBP is generally more difficult than that of a SBP because the
defenders may be more dispersed. To maintain security and avoid detection,
defenders will make all possible use of secure communications, such as couri-
ers and wire.
4-40
_________________________________________________________________________________Chapter 4
Mountains
Ene
y m
Forest
Disruption Zone
Village
Dismounted
Exfiltration Route
CSOP (+)
d
oa
R
e
on
OPFOR BDET
lZ
Battle Position
Kil Exfiltration
Route
Alt. Exfiltration
Anti-LZ / Infiltration
Enemy
Route
Disruption Zone
4-166. Due to the larger signature of armored forces (and its tendency to
draw PGM fire), forces defending a CBP are less likely to employ significant
armor assets. When armor is employed, it will generally remain concealed in
reserve and emerge only when needed to defeat attacking enemy forces or to
cover a withdrawal.
4-41
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
4-168. Unlike SBPs, passive air defense is most common to CBPs, and active
air defense will generally be of non-electromagnetic signature emitting na-
ture. AAA and shoulder-fired SAMs may be found interspersed throughout
the CBP including anti-LZ ambushes.
4-170. Obstacle planning While CBP obstacles may be used in the devel-
opment of kill zones, they are generally more protective in nature than those
in a SBP. For example, they may be employed to turn an attacker away from
a vulnerable flank, or to protect an exfiltration route by blocking an avenue of
approach into it.
IW Support to a CBP
4-173. Elements from the CBP may attempt to integrate within any local
communities for the purpose of gathering and disseminating information.
Generally, the CBP will not have an easily detectable IW operation as it is at-
tempting to maintain a low profile. IW may focus on downplaying the exis-
tence or significance of the CBP itself. If the CBP cannot be hidden, IW may
attempt to convince enemy (extra-national) forces that the defenders are
friendly to them. In some cases, senior OPFOR leaders may conduct IW from
a CBP to convince followers in other locations that they are still alive and
leading their organizations in the struggle against the enemy.
4-174. Complex battle positions in urban environments may make special use
of sewer and subway systems. Sewers and subways will provide shelter as
4-42
_________________________________________________________________________________Chapter 4
4-43
Chapter 5
Battle Drill
The OPFOR derives great flexibility from battle drill. Contrary to the U.S.
view that battle drill, especially at higher levels, reduces flexibility, the
OPFOR uses minor, simple, and clear modifications to thoroughly
understood and practiced battle drill to adapt to ever-shifting conditions.
It does not write standard procedures into its combat orders and does not
write new orders when a simple shift from current formations and
organization will do.
BATTLE DRILLS
5-2. OPFOR Battle drill is used to make the execution of basic tactical tasks
standard throughout the OPFOR. It is not meant to be specific to a type of
unit, but rather represents a common methodology for certain recurring
missions tactical units are routinely called upon to accomplish.
TASK ORGANIZATION AND BATTLE DRILL
5-3. Battle drill is primarily oriented toward offensive action and attacking, or
at least moving forces.
5-4. The standard battlefield organization of a detachment is into three parts:
the security element, the support element and the action element (also known
in specific situations as the firing or assault element).
5-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
5-5. The security element of a detachment provides local tactical security for
the detachment and prevents the enemy from influencing mission
accomplishment. The action element accomplishes the detachments tactical
task. The support element provides combat and combat service support and
C2 for the detachment. Due to such considerations as multiple avenues of
approach, a detachment may organize one or more of each of these elements
in specific cases.
5-6. In certain situations, a detachment may organize one or more specialist
elements. Specialist elements are typically formed around a unit with a
specific capability such as an obstacle clearing element, reconnaissance
element or deception element.
ACTIONS ON CONTACT
5-7. Despite constant advances in situational awareness technologies and
methods, it will be the rule rather than the exception that an OPFOR unit
makes contact under precisely predicted conditions and with exactly the
expected enemy. The actions on contact battle drill is designed to ensure
OPFOR units retain the initiative and fight under circumstances of their
choosing.
Forms of Contact
5-8. The OPFOR recognizes seven forms of contact:
Direct Fire
Indirect Fire
Obstacle
Air
NBC
EW
Sensor
5-9. The actions on contact battle drill is primarily for use by a combat force
making sensor and/or direct fire contact with an enemy force. When making
undesired contact (indirect fire, air, NBC, EW or ground contact made by a
non-combat unit), the Break Contact battle drill is employed instead. When
making contact with an isolated obstacle, Situational Breach may be selected.
Actions on Contact Conditions
5-10. The commander making contact must rapidly determine what type of
contact has been made:
5-2
_________________________________________________________________________________Chapter 5
5-11. The OPFOR considers it highly unlikely that contact will be made in
the expected location at the expected time with the expected enemy force.
Actions on contact are designed to provide the commander with the flexibility
to either continue with the planned course of action or rapidly adopt a new
course of action more suited to changed conditions.
5-15. Isolate. The unit making contact maneuvers and deploys security
elements to ensure additional enemy forces do not join the battle
unexpectedly.
5-17. Execute course of action. The contacting unit either continues with its
original course of action if deemed appropriate or executes a new one that
suits the situation. A new course of action could be one given to the unit
5-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
5-18. The unit making contact ensures follow-on units are aware of the
contact and de-conflict positioning, typically through the use of a standard
marking system.
Isolate
Fix
Security Element
5-4
_________________________________________________________________________________Chapter 5
MANEUVER Enemy
ISOLATE
FIX
Security Element
CONTACT
Security Element
ASL
Action Element
Support Element
SL
SITUATIONAL BREACH
5-19. The OPFOR is prepared to overcome obstacles during all phases of
combat. A situational breach is the reduction of and passage through an
obstacle encountered in the due course of executing another tactical task.
The unit conducting a situational breach may have expected an obstacle or
not, but in either case conducts a situational breach with the resources at
hand and does not wait for specialized equipment and other support.
5-20. Isolate. The security element takes action to ensure enemy
elements cannot reinforce those defending the obstacle. It might
accomplish this through C3D measures, counter-mobility tasks, direct
or indirect fire engagements or a variety of other means.
5-21. Secure. The security element takes action to ensure enemy
defending the obstacle are neutralized. This is typically accomplished
by direct or indirect fire or the use of obscurants. This task may also
be assigned to the support element alone or in combination with the
security element.
5-22. Penetrate. The clearing element neutralizes the obstacle such
that the action element and/or a follow-on force can complete its
5-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
ISOLATE
PENETRATE
Security Element
ISOLATE
SECURE
Security Element
WPNS
Support Element
HQ
BREAK CONTACT
5-6
_________________________________________________________________________________Chapter 5
5-25. Fix. The SE fixes the enemy. It prevents the enemy force from
maneuvering to remain in contact with the rest of the OPFOR force. It may
employ IW to appear to be larger than it is or even to appear to be the entire
OPFOR detachment.
5-26. Regain Freedom to Maneuver. The commander reduces his elements in
contact to only security element(s). He selects one or more routes from his
current location that enable his detachment to remain out of contact while
permitting him to maneuver in support of his mission.
5-27. Employ C3D, Fires, and Counter-mobility. The commander employs a
variety of means to protect his force while it maneuvers to a position out of
contact. Cover, camouflage, concealment and deception are employed to limit
or remove the enemys ability to maintain situational awareness of the
OPFOR force. This may be as simple as placing obscuring smoke between
the enemy and the OPFOR force or as complex as a sophisticated deception
plan making use of decoys and mock-ups. The OPFOR commander employs
fires as part of the break contact battle drill to suppress the enemy and
prevent him from returning fire effectively and to fix him and restrict his
maneuver. Counter-mobility actions, such as the emplacement of dynamic
obstacles or the destruction of man-made structures also restrict the enemys
ability to maneuver and maintain contact with the OPFOR force.
5-28. Execute Course of Action. Once freedom to maneuver has been
regained, the OPFOR force executes the basic course of action.
5-29. Fixing Element Rejoins. An important consideration within the break
contact battle drill is that it is likely one or more security elements were
given the task to fix the enemy force while the drill was executed. These
elements must be accounted for in the action to break contact. Typically, the
employment of C3D, fires and counter-mobility is focused on separating the
fixing elements from the enemy while the fixing elements permit the rest of
the force to break contact first.
5-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Smoke
Fix
Rejoin
5-8
_________________________________________________________________________________Chapter 5
be destroyed. If the action element does not have the combat power to take
the objective or assume its new role as support element, the mission will fail.
Fix 1
Security Element
Fix 2
Maneuver 2
Maneuver 1
Security Element
FIX
5-33. One of the most critical battle drills OPFOR units execute is to fix the
enemy. The ability to fix the enemy at crucial points is the fundamental way
units maintain the freedom to maneuver and retain the initiative.
5-35. An enemy that cannot physically move is constrained in some real way.
A soldier wounded in the legs, a tank with a track blown off and a platoon
surrounded by scatterable mines are examples of this from of fixed. However,
even this state can be temporary a buddy can carry the soldier, the tank
repaired, the minefield breached. Fixing an enemy by physically preventing
him from moving is the most difficult and resource intensive method.
5-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
5-36. An enemy does not want to move when he feels that in doing so he
takes great risk to life and material. Suppressive fires are the primary
method by which an enemy is fixed in this way. Suppressive fires are simple
to employ and are the least difficult and resource intensive means, but are
also the means that places the OPFOR at the greatest risk the soldiers and
systems providing the suppressive fires are vulnerable to detection and
return fire.
5-37. Fires. Fires fix the enemy by killing him or wounding him enough to
prevent relocation (destructive) or by making it too dangerous for him to
reposition (suppressive).
5-38. IW. Information Warfare fixes the enemy by convincing the enemy he
does not want to move or by making him think he cannot move. Some
examples of IW used to fix the enemy are:
Propaganda claiming the enemy will be destroyed if he moves in the
open.
Information attack that simulates the enemy higher commander
ordering the enemy unit to remain in place.
Deception that makes the enemy think the fixing force is stronger than
it is or at least capable of destroying the enemy force if it relocates.
5-39. Counter-mobility. Counter-mobility actions fix the enemy primarily by
physically restraining his movement. In actuality, there is no obstacle that
cannot be breached with effort, so counter-mobility actions are typically time-
sensitive. The more time spent and resources gathered by the enemy, the
less effective counter-mobility actions would be at fixing him.
5-10
_________________________________________________________________________________Chapter 5
Security Element
Action Element
TACTICAL MOVEMENT
5-40. Tactical movement is the method by which OPFOR units move on the
battlefield. It is employed in any situation where enemy contact is possible. It
is most often used in offensive operations, to move from attack position to the
point of attack.
ORGANIZING THE BATTLEFIELD FOR TACTICAL MOVEMENT
5-41. Even on a defensive battlefield, tactical movement is essentially an
offensive action and, at least for the moving force, the battlefield will be
organized in a manner similar to other offensive actions.
Axis
5-42. The moving force will move along an axis. The axis will define the area
within which the greater part of the main body (defined below) will move.
Exact routes within and along an axis that the force will use are called attack
routes.
Attack Zone
5-43. The moving force typically operates inside its own attack zone to give it
more freedom with which to fire and maneuver. If the moving force does not
5-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
have its own attack zone, it must clear fires with the unit who owns the
terrain over which it is moving.
Firing Lines
5-44. Firing lines will be established on common graphics to facilitate
coordination of direct fire. Firing lines are positions from which to engage the
enemy that possess some inherent advantage (such as concealment or hull-
down).
ORGANIZING FORCES FOR TACTICAL MOVEMENT
5-45. Some of the task organizations associated with tactical movement also
play roles on other types of combined arms tactics. For example, SDs and SEs
provide security during tactical movement and in other situations. Fighting
patrols (FPs) perform reconnaissance missions during tactical movement and
in other situations in which the OPFOR is not in direct contact with the
enemy. The main body contains forces organized in the same manner as
during the offense. Figure 5-8 shows an example of the possible deployment
of various forces within a BTG during tactical movement.
FL1
wn
oute Bro
Attack R SE FL2
FP
FL3
Exploitation
Force AXIS FALCON FL4
II II II I
FL5 FL6
II I I (-) I
FL7
5-12
_________________________________________________________________________________Chapter 5
Security Detachment
5-46. An SD is a task-organized battalion or company with the mission of
protecting the moving force from direct fire and other forms of contact and
from being fixed by enemy action. The SD is typically also the fixing force in
an offensive action. The SD will be further organized into security elements to
facilitate providing all-around security.
Security Element
5-47. An SE is a company- or platoon-size force that operates as part of an
SD. SEs are typically charged with providing the moving force with
protection from enemy action originating from a particular area along the
axis (thus, they may be designated as a front, flank, or rear security
element).
Fighting Patrols
5-48. Chapter 7 includes the complete discussion of FPs. However, a moving
force will use as many FPs as the commanders analysis deems necessary to
facilitate situational awareness and freedom of movement along each attack
route.
Main Body
5-49. The main body consists of the assault, exploitation and supporting
forces of the attacking unit. (See Chapter 3.)
PLANNING TACTICAL MOVEMENT
5-50. The focus of planning tactical movement is determining how to attack
according to the commanders intent with no or little interference from the
enemy. This is done by
Selecting attack routes the enemy cannot influence or could only do so
with extreme difficulty.
Properly allocating forces to the security detachment.
Planning and executing IW to disrupt the enemys ability to interfere
with the moving force.
5-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
5-54. SEs fix and destroy enemy forces that might interfere with the progress
of the unit. They serve as a base of fire for maneuver by other parts of the
force.
Transition from Tactical Movement
5-55. Tactical movement is, in essence, an offensive action. Should the
moving unit make contact with enemy forces prior to reaching its objective or
initiating its attack, the commander is faced with the following basic choices:
Bypass the new enemy force.
Engage and destroy the new enemy force.
Assume a situational defense.
Enemy forces are typically bypassed if small enough to be fixed entirely by
one or more FPs or SEs. Figure 5-9 hows an example with a combination of
fixing and bypassing an enemy force.
5-56. The new enemy force is destroyed by the moving unit conducting an
integrated or dispersed attack from its movement formation. FPs and
elements of the SD become the fixing force and elements of the main body
provide the assault and exploitation forces. These may be the assault and
exploitation forces from the original mission or a new task organization.
5-57. Only if there is no other choice or if the terrain is very favorable to
defensive operations will the OPFOR transition a tactical movement to a
defense. The type of defensive action selected (maneuver or area) will depend
on the circumstances that brought about the transition.
5-14
_________________________________________________________________________________Chapter 5
te
FP Rou
New
ute
ed Ro
Plann II
I
FP
SE
I
SE
FP
Assault Force II
II
II
Exploitation
Force
II
I
SE
5-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
TACTICAL SECURITY
5-58. Tactical security is the collection of measures taken to protect a unit
from the effects of enemy action. Tactical security is a continuous combined
arms action performed in both offense and defense.
ORGANIZING THE BATTLEFIELD FOR TACTICAL SECURITY
5-59. Tactical security is performed throughout the AOR and uses the same
control measures that define the AOR. In addition, security forces may
receive their own attack zones in which to operate to allow them to better
control their forces.
ORGANIZING FORCES FOR TACTICAL SECURITY
5-60. The OPFOR employs various types of forces in tactical security roles.
The exact task organization depends on the situation and the force to be
protected.
Security Force
5-61. If the commander chooses to have one organization responsible for all
tactical security in his AOR, this is known as the security force. There is no
set organization for the security force, but its subelements will be security
detachments. A security force is typically formed when the types and number
and separation of anticipated security actions requires a single responsible
commander and planning staff. Some examples are
A DTG assigns an infantry-based BTG the security force role and
allocates counterintelligence assets and a signals reconnaissance unit
to it to focus on enemy special operations and long-range
reconnaissance forces operating throughout its AOR.
A DTG assigns an air defense-based BTG the security force role and
assigns the antilanding reserve to it to focus on the enemy air, missile
and air assault threat to the DTG AOR.
A BTG creates a CRD and assigns it the security force role as the
commander assesses the primary threat to the BTG is from enemy
reconnaissance.
A BTG creates a security detachment (SD) and assigns it the security
force role while it undertakes tactical movement (discussed in detail
later in this chapter).
Security Detachment
5-62. Detachments formed to undertake tactical security actions are SDs. An
SD may be formed for and given any security mission. Most commonly, they
are formed as part of a tactical movement. SDs designated to rapidly move
anywhere in the AOR to respond to a variety of enemy threats are called
quick response forces (QRFs).
Security Element
5-63. Security elements (SEs) are task-organized company- or platoon-size forces
operating as part of a detachment. They execute an independent tactical
security task, such as protecting the flank or rear of a moving force or
providing local security while the rest of the detachment executes the
5-16
_________________________________________________________________________________Chapter 5
mission. (See the Antiarmor Ambush and Artillery Raid portions of this
Chapter for examples.)
Combat Security Outpost
5-64. Combat security outposts (CSOPs) are task-organized platoon- or
squad-size forces that provide local security to forces in battle positions or
assembly areas. They prevent enemy reconnaissance or small groups from
penetrating friendly positions and force the enemy to deploy and lose his
momentum in the attack. They are typically assigned one or more of the
following tactical tasks:
Ambush.
Attack by fire.
Delay.
Disrupt.
Fix.
Counterreconnaissance Detachment
5-65. The CRD is discussed elsewhere in this chapter, but has a significant
tactical security function. The CRD is focused almost entirely on enemy
reconnaissance, while other security forces have the mission to protect from
other types of enemy units and action as well. The commander has great
flexibility in determining the size and composition of his CRD and its
relationship with the security force, if formed.
Fighting Patrol
5-66. Fighting patrols (FPs) have a security function as well as a
reconnaissance function. See Chapter 7 for information on FPs.
Reserves
5-67. Reserves will often be called upon to perform security missions. This is
particularly likely in the case of unanticipated enemy action.
PLANNING TACTICAL SECURITY
5-68. Tactical security is planned as any other mission and is a component of
all combat actions. The operations section coordinates tactical security
planning, but gets significant input from the reconnaissance, IW and force
protection subsections. The commander may assign some or all tactical
security planning tasks to the security force headquarters if that organization
has the resources to conduct effective C2 integration.
5-69. All units are expected to execute tactical security in their AORs or
zones. The mission is to protect key assets from enemy reconnaissance,
special operations, intelligence services, and small-scale infiltrations.
5-70. The key to planning tactical security is to identify the threats to the
unit and the accomplishment of the mission and to allocate the minimum
essential forces necessary to mitigate or eliminate those threats. Minimum
forces is an important consideration because the OPFOR does not want the
execution of tactical security to degrade the units ability to accomplish the
mission. Essential forces are those who by capability are best suited to deal
with the particular threats faced by the command. For example,
counterintelligence units may be a critical element of tactical security for a
5-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
5-72. Cover is a defensive tactical task that uses an area defense to protect a
force from direct and indirect fire. Cover is described further in Chapter 4.
Delay is a defensive tactical task that uses a maneuver defense to protect a
force from direct and indirect fire. Cover and delay are described further in
Chapter 4. The execution of tactical security for a force conducting tactical
movement is described later in this chapter.
5-73. Combat security (also called local security) is executed by establishing
outposts along enemy avenues of approach and conducting patrols to provide
early warning to the main body and time for the main body to complete its
current action and respond as needed to the new threat. Combat security
forces also destroy enemy reconnaissance. Forces that execute combat
security are CSOPs and SEs (see above). Figure 5-7 shows an example of
combat security actions.
5-18
_________________________________________________________________________________Chapter 5
II
II CSOP
Enemy AA
PATROL
Enemy AA
CSOP I
QRF
II
CSOP
Enemy AA
5-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
C3D.
Quick response.
Counterfire.
Antilanding actions.
5-20
_________________________________________________________________________________Chapter 6
Chapter 6
6-2. The disruption force may be given any offensive, defensive or security
mission that best suits the disruption of the particular enemy force in ques-
tion in the specific battlespace assigned. To accomplish these missions, the
disruption force executes a combination of tactical tasks designed to set the
conditions for OPFOR success. These tasks include one or more of the follow-
ing:
Cover.
Delay.
Disrupt.
Fix.
Ambush.
Contain.
Canalize.
Isolate.
Neutralize.
6-1
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
Interdict.
ORGANIZING THE DISRUPTION ZONE
6-3. The disruption zone is essentially the area of responsibility (AOR) of the
disruption force. It may contain subordinate unit battle positions, kill zones,
axes, objectives and attack zones based on the disruption force commanders
intent.
6-2
_________________________________________________________________________________Chapter 6
This includes an air defense effort to deny aerial attack and reconnaissance
platforms from targeting OPFOR elements. The disruption force seeks to
conduct highly damaging local attacks.
6-7. Typical systems, units, or facilities to be attacked by the disruption force
are
Command and control (C2) systems.
RISTA assets.
Attack helicopter forward arming and refueling points.
Airfields.
Precision fire systems.
Logistics support areas.
Lines of communication (LOCs).
Mobility and countermobility assets.
Casualty evacuation routes and means.
COUNTERRECONNAISSANCE
6-8. The OPFOR defines counterreconnaissance (CR) as a continuous com-
bined arms action to locate, track and destroy all enemy reconnaissance op-
erating in a given AOR. The OPFOR conducts CR at all times and during all
types of operations. The OPFOR understands the role of situational aware-
ness in battle and will spare no effort or resource to hunt down and eliminate
enemy reconnaissance troops and systems.
Reference Zones
6-10. Reference zones (RZs) are subdivisions of the CRZ that assist in rapid
orientation on the ground and direction of killing forces or systems to enemy
reconnaissance elements. RZs may take the form of a grid pattern with indi-
vidual grids given code names, letters or numbers. RZs may also include tar-
get reference points whether for orientation purposes only or also as artillery
targets.
6-3
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
Kill Zones
6-12. Kill zones are discussed in Chapter 2. However, the CRD commander
will often identify his own set of kill zones associated with where he intends
to kill enemy reconnaissance on the ground.
BTG Reference
Zones
RZ8
RZ9
PEL RZ7
1
II
RZ1
RZ6
II
PEL
2
II
RZ2
Counterreconnaissance Detachment
6-14. A CRD is a detachment (see Chapter 2) task organized to be able to lo-
cate, track and destroy enemy reconnaissance throughout its CRZ. Each CRZ
is the responsibility of one CRD.
6-15. Command and Support Relationships. As a detachment, the CRD
is primarily composed of constituent and dedicated units. However, the sup-
porting command and support relationship may be necessary to bring special-
ized capabilities to bear for limited periods of time. For example, the CRD
may receive a precision-capable artillery unit in support in order to destroy
enemy mounted reconnaissance targets. In another case, the CRD may re-
6-4
_________________________________________________________________________________Chapter 6
ceive a night-capable helicopter unit for use during a period of limited visibil-
ity.
6-16. CRD and the Security Force. The security force is charged with the
force protection of the unit from all threats. A CRD is specifically designed to
enemy reconnaissance and intelligence collecting elements. The commander
has two basic options in designing their relationship. Typically, the CRD is a
component of the security force. Alternately, the commander may give the
CRD additional security responsibilities and resources and charge the CRD
with performing the security mission in its AOR leaving the security force to
execute missions in other parts of the higher AOR.
CRD Components
6-17. The CRD is a task organization created specifically for the CR mission.
It is a combined arms organization, with various combinations of the follow-
ing components. See Figure 6-2 for an example of a CRD organization.
6-18. Reconnaissance. Perhaps the most essential component of a CRD is
its reconnaissance elements. If the CRD cannot locate and track enemy re-
connaissance elements, it cannot perform its mission. CRD reconnaissance
elements take many forms: long range reconnaissance units, mounted and
dismounted (combat) reconnaissance units, signals reconnaissance, aerial re-
connaissance, or SPF.
6-19. Air Defense. Air defense systems in the CRD might be used defen-
sively to protect elements of the CRD. It might also be used offensively to de-
stroy enemy aerial reconnaissance systemsunmanned aerial vehicles
(UAVs), reconnaissance aircraft, or reconnaissance helicopters.
6-20. Aviation. Aviation assets play a number of roles in a CRD. They
transport infantry rapidly to already located enemy reconnaissance targets.
They perform armed and unarmed reconnaissance to locate enemy reconnais-
sance. As the CRZ is generally a large area for the forces in the corresponding
CRD to cover, aviation assets may be used to resupply dispersed elements of
the CRD.
6-21. Artillery. Artillery and other indirect fire systems provide an excellent
means of killing enemy reconnaissance without involving direct fire engage-
ments. The challenge is to employ artillery against enemy targets within the
battle and support zones without endangering other OPFOR forces. Precision
systems are uniquely suited to the CR mission and the OPFOR considers the
expenditure of limited precision resources against enemy reconnaissance tar-
gets to be well worth it.
6-22. Infantry. Enemy reconnaissance units often seek concealment in com-
plex terrain. Infantry units in the CRD attack and destroy such targets.
Normally, other elements of the CRD locate these targets, but infantry may
also be called upon to conduct reconnaissance missions in complex terrain in
support of the CR effort.
6-23. Engineers. Typically a CRD does not have significant engineer re-
sources. When present, they execute standard engineer missions when and
where necessary. Combat engineer elements also accompany infantry in ac-
tions on complex terrain.
6-5
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
6-24. Signal. CRDs often operate over relatively large geographic areas. The
CRD will be organized with appropriate signal assets to allow it to transmit
and manipulate information securely over large distances.
6-25. Electronic Warfare. CRDs may contain electronic warfare (EW) as-
sets to permit them to block enemy reconnaissance elements from communi-
cating their observations to their higher headquarters and other enemy units.
6-26. Armor. If the enemy has a strong mounted reconnaissance capability,
or when terrain conditions are favorable, the CRD may contain armor ele-
ments. The tank units can move rapidly to engage and destroy located recon-
naissance targets.
CRD
SP HOWITZER
BATTERY
(122-mm)
PLANNING COUNTERRECONNAISSANCE
6-27. The CR plan is written by the staff of the unit forming the basis of the
CRD with guidance from the higher staff. CR is treated as an ongoing offen-
sive action no matter what type action is being undertaken by the higher
unit. The CR plan is the battle plan (see Chapter 2) of the CRD.
EXECUTING COUNTERRECONNAISSANCE
6-28. The CRD headquarters interacts with the reconnaissance section of the
DTG or BTG staff to maintain a clear picture of enemy locations with an em-
phasis on his reconnaissance systems. As enemy reconnaissance assets are
identified, they are tracked by the CRD headquarters and this information is
provided to the CRD elements given the mission to destroy those elements. If
6-6
_________________________________________________________________________________Chapter 6
other OPFOR combat elements in the AOR are closer and/or better suited to
find or destroy critical enemy reconnaissance elements, the CRD commander
will recommend this action to the higher commander and, if approved, coor-
dinate this effort. See Figure 6-3 for an example of CR execution within a
BTGs AOR.
6-29. The CRD commander determines which enemy reconnaissance assets
are to be destroyed in accordance with the higher commanders guidance. He
assigns missions to attack and destroy those assets to appropriate subordi-
nate elements. The CRD headquarters guides the attacking element in on the
enemy reconnaissance asset until contact is made.
BTG Reference
Zones
RZ8
RZ9
PEL RZ7
1
II
RZ1
RZ6
II
PEL
2 COLT
II
RZ2
LEGEND
RZ3 PEL RZ5
3 Observation
RZ4
BTG
6-7
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
air defense assets/systems alone. This air threat includes all aircraft capable
of attacking, conducting reconnaissance or moving troops on the battlefield.
The extent to which this can be applied is limited only by the commander and
staffs knowledge of the enemy air threat, capabilities of their own systems
and their ability to apply that knowledge to come up with innovative solu-
tions.
6-31. This section addresses a number of example tactics that can be em-
ployed against the enemy air threat. It will include a brief discussion of plan-
ning from national through tactical levels. This is necessary to demonstrate
that these tactics can be used to achieve strategic, operational and tactical
results and therefore applied at all levels. They are part of an overall cam-
paign to defeat or at least degrade enemy air capabilities.
6-32. The OPFOR organizes its forces and assets to assist in accomplishing
the three basic phases of air defense:
Actions taken to destroy enemy aircraft and control systems before
they are employed.
Actions taken to destroy enemy aircraft while in flight and before they
enter airspace over ground forces.
Actions to destroy aircraft that have penetrated airspace over ground
maneuver forces.
Although these phases occur sequentially as hostilities are initiated, they oc-
cur almost simultaneously and are conducted continuously.
6-8
_________________________________________________________________________________Chapter 6
6-9
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
from the system. Once given the order to execute the firing systems work on a
predetermined firing schedule issued as part of an overall plan. Each MRL
may be may be assigned the mission of firing once. Firing occurs in a prede-
termined sequence separated by time. The net effect of this tactic is to de-
stroy or damage facilities/aircraft on the ground and degrade the operating
capability of support personnel. Munitions loads can be mixed dependent on
the desired effect. They can include scatterable mines, delayed-fuzed muni-
tions, high explosive (HE), and chemical.
6-40. This effort can be enhanced through the employment of mortars. Single
mortar crews operating from pre-selected hides can move to firing positions
where rounds with pre-set charges are cached. Once laid in the mortars can
fire rounds in rapid succession at targets on the airfield and then move back
to hides. Given range and terrain considerations larger caliber mortars (120-
mm) can be used in conjunction with laser target designators to place rounds
on point targets such as large aircraft, fuel storage and ammunition facilities
and hangers.
6-41. The use of small special-purpose forces (SPF) teams equipped with
man-portable non-line-of-sight ATGMs can target aircraft on the ground,
maintenance vehicles and facilities and even air traffic control and communi-
cations vans.
6-42. In filtrated or stay behind special-purpose forces and infantry can con-
duct on-order raids against airfields and ground support facilities away from
the airfields. These raids can be timed in conjunction with other methods so
that they assist in keeping the target under constant pressure. They can also
conduct small team ambushes along LOCs with the specific purpose of de-
stroying certain types of vehicle or equipment related to air operations.
6-43. Terrorist and other affiliated groups can intimidate host country civil-
ian contractors to force them to sabotage enemy operations they are support-
ing. Examples include contaminating fuel and lubricant supplies, placing
bombs on generators or ground support equipment. Insurgent groups can be
contacted, supplied and trained to perform missions that support the objec-
tive of the operation.
6-44. SPF teams can infiltrate man-portable, shoulder-fired surface-to-air
missiles (SAMs) close to airfields or along identified and potential flight
routes. These teams are best employed in pairs. Early warning can be
achieved to some extent through the use of a team overwatching airfields and
transmitting to SAM teams the departure of aircraft.
6-45. The planned combined use of antihelicopter mines, artillery and remote
sensors by OSCs and their constituent organizations can be an effective tactic
against attack helicopters using standoff firing techniques. Critical to this
tactic is the identification through analysis of likely helicopter firing posi-
tions. These will be located primarily in the disruption zone. Once identified
these areas are seeded with antihelicopter mines, remote sensors are placed
to overwatch the sites and the sites registered as preplanned artillery tar-
gets. Once the sensors pick up the incoming helicopters, the information is re-
layed to artillery units that take the sites under fire using variable time
fused munitions. This tactic can either destroy or damage the aircraft or
cause the area to be untenable. In lieu of remote sensors small teams can be
6-10
_________________________________________________________________________________Chapter 6
positioned to overwatch the most likely sites and relay information back to
the guns.
6-46. Antihelicopter mines can be placed on likely firing positions. This area
can be left unattended and the technique can be used at sights to economize
assets for use at the most likely sights. Another crude but potentially effec-
tive method employing engineers is the use of cables strung across avenues of
ingress.
ANTILANDING ACTIONS
6-47. The OPFOR prefers to prevent landings by airborne or heliborne troops
through the destruction of the troop transport aircraft in flight. Failing that,
it will take significant actions to destroy landing forces on the ground as soon
after landing as possible. Antilanding actions (ALA) can and will be executed
by any force with the capability to affect the aircraft or the landing forces, but
ALA is a combined arms action that primarily falls to the antilanding reserve
(ALR) for execution.
6-11
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
6-51. The ALR plans and rehearses actions in the vicinity of the LZs or DZs
as well as movement between assembly areas, hide positions, attack positions
and between LZs or DZs.
URBAN COMBAT
6-53. The OPFOR sees urban combat (UC) as a vital subcomponent of its tac-
tical actions. Complex urban terrain provides significant advantages to the
side that is ready to make use of them. OPFOR units train extensively in UC
and expect to make maximum use of complex urban terrain and to act to
deny such use to the enemy.
Disruption
Zone
Kill Zone
Battle
Zone
Rubble/debris
Fighting
Position Basement
Sewers/Drains Sewers/Drains
Underground Parking Garage
Tunnels/cache
Support Zone
6-12
_________________________________________________________________________________Chapter 6
6-58. The security element of a UD provides local tactical security for the de-
tachment and prevents the enemy from influencing mission accomplishment.
The clearing element ensures the assault element has an avenue of approach
that is clear of obstacles, debris and rubble that would disrupt its movement.
The assault element moves from a covered and concealed position and accom-
plishes the UDs tactical task. The support element provides combat and com-
bat service support and C2 for the detachment.
6-13
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
6-14
_________________________________________________________________________________Chapter 6
Enemy-held
Building Complex
Security Element
Security Element
Support Element
Assault Element
Clearing Element
6-66. Whether they are purpose-built or adapted, many weapons will have
greater then normal utility in an urban environment while others will have
significant disadvantages. The following are examples of weapons favored by
the OPFOR in urban operations:
Weapons with no minimum depression or maximum elevation.
Grenade launchers (automatic and rifle-mounted).
AT grenade launchers and shoulder-fired ATGMs.
Weapons with little or no backblast (such as gas metered or soft
launch).
Mortars.
Sniper rifles.
Machineguns.
Grenades.
Flame and incendiary weapons.
Riot control and tranquilizer gases.
Mines and boobytraps.
Artillery pieces used in direct fire mode.
6-15
FM 7-100.2 (Final Draft Sep 04)_______________________________________________________________
6-16
Chapter 7
Information Warfare
The OPFOR and forces of the States regional neighbors are rapidly in-
creasing the levels of technology used by military communications, auto-
mation, reconnaissance, and target acquisition systems employed at the
tactical level. Potential extra-regional adversaries rely heavily on such
systems. In order to ensure the successful use of its own information
technologies and to deny the enemy the advantage afforded by such sys-
tems, the OPFOR has continued to refine its doctrine and capabilities for
information warfare (IW).
ELEMENTS OF IW
1
Unless specifically stated otherwise, references to division and brigade in this chapter also apply to a division tacti-
cal group (DTG) or brigade tactical group (BTG). A tactical group is a task-organized unit organized around the
baseline, administrative structure of a division or brigade.
6-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
7-2. The seven elements of IW do not exist in isolation from one another and are not mutually
exclusive. The overlapping of functions, means, and targets makes it necessary that they all be
integrated into a single, integrated IW plan. However, effective execution of IW does not neces-
sary involve the use of all elements concurrently. In some cases, one element may be all that is
required to successfully execute a tactical IW action. Nevertheless, using one element or subele-
ment, such as camouflage, does not by itself necessarily constitute an application of IW.
7-3. The use of each element or a combination of elements is determined by the tactical situa-
tion and support to the overall operational objective. The size and sophistication of an enemy
force also determines the extent to which the OPFOR employs the various elements of IW. The
commander has the freedom to mix and match elements to best suit his tactical needs, within the
bounds of guidance from higher headquarters.
ELECTRONIC WARFARE
7-4. EW is activity conducted to control or deny the enemys use of the electromagnetic spec-
trum, while ensuring its use by the OPFOR. The OPFOR realizes that it cannot completely deny
the enemys use of the spectrum. Thus, the goal of OPFOR EW is to control (limit or disrupt) his
use or selectively deny it at specific locations and times on the battlefield, at the OPFORs choos-
ing. In this way, the OPFOR intends to challenge the enemys goal of information dominance.
7-5. The OPFOR employs both nonlethal and lethal means for EW. Nonlethal means range
from signals reconnaissance and electronic jamming to the deployment of corner reflectors, pro-
tective countermeasures, and deception jammers. The OPFOR can employ low-cost GPS jammers
to disrupt enemy precision munitions targeting, sensor-to-shooter links, and navigation. Lethal
EW activities include the physical destruction of high-priority targets supporting the enemys
decision-making processsuch as reconnaissance sensors, command posts (CPs), and communi-
cations systems. They also include activities such as lethal air defense suppression measures. If
available, precision munitions can degrade or eliminate high-technology command and control
(C2) assets and associated links.
7-6. EW activities especially focus on the enemys advanced C2 systems developed to provide
real-time force synchronization and shared situational awareness. The enemy relies on the
availability of friendly and enemy force composition and locations, digital mapping displays, and
automated targeting data. By targeting vulnerable communications links, the OPFOR can dis-
rupt the enemys ability to digitally transfer and share such information. The OPFOR enhances
its own survivability through disrupting the enemys ability to mass fires with dispersed forces,
while increasing enemy crew and staff workloads and disrupting his fratricide-prevention meas-
ures.
7-7. EW is a perfect example of the integrated nature of OPFOR IW elements. It overlaps
significantly with protection and security measures, deception, and physical destruction. Recon-
naissance, aviation, air defense, artillery, and engineer support may all contribute to successful
EW for IW purposes.
Signals Reconnaissance
7-8. Signals reconnaissance conducted in support of the tactical actions focuses on identifying
and disrupting the coordination of enemy forces. It includes both intercept and direction finding
(DF). Priorities for signals reconnaissance include
Maneuver unit CPs and nets.
Forward air controller (FAC) nets.
Control links of
7-2
_________________________________________________________________________________Chapter 7
Electronic Jamming
7-9. Jamming also supports the disaggregation of enemy forces. Jamming targets include
Company and battalion command nets.
Brigade command nets.
Artillery battery and battalion fire direction center (FDC) and com-
mand nets.
Command links between brigade and division reserves and parent units.
7-10.
DECEPTION
7-11. The OPFOR integrates deception into every tactical military action; it does not plan de-
ception measures and activities in an ad hoc manner. A deception plan is always a major portion
of the overall IW plan. The OPFOR formulates its battle plan, overall IW plan, and deception
plan concurrently. It attempts to deceive the enemy concerning the exact strength and composi-
tion of its forces, their deployment and orientation, and their intended manner of employment.
When successfully conducted, deception activities ensure that the OPFOR achieves tactical sur-
prise, while enhancing force survivability. All deception measures and activities are continuously
coordinated with deception plans and operations at higher levels. Affiliated forces may assist in
executing deception activities.
Deception Activities
7-12. OPFOR deception activities seek to confuse the enemy to the extent that he is unable to
distinguish between legitimate and false targets, units, activities, and future intentions. Insert-
ing false or misleading information at any point in the enemy decision-making process can lead
to increased OPFOR survivability and the inability to respond appropriately to OPFOR tactical
actions. Manipulation of the electromagnetic spectrum is critical to successful deception activi-
ties, as the OPFOR responds to the challenge posed by advances in enemy C2 systems and sen-
sors.
7-13. Deception activities can include
Executing feints and demonstrations to provide a false picture of where
the main effort will be.
Creating the false picture of a major offensive effort.
Maximizing protection and security measures to conceal movement.
Creating false high-value assets such as surface-to-surface missile
(SSM) launchers, CPs, and armor concentrations with decoys or mockups.
7-14. The OPFOR employs all forms of deception, ranging from physical decoys and electronic
devices to tactical activities and behaviors. The key to all types of deception activities is that they
7-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
must be both realistic and fit the deception story. Due to the sophistication and variety of sensors
available to the enemy, successfully deceiving him requires a multispectral effort. The OPFOR
must provide false or misleading thermal, visual, acoustic, and electronic signatures.
7-15. Integral to the planning of deception activities is the OPFORs identification of the decep-
tion target. This target is that individual, organization, or group that has the necessary decision-
making authority to take action (or to neglect to do so), in line with the deceivers deception objec-
tive. On the tactical battlefield, this target is typically the enemy commander, although the OPFOR
recognizes the importance of focusing actions to affect specific staff elements.
7-16. Successful deception activities depend on the identification and exploitation of enemy
information systems and networks, as well as other conduits for introducing deceptive informa-
tion. Knowing how the conduits receive, process, analyze, and distribute information allows for
the provision of specific signatures that meet the conduits requirements. On the tactical battle-
field, the enemy reconnaissance system is the primary information conduit, and receives the
most attention from OPFOR deception planners. The international media and Internet sites may
also be a target for deceptive information at the tactical level, being fed false stories and video that
portray tactical-level actions with the goal of influencing operational or even strategic decisions.
Deception Forces
7-17. The battle plan and/or IW plan may call for the creation of one or more deception forces.
This means that nonexistent or partially existing formations attempt to present the illusion of
real or larger units. When the IW plan requires combat forces to take some action (such as a feint
or demonstration), these forces are designated as deception forces in close-hold executive sum-
maries of the plan. Wide-distribution copies of the plan make reference to these forces according
to the designation given them in the deception story.
7-18. The deception force is typically given its own command structure both to replicate the
organization(s) necessary to the deception story and to execute the multidiscipline deception re-
quired to replicate an actual or larger military organization. The headquarters of a unit that has
lost all of its original subordinates to the task organization of actual DTGs or BTGs is an excel-
lent candidate for use as a deception force. Operational-strategic command (OSC) or DTG com-
manders can use deception DTG or BTG (or division or brigade) command structures to mislead
the enemy and deny him information on the actual organization of forces in the operation plan or
battle plan.
7-19. Deception forces may use a series of feints or demonstrations, ruses or decoys. All activi-
ties must fit the overall deception story and provide a consistent, believable, and multidiscipline
representation. Basic tactical camouflage and cover techniques are used to support all types of
deception.
7-20. Feints. Feints are offensive in nature and require engagement with the enemy in order
to show the appearance of an attack. The goal is to support the mission and ultimately mislead
the enemy. Feints can be used to force the enemy to
Employ his forces improperly. A feint may cause these forces to move
away from the main attack toward the feint, or a feint may be used to
fix the enemys follow-on forces.
Shift his supporting fires from the main effort.
Reveal his defensive fires. A feint may cause premature firing, which
reveals enemy locations.
7-4
_________________________________________________________________________________Chapter 7
7-22. Ruses. Ruses are tricks designed to deceive the enemy in order to obtain a tactical ad-
vantage. They are characterized by deliberately exposing false information to enemy collection
means. IAs, perception management actions, and basic C3D all support this type of deception.
7-23. Decoys. Decoys represent physical imitations of OPFOR systems or deception positions
to enemy RISTA assets in order to confuse the enemy. The goal is to divert enemy resources into
reporting or engaging false targets. It is not necessary to have specially manufactured equipment
for this type of visual deception. Decoys are used to attract an enemys attention for a variety of
tactical purposes. Their main use is to draw enemy fire away from high-value targets. Decoys are
generally expendable, and they
Can be elaborate or simple. Their design depends on several factors,
such as the target to be decoyed, a units tactical situation, available
resources, and the time available.
Can be preconstructed or made from field-expedient materials. Except
for selected types, preconstructed decoys are not widely available. A
typical unit can construct effective, realistic decoys to replicate its key
equipment and features through imaginative planning and a working
knowledge of the electromagnetic signatures emitted by the unit.
7-24. The two most important factors regarding decoy employment are location, fidelity and
realism. Logically placing decoys can greatly enhance their plausibility. Decoys are usually
placed near enough to the real target to convince an enemy that it has found the target. How-
ever, a decoy must be far enough away to prevent collateral damage to the real target when the
decoy draws enemy fire. Proper spacing between a decoy and a target depends on the size of the
target, the expected enemy target acquisition sensors, and the type of munitions directed against
the target. Decoys must be constructed according to a friendly units SOP and must include tar-
get features that an enemy recognizes. The most effective decoys are those that closely resemble
the real target in terms of electromagnetic signatures. Completely replicating the signatures of
some targets, particularly large and complex targets, can be very difficult. Therefore, decoy construc-
tion should address the electromagnetic spectral region in which the real target is most vulnerable.
Electronic Deception
7-25. Electronic deception is used to manipulate, falsify, and distort enemy sensors. It must be
conducted in such a manner that realistic signatures are replicated. Electronic deception takes
the form of manipulative, simulative, or imitative deception. The OPFOR may use one or all
of these types of electronic deception.
7-26. Manipulative Electronic Deception. Manipulative electronic deception (MED) seeks
to counter enemy jamming, signals intelligence (SIGINT), and target acquisition efforts by alter-
ing the electromagnetic profile of friendly forces. Specialists modify the technical characteristics
7-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
and profiles of emitters that could provide an accurate picture of OPFOR intentions. The objec-
tive is to have enemy analysts accept the profile or information as valid and therefore arrive at
an erroneous conclusion concerning OPFOR activities and intentions.
7-27. MED uses communication or noncommunication signals to convey indicators that mis-
lead the enemy. For example, to indicate that an OPFOR unit is going to attack when it is actu-
ally going to withdraw, the unit might transmit false fire support plans and requests for ammu-
nition.
7-28. MED can cause the enemy to fragment his intelligence and EW efforts to the point that
they lose effectiveness. It can cause the enemy to misdirect his assets and therefore cause fewer
problems for OPFOR communications.
7-29. Simulative Electronic Deception. Simulative electronic deception (SED) seeks to mis-
lead the enemy as to the actual composition, deployment, and capabilities of the friendly force.
The OPFOR may use controlled breaches of security to add credence to its SED activities. There
are a number of techniques the OPFOR uses.
With unit simulation, the OPFOR establishes a network of radio and
radar emitters to emulate those emitters and activities found in the
specific type unit or activity. The OPFOR may reference the false unit
designator in communications traffic and may use false unit call signs.
With capability or system simulation, the OPFOR projects an elec-
tronic signature of new or differing equipment to mislead the enemy
into believing that a new capability is in use on the battlefield. To add
realism and improve the effectiveness of the deception, the OPFOR
may make references to new equipment designators on other or re-
lated communications nets.
To provide a false unit location, the OPFOR projects an electronic sig-
nature of a unit from a false location while suppressing the signature
from the actual location. Radio operators may make references to false
map locations near the false unit location, such as hill numbers, a road
junction, or a river. This would be in accordance with a script as part of
the deception.
7-30. Imitative Electronic Deception. Imitative electronic deception (IED) injects false or
misleading information into enemy communications and radar networks. The communications
imitator gains entry as a bona fide member of the enemy communications system and maintains
that role until he passes the desired false information to the enemy.
7-31. In IED, the enemys electromagnetic emissions are imitated to mislead the enemy. Ex-
amples include entering the enemy communication nets by using his call signs and radio proce-
dures, and then giving enemy commanders instructions to initiate actions. Targets for IED in-
clude any enemy receiver and can range from cryptographic systems to very simple, plain-
language tactical nets. IED can cause an enemy unit to be in the wrong place at the right time,
to place ordnance on the wrong target, or to delay attack plans. Imitative deception efforts are
intended to cause decisions based on false information that appears to the enemy to have come
from his own side.
7-32. Noncommunications Deception. The OPFOR is continuing the development and
fielding of dedicated tactical noncommunications means of electronic deception. It simulates
troop movements by such means as use of civilian vehicles to portray movement to radar, and
marching refugees to portray movement of troops in the rear. Simple, inexpensive radar corner
7-6
_________________________________________________________________________________Chapter 7
reflectors provide masking by approximating the radar cross sections of military targets such as
bridges, tanks, aircraft, and even navigational reference points. Corner reflectors can be quite
effective when used in conjunction with other EW systems, such as ground-based air defense
jammers.
PHYSICAL DESTRUCTION
7-34. Another method for disrupting enemy control is physical destruction of the target. The
OPFOR integrates all types of conventional and precision weapon systems to conduct the de-
structive fires, to include fixed- and rotary-wing aviation, cannon artillery, multiple rocket
launchers (MRLs), and SSMs. It can also utilize other means of destruction, such as explosives
delivered by special-purpose forces (SPF), insurgents, terrorists, or other affiliated forces.
7-35. Physical destruction measures focus on destroying critical components of the enemy
force. C2 nodes and target acquisition sensors are a major part of the fire support plan during
physical destruction action. Priority targets include
Battalion, brigade, and division CPs.
Area distribution system communications centers and nodes.
Artillery FDCs.
FACs.
Weapon system-related target acquisition sensors.
Jammers and signals intelligence (SIGINT) systems.
7-36. The OPFOR may integrate all forms of destructive fires, especially artillery and aviation,
with other IW activities. Physical destruction activities are integrated with jamming to maximize
their effects. Specific missions are carefully timed and coordinated with the IW plan and the actions
of the supported units.
7-37. The accuracy of modern precision weapons allows the OPFOR to strike at specific IW-
related targets with deadly accuracy and timing. Due to the mobility and fleeting nature of many
IW targets, precision weapons deliver the munitions of choice against many high-priority targets.
7-38. The OPFOR continues to research and develop directed energy weapons, to include radio
frequency weapons and high-power lasers. While the OPFOR has fielded no dedicated weapon
systems, it may employ low-power laser rangefinders and laser target designators in a sensor-
blinding role.
7-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Counterreconnaissance
7-41. The OPFOR tries to exploit the large number and apparently superior technology of the
enemys sensors. For example, it employs software at the tactical level that allows it to analyze
the enemys satellite intelligence collection capabilities and warn friendly forces of the risk of
detection. The use of signature-reducing and signature-altering devices, along with diligent ap-
plication of operations security measures, supports deception activities in addition to denying
information.
PERCEPTION MANAGEMENT
7-45. Perception management involves measures aimed at creating a perception of truth that
best suits OPFOR objectives. It integrates a number of widely differing activities that use a com-
bination of true, false, misleading, or manipulated information. Targeted audiences range from
enemy forces to the States own citizens.
7-46. The various perception management activities include efforts conducted as part of
Psychological warfare (PSYWAR).
Public affairs.
7-8
_________________________________________________________________________________Chapter 7
7-47. The last two components, while not conducted at the tactical level, certainly have a great
impact on how and where the OPFOR conducts tactical-level perception management activities.
Perception management activities conducted at the tactical level must be consistent with the
States operational and strategic goals.
7-48. PSYWAR is a major contributor to perception management during combat. Targeting the
military forces of the enemy, PSYWAR attempts to influence the attitudes, emotions, motiva-
tions, and reasoning of enemy personnel. Specialists plan PSYWAR activities at all command
levels down to DTG or BTG. In addition to the enemys military forces, the specialists also con-
centrate on manipulating the local population and international media in favor of the OPFOR,
turning opinion against the enemys objectives. Planners focus special emphasis on highlighting
enemy casualties and lack of success. The enemy nations population is a major target of these
activities, due to the importance of public support for enemy military activities.
7-49. Statecraft (the art of conducting state affairs) and diplomacy (the art and practice of con-
ducting negotiations with other states) are aspects of perception management conducted with
foreign governments, and include those countries populations as a target. The OPFOR skillfully
employs media and other neutral players, such as nongovernmental and private volunteer or-
ganizations, to influence further public and private perceptions. It exploits the international me-
dias willingness to report information without independent and timely confirmation.
7-50. The State employs public affairs and censorship to control its own populations access to
information and perception of reality. Successful preparation of the population significantly en-
hances public support for the OPFORs military actions. As part of this, the State prepares its
forces and population for enemy IW.
INFORMATION ATTACK
7-51. The OPFOR recognizes the increasing dependence of modern armies on tactical informa-
tion systems. The OPFOR attempts to preserve the advantages of such systems for its own use,
while exploiting the enemys reliance on such systems.
7-52. Information attack is a critical element of OPFOR IW. This type of action focuses on the
intentional disruption or distortion of information in a manner that supports accomplishment of
the mission. Unlike, computer warfare attacks that target the information systems, IAs target the
information itself. Attacks on the commercial Internet by civilian hackers have demonstrated the
vulnerability of cyber and information systems to innovative and flexible penetration, disruption, or
distortion techniques. OPFOR information attackers (cyber attackers) learn from and expand upon
these methods.
7-53. IA offers a powerful tool for the OPFOR. For example, an information attacker may tar-
get an information system for electronic sabotage or manipulate and exploit information. This
may involve altering data, stealing data, or forcing a system to perform a function for which it
was not intended, such as creating false information in a targeting or airspace control system.
7-54. Likely targets for an IA are information residing in the critical tactical systems of
an opponent: telecommunications links and switches, fire control, logistics automation, ISR
downlinks, situational awareness networks, command and control systems, etc.
COMPUTER WARFARE
7-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
7-55. Computer warfare consists of attacks that focus specifically on the computer systems,
networks, and/or nodes. This includes a wide variety of activities, ranging from unauthorized
access (hacking) of information systems for intelligence-collection purposes, to the insertion of
malicious software (viruses, worms, logic bombs, or Trojan horses). Such attacks concentrate on
the denial, disruption, or manipulation of the infrastructures integrity. The OPFOR may at-
tempt to accomplish these activities through the use of agents or third-party individuals with
direct access to enemy information systems. It can also continually access and attack systems at
great distances via communications links such as the Internet.
7-56. OPFOR computer warfare activities may be conducted prior to or during a military
action. For example, by damaging or destroying networks related to an enemys projected force
deployments and troop movements, the OPFOR can effectively disrupt planning and misdirect
movement, producing substantial confusion and delays. As modern armies increasingly rely on
just-in-time logistics support, targeting logistics-related computers and databases can produce
delays in the arrival of critical materiel such as ammunition, fuel, and spare parts during critical
phases of a conflict.
The OPFOR can successfully conduct invasive computer warfare activities from the safety of its own
territory, given the distributed ability to reach targeted computers anywhere in the world (as long as
they are connected to the Internet). The OPFOR can continuously exploit the highly integrated
information systems of an adversary.
STRATEGIC IW
7-59. Strategic information warfare (SIW) is the synergistic effort of the State to control or
manipulate information events in the strategic environment, be they political, economic, mili-
tary, or diplomatic in nature. Specifically, the State defines SIW as any attack (digital, physical,
or cognitive) against the information base of an adversarial nations critical infrastructures. The ul-
timate goal of SIW is strategic disruption and damage to the overall strength of the opponent. This
disruption also focuses on the shaping of foreign decision makers actions to support the States stra-
tegic objectives and goals.
7-60. The Strategic Information Warfare Planning Office (SIWPO) within the National Com-
mand Authority (NCA) is responsible for developing a strategic information warfare plan (SIWP)
and for reviewing and integrating information-related plans of all State ministries, both military
and civilian. However, the SIWPO works most closely with the Ministry of Defense, specifically
the General Staff, to ensure the development of the SIWP in concert with the military IW plan.
7-10
_________________________________________________________________________________Chapter 7
7-61. In Intelligence Directorate of the General Staff, the Chief of IW handles IW functions
that transcend service component boundaries. He reviews and approves the IW plans of all op-
erational-level commands as well as any separate theater headquarters that might be estab-
lished. He drafts the overall military IW plan that, upon approval by the Intelligence Officer, is
forwarded to the Operations Directorate of the General Staff for inclusion in the military strate-
gic campaign plan (SCP). Once approved by the Chief of the General Staff, the military IW plan
and the rest of the military SCP are forwarded to the SID for incorporation into the national-
level SIWP and the national SCP, respectively. During peacetime and preparation for war, the
Chief of IW continues to review and refine the military IW plan.
OPERATIONAL-LEVEL IW
7-62. The OPFOR conducts IW actions at the operational level to support strategic campaigns
or operational objectives or to deny its opponents the ability to conduct such operations. The fo-
cus at this level is on affecting an adversarys lines of communication (LOCs), logistics, C2, and
critical decision-making processes. The OPFOR targets information or information systems in
order to affect the information-based process, be it human or automated.
7-63. Just as there is a Chief of IW in the General Staff, there is a chief of IW under the intel-
ligence officer in operational-level staffs. The intelligence officer coordinates all necessary na-
tional- or theater-level assets for the IW plan. He and chief of IW are responsible for ensuring
that all IW actions undertaken at their level are in concert with the overall military IW plan and
the SIWP. As necessary, the Chief of IW in the General Staff can directly task each operational-
level chief of IW to support the SIW campaign.
TACTICAL-LEVEL IW
7-64. Information, its management, and its control have always been important to the success-
ful conduct of tactical missions. Given todays tremendous advancements in information and in-
formation systems technology, this importance is growing in scope, impact, and sophistication.
The OPFOR recognizes the unique opportunities that IW gives tactical commanders and con-
tinuously strives to incorporate IW activities in all tactical missions and battles.
7-65. IW may help degrade or deny effective enemy communications and blur or manipulate
the battlefield picture. In addition, IW helps the OPFOR achieve the goal of dominating the
tempo of combat. Using a combination of perception management activities, deception tech-
niques, and EW, the OPFOR can effectively slow the pace of battle. For example, the OPFOR
may select to destroy lucrative enemy targets or orchestrate and execute a perception manage-
ment activity that weakens the enemys international and domestic support, causing hesitation
or actual failure of the operation. It executes deception plans to confuse the enemy and conceal
true OPFOR intentions. More traditional EW activities can also contribute to the successful ap-
plication of IW at the tactical level by challenging or weakening the enemys quest for informa-
tion dominance.
7-66. IW also supports the critical mission of counter-reconnaissance at the tactical level. The
OPFOR constantly seeks ways to attack, degrade, or manipulate the enemys reconnaissance,
intelligence, surveillance, and target acquisition (RISTA) capabilities. All enemy target acquisi-
tion systems and sensors are potential targets. Long-range sensors in particular are a high prior-
ity for attack by fires or electronic jamming.
7-67. While the effects of IW can be multidimensional and at times hard to pinpoint, the OP-
FOR highlights the following tasks and associated effects as critical to the application of IW at
the tactical level:
7-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
OFFENSIVE IW
7-69. Offensive IW involves the integrated use of subordinate and supporting capabilities and
activities, mutually supported by intelligence, to affect an adversarys decision makers or to in-
fluence others in order to achieve or promote specific OPFOR objectives. Using the elements of
IW offensively, the OPFOR can either prevent an adversary from exercising effective C2, chal-
lenge his quest for information dominance, or leverage enemy information systems to its own
advantage.
Purpose of Offensive IW
7-70. Simply put, offensive IW seeks to deny, degrade, destroy, disrupt, deceive, and exploit an
adversarys information systems and capabilities. Offensive IW helps the OPFOR seize and re-
tain the initiative by degrading the enemys information systems and forcing the enemy com-
mander to be reactive. This can result in slowing the enemys tempo, disrupting his decision cy-
cle, and impacting his overall ability to generate combat forces and execute and sustain opera-
tions.
7-12
_________________________________________________________________________________Chapter 7
Purpose of Defensive IW
7-73. The objectives of OPFOR defensive IW activities and actions are
Protecting the information environment.
Detecting attack.
Restoring capabilities.
Responding to attack.
Specific objectives of defensive IW include misleading the enemy concerning
the OPFORs force structure, location, and intent; protecting all critical in-
formation and communication links; and ensuring maximum survivability of
friendly high-value assets and combat power.
7-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
IW IN THE OFFENSE
7-75. IW in the offense can include both offensive and defensive IW activities. IW in the offense
may be in the form of deception planning and execution, physical destruction of C2 systems,
jamming, and/or IA of critical communication nodes. However, all elements of IW are available
for use by the commander.
7-76. During transition and adaptive operations, many tactical offensive actions are intended
to contribute to a larger effort to get the extraregional force to leave the region. Attacks to expel
often have a strong IW component, with an increased role of perception management activities,
with the goal of causing the enemy to remove himself from the area.
WINDOWS OF OPPORTUNITY
7-77. In order to conduct successful offensive action against an extraregional force that enjoys
a technological overmatch, the OPFOR must exploit windows of opportunity. Sometimes these
windows occur naturally, as a result of favorable conditions in the operational environment, but
most often the OPFOR will have to create its own opportunities.
7-78. When the OPFOR must create a window of opportunity, IW activities can contribute to
this by
Destroying or disrupting enemy C2 and RISTA assets.
Deceiving enemy imagery and signals sensors.
Selectively denying situational awareness.
Slowing the tempo of enemy operations.
Isolating key elements of the enemy force.
IW can help create the necessary windows of opportunity for each type of
offensive action by executing effective deception techniques, EW, and physical
destruction.
Disruption Force
7-80. IW supports the counterreconnissance mission of the disruption force. Units in the dis-
ruption zone attempt to strip away the enemys reconnaissance assets (to deceive him of the loca-
tion and configuration of the attack) while denying him the ability to acquire and engage OPFOR
targets with deep fires. Typical targets for attack by the disruption force include enemy C2 sys-
tems and RISTA assets.
7-81. In the disruption force, signals reconnaissance elements assist other OPFOR reconnais-
sance means in completing the identification of the type of forces deployed by the enemy. They
also identify enemy reconnaissance reporting links for exploitation during the course of the of-
fensive action. All fire support and tactical aviation nets are identified and monitored, as are C2
links to enemy reserves. Combat engineer units are a high priority, since their composition and
disposition on the battlefield are indicators of how and where the enemy expects to conduct his
main defensive effort. Of particular interest are all units with obstacle-creating assets, such as
minelayers.
7-14
_________________________________________________________________________________Chapter 7
Fixing Force
7-82. A fixing force may achieve its mission by conducting a successful feint or demonstration.
In this case, the function of the fixing force could be achieved by means of a deception force. EW
assets may be part of a fixing force. A combination of deception, EW, and other IW activities can
fix defending forces and forces that might otherwise have been capable of disrupting or interfer-
ing with the actions of the assault and exploitation forces, or coming to the aid of the targeted
enemy force. Such enemy forces and systems include reserves, quick-response forces, and preci-
sion fire systems that can respond rapidly to OPFOR offensive actions.
Assault Force
7-83. The assault force typically creates a window of opportunity that exposes the target and
allows the exploitation force to achieve the objective. However, effective IW can assist in creating
a situation in which no other assault force is necessary, since the target is already sufficiently
exposed.
7-84. Jamming missions are critical for assault forces. The OPFOR heavily targets reconnais-
sance-reporting links, minimizing the enemy knowledge of the approaching forces composition
and intentions. It jams fire support nets, and in particular reporting links between forward ob-
servers and firing batteries, to limit the number of calls for fire and fire missions. Depending on
the amount of air activity conducted by both the enemy and the OPFOR, air defenses and FACs
are targeted.
7-85. Specific targets jammed by the assault force, or in support of it, can include
Artillery FDCs and command nets.
Ground-reconnaissance and forward observer reporting links.
EW command and reporting links.
Air defense target acquisition, command, and air warning nets.
FAC-associated nets controlling attack aircraft.
Exploitation Force
7-86. Once the window of opportunity has been created by IW and/or other means, IW can con-
tinue to keep that window open throughout the conduct of the exploitation. If the target happens
to be an enemy C2 or RISTA asset, its physical destruction can meet the objective of the IW plan
as well as the battle plan.
7-87. During exploitation activities, IW (specifically EW) focuses on disrupting enemy forces,
such as reserves and attack air assets, that are capable of halting the OPFORs movement and
exploitation. Both signals reconnaissance and electronic jamming are performed by the exploita-
tion force and in support of it.
7-88. As the OPFOR maneuvers, it monitors enemy reserves and follow-on forces for the re-
sponse to the penetration. It also continues to monitor bypassed forces, in order to identify those
enemy elements capable of reconstituting or reorganizing and counterattacking. The OPFOR
typically tasks signals reconnaissance assets of exploitation forces with this mission, relieving
the assault force assets of this responsibility.
7-89. Priority targets for signals reconnaissance include
Reserve and follow-on force command nets.
Fire support nets (especially those units that could employ precision
weapons)
7-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Antitank nets.
Attack helicopter nets.
NBC-related nets.
7-90. Jamming activities during exploitation target those maneuver and fire support units
providing active resistance. The OPFOR heavily targets reporting links between reserve and fol-
low-on maneuver units and their reconnaissance patrols, as well as their command nets.
7-91. All enemy maneuver and fire support units that may influence the OPFORs exploitation
force are jammed. This includes jamming of enemy air defense units that could jeopardize the
use of OPFOR attack helicopters and fixed-wing attack aircraft.
7-92. Specific jamming priorities include
Command nets of units in contact with the OPFOR fixing or assault
forces.
Reserve and follow-on force command nets.
Artillery battery FDC and command nets.
Air defense target acquisition and command nets.
FAC links and attack air command nets.
Reserves
7-93. The OPFOR will use information security and C3D measures to conceal the location, size,
and composition of an offensive reserve. For reserves (or any other force that has not yet been
committed to battle), the OPFOR emphasizes rigid information security procedures. This in-
cludes limiting radio transmissions to the minimum required or using alternate communications
means. Assembly areas will rely heavily on C3D to protect the uncommitted force from observa-
tion and attack. In some cases, however, the reserve may act as a deception force, drawing atten-
tion away from the actual assault or exploitation force.
Dispersed Attack
7-95. Besides dispersion of forces, dispersed attack relies on IW to permit the OPFOR to con-
duct tactical offensive actions while overmatched by precision standoff weapons and imagery and
signals sensors. Deception forces can also play an important role in a dispersed attack.
7-16
_________________________________________________________________________________Chapter 7
Strike
7-97. Strikes are characterized by significant reliance on deception and other IW measures.
The window of opportunity needed to establish conditions favorable to the execution of the strike
may be created by deceiving enemy imagery and signals sensors or selectively denying the en-
emy situational awareness. A combination of deception and EW can fix defending forces, and
prevent the targeted enemy force from reacting in time to avoid destruction by OPFOR maneu-
ver and/or fires.
IW IN THE DEFENSE
7-98. As in the offense, IW in the defense can include both offensive and defensive IW activi-
ties. Some defensive IW activities tend to be more important in the defense than in the offense.
However, all elements of IW are available for use by the commander, and all can play a signifi-
cant role. Offensive IW actions have important applications, since an overall OPFOR defensive
actioneven at the tactical leveltypically incorporates many smaller offensive actions, which
can involve IW as well as maneuver and fires.
7-99. Specific defensive objectives include: misleading the enemy concerning the OPFORs
force structure, defensive orientation, and intentions; delaying and fragmenting the enemy at-
tack; and ensuring maximum survivability of friendly high-value assets and combat power. To
achieve these objectives, the OPFOR conducts a variety of IW activities that can
Disrupt or destroy enemy C2 nodes and links.
Provide for uninterrupted control of friendly forces.
Ensure survivability through extensive use of signature-reducing
measures.
Conceal the identities and locations of critical assets such as reserves,
artillery assets, and CPs.
Portray false force dispositions and strengths.
Portray false levels of preparation, readiness, and morale.
Disruption Force
7-101. The role of the disruption force and of IW supporting that force is much the same as in
the offense. Targets for attack in the disruption zone include enemy C2 systems and RISTA as-
sets. However, IW efforts in the disruption zone may seek to either destroy or manipulate enemy
reconnaissance assets.
7-102. The disruption force may selectively destroy or render irrelevant the enemys RISTA
forces and deny him the ability to acquire and engage OPFOR targets with deep fires. There will
be times, however, when the OPFOR wants enemy reconnaissance to detect something that is
part of the deception plan. In these cases, the disruption force will not seek to destroy all of the
enemys RISTA assets.
7-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
7-103. In either maneuver or area defense, the main defense force operates in the battle zone.
The success of the main defense force in accomplishing the purpose of the defense (destroy, pre-
serve, or deny) often relies heavily on successful execution of IW, especially in a defense against
a technologically superior extraregional force.
7-104. Maneuver Defense. Part of a defensive line in a maneuver defense may consist of de-
ception defensive positions. When the contact and shielding forces conduct defensive maneuver
to positions on subsequent defensive lines, signals reconnaissance and jamming assets support
the movement, when possible. Because of their high value to the commander, these assets nor-
mally do not deploy in positions that expose them to capture or destruction. Rather, they deploy
to reasonably secure terrain available off the routes of defensive maneuver. Primary targets are
enemy reconnaissance reporting links and fire support nets, in order to prevent or minimize at-
tacks or fire strikes on the contact or shielding force. Operational-level signals reconnaissance
and jamming assets may support a divisions (or brigades) maneuver defense; less likely, but
possible, is support provided by flanking units.
7-105. Area Defense. IW is particularly important to the execution of the area defense in tran-
sition and adaptive operations. Deception is critical to the creation of complex battle positions,
and effective perception management is vital to the creation of the windows of opportunity
needed to execute maneuver and fires. Complex battle positions are defensive locations designed
to employ a combination of complex terrain, C3D, and engineer effort to protect combat forces
from engagement by precision standoff attack. They are designed to protect the units within
them from detection and attack. Engineers also support the IW plan through activities such as
constructing deception defensive positions and preparing false routes. Defensive actions during
transition and adaptive operations will typically include increased use of perception manage-
ment in support of defensive actions.
Counterattack Force
7-106. As the OPFOR element designated as a counterattack force maneuvers to counterattack,
early and accurate identification of any enemy recognition and response is critical. Enemy air-
borne and ground reconnaissance reporting links and sensors, and long-range fire assets are
high-priority targets, although the OPFOR must rely on operational-level support for much of
the targeting capabilities required.
7-107. Signals reconnaissance and jamming priorities are generally similar to those for the
main defense force, with a few exceptions. Of particular importance are identifying and disrupt-
ing those command, fire support, and reconnaissance nets that link the penetrating enemy force
with his main body. Artillery and aviation nets are jammed, in order to prevent attacks coordi-
nated with the penetrating force.
Reserves
7-108. The commander positions his maneuver reserve in an assembly area using C3D to protect
it from observation and attack. In some cases, however, the reserve may receive the mission of
acting as a deception force. Antilanding reserves may be allocated EW assets for the purpose of
disrupting or defeating an airborne or heliborne landing.
7-18
_________________________________________________________________________________Chapter 7
will discuss specific applications of various IW element that apply to the OPFOR defense, in
which the paramount role of IW is to provide deception capabilities, protection and security, EW,
and physical destruction, as well as to assist in attack detection and capability restoration. This
discussion supplements the basic information found in the Elements of IW section earlier in this
chapter, but with defense-specific applications.
Deception
7-110. The OPFOR develops a deception plan as part of the overall IW plan. The extent and
complexity of the deception depends on the amount of time available for planning and prepara-
tion.
7-111. While creating the picture of the battlefield the OPFOR wants the enemy to perceive,
deception planners have two primary objectives. The first is to cause the enemy to commit his
forces and attack in a manner that favors the OPFORs defensive plan. Specifically, the intent is
to have the enemy attack and attempt to penetrate the defense at a location of the OPFORs
choosing, where the OPFOR has created a lethal antitank defense and can counterattack to de-
stroy the enemy main force.
7-112. The second objective, and the focus of deception activities when time is limited, is to
minimize friendly-force signatures. This limits detection and destruction by enemy attack.
7-113. False Deployment. The OPFOR attempts to deny the enemy the ability to accurately
identify its defensive force dispositions and intentions. Knowing it cannot totally hide its forces,
it tries to blur the boundaries and compositions of the defending forces, while providing indica-
tions of deception units and false targets.
7-114. Actions are also taken to hide the exact composition and deployment of forces. Specific
activities include
Establishing deception defensive positions and engineer obstacles, sup-
ported by decoy vehicles.
Establishing disruption zones to conceal the actual battle line of
friendly defensive positions.
Concealing unit movement and occupation of defensive positions.
Creating the perception of false units and their associated activity.
Creating false high-value assets such as artillery and rocket systems,
tanks, and CPs.
7-115. By providing the appearance of units in false locations, the OPFOR attempts to induce
the enemy to attack into areas most advantageous to the OPFOR. When the deception is success-
ful, the enemy attacks the defense where the OPFOR can take maximum advantage of terrain.
False thermal and acoustic signatures, decoy and actual vehicles, and corner reflectors, sup-
ported by false radio traffic, all contribute to the appearance of a defensive force where in fact
none exists. Depending on the terrain, deception units may be created forward of the actual de-
fense, causing the enemy to commit forces to the attack earlier than he should. Alternatively, the
actual units could be forward of the deception units, providing surprise and lethal fires before the
enemy is prepared.
7-116. Sufficient engineer support is critical to the success of any defensive deception activity.
Units in the main effort receive the priority, to include the allocation of additional assets from
operational-level engineer units.
7-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
7-117. Signature Reduction. Signature reduction of OPFOR units in the defense is critical to
the success of any deception plan. Minimizing the thermal, radar, acoustic, and electronic signa-
tures of combat vehicles and supporting systems is critical to ensuring deception of the enemy
and, of course, enhancing survivability. The OPFOR extensively uses a variety of signature-
reduction materials and procedures that provide protection from sensors and target acquisi-
tion systems operating across the electromagnetic spectrum.
Electronic Warfare
7-123. EW activities conducted in support of the defense focus on identifying and disrupting the
enemy maneuver C2 networks, disrupting control links associated with enemy fire support and
tactical aviation assets, and identifying sensor and target acquisition systems. As in the offense,
specific targets are assigned a priority based on the expected impact of their disruption, as well
as the time and location on the battlefield.
7-124. Signals Reconnaissance. In support of the defense, a division or separate brigade re-
ceives intelligence from the parent OSC concerning the projected enemy forces structure, compo-
sition, and intentions. This is especially critical for the signals reconnaissance effort, due to the
relatively short range of the tactical systems employed by the division or brigade.
7-20
_________________________________________________________________________________Chapter 7
7-125. The OPFOR may choose to deploy signals reconnaissance assets forward within the dis-
ruption zone. These systems deploy along a baseline that best allows intercept and DF in the
projected area through which the enemy main effort must travel. When possible, the assets de-
ploy to pre-surveyed positions. It is extremely critical to select sites with access routes concealed
from enemy observation.
7-126. Deploying vulnerable electronic systems forward is a risk the commander may assume to
gain a tactical advantage. This deployment does allow the short-ranged tactical systems to col-
lect on targets they would otherwise be unable to reach from positions within the battle zone.
7-127. As the enemy forces approach, the OPFOR targets specific types of units for identifica-
tion and locating, to include
All reconnaissance units and systems, both ground-based and airborne.
Command links and CPs of leading maneuver units (although typically
most are still out of range).
Engineer units, especially obstacle-clearing and crossing assets.
Fire support and aviation nets, especially FACs and forward observers.
Jammers.
7-128. Reconnaissance and engineer activities are high priorities for detection and locating,
since they are excellent indicators of enemy intentions. The enemy moves obstacle-clearing
equipment and water-crossing systems, such as pontoon bridges, into the areas where he expects
to pass the main effort, and, in the case of rivers, where he plans to cross. The actions of recon-
naissance assets, particularly ground reconnaissance patrols, similarly indicate likely intentions
of the enemy main effort. Enemy jammers are always a high-priority target, due to their poten-
tial effect on OPFOR command and control.
7-129. As the enemy commits forces to the attack, the OPFOR tasks its signals reconnaissance
assets with identifying and locating the enemys main-effort maneuver and fire support ele-
ments, as well as those support units dedicated to supporting the main effort. The focus at this
time is on providing targeting, as well as details on enemy strength and intentions. Targeting
priorities for intercept and DF include
Maneuver battalion and brigade nets.
Artillery nets.
FAC and attack helicopter nets.
Air defense nets.
Communications jammers and SIGINT systems.
Engineer nets.
As command elements of these enemy units (such as CPs and communica-
tions nodes) are identified and located, the coordinates are passed to the divi-
sion (or brigade) for confirmation and targeting by fires.
7-130. Primary targets for the radar intercept and DF assets are the enemys battlefield surveil-
lance radars, weapon-locating radars, and air defense radars. In particular, detection of the en-
emys battlefield surveillance radars provides a key indication of his main effort, as well as a
general location of the enemys leading forces.
7-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
7-131. Electronic Jamming. The OPFOR conducts electronic jamming from the disruption
zone, although limited in scope. Because jammers are also limited in number, it dedicates them
to the defenses main effort.
7-132. There are a number of circumstances where jamming is appropriate, and at times, criti-
cal. These include
Jamming of maneuver and fire support nets in support of withdrawing
forces.
Jamming of C2 nets associated with NBC and precision weapons.
Jamming of reconnaissance reporting nets.
Jamming as part of a deception plan.
While the commander may employ jamming at other times, he must consider
the potential gain against the risk of detection.
7-133. The OPFOR takes advantage of the time prior to an enemy attack to emplace expendable
jammers (EXJAMs). These jammers can disrupt enemy communications nets. When used in con-
junction with terrain (such as at natural choke points, mountain passes, or valleys), they can
achieve significant results despite their short range and low power. The OPFOR can also use them to
support a deception plan, without risking expensive vehicle-based systems.
7-134. While limited in number, artillery-delivered EXJAMs may be employed. These jammers
are especially useful in those areas where support is not available from more powerful vehicle-
mounted jammers. Proximity fuze jammers deployed to protect high-value assets are active,
since the high-value assets are within indirect fire range from enemy artillery.
7-135. The OPFOR also employs jamming in the battle zone in support of its main defense force.
Once enemy forces close with the defending units, jamming activities focus primarily on enemy
maneuver and fire support assets engaged in his main effort, as well as any assets directly sup-
porting them.
7-136. Jamming priorities are similar to those for signals reconnaissance. Maneuver units are
jammed in order to disrupt coordination between and within units, especially when enemy units
are achieving varying degrees of success. Reporting links between reconnaissance and engineer
elements and the supported maneuver units are attacked as they attempt to exploit OPFOR
weaknesses the enemy may have found.
Physical Destruction
7-137. During the defense, IW-related destruction measures focus on destroying enemy assets
critical to the control of the attack. As in the offense, indirect fire, ground attack, and possibly air
attack all can contribute to the effort. Specific targets vary based upon location and time, but
typical high-priority targets include
Precision weapons systems.
C2 nodes and facilities.
Artillery, tactical aviation, and air defense systems.
Reserves.
RISTA systems.
7-138. Special emphasis is given to destruction of RISTA capabilities prior to the attack on OP-
FOR defensive positions. Once the attack begins, the OPFOR heavily targets enemy C2 nodes
7-22
_________________________________________________________________________________Chapter 7
responsible for the planning and conduct of the attack, along with supporting communications.
Typically, destruction of C2 nodes prior to the attack may allow the enemy time to reconstitute
his control, whereas targeting them once forces are committed to the attack can cause a far
greater disruptive effect.
IW PLANNING
7-139. OPFOR IW planning occurs at all levels of conflict and before and after conflict. At the
strategic level, the initial focus is achieving State objectives and supporting the SCP. Perception
management, protection and security measures, and deception activities are critical at this level.
7-140. As tensions escalate, IW at the operational level can be employed to disrupt the enemys
information systems, further demonstrating national resolve and military capability. The opera-
tional-level chief of IW formulates the IW plan as an integral part of all ground, air, sea, and
space operations within the OSC. At the tactical level, IW activities focus on deception activities,
the disruption of enemy military communications, and protection and security for OPFOR mili-
tary actions (see TacticalLevel IW above).
7-141. An effective IW action demands the coordination of activities and capabilities into a sin-
gle, focused plan. Any or all elements of IW may be effectively used in any given plan. Figure 6-1 pro-
vides examples of objectives and targets.
Electronic Warfare Exploit, disrupt, deny, and degrade the en- C2 and RISTA assets and
emys use of the electromagnetic spectrum. networks.
Computer Warfare Disrupt, deny, or degrade the enemys C2 and RISTA assets and
computer networks and information flow. networks.
Physical Destruction Destroy enemys information infrastructures. C2 nodes and links, RISTA
assets, telecommunications,
and power sources.
Information Attack Objectives vary based on situational needs Computer networks, soft-
ware, hardware, telecom-
7-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
IW INFORMATION REQUIREMENTS
7-142. The OPFOR requires precise and reliable knowledge of the enemys military information
architecture, including the design and training of his command structure, his decision-making
philosophies, and his communications and sensor capabilities. While not necessarily collected by
tactical assets, information related to an enemy nations civil communications, information sys-
tem software, and even how the media influence decision makers may be exploited on the battle-
field.
7-143. Information collected through reconnaissance is critical to the OPFOR IW planning proc-
ess. The OPFOR uses all forms of information collection, ranging from signals and ground recon-
naissance, to engineer reconnaissance, to radars and NBC detection systems. It can also use hu-
man intelligence assets such as agents and sympathizers. Each type provides critical pieces of
the enemy commanders plan that, when integrated, provide an accurate understanding of the
plan while minimizing the likelihood of accepting enemy deception for reality.
STAFF RESPONSIBILITIES
7-144. There is a chief of IW under the intelligence officer at division and brigade level, who has
responsibilities that parallel those of the chiefs of IW in the General Staff and on operational-
level military staffs. Within tactical-level staffs, the intelligence officer and chief of IW are re-
sponsible for ensuring that all IW actions undertaken at their level are in concert with the opera-
tional-level IW plan, the overall military IW plan, and the SIWP. As necessary, the Chief of IW
in the General Staff or the operational-level chief of IW can directly task each tactical-level chief
of IW to support the SIW campaign or the operational-level IW plan. (See the Strategic IW and
Operational-Level IW sections of this chapter.)
Intelligence Officer
7-145. The intelligence officer heads the intelligence and information section of the primary
staff. He ensures that all intelligence requirements are met and executes staff supervision over
the IW plan. He coordinates the support of all necessary operational-, theater-, or national-level
assets required for execution of the division (or brigade) IW plan. He must effectively task organ-
ize his staff resources to plan, conduct, and execute IW in a manner that supports strategic and
operational-level IW plans. Traditional staff functions and relationships may be expanded or
even redefined. (See Chapter 2 for a more detailed discussion of staff responsibilities and organi-
zation.)
Chief of IW
7-146. The division (or brigade) chief of IW belongs to the secondary staff, heading the IW sub-
section under the intelligence officer, under whose supervision he formulates the IW plan as an
integral part of division- or brigade-level planning. An effective IW action demands the coordina-
tion of all activities and capabilities into a single, focused plan. Any or all elements of IW may be
effectively used in any given plan.
7-24
_________________________________________________________________________________Chapter 7
7-147. The chief of IW supervises the execution of the division (or brigade) IW plan. He is re-
sponsible for
Coordinating the employment of IW assets, both those constituent to
the division (or brigade) level and (with the help of his intelligence of-
ficer and those at higher levels) those assets available at higher levels
that could support his IW plan.
Planning for and supervising all information protection and security
measures.
Supervising the implementation of the deception plan and perception
management objectives.
Working with the operations section of the staff to ensure that targets
scheduled for destruction support the IW plan, and if not, resolving
conflicts between IW needs and tactical needs.
Recommending to the intelligence officer any necessary actions re-
quired to implement the IW plan.
7-148. The chief of IW at each level of command submits his IW plan to the chief of IW at the
next-higher level. The senior chief of IW issues directives to subordinate units chiefs of IW.
These directives are part of the next-higher commands battle plan (operations plan) or combat
order (operational directive), and can be part of the SCP. What the subordinates plan and exe-
cute must be in concert with the higher plan and the higher headquarters also needs to ensure
that the IW plan of one subordinate does not conflict with that of its adjacent units.
7-149. The chief of IW also plays a key role in coordinating IW activities with other staff sec-
tions and subsections, particularly with members of the functional staff. For instance, he coordi-
nates with the division-level chief of integrated fires (or brigade-level chief of fire support) to en-
sure that deception and protection and security measures contribute to the success of fire sup-
port to overall offensive and defensive actions. He coordinates with the chief of force protection to
prevent or mitigate the effects of hostile actions on critical information and information systems.
He works closely with the chief of population management and representatives from the Minis-
try of Public Information regarding coordination of PSYWAR and other perception management
activities.
PLANNING
7-150. A key element in planning the offense or defense is organizing IW activities that are ap-
propriate and necessary to support whatever type of offensive or defensive action is being
planned. The success of IW during any form of action relies on the effectiveness of earlier IW ac-
tivities. Of course, it is important for all tactical-level IW plans to fit into the overall aims and
plans already set into motion at the operational and strategic levels.
7-151. The components of a tactical-level IW plan include, at a minimum, the following:
Statement of national- and operational-level military objectives and
goals.
IW objectives of the next-higher level of command.
Definition of the missions of IW (public, private, military, and nonmili-
tary).
Identification of all applicable State elements of power to assist in the
execution of the IW plan.
7-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
7-26
Chapter 8
Reconnaissance
To the OPFOR, the single most important component of military action is
reconnaissance. Reconnaissance represents all measures associated with
organizing, collecting, and studying information on the enemy, terrain,
and weather in the area of upcoming battles. Aggressive, continuous
reconnaissance allows the timely accomplishment of combat missions
with minimum losses. Poor reconnaissance can lead directly to failure.
The OPFOR will commit significant resources to any reconnaissance
mission.
8-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
CONCEPT
8-3. For the OPFOR, reconnaissance is a critical element of combat support.
In modern combat, the battlefield develops unevenly, and units cannot rely
on the security of their flanks or rear in fact there may not even be flanks
or rear. Friendly and enemy forces can become mixed, with the combat
situation developing and changing quickly. Reconnaissance elements must
warn commanders of developing threats and identify enemy strengths and
vulnerabilities. The OPFOR organizes reconnaissance to acquire continuous,
timely, and accurate information about the enemys NBC and precision
weapons; force disposition and intentions; and terrain and weather. This
information is vital to the OPFOR decision-making and planning process.
Reconnaissance can decisively influence the outcome of a battle.
PRINCIPLES
8-4. With the speed and potential non-linearity of modern combat, the role of
reconnaissance has increased in importance. Without decisive actions of
reconnaissance forces and assets, it is impossible to preempt the enemy, seize
the initiative, and conduct a successful battle. The OPFOR uses the following
set of interrelated principles to guide its reconnaissance activities:
Focus
8-5. Reconnaissance action must serve the commanders needs and focus on
elements and objectives critical to the execution of combat missions. Each
unit develops a comprehensive reconnaissance plan in accordance with the
organizations mission. The reconnaissance plan must coordinate all available
assets into an integrated plan.
8-6. The OPFOR understands that information is not the same thing as
knowledge. With the number of sensors available to the tactical commander,
the danger exists that analysts and decision makers could become
overwhelmed with raw data. Therefore, all reconnaissance activities should
focus on answering specific information requirements.
Continuity
8-7. The modern, fluid battlefield demands continuous reconnaissance to
provide an uninterrupted flow of information under all conditions.
Reconnaissance provides constant coverage of the enemy situation, using a
wide variety of redundant assets. Not only must reconnaissance units answer
specific requests for information; they also must continuously collect
information on all aspects of the enemy, weather, and terrain to fully meet
future requirements. The variety of overlapping assets ensures greater
validity of collected information. Continuous reconnaissance decreases the
likelihood that the enemy could carry out successful deception.
8-8. Reconnaissance units attempt to maintain contact with the enemy at all
times. They conduct reconnaissance in all directions, in order to prevent
8-2
_________________________________________________________________________________Chapter 8
surprise. They collect information during all battle phases, 24 hours a day, in
all weather conditions.
8-9. To ensure this continuity, units conducting reconnaissance must
maintain a high state of combat readiness. They must be able to sustain
themselves wherever they deploy, without relying on others for transport or
subsistence. In the event that a specialized reconnaissance unit is destroyed
or becomes combat ineffective, commanders reassign the mission to
appropriate forces.
Aggressiveness
8-10. Aggressiveness is the vigorous search for information, including the
willingness to fight for it if necessary. Reconnaissance troops must collect
information creatively and make maximum use of all assets and methods to
ensure success on the battlefield. The OPFOR vigorously employs all
available collection resources and adheres carefully to the reconnaissance
plan. However, it will alter the plan when its own initiatives or enemy
actions dictate.
8-11. Although reconnaissance is the primary mission, all reconnaissance
units train to defend themselves. Reconnaissance troops penetrate enemy
defenses, avoiding contact if possible. When required, they can ambush and
raid enemy forces. They do what is necessary to fulfill the commanders
information needs.
8-12. The information requirement determines the techniques to use.
Reconnaissance patrols by mechanized forces are not always the best means.
Ambushes and raids are fruitful sources of information from captured
prisoners, documents, and equipment. Such information-gathering actions
are generally more important than any associated damage, but there are
exceptions. Reconnaissance elements are often called upon to destroy high-
value targets they find.
Timeliness
8-13. Timely information is critical on the modern battlefield. Because of the
high mobility of modern forces, there are frequent and sharp changes in the
battlefield situation. As a result, information quickly becomes outdated. The
best intelligence is useless if it is not received in time. Timely reporting
enables the commander to exploit temporary enemy vulnerabilities and
windows of opportunity. Using increased data automation, he can adjust
plans to fit a dynamic battlefield. The OPFOR achieves timeliness through
increased automation for C2 and processing of information; real-time or near
real-time aerial downlinks; and satellite downlinks. This timeliness is
especially critical for the success of integrated fires commands (IFCs).
8-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
8-4
_________________________________________________________________________________Chapter 8
ASSETS
8-19. Tactical reconnaissance supports division and below. It provides
reconnaissance needed to plan and carry out tactical actions within each
commanders area of responsibility (AOR). Divisions and below perform
tactical reconnaissance using specially-trained reconnaissance resources and
combat troops from maneuver units. Figure 8-1 summarizes the range
capabilities of the reconnaissance assets that can support tactical
commanders.
Distance in Kilometers
1. Satellite No Limit
2. Aerial
a. Photographic Reconnaissance 600
b. UAV (RPV and Drone) 300+
4. Special Reconnaissance
a. Theater SPF Assets 100-500+
b. OSC SPF Assets 100-500
c. Division LRR Company
100
5. Mechanized Reconnaissance
a. IRPs from Division
Reconnaissance Battalion 50+
b. IRPs from Brigade
Reconnaissance Company 50
6. Artillery Observation
a. Surveillance and Countermortar/
20+
Counterbattery Radars
b. Sound Ranging 25
c. Flash Spotting (Visual Limits)
d. RPV 60
GROUND RECONNAISSANCE
8-20. Tactical units may send out independent reconnaissance patrols (IRPs)
to perform ground reconnaissance. The size of such patrols can vary, but is
usually an augmented reconnaissance or combat arms platoon.
8-21. Long-range reconnaissance (LRR) units may form additional IRPs, or
their vehicles can supplement patrols formed by the other reconnaissance
units. However, LRR personnel are specially trained for insertion in small
reconnaissance teams at distances up to 100 km beyond the battle line.
8-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
AERIAL RECONNAISSANCE
8-28. Aerial reconnaissance includes visual observation, imagery, and signals
reconnaissance from airborne platforms. These platforms may be either
piloted aircraft or remotely-piloted vehicles (UAVs). 1
1
The UAV represents one of two types of unmanned aerial vehicle (UAV); the other type is the drone. An UAV can
be flown by remote control from a ground station, over a flight path of the controllers choosing. A drone, on the
other hand, flies a set course programmed into its onboard flight control system prior to launch. See the appropriate
OPFOR organization guide and equipment guide for details on UAV and drone organizations and capabilities.
8-6
_________________________________________________________________________________Chapter 8
10 km 5 km e
Lin
ttle
Ba
Ground Control
Station
Target
8-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
8-31. While the radio command link gives an UAV greater flexibility, it also
limits the range of the UAV to the line-of-sight transmission range from its
control station. However, many UAVs can also operate in a preprogrammed
mode at longer ranges.
8-32. As the UAV acquires priority point and area targets during these
missions, it immediately transmits video imagery of the target to its ground
control station. Personnel at the ground control station must use terrain and
map association to determine target location in terms of grid coordinates. By
this method, trained personnel can usually determine target location to
within 100 m. Even with modern UAVs equipped with Global Positioning
System (GPS) receivers, the transmission from the UAV gives the location of
the UAV, not the location of the target. However, knowing the precise
location of the UAV at the time it took the imagery can greatly facilitate
terrain and map association.
8-33. Having determined the target location, the ground control station
personnel must then transmit the target location via secure radio
communications to the COR. For UAVs from artillery target acquisition
elements, the target data would go directly to the artillery fire control
element.
10 km
e
Lin
tle
Ground Control Ba
Station
Target
8-8
_________________________________________________________________________________Chapter 8
Ba
ttle
Lin
e
ce
aissan
ep Reconn
De
Forw
ard A
rea R
econ
nais
sanc
Bat e
tle Target
Lin
e Target
Target
Target
Launcher
8-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RECONNAISSANCE PLANNING
8-34. The purpose of reconnaissance planning is to thoroughly coordinate the
actions of all reconnaissance organizations and levels. Ultimately, the
planning must ensure that missions, targets, times, forms of action, zones of
reconnaissance responsibility (ZORRs), and the exchange of information are
fully coordinated.
DTG ZORR
DTG AOR
8-36. By definition, the ZORR extends into adjacent unit AORs. This is to
serve the dual functions of overlapping coverage and preventing surprise.
Within this zone, the headquarters must be able to monitor enemy activity
sufficiently to ensure that unexpected enemy moves do not disrupt its own
plans. Reconnaissance in this zone should provide early warning of potential
enemy movement into the AOR from any direction.
8-10
_________________________________________________________________________________Chapter 8
COMMANDER
8-37. Reconnaissance planning begins with the commander. Following the
receipt of combat orders, the maneuver commander determines what
additional information is necessary to conduct his mission. To fight the battle
properly, the tactical commander typically needs information on
Enemy positions, boundaries, and strong and weak points.
The location of key enemy systems and installations (such as FARPs,
counterfire radars, C2 nodes, or logistics centers).
The location and movement of enemy reserves.
Possible axes for enemy counterattacks.
Terrain trafficability and cover.
The location of and approaches to obstacles.
8-38. There are several pieces of information that can be of great interest
before and during the battle. General aims that guide the reconnaissance
process prior to the initiation of combat are the timely detection or
determination of
Enemy preparations for an attack with conventional or precision
weapons, or WMD.
Indications of the enemys concept for upcoming action.
Groupings of enemy forces and their preparation for combat.
Changes in the grouping or composition of these forces.
8-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
assets may or may not be used prior to combat. He establishes the type of
information required and the deadline for receipt of this information.
CHIEF OF STAFF
8-42. The chief of staff interprets the commanders instructions and converts
them into specific tasks. At this point, if not before, the general aims of the
reconnaissance effort become specific information requirements and taskings
to reconnaissance units.
8-43. The chief of staff has overall responsibility for providing the necessary
information for the commander to make decisions. At the tactical level, he
has a more clearly defined role in structuring the reconnaissance effort than
at higher levels.
8-44. Because reconnaissance is a combined arms task, the chief of staff must
coordinate the overall reconnaissance effort. Aside from reconnaissance
troops, various other combat, combat support, and combat service support
branches have reconnaissance tasks and capabilities. Thus, coordination
involves not only ground reconnaissance, but also the efforts of target
acquisition elements and chemical, engineer, and signals reconnaissance, as
well as any aerial reconnaissance assets allocated to support the maneuver
units mission. The chief of staff can ensure that the various branches report
the results of all these reconnaissance efforts through the COR and the
intelligence officer to the commander.
8-45. Upon receipt of the commanders reconnaissance instructions, the chief
of staff refines the requirements and passes them to the intelligence officer
for the detailed development of the reconnaissance plan. The chief of staff
provides any other information available on targets and areas for
concentration of the reconnaissance effort.
INTELLIGENCE OFFICER
8-46. The intelligence officers instructions to the COR specify details of the
missions identified by the commander, and the method of execution. He
determines the sequence for the performance of these tasks and the
manpower and equipment necessary to complete them. He specifies the
reconnaissance assets to be used for the priority reconnaissance tasks. He
determines the principal means of preparing and supporting reconnaissance
units, and ensuring their interaction and coordination. He then specifies to
the COR the times for preparing the reconnaissance plan and issuing combat
orders to reconnaissance units.
8-47. The intelligence officer is responsible for the coordination between
recon and IW, communications requirements. He reviews the efforts of all
three areas and resolves conflicts. For example, if the IW plan recommended
a particular enemy command and control center for destruction, but the
reconnaissance plan sought to collect vital information from it, the
intelligence officer would choose the course of action that best supported the
commanders intent.
8-12
_________________________________________________________________________________Chapter 8
CHIEF OF RECONNAISSANCE
8-48. In tactical group headquarters, the intelligence and information section
of the staff includes a reconnaissance subsection headed by the COR. This
staff officer is responsible for organizing reconnaissance in accordance with
the commanders general plan. The COR works for and reports to the
intelligence officer. Along with or through the intelligence officer, he reports
to the commander concerning the organization of reconnaissance planning.
8-49. Like other section and subsection chiefs on the division and brigade
staff, the COR has a dual reporting chain. He is responsible to the
commander and chief of staff in whose headquarters he serves. However, he
also receives additional instructions and guidance from his COR counterpart
at the next-higher level. For example, a DTG COR coordinates with the OSC
COR and with the CORs of subordinate BTGs. Through these channels, he can
request reconnaissance support from higher levels or task reconnaissance
elements of subordinate brigades to perform missions for the division. Thus, a
tactical-level COR has access to information collected by means not available to
him, such as aerial reconnaissance. He is also responsible for passing the results
of reconnaissance both up and down the chain of command.
8-50. To the reconnaissance missions he receives from the chief of staff, the
COR adds specific instructions to complete the reconnaissance plan. His
knowledge of enemy doctrine, and his access to current intelligence enable
him to assign precise missions to reconnaissance assets at his own level of
command. He establishes time constraints, reporting schedules, and
reporting methods. He also establishes measures for interaction and
coordination of reconnaissance actions to ensure accomplishment of all
missions and objectives. He organizes and continuously monitors
communications with all maneuver units and with the headquarters of
subordinate reconnaissance units. He can also provide guidance to
immediately subordinate maneuver units regarding their contribution to the
higher units reconnaissance effort.
RECONNAISSANCE PLAN
8-51. The COR at tactical group level develops a reconnaissance plan within
the framework of the higher headquarters mission and the higher
commanders decision for combat. He combines this information with the
higher headquarters instructions on conduct of the reconnaissance mission,
information currently available on the enemy, and status of reconnaissance
assets.
8-52. Depending on the situation, the reconnaissance plan may include
The AORs of friendly units.
The commanders concept and mission.
All available information regarding known and suspected enemy
groupings and intentions.
A list of tasks (including obtaining new information, confirming
previously available information, BDA, and calling for fire on targets of
opportunity).
A list of priority targets for reconnaissance.
8-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Reporting
8-58. Standard operating procedures developed for reconnaissance reporting
seek to ensure that the supported commander receives critical information he
requires to make a decision. To reduce the likelihood of information overload,
there are two different reporting categories: periodic (reports submitted at a
set time) and aperiodic (reports submitted on the staffs own initiative
resulting from significant changes in the situation).
8-14
_________________________________________________________________________________Chapter 8
Reconnaissance Report
8-60. Commanders and staffs receive reports from reconnaissance elements
and/or CORs. Depending on the situation, these reports may be in the form of
briefings, radio communications, or written reports.
8-61. The term reconnaissance report also applies to a specific document
prepared by the headquarters of a brigade, division, or OSC for reporting
information about the enemy to a higher headquarters. It may be a periodic
reconnaissance report forwarded every few hours at set times specified in
instructions. It may also be an aperiodic report prepared at the initiative of
the subordinate commander or by special request from the higher commander.
In either case, it includes, at a minimum, the following:
The general nature of enemy activities throughout the reporting units
entire ZORR.
The disposition and grouping of enemy forces in each area or axis
within the ZORR.
Significant changes that have occurred since the previous report.
The reporting units conclusions about possible enemy actions based on
these indications.
The source of the data and the time received.
Reconnaissance Summary
8-62. The reconnaissance summary is a report, prepared by the headquarters
of a division or brigade that contains information about the enemy covering a
given period of time. The reporting unit sends this summary to the higher
headquarters at times established in instructions. It is normally provided
once a day as a brief narrative of the highlights of the past 24 hours. It is also
sent to adjacent and subordinate headquarters for information purposes. It
typically includes the following:
The general nature of enemy activities in the AOR.
Data about the enemys precision weapons and WMD and their
employment.
The positions of enemy forces at the time of preparation of the
summary.
Information about the enemys air (and naval) forces, air defense, CPs,
radar equipment, logistics installations, obstacles, and field
fortifications.
8-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RECONNAISSANCE ORGANIZATIONS
8-63. The general term reconnaissance organization applies to any unit or
detachment given a specific reconnaissance mission. Some reconnaissance
organizations are formed on the basis of a reconnaissance unit, but others come
from maneuver units or other sources.
8-64. At the tactical level, the ground forces employ a variety of
reconnaissance organizations, tasked and tailored to fit the specific needs of
the tactical commander in a particular situation. These organizations vary in
size and composition from a few scouts to a battalion.
8-65. Reconnaissance units at the tactical level may either operate
independently or be task organized with personnel from maneuver units into
special types of reconnaissance organizations. They may or may not have
augmentation such as mechanized infantry troops, tanks, artillery, engineers,
NBC reconnaissance personnel, and other specialists.
COMMANDERS RECONNAISSANCE
8-66. Tactical commanders conduct a personal commanders reconnaissance,
where possible, as part of the planning process. The commander goes to a
field site in the vicinity of planned combat actions to conduct a visual study of
the enemy and terrain. He takes with him his subordinate maneuver
commanders, the commanders of dedicated and supporting units, and staff
officers. The purpose of this reconnaissance is to refine and verify, on the
terrain, and add details to the general plan already made on a map and
missions already assigned to the troops; however, it can also occur prior to
making battle plans. During the reconnaissance, the commander issues an
oral combat order and organizes coordination.
8-67. Prior to departure for the field site, time permitting, a commanders
reconnaissance plan is drawn up. It specifies the purpose and objective of the
commanders personal reconnaissance, principal tasks, the composition of the
reconnaissance group, routes and means of transportation, halt points for
reconnaissance activity, and the principal items to be covered at each halt
point. The OPFOR takes elaborate measures to disguise the conduct of this
reconnaissance and the ranks of the participants in the commanders
reconnaissance group.
OBSERVER
8-68. Within a squad, platoon, or company, an individual can be assigned as
an observer. This observer can reconnoiter the ground and airspace, enemy
and terrain, and observe the actions and position of his own unit, its
subordinate units, and adjacent units.
8-16
_________________________________________________________________________________Chapter 8
OBSERVATION POST
8-69. The observation post (OP) is a team assigned the mission of conducting
surveillance of enemy in a given zone or location. An OP can have literally
any organization and can be drawn from any type force. Typically OPs are
kept small and own and/or are given sensor and communications capability
that permits stealthy and rapid movement and provides the OP with the
ability to locate, track and report on its recon targets.
8-70. OPs typically operate in enemy-controlled areas. The recon plan will
include the method by which the OP penetrates enemy security forces, eludes
detection and observes and reports on the enemy. OPs will often be called
upon to perform the infiltration tactical task. The IW plan will often include
C3D measures that assist in preventing enemy detection of OPs. This C3D
effort may include employing cover from the local population or affiliated
forces.
PATROL SQUAD
8-71. A patrol squad is, as the name implies, a single squad sent out with a
reconnaissance mission. It can be a single vehicle (patrol vehicle or tank) or a
reconnaissance or infantry squad on foot. Patrol squads may be the only
reconnaissance element deployed when the risk of meeting the enemy is low.
However, they can also be deployed from a larger reconnaissance element,
such as any platoon-size patrol. Any maneuver company or battalion
operating in isolation from the main force can send out a patrol squad, even
when not performing reconnaissance missions. This occurs chiefly when the
maneuver unit is on the move or when occupying an assembly area.
8-72. As a rule, the patrol squad operates off-road, moving from one suitable
observation point to another. It typically reconnoiters places where an enemy
unit could be concealed, such as hills, woods, or built-up areas. If it sights the
enemy, the patrol squad immediately reports this to the commander or
platoon leader who dispatched it, and then continues to carry out
observation. In the event of a sudden meeting with the enemy, the patrol
squad can open fire on him.
RECONNAISSANCE TEAM
8-73. The reconnaissance team is an element, usually at squad strength,
formed from specially trained personnel (e.g. from a LRR company). It
conducts independent actions in the enemy rear to discover precision
weapons, WMD, C2 facilities, reserves, airfields, and other priority targets. A
reconnaissance team may be inserted into the enemy rear on foot or in an
armored reconnaissance vehicle. If the team leaves its vehicle behind,
insertion could also be by helicopter or by parachute landing from fixed-wing
aircraft.
RECONNAISSANCE PATROL
8-74. A reconnaissance patrol (RP) is a platoon-size tactical reconnaissance
organization with the mission of acquiring information about the enemy and
the terrain. The OPFOR distinguishes among various types of patrols that fit
under the general descriptive term reconnaissance patrol. These specific
8-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
8-18
_________________________________________________________________________________Chapter 8
communications with the unit that dispatched it. IRPs move on multiple
axes, although the main axis receives the primary reconnaissance effort.
FIGHTING PATROL
8-85. The fighting patrol is a platoon-size element, normally composed of
combat troops, dispatched from maneuver battalions (and sometimes
companies). When necessary, engineer and NBC reconnaissance elements
and other specialists can be allocated to the patrol. Units dispatch one or
more FPs depending on the tactical situation.
8-86. An FP is generally deployed to reconnoiter and provide security. FPs
are dispatched from units conducting tactical movement, during battle in the
absence of direct contact with the enemy, and in other cases where it is
difficult for the unit to directly observe the enemys actions. The main
mission of the FP is the timely detection of advancing enemy, locating enemy
direct fire weapons, especially antitank weapons, and locating minefields. An
FP normally moves in such a way that its parent unit can provide it indirect
fire support.
8-87. An FP employs the same techniques as other reconnaissance patrols.
Because of its security function, however, it is harder for the FP to avoid
becoming engaged in combat with the enemy. It may engage a weaker enemy
force using an ambush, or it may avoid contact altogether, taking up a
concealed observation point or maneuvering around superior enemy forces. If
it encounters what it considers to be enemy scouts or security forces, it
attempts to penetrate them to locate the enemys main force. FPs are also
often called upon to fix enemy forces they encounter, to permit other security
elements to maneuver to destroy them.
RECONNAISSANCE DETACHMENT
8-88. The largest organization the OPFOR employs at the tactical level to
supplement specialized reconnaissance is the reconnaissance detachment
(RD). It is typically a task-organized combat arms company or battalion. The
detachment often receives such assets as tanks (if it is not a tank unit), air
defense, artillery, engineers, or NBC specialists. The RD dispatches platoon-
size RPs to reconnoiter specific objectives along the detachments axis.
8-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RECONNAISSANCE METHODS
8-92. Reconnaissance elements collect information by various methods. These
can include observation, listening (eavesdropping), raids, ambushes, imaging,
interception of transmissions and DF of electronic resources, questioning of
local inhabitants, interrogation of prisoners of war and defectors, and the
study of documents and equipment captured from the enemy.
8-93. Information is also acquired during combat by maneuver units. Tactical
units may also receive information on the enemy from higher headquarters
and adjacent units.
8-94. More specifically, RPs can gather information using a number of
standard methods, including
Observation.
Raids.
Ambushes.
Reconnaissance Attack.
Other tactical reconnaissance organizations may use some of the same
techniques.
OBSERVATION
8-95. Observation is the coordinated inspection of the enemy, terrain,
weather, obstacles, and adjacent friendly forces during all types of combat
activity. This type of reconnaissance, performed by troops conducting direct
observation of the objective, is the most common method of gathering
reconnaissance information. It is also one of the most reliable and accurate
methods. In many cases, it is the only source of information.
8-96. The OPFOR has great confidence in the utility of observation, but it
also recognizes the limitations. It is often difficult to determine enemy
intentions through observation alone. To supplement observation, the
8-20
_________________________________________________________________________________Chapter 8
OPFOR conducts raids and ambushes to capture information that can give a
clearer picture of enemy strengths and intentions.
RAIDS
8-97. The raid is more aggressive than most methods of reconnaissance
because it involves the active search for and engagement of selected enemy
targets. A raid can occur in any terrain, in any season, at any time of day or
night, and under various weather conditions. However, it is generally
conducted at night or under conditions of limited visibility.
8-98. Reconnaissance tactics involve two methods of conducting raids. The
difference is in the purpose of the raid, the depth of the target, and the type
of reconnaissance element performing it. See Chapter 3 for information on
the execution of raids in general.
Reconnaissance Raid
8-99. The primary goal of a reconnaissance raid is to obtain information; any
damage or destruction of enemy installations is incidental. It consists of the
covert approach of the raiding unit to a preplanned and previously studied
target (objective); a surprise attack to capture prisoners, documents, and
equipment; and a swift withdrawal to friendly positions. The depth of the
raid is limited to the enemys forward edge or his immediate tactical depth.
The raiding unit is usually a reconnaissance or maneuver unit up to platoon
size, with some augmentation.
8-100. The reconnaissance raid is normally takes place in enemy-held
terrain, typically during preparation for an attack. Typical targets are
individual soldiers or small groups of soldiers. These might be isolated firing
positions, OPs and observers; isolated sentries and guard posts; couriers;
small, isolated work details; staffs; or communications centers.
AMBUSH
8-101. Reconnaissance by ambush (reconnaissance ambush) is a method of
reconnaissance accomplished by surprise attack, from cover, for the purpose
of seizing prisoners, documents, and samples of weapons or equipment. The
ambush is similar to the raid with two exceptions:
The ambush is more of a passive tactic than the raid; the ambush unit
selects a concealed position along a probable route of enemy travel and
attacks enemy units when the situation is favorable.
The ambushing unit can consist of a specialized reconnaissance patrol
or infantry unit.
For information on the execution of ambushes, see Chapter 3.
8-102. Typical targets for ambush are solitary enemy soldiers or small groups
moving on foot or in vehicles. The most favorable conditions for finding such
isolated targets are when the enemy is preparing for an attack or when he is
regrouping or relieving his forces. In preparing for an attack, the enemy
sends out reconnaissance elements and small groups of engineers looking for
passages in obstacles; there is also increased movement within the enemy
8-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RECONNAISSANCE ATTACK
8-104. The most ambitiousand least preferredground reconnaissance
tactic is reconnaissance attack. When other means of gaining information
have failed, a reconnaissance detachment can undertake a reconnaissance
attack.
8-105. In execution, a recon attack is similar to a search and attack. The
primary difference is that a search and attack is designed to destroy the
enemy or restrict freedom of movement. A reconnaissance attack is designed
to gain information. It is structured to penetrate or dislocate the enemys
security forces and permit reconnaissance and/or surveillance of
reconnaissance objectives.
8-106. Most commonly, a recon attack is conducted when the enemys
security structure is of sufficient effectiveness that a concerted independent
effort must be made to achieve the commanders intelligence requirements.
8-107. A recon attack is conducted as a search and attack (Chapter 3) with
the following specific components:
It will include at least one recon element for each recon objective. The
number of recon elements for each recon objective is primarily
determined by the level of uncertainty over the location of those
objectives.
The action elements of a recon attack are the recon elements.
Normally, any recon elements in the detachment support the
detachment by detecting critical targets and forces during the course of
the operation. But in a recon attack, the recon elements gaining
information is the focus of the operation.
8-108. The recon objectives may be force or terrain/facility oriented, but the
overall objective of a recon attack is force oriented.
8-22
_________________________________________________________________________________Chapter 8
Security Element
Fixing Element
CP
?
Security Element
HQ?
Recon Element
Enemy Log
Suspected Center
Enemy HQ
CP
Fixing Element
Recon Element
Security Element
Security Element
8-23
Chapter 9
Modern battle is, above all, a firefightin which indirect fire plays a deci-
sive role in the effective engagement of the enemy. Uninterrupted and
very close cooperation with the maneuver of supported combined arms
units is the basis of the actions of indirect fire support units.
9-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
SYSTEMS WARFARE
9-5. The foundation of OPFOR planning is the systems warfare approach to
combat. Thus, the OPFOR analyzes its own combat system and how it can use
the combined effects of this system of systems to degrade or destroy the en-
emys combat system. In systems warfare, the subsystems or components of a
combat system are targeted and destroyed individually. Once a favorable com-
bat situation has developed, the targeted enemy subsystem is quickly destroyed
in high-intensity battle, thus making the enemys overall combat system vul-
nerable to destruction or at least degrading its effectiveness. (See Systems War-
fare in Chapter 1 for further information.)
9-6. Within the systems warfare approach, the OPFOR employs a fire sup-
port concept centered on a phased-cycle of finding a critical component of the
enemy combat system and fixing its location with RISTA assets; engaging it
with precision fires, maneuver, or other means; and recovering to support the
fight against another part of the enemy force. The primary reason for attack-
ing an enemy with fires is to destroy one or more key components of the en-
emys combat system and/or to create favorable conditions for destroying
other parts of his combat system.
9-2
_________________________________________________________________________________Chapter 9
9-8. During regional operations, the OPFOR will use fire support means
(primarily aviation, SSM, and long-range rocket strikes) to attack targets in
the homeland of a regional opponent. During all types of operations in a stra-
tegic campaign, the OPFOR may use various fire support assets in access-
control operations and attack of the enemys lines of communication (LOCs)
and rear. It will attack the most vulnerable parts of the enemys combat sys-
tem. This may include strikes on the infrastructure or even civilian targets.
Such OPFOR attacks will be coordinated with perception management efforts
to convey the view that these terror tactics are no worse than enemy bombing
campaigns.
9-9. The OPFOR will also leverage the effects of its available fire support
means by integrating them into an integrated fires command (IFC) in organi-
zations down to division or division tactical group (DTG) level. The IFC (de-
scribed in detail in Chapter 2) synchronizes and focuses the efforts of RISTA
and fire to destroy key enemy formations or systemsor key components of
an enemy combat system. Destroying such targets can not only shift the bal-
ance of power in the region in the OPFORs favor, but also undermine enemy
morale and resolve.
Annihilation
9-11. Annihilation fires render targets completely combat-ineffective and in-
capable of reconstruction or token resistance. For a point target such as an
antitank guided missile launcher, the OPFOR must expend enough muni-
tions to ensure a 70 to 90 percent probability of kill. For area targets such as
platoon strongpoints or nuclear artillery assets, the OPFOR must fire enough
rounds to destroy from 50 to 60 percent of the targets within the group. These
fires result in the group ceasing to exist as a viable fighting force.
Demolition
9-12. The OPFOR uses the term demolition in reference to the destruction of
buildings and engineer works (such as bridges, fortifications, or roads).
Demolition requires enough munitions to make such material objects unfit for
further use.
Neutralization
9-13. Fire for neutralization inflicts enough losses on a target to
Cause it to temporarily lose its combat effectiveness, or
Restrict or prohibit its maneuver, or
1
The use of precision weapons may render such target damage criteria obsolete, since precision
weapons are always supposed to annihilate the targets completely, not just destroying a certain percent-
age of them.
9-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
2
Disrupt its command and control (C ) capability.
To achieve neutralization, the OPFOR must deliver enough munitions to de-
stroy 30 percent of a group of unobserved targets. The expectation is that the
target is severely damaged but could again become capable of coordinated re-
sistance after the fire is lifted. The term neutralization applies only in an ar-
tillery context.
Harassment
9-14. The OPFOR uses a limited number of fire support systems and muni-
tions within a prescribed time to deliver harassment fires. The goal of these
fires is to put psychological pressure on enemy personnel in locations such as
defensive positions, command posts (CPs), and logistics installations. Suc-
cessful harassment fire inhibits maneuver, lowers morale, interrupts rest,
and weakens enemy combat readiness.
2
A division or DTG would still have an IFC headquarters, even if it loses its originally organic fire
2
support assets to another command during task organization. This facilitates C of any fire support assets
that might be reallocated to that division or DTG during some subsequent phase of combat.
9-4
_________________________________________________________________________________Chapter 9
sion or DTG, to support the tactical battle plan. However, each IFC is capable
of engaging designated operational and strategic targets, if necessary.
9-19. The DTG deputy commander is the IFC commander. Through his IFC
commander, the DTG commander exercises C2 over all subordinate (constitu-
ent and dedicated) indirect fire support and associated RISTA assets retained
at this level of command. The following procedures apply to this process:
The DTG commander specifies the organization of forces for combat
and the tasks for indirect fire support assets.
The IFC commander conducts and coordinates fire support planning.
He also coordinates with the DTG chief of reconnaissance and the re-
connaissance subsection for targeting data.
9-20. The IFC commander can also control (but not command) fire support
and RISTA assets allocated to the DTG in a supporting relationship. He can
give them mission priorities, but they are still commanded by their parent
organization.
9-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-6
_________________________________________________________________________________Chapter 9
Decentralized Option
9-35. The observer may call for fire from any fire support assets available to
support the mission. This is the most responsive request, but allows the
FSCC the least amount of control. Since the observer is allowed to determine
which asset should engage each target, this option generally requires a
highly trained observer.
9-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Predesignated Option
9-36. The observer is assigned a particular fire asset from which he may re-
quest support, and he operates on that fire units radio net. If the observer
thinks that the target requires a different fire support asset, he must request
permission from the FSCC to change assets. Permission is granted on a case-
by-case basis. Under this option, fire support is highly responsive if the FSCC
determines that the asset is suitable to the type of target.
Centralized Option
9-37. The observer must contact the FSCC for each call for fire, and the
FSCC refers the observer, or relays his request, to an appropriate fire support
asset. This option is the least responsive for the observer, but offers the high-
est degree of control to the FSCC. This option is generally used when a ma-
neuver commander acts as an observer.
Tailoring
9-38. Since the level of training and the tactical situation vary for each ob-
server, the FSCC may assign the appropriate option to each supported unit.
For example, a special-purpose forces (SPF) or reconnaissance unit may be
predesignated. A maneuver unit may be centralized. An observer from an in-
direct fire support unit may be decentralized.
9-8
_________________________________________________________________________________Chapter 9
ESTIMATE OF SITUATION
9-43. The planning process begins with an estimate of the situation. This es-
timate includes the following:
Scheme of maneuver of supported forces.
Locations and type of enemy targets.
Required level of damage.
Delivery means and ordnance available.
9-44. The commander, his IFC commander, and other staff members estab-
lish the basis for fire support planning during the commanders reconnais-
sance of the area of anticipated action. During this reconnaissance, the com-
mander refines the organization of forces for combat and the means of coordi-
nation. The division commander gives the IFC commander the information
base to determine the following:
Targets for indirect fire weapons to engage and fire upon.
Priority of each target.
Sequence in which to attack targets.
Time to attack each target.
9-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-45. The commander of an indirect fire support unit at any level coordinates
the fires under his control. He determines new requirements and missions
and, with the IFC commander or brigade CFS, makes suggestions to the ma-
neuver commander about adjustments in tactical organization as the situa-
tion develops.
IFC PLANNING
9-46. An IFC commander and members of his staff conduct their planning in
coordination with the rest of the division staff, concurrently with the division
staff developing the battle plan. Planning considerations include target type,
dimensions, degree of protection, mobility, and range to the target.
Allocation Procedures
9-47. The OPFOR carefully calculates fire support requirements in terms of
weapons and munitions needed to produce a required effect on enemy targets.
If insufficient fire support or ammunition is available to achieve the neces-
sary result, the OPFOR does not fire less and hope for the best. Rather, if
necessary, it engages fewer targets, adjusting the tactical, or even opera-
tional, fire support plan.
9-48. Fire support assets that are allocated to a DTG and not used in the IFC
are allocated, in a constituent or dedicated relationship, to subordinate BTGs.
Fire support units remaining under IFC command may provide fires for ma-
neuver brigades or BTGs in a supporting relationship. The supporting rela-
tionship allows the IFC commander the flexibility to task fire support assets
to engage key enemy targets throughout the AOR.
9-10
_________________________________________________________________________________Chapter 9
CANNON SYSTEMS
9-52. Cannon artillery includes field guns, howitzers, and hybrid systems. Of
the two basic types, field guns generally have longer tubes, higher muzzle ve-
locities, and longer ranges with higher-trajectory fire. Howitzers can deliver
both low- and high-angle fire; the high-angle fire lends itself to attacking tar-
gets located behind cover or on reserve slopes. Hybrid cannon systems in-
clude gun-howitzers, which combine the principal characteristics of both guns
and howitzers, and are particularly useful for counterbattery fire. There are
also combination guns that can fire fin-stabilized, direct-fire projectiles, spin-
stabilized howitzer projectiles, and conventional mortar projectiles.
9-53. The various systems make tradeoffs in their performance. Guns gener-
ally sacrifice mobility and projectile lethality for increased range, howitzers
sacrifice range for versatility, and combination guns trade some of everything
in order to gain versatility.
9-54. Towed cannon systems are lightweight, low-cost, simple, and extremely
mobile on hard surfaces. Their disadvantages are a lack of cross-country mo-
bility and no gun crew protection against nuclear, biological, and chemical
(NBC) strikes or conventional counterbattery fire. The OPFOR continues to
employ towed weapons, especially in artillery units at echelons above divi-
sion, but its current emphasis is on acquiring SP artillery systems.
9-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
MORTARS
9-59. In infantry and motorized infantry brigades, mortars are constituent at
the brigade level, and each infantry battalion has additional mortars. In
mechanized infantry brigades, each mechanized infantry battalion has an or-
ganic mortar battery. These indirect fire support weapons help the brigade to
maintain effective fire support.
9-60. Compared to cannon systems, mortars generally sacrifice range. How-
ever, their mobility makes them well suited for close support of maneuver
units. Their high-angle fire enhances fragmentation effects and permits at-
tack of targets in deep defilade. They are ideal weapons for attacking targets
on reverse slopes, in narrow gullies, in ditches, in cities, and in other areas
that are difficult to reach with low-angle fire. Mortars are especially effective
for smoke and illumination missions.
9-61. Traditionally, mortars have been area-type weapons due to their lack of
accuracy. However, modern ammunition developments have led to the avail-
3
The OPFOR recognizes a third category of small-caliber (less than 100-mm) MRLs, but regards
these as relatively low in combat effectiveness.
9-12
_________________________________________________________________________________Chapter 9
SURFACE-TO-SURFACE MISSILES
9-62. SSMs include tactical- through strategic-level ballistic missiles and
land-attack cruise missiles using warheads ranging from conventional to nu-
clear. SSMs normally use liquid or solid propellant and are normally trans-
ported on a transporter-erector-launcher (TEL). Some OPFOR SSMs are in-
digenously designed variants of other nations SSMs and have improved ca-
pabilities in delivering conventional, chemical, and nuclear munitions. SSMs
are the weapon of choice where a precision engagement is required and econ-
omy of force is desired against relatively fixed targets. The OPFOR expects to
employ SSMs against
Weapons of mass destruction delivery systems and storage sites.
Aerial and sea ports of debarkation (APODs and SPODs).
C2 facilities.
Key transportation hubs.
Major logistics operating bases.
Theater air and missile defense locations.
9-63. Figure 9-1 shows how SSMs are normally classified, according to their
ranges. Missiles with ranges up to 5,500 km belong to the larger category of
theater ballistic missiles (TBMs).
4
OPFOR fixed-wing aircraft may also employ air-launched cruise missiles, possibly in land-attack
roles.
9-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
AMMUNITION OPTIONS
9-66. A wide variety of ammunition types may be available. In addition to
standard ammunition, there are various types in the special munitions family
for use against HPTs.
STANDARD MUNITIONS
9-67. The default munition is fragmentation high-explosive (Frag-HE) with a
proximity or time fuze, except when the target is dug-in troops, vehicles, and
equipment. These targets would be engaged with a 50-50 mix of point-
detonating and short-delay-fuzed Frag-HE projectiles. Dug-in targets are as-
sumed to have overhead cover for personnel positions and hull-down positions for
vehicles. Frag-HE with a 25-75 mix of airburst and point-detonating projectiles is
the preferred engagement when the target is unidentified troops and equipment.
COURSE-CORRECTED MUNITIONS
9-68. Course-corrected munitions (CCM) are designed to defeat area targets
with major ammunition reductions. CCM are 5 to 10 times more accurate
than conventional projectiles or rockets at longer ranges. CCM compare the
actual flight path to the calculated flight path and change the trajectory to
correct to the desired flight. This correction method is commonly referred to
as should-hit to did-hit data. However, CCM do not correct for inaccurate or
untimely target location.
9-69. CCM use a variety of tracking schemes and actuators for course correc-
tion. CCM tracking schemes include inertial guidance, global positioning system
(GPS), and external radar or radio transponder tracking (active and passive).
The actuators include fins, thrusters, drag brakes, shifting mass, and bent nose.
9-70. CCM are capable of engaging any target. The munition does not care
about the signature of the target. However, the warhead effects must match
the target. Typical payloads include both Frag-HE and advanced munitions
such as dual-purpose improved conventional munitions (DPICM), sensor-
fuzed submunitions (SFSM), or terminally homing munitions.
9-71. CCM size limit does not allow for the shielding of the electronics. Thus,
they are vulnerable to an electronic attack by an enemy with a substantial
electronic attack capability. Severe winds in target area can also affect the
accuracy of CCM.
ADVANCED MUNITIONS
9-72. Indirect fire support targeting with advanced munitions prioritizes tar-
gets for engagement. Prioritization is essential to avoid the waste of highly
capable, relatively costly munitions. Numerous factors can affect prioritiza-
tion, with the following five determinants predominating:
Classification of the target.
Location accuracy.
Timeliness of targeting data.
9-14
_________________________________________________________________________________Chapter 9
Type of operation.
Availability of advanced munitions.
Target Type
Munition Type
9-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
5
The most effective means of protection are laser warning detectors that automatically cue gre-
nade launchers to fire a number of smoke grenades within 2 to 3 seconds after detection of a laser beam.
A smoke cloud builds up around the vehicle 6 to 8 seconds after firing. The smoke cloud bends or refracts
the laser beam and provides a false homing point for the SALP. In essence, an effective laser protection
screen is deployed around the target within 8 to 11 seconds after a laser detection.
9-16
_________________________________________________________________________________Chapter 9
kill zone for background conditions that may cause sufficient backscatter
(from other reflecting surfaces) to provide the target early warning of the
LTD laser beam. The LTD operator lases at the predetermined offset point
(15 to 20 m from the target) at the beginning of the fire mission. Either a
munition approach light-emitting diode on the shot-synchronization equip-
ment or a blinking signal light in the optics of the LTD alerts the operator or
his assistant to the SALPs acquisition of the laser beam. The operator begins
shifting the LTD crosshairs to the center of the target 4 to 5 seconds after the
signal prompt. The shifting of the laser beam from the offset point to the tar-
get is 2 to 3 seconds prior to the terminal phase of projectile flight. The offset
procedure process takes a total of 6 to 8 seconds. Thus, the SALP is able hit
and destroy the target prior to employment of laser countermeasures. The
offset procedure requires a skilled LTD operator due to the requirement for
increased hand and eye coordination during the laser beam-shifting process.
9-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
thought to be clear can either delay the enemy or canalize him into other
minefields or kill zones. Enemy forces in such a case would have little to no
intelligence as to the existence of these mines until it was too late and would
have little time to organize clearing efforts.
9-86. One method is to lay MRL-delivered minefields in a checkerboard
pattern of smaller (400 x 400 m) minefields. This makes it harder for the en-
emy to locate the separate fields and delays his mineclearing efforts. Re-
peated encounters with smaller minefields can cause him more attrition and
confusion than a single, long minefield that he only needs to breach once.
This method can break up attacking formations and cause loss of morale and
momentum. Breaching multiple minefields also can cause increased expendi-
ture of mineclearing means.
Sensor-Fuzed Submunitions
9-90. Although SFSM can be used against a wide variety of targets, armored
vehicles of various types are the primary targets. These munitions have a
relatively small search area and a kinetic-energy kill mechanism. Because of
the accuracy of the delivery system and the small footprint, cannon-delivered
SFSM can be used against targets 2 km or more from friendly ground forces.
9-91. The engagement is normally by platoon or battery, with each unit firing
at a specifically targeted area. The size of target area can be up to 12 hec-
tares for a firing platoon or 20 hectares for a battery. Larger targets will be
divided up and engaged by separate platoons. For employment of SFSM, the
target-location error cannot be greater than 350 m. Preferably, it should be
less than 200 m. If only a small number of SFSM are available (four to five
9-18
_________________________________________________________________________________Chapter 9
rounds per tube per day), then the firing unit would use the next-best muni-
tion until the target location error is reduced below 200 m. Moving targets
(such as convoys) will generally not be engaged by SFSM.
Flechette
9-92. Flechette-filled artillery projectiles are antipersonnel munitions that
are highly lethal, as much as five times as lethal as conventional Frag-HE
projectiles. They are useful against all targets with large numbers of person-
nel, excluding personnel in armored vehicles, bunkers, and field fortifications
with overhead cover. Because of the shape, distribution density, and terminal
velocity of flechettes, they are useful against personnel wearing woven-fabric
body armor and against personnel in shallow trenches and positions without
overhead cover.
9-93. Flechette projectiles require adjustment due to their use of mechanical
time fuzes, and their effects are very sensitive to burst height. An offset ad-
justment is normally used to avoid warning the target. To maximize shock ef-
fects, an engagement with flechette projectiles normally occurs with a mini-
mum of a battery (four to eight guns), and battalion massed fires are most
desirable. The target area is normally 8 hectares or less for a single battery
or battalion, with larger effects requiring multiple battalions.
Volumetric Explosives
9-94. The use of VEX 6 is normally limited to MRL warheads, with diameters
normally greater than 160 mm. These warheads are used against any target
that has a target-location error less than 500 m and consists primarily of soft-
skinned vehicles, personnel, and equipment presenting a large surface area
(such as radars, bridging equipment, frame buildings, and aircraft on the
ground). Increasing the accuracy of the delivery system can enhance VEX
warhead effectiveness. For example, a course-corrected rocket can reduce
dispersion in the target area.
9-95. Engagement with VEX warheads is normally by battery (six to eight
launchers). Battalion missions would consist of three independent targets in
the same vicinity. The maximum target size for a battery strike can be 25 to
36 hectares, depending on the hardness of the target. VEX warheads can also
be targeted against minefields that use simple, single-impulse-detonated
mines. VEX warheads are not used (except as a last resort) on targets that
contain numerous armored vehicles or troops in extensive enclosed fortifica-
tions.
PRECISION MUNITIONS
9-96. Some of the advanced munitions described above fall into the category
of precision munitions, which have a guidance or homing element. The
OPFOR defines a precision weapon as one capable of delivering guided con-
ventional munitions with a high probability of destroying enemy targets with
a first-round hit (within range of the weapon delivery system). The presence
of the precision munition transforms a weapon into a precision weapon. How-
ever, a precision weapon system must also incorporate a target acquisition
6
Artillery VEX are commonly referred to as fuel-air explosives or enhanced-blast explosives.
9-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
NBC WEAPONS
9-101. The OPFOR might use NBC weapons either to deter aggression or as
a response to an enemy attack on the State. The State considers the employ-
ment of NBC weapons as a responsibility of the National Command Author-
ity. Delivery means such as long-range missiles and rockets are political
tools, first and foremost. The OPFOR has SSMs capable of carrying nuclear,
chemical, or biological warheads. Additionally, it can employ aircraft systems
and cruise missiles to deliver an NBC strike.
9-102. OPFOR military doctrine distinguishes between fire support and an
NBC strike. However, the two are closely related. Strategic and operational
fire support units must plan and deliver the strikes. They must also adjust
the fire support plan to account for the effects of NBC strikes on the enemy.
Such strikes greatly affect the tempo of combat activity. This, in turn, influ-
ences the type of fire support required. It also influences the kind of logistics
support needed, such as fuel or ammunition.
9-103. If needed, the majority of OPFOR artillery (152-mm and above) is ca-
pable of firing nuclear or chemical munitions. However, continued improve-
ments in conventional munitions, especially precision munitions, increase the
7
Air-delivered precision munitions include homing and guided air-to-surface missiles (including
radar-seeking antiradiation missiles); guided bombs and cluster bombs containing homing elements; and
air-launched cruise missiles.
9-20
_________________________________________________________________________________Chapter 9
likelihood that the OPFOR can achieve operational- or tactical-level fire su-
periority at the desired location and time without resorting to NBC weapons.
TARGETING
9-104. Targeting is the process of selecting targets and matching the appro-
priate response, taking into account operational requirements and OPFOR
capabilities. Targeting requires constant interaction between maneuver, re-
connaissance, fire support, and IW, at all levels. Target value analysis is an
analytical tool that is used in the targeting process by which the supported
maneuver commander
Provides focus for his target acquisition effort.
Identifies priorities for the engagement of enemy targets that will fa-
cilitate the success of his mission.
Identifies the target damage criteria.
Permits planning for identified contingencies based on enemy options
available when the enemy operation fails.
HIGH-VALUE TARGETS
9-105. HVTs are targets deemed important to the enemy commander for the
successful accomplishment of his mission. The loss of HVTs can be expected
to contribute to a substantial degradation of an important battlefield func-
tion.
HIGH-PAYOFF TARGETS
9-106. HPTs are HVTs that must be successfully acquired and attacked to
contribute substantially to the success of OPFOR operations and tactical ac-
tions. They are developed on the basis of factors such as enemy situation,
unit mission, terrain, and the time and resources available. They are not de-
pendent on the ability of the fire support unit to acquire or attack them. If an
HPT is beyond the capability of the target acquisition or reconnaissance unit
to acquire, it should be passed to the next-higher headquarters as a priority
intelligence requirement.
9-107. Based on a battlefield analysis, the division or DTG commander, with
advice from his IFC commander, selects HPTs and establishes a prioritized
list of them. The HPT list identifies the HPTs for a specific point in the battle
in the order of their priority for acquisition and attack. While their target
value is usually the greatest factor contributing to the target payoff, other
considerations include the following:
Sequence or order of occurrence.
Ability to locate and identify the target.
Degree of accuracy and identification available from the acquisition
system.
Ability to engage and defeat the target in accordance with the estab-
lished target damage criteria.
Resource requirements necessary to accomplish all of the above.
9-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
TIME-SENSITIVE TARGETS
9-108. Time-sensitive targets are those targets requiring an immediate re-
sponse. The reason for the urgency is that they either pose (or will soon pose)
a clear and present danger to the OPFOR or are highly lucrative, fleeting
targets of opportunity.
Plan
9-110. The plan phase provides the focus and priorities for the reconnais-
sance collection management and fire planning process. It employs an esti-
mate of enemy intent, capabilities, and vulnerabilities in conjunction with an
understanding of the OPFOR mission and concept of battle. During the plan
phase, the division or DTG commander, with advice from his IFC com-
mander, makes a determination of what HPTs to look for, when and where
they are likely to appear on the battlefield, who (reconnaissance or target ac-
quisition assets) can locate them, and how the targets should be attacked.
Detect
9-111. During the detect phase, the reconnaissance plan is executed. As
specified targets are located, the appropriate command observation post
(COP) or delivery system is notified to initiate the attack of the target.
9-112. Figure 9-3 illustrates the varying methods of reporting targets for at-
tack from the point of detection by a sensor through delivery. The figure dis-
plays the methods along a range from the least to the most responsive.
9-22
_________________________________________________________________________________Chapter 9
WEAPON
PLATFORM
LEGEND
WEAPON
PLATFORM
DTG IFC
FSCC
Deliver
9-113. Timely, accurate delivery is the culmination of synchronization of fire
support. The delivery is rapidly executed by having designated attack sys-
tems respond to the maneuver commanders guidance when the HPTs are ob-
served.
Assess
9-114. Following the attack of the target, the RISTA assets are cued to de-
termine if the target has been defeated in accordance with the established
target damage criteria. If it is determined that the target damage criteria are
not achieved, delivery assets re-engage the target until the desired target
damage has been achieved.
METHODS OF FIRE
9-115. Critical to the success of OPFOR combat actions is the ability to plan,
detect, deliver, and assess fire (in accordance with the commanders target
damage criteria) against enemy C2 and RISTA and weapons systems
throughout the AOR. The focus is a systems warfare approach to combat,
9-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
where the objective of the combat action is to deny the enemys combat sys-
tem its synergistic capabilities. Thus, the OPFOR is able to compel enemy
forces into multiple and rapid tactical transitions and to create opportunity
by keeping them off balance, breaking their momentum, and slowing move-
ment. The OPFOR uses various types of fire against the enemy. The methods
of fire may have different purposes in the offense and defense.
RECONNAISSANCE FIRE
9-117. Reconnaissance fire is the integration of RISTA, fire control, and
weapon systems into a closed-loop, automated fire support system that de-
tects, identifies, and destroys critical targets in minutes. This integration ca-
pability normally exists only in an IFC. One reason for this requirement for
accelerated engagement is that high-value targets may expose themselves for
only fleeting periods. Reconnaissance fire is primarily designed to attack and
destroy key enemy capabilities and/or set the conditions for a strike (see
Chapter 3).
9-118. Reconnaissance fire enables the OPFOR to deliver rotary-wing air,
SSM, cruise missile, and artillery fires (including precision munitions) on en-
emy targets within a very short time after acquisition. The OPFOR can use
reconnaissance fire in offensive and defensive phases of combat. Assets des-
ignated for reconnaissance fire use are under control of the IFC commander,
and control remains centralized for planning, analysis, and evaluation of re-
connaissance data, and for execution of the reconnaissance fire mission. This
type of arrangement allows the assets to execute other missions or taskings
until the desired HPTs are detected. The IFC commander may establish a
window of time for assets tasked to support reconnaissance fire (based on an
intelligence assessment of when the enemy targets should be in designated
kill zones).
9-119. The division commander selects and establishes the target priority
and target damage criteria of the combat system component or components to
be attacked in order to force the favorable condition to conduct a strike. The
IFC staff and fire support component commanders develop the fire support
plan designed to conduct reconnaissance fire necessary to create the favor-
able condition. The IFC commander then briefs the fire support plan to the
division commander to ensure compliance with the overall battle plan. The
IFC executes reconnaissance fire in accordance with the approved fire sup-
port plan.
9-24
_________________________________________________________________________________Chapter 9
INTERDICTION FIRE
9-121. Interdiction fire is fire designed to attack targets in depth (such as lo-
gistics sites or assembly areas) and to prevent enemy follow-on or reserve
forces from reinforcing or influencing a battle or situation. Generally, inter-
diction fire (when compared to close fire) has a slower response time, espe-
cially for stationary targets; accuracy may be lower; and the targets are gen-
erally not as well protected. However, technological improvements such as
course-corrected rockets, projectiles, and fuzes facilitate long-range precision
targeting.
9-122. The OPFOR employs long-range strike assets (operating from dis-
persed areas) to continuously engage targeted forces and systems. Opera-
tional and tactical RISTA systems direct them.
COUNTERFIRE
9-123. Counterfire is fire designed to destroy the enemy fire support infra-
structure throughout the battlefield. The fire support infrastructure includes
mortars, cannon, rockets, missiles, fire support C2 and RISTA, and logistics
assets. Counterfire enables the ground forces to achieve effective fire support
on the battlefield. It is especially important for the early destruction of the
enemys long-range and precision weapons.
COUNTERBATTERY FIRE
9-124. Counterbattery fire is fire that accomplishes the annihilation or neu-
tralization of enemy artillery batteries. It enables ground forces the ability to
maneuver on the battlefield with little to no suppression by enemy artillery.
However, combat with enemy artillery requires more than counterbattery
fire. It requires the destruction of the enemy C2 centers as well as his artil-
lery support structure.
9-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
support assets, with the goal of achieving the commanders specified target
damage criteria in the shortest time possible.
OFFENSE
9-127. Fire support considerations for the offense apply to all types of offen-
sive action discussed in Chapter 3. The OPFOR plans and executes fires to
support the attack and complete the destruction of the enemy. The use of se-
lected lines or zones controls the shifting of fires, displacement of fire support
units, and changes in command and support relationships between fire sup-
port units and maneuver units. Fires are planned to
Suppress enemy troop activity and weapon systems.
Deny the enemy information about friendly forces.
Prevent the enemy from restoring fire support, C2, and RISTA systems
neutralized during previous fire support missions.
Deny the enemy the ability to use reserve forces to conduct a counter-
attack.
If necessary, create favorable conditions for the conduct of a strike.
Support the exploitation force.
DEFENSE
9-128. Fire support considerations for the defense apply to all types of defen-
sive action discussed in Chapter 4. Key is the application of fire support as
early as possible throughout the AOR in support of the defensive battle plan.
Emphasis is placed on RISTA assets locating enemy formations and attack
positions, with the goal of determining the direction and composition of the
enemy main attack. Carefully analyzing the terrain over which the enemy
will advance and canalizing his movement into kill zones can create condi-
tions for fires in the defense. Fires are planned to
Deny the enemy information about friendly forces.
Develop the situation early by forcing the enemy to deploy early and
thus reveal the location of his main effort.
Maximize the effect of obstacles as combat multipliers.
Create favorable conditions for the conduct of a strike and counterat-
tacks.
9-129. Close-support fire is directed against advancing enemy maneuver
units. Close support fire includes fires within defensive positions that are ini-
tiated after the enemy has successfully penetrated friendly defensive posi-
tions. Indirect fires are used against enemy forces that have become wedged
against defensive positions. The indirect fires may be massed or concentrated
(point). The intent is to annihilate enemy forces in kill zones, thus preventing
continuation of enemy offensive operations. Counterbattery fires also will be
used to neutralize enemy artillery supporting the attack.
9-130. Final protective fire is planned along the most likely avenue of ap-
proach into the defensive position. Because the likely direction of attack can
change as the enemy situation develops, the final protective fire section of the
battle plan is reviewed an updated as required.
9-26
_________________________________________________________________________________Chapter 9
TACTICAL DEPLOYMENT
9-131. There are some basics of indirect fire support employment that apply
to any tactical situationoffense or defense. These relate to the effectiveness
and survivability of indirect fire weapon systems and units.
9-132. Two factors govern the deployment of indirect fire support: continuity
and dispersion. The need for continuity of fire support leads to indirect fire
support units being deployed in positions to support the maneuver force
throughout the battlefield. The OPFOR understands that unplanned move-
ments to alternate firing positions deny the maneuver force the amount of
fire support it requires. Therefore, the OPFOR adheres to the principle of
flexibility of employment in order to ensure the delivery of highly accurate
and effective fires. Dispersion is the requirement to space batteries and bat-
talions so that the enemy cannot destroy them with a single fire strike. Coun-
terfire continues to be the greatest threat facing indirect fire units. Disper-
sion is a principle technique used to survive the counterfire threat. It is the
least expensive technique in terms of effort and time.
9-133. The factors of accuracy and consistency are important since they de-
termine the time and quantity of ammunition required to effectively attack a
target. Accuracy is a measure of the precision with which the mean point of
impact (MPI) of a group of rounds can be placed on the target. Consistency is
a measure of the spread of rounds about the MPI when each round is aimed
at the same target. Accuracy is the function of the overall indirect fire sup-
port system. This includes many sources of error, such as survey of the weap-
ons, target location, ammunition variations, instrument precision (calibra-
tion), meteorology, and operator error. Consistency is affected by round-to-
round variations in factors such as muzzle velocity, meteorology, sight setting
and laying, and ramming during loading.
9-134. Another factor affecting the dispersion of rounds at a target is the
spread or dispersion of the weapons at their firing position. The primary fac-
tor affecting the dispersion of the weapons in a position is type of terrain. For
example, complex terrain such as heavily forested, mountainous, urban, and
jungle-type terrain affects not only the mobility of weapon systems but also
their ability to disperse within limitations of the weapon system. Tradition-
ally when operating in complex of terrain, dispersion between mortar sys-
tems and cannon can range from 20 to 50 m, with MRL systems ranging from
50 to 60 m. However, to increase the survivability of the weapon systems
against enemy counterfire and air attacks, it is advisable for mortar, cannon,
and MRL systems to disperse no closer than 50 m from each other, as terrain
permits.
9-135. Normally, it is acceptable or easier to fire each gun on the same bear-
ing (lines of fire parallel) or with the bearings converged so that each projec-
tile was aimed at exactly the same point. This is due to the inability of man-
ual or some automated fire direction systems to be fast enough to predict the
separate bearings and elevation for each gun in an optimum way. Recent ad-
vancements in technology have enabled ballistic computing to be fast enough
to predict the separate bearing and elevation for each gun, so that the indi-
vidual aim points cover the specified target dimensions and orientation in an
optimum way. However, other factors, such as the enemy situation and capa-
9-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Primary
9-138. The primary firing position area is designated for carrying out the
primary fire missions in all types of battle. Its distance from the battle line of
friendly units depends on the battalions place in the IFC, the range of artil-
lery systems, the nature of the terrain, and other conditions. Within the bat-
talion firing position area, each battery has a primary firing position and pos-
sibly one or two alternate positions.
Alternate
9-139. The alternate firing position area is usually designated in a defensive
situation for battalion or battery maneuver and to carry out fire missions
during an intentional or forced abandonment of the primary firing position
area. A battalion usually has one or two alternate firing position areas to the
flanks of the primary area or in the depth of the defense. An alternate area
can be several kilometers from the original location.
Temporary
9-140. The temporary firing position area can be designated for carrying out
individual fire missions. It could be forward of the battle zone, for support of
maneuver units defending in the disruption zone or for firing on distant tar-
gets. It could also be for carrying out missions as roving units. Other missions
could include supporting the commitment of an exploitation force or commit-
ment of a reserve unit to a spoiling attack or counterattack.
8
Flexibility is the ability of a weapon to deliver fire over a wide front (traverse) and at all angles of
elevation without time-consuming shifts. Flexibility is achieved by maximum on-carriage elevation and
traverse. Flexibility of towed weapons is achieved through the use of rear-mounted trunions, split trails,
and pintle traverse or a pivot and socket, and a firing platform. Flexibility of SP weapons is achieved
through the use of ring and race traverse and rear-mounted trunion.
9-28
_________________________________________________________________________________Chapter 9
I
1
I I
1 1
Battalion I Battalion
Primary 3 Alternate
I
Firing Position Firing Position
I 2
Area I Area
I
2
2 3
I
Temporary 2
Firing Position
Battalion Battalion
Temporary Alternate
Firing Position Firing Position
Area Area
9-143. The artillery battalion commander typically positions his COP vehicle
where he can observe as much as possible of the battalions sector of fire.
Since this COP needs to communicate over longer distances, it may locate on
the reverse slope of a hill, where it can elevate its antenna mast. The battal-
ion battle formation can also include other types of observation posts (OPs), if
9-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
employed. (See Figures 8-4 and 8-5 for examples of deployment of the various
OPs in a battalion battle formation.) It could also include artillery reconnais-
sance elements allocated from the parent artillery regiment or brigade.
Types of Positions
9-145. As with battalion firing position areas, battery firing positions may be
primary, alternate, or temporary. In the offense, an artillery battery can use
any or all of those, and possibly create deception firing positions. The defense
can require primary, alternate, temporary, and deception positions. The func-
tions of primary and alternate firing positions are much the same as for bat-
talion firing position areas.
9-146. Temporary. A temporary firing position can allow a battery to ac-
complish special, short-term, or emergency missions. In the defense, a battery
can use a temporary firing position near the forward edge or forward of the
main defensive zone to support maneuver units defending in the security
zone or to fire on a distant target. A temporary position can also be for use by
a roving battery or platoon. Although temporary, these firing positions can be
prepared and camouflaged.
9-147. Deception. A battery (or battalion) may prepare deception firing posi-
tions and COP sites on its own or as part of the senior commanders deception
plan. Their purpose is to mislead the enemy as to the actual deployment of
artillery units. Their preparation and camouflage must not differ sharply
from that of actual positions and sites. A roving unit may periodically deliver
fire from the deception firing position.
9-30
_________________________________________________________________________________Chapter 9
weapon. The battery senior officer or gun position officers select individual
gun firing positions.
9-150. Figure 9-5 is an example of a howitzer battery deployment in linear
formation. In this example, the battery forms a straight line with equal in-
tervals between guns. This pattern of deployment reduces emplacement and
displacement time. It also simplifies the computation procedures required for
battery fire missions. The reduced computation and mission times enable
batteries to complete missions and relocate more quickly. This lessens their
exposure to enemy fire and compensates for the vulnerability inherent in the
formation.
Minimum
400 m
FOP
Up to 300 m
Weapon Pit
20-50 m (MG or ATGL)
15-20 m
15-30 m
Up to
Ammo 200 m
Shelter
200 to
500 m
9-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-151. For increased survivability, artillery uses formations that vary the in-
terval between guns and disperse the guns in depth with the aid of com-
puters. Guns may be in a wave formation, a forward or reverse wedge, or a
semicircle. Figure 9-6 gives some examples of the nonlinear formations a bat-
tery might use. Even with computers, batteries may retain the linear forma-
tion for speed and simplicity. Its goal is to reduce the time that a firing bat-
tery remains in position after the first round fires.
Up to 200 m Up to 200 m
Base Piece
Base Piece
2
2 Up to
250 m
20-50 m Battery
FDC
Battery
Base Piece FDC
Battery
FDC
40 to
Up to 50 m
1 250 m
30 m
1
2
20-50 m
20-50 m
30-50 m Up to 200 m
Not to Scale
9-152. Given the tempo of modern combat, artillery must now deliver effec-
tive fire from emergency positions without firing a registration. The use of
improved rangefinders can reduce adjustment time and eliminate the need
for registration for many types of missions.
9-153. Battery firing positions consist of two firing platoons of three guns
each. 9 The platoons may be separated a few hundred meters for greater sur-
vivability. Each platoon has a platoon headquarters and three gun sections.
The platoon leader of one firing platoon is the battery senior officer, if there is
not a separate officer for that position. The battery commander of an attached
9
Some artillery units allocated from the operational level have firing platoons of four guns.
9-32
_________________________________________________________________________________Chapter 9
or supporting battery normally deploys near the COP of the maneuver unit to
which it is attached or which it is supporting.
CONCEALMENT
9-154. In selecting firing positions, both battalion and battery commanders
consider the concealment offered by the terrain. With respect to concealment,
firing positions can fall into one of two categories:
Concealed positions.
Unconcealed or open positions.
In either case, the entrance to and exit from all gun positions should be con-
cealed as much as possible.
Concealed Position
9-155. A concealed position is one in which the artillery systems are not ex-
posed to enemy air or ground observation during delivery of fire. A primary
way for an indirect fire unit to survive an enemy that has air parity or supe-
riority is to occupy well concealed positions so that the enemy cannot detect
the firing unit as a target. Site selection for an indirect fire position takes
into account
The possibility of delivering fire at given minimum quadrant elevations
and large deflection shifts from the base line.
The possibility of direct fire for self-defense.
The availability of convenient access routes and camouflage conditions.
9-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Deliberate Positions
9-161. When time permits, the battery senior officer will send an artillery re-
connaissance patrol forward to lay out and secure the future firing position.
The position of each howitzer and the FDC will be marked with numbered
cards and the vehicles will proceed to their assigned positions during occupa-
tion. A guide stake is emplaced at each howitzer position for the driver of the
prime mover or SP howitzer to use when roughly aligning the cannon on the
azimuth of fire. The howitzers may have luminous tape or paint (inside the
gunners door) for easy identification during periods of limited visibility. Once
the base piece has halted, the senior officer uses the onboard periscopic aim-
ing circle of his artillery command and reconnaissance vehicle (ACRV) to lay
the howitzer for direction. Depending on the situation and time available, the
remaining howitzers are either laid from the senior officers ACRV or recipro-
cally from the base howitzer. The senior officer measures the azimuth and
distance from his location to each of the howitzers and uses the data to com-
pute individual locations and piece corrections based upon the disposition of
the howitzers.
Hasty Positions
9-162. In the event the unit is required to occupy an unplanned position, the
battery senior officer positions his ACRV at the selected battery center, ori-
ented in the direction of the azimuth of fire (determined from the onboard
land navigation system). The leading howitzer pulls in beside the senior offi-
cers ACRV, and the other howitzers pull on-line, alternating sides. Once the
base piece has halted, the senior officer repositions his vehicle at the left rear
of the battery firing position and lays the howitzer for direction. The remain-
ing howitzers are laid either reciprocally from the base howitzer or from the
senior officers ACRV.
9-34
_________________________________________________________________________________Chapter 9
instance) using GPS and record the data for future reference. The howitzers
are guided (by their ground guides) to their respective positions (predeter-
mined by GPS) using a compass for orientation. Once the base piece has
halted, the senior officer uses his onboard periscopic aiming circle to lay the
howitzer for direction. The remaining howitzers are laid either reciprocally
from the base howitzer or from the senior officers ACRV.
Battery Displacement
9-165. The battery commander determines a battery rally point at least 300
m away from the occupied position. The rally point location is given to each
howitzer crew chief, the FDC, and the ammunition transport section chief.
During displacement, each howitzer crew proceeds in the most expeditious
manner to the rally point. Upon arrival at the rally point, the travel locks (on
guns lacking the automated travel lock) are emplaced and a check of all
equipment and personnel is conducted prior to movement to the batterys al-
ternate or temporary position. The rally point is occupied no longer than 3 to
5 minutes.
9-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-168. For MRLs, the battery firing position includes all the same things
listed above for a cannon artillery firing position. In addition, it includes a
loading point and a meteorological station. For some MRLs, crews can launch
rockets remotely from shallow trench shelters located 50 m or more from the
launcher vehicle. The battery senior officer operates the battery FDC, which
usually is 150 to 300 m behind the line of MRLs.
9-36
_________________________________________________________________________________Chapter 9
coordinates of the battery center and the directions for several distant aiming
points. It is also responsible for conducting a security sweep of the position
(checking for mines, enemy observers, or ground-emplaced reconnaissance
sensors) and for marking the positions for each of the vehicles (firing and
support). The position of each MRL and the fire direction center (FDC) is
marked with numbered cards, and the vehicles proceed to their assigned po-
sitions during occupation. A guide stake is emplaced at each MRL position for
the driver to use when roughly aligning the launcher on the azimuth of fire.
The MRLs may have luminous tape or paint on the vehicle body for easy
identification during periods of limited visibility.
9-174. Once the artillery reconnaissance patrol has completed the reconnais-
sance of the planned position, the senior officer returns to the original firing
position (or assembly area) to guide the battery to the new location. Once the
base MRL has halted, the senior officer uses his ACRVs onboard periscopic
aiming circle to lay the MRL for direction. The remaining MRLs are laid from
the senior officers ACRV. The senior officer measures the azimuth and dis-
tance from his location to each of the MRLs and uses the data to compute in-
dividual locations and piece corrections based upon the disposition of the
MRLs.
9-37
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
set up magnetically, and the second aiming circle is laid off of the first. The
MRLs are guided (by their ground guides) to their respective positions (pre-
determined by GPS) using a compass for orientation. A communications link
is established between the MRLs, FDC, and aiming circles using wire (pre-
ferred method) or short-range radios. The battery senior officer sets up and
magnetically orients a safety circle over the orienting station grid established
by GPS. The safety circle is checked against the first aiming circle, and a si-
multaneous observation is conducted with the battalions surveyed point or
one of the other batteries. Once the simultaneous observation is complete, the
battery commander compares the survey azimuth to the magnetic azimuth in
the battery computer. Immediately after being laid, each MRL obtains a re-
ferred deflection to the safety circle and verifies the information to be checked
out as safe.
Battery Displacement
9-178. The battery commander determines a battery rally point at least 300
m away from the occupied position. The rally point location is given to each
MRL crew chief, the FDC, and the ammunition transport section chief. Dur-
ing displacement, each MRL crew proceeds in the most expeditious manner to
the rally point. Upon arrival at the rally point, a check of all equipment and
personnel is conducted prior to movement to the batterys next firing position.
The rally point is occupied no longer than 3 to 5 minutes.
SSM EMPLOYMENT
9-179. SSMs may be fired from both fixed and mobile launchers. The OPFOR
prefers to fire SSMs from mobile launchers. The value of a mobile SSM is its
crews ability to rapidly move the SSM from a hide site to a launch site, per-
form pre-launch procedures, launch the missile, and displace from the launch
site in a short time.
9-180. A missile mounted on a wheeled or tracked vehicle chassis character-
izes the mobile launcher. The vehicle is referred to as a transporter, erector,
and launcher (TEL). The vehicles that provide the mobility to these missile
systems range from specially designed vehicles with mobility-enhancing fea-
tures to modified commercial or military all-wheel-drive trucks, to commer-
cial trucks and trailers. Generally, TELs are unarmored and have vital com-
ponents such as erection and pre-launch control panels and auxiliary power
equipment exposed or covered by thin metal.
9-38
_________________________________________________________________________________Chapter 9
OPFOR considers this procedure unusual and will use this only in emergency
situations.
9-182. Normally, the TEL stops near the selected launch point, and the
launch point coordinates are determined using the TELs onboard navigation
or survey system. The launch azimuth is determined using the launch point
coordinates and target coordinate information. The TEL is then positioned on
the launch point, and launch preparation begins. Once the missile is fired,
the TEL quickly displaces from the launch site to a resupply point or hide
site.
READINESS CONDITIONS
9-183. The OPFOR use four readiness condition to describe the status for
SSMs. They are stand down, standby, alert, and ready.
Stand Down
9-184. Stand down is sometimes referred to as garrison or administrative
status. During this stage, the missile is located on a TEL in a missile storage
and checkout building. General support equipment such as empty propellant
vehicles, warhead vans, and other vehicles are maintained in normal unit
storage areas. The warhead and the propellant (when needed) arrive from
separate storage points via motor transport, rail, water, or air. The SSM crew
follows normal duty and training schedules and periodically performs system
maintenance. Additionally, they occasionally conduct filed training.
Standby
9-185. The SSM is deployed in a forward operating location and remains in a
hide position. The hide site may be
Bunkers or underground facilities.
Culverts or bridges.
Revetments.
Civilian buildings.
Vegetation with camouflage nets.
9-186. The distance between the hide site and the launch position is depend-
ent upon the terrain and operational capabilities of the SSM. During this
stage, the warhead may or may not be present. The warhead may be stored in
a hardened facility near the launch site or in a warhead van. General support
equipment vehicles such as propellant and oxidizer vehicles, maintenance
vans, and engineer equipment are located in dispersed locations near the
hide site.
Alert
9-187. During the alert stage, the SSM deploys to predetermined locations in
preparation for launch. Once the TEL is on the launch point, the missile may
be erected on the launch stand with the propellant loaded. The crew has
completed all subsystem checks and monitors the missile status.
9-39
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Ready
9-188. The SSM is erected on the launch stand, propellant and (oxidizer if
necessary) are loaded, and the final guidance alignment is completed. The
launch pad and apron is cleared and the umbilicals remain attached. The
crew has completed all system checkouts and final checks and continues to
monitor the missile status.
9-191. The OPFOR also attempts to keep the signatures of launch-related ac-
tivity to a minimum. These signatures include the following:
Excessive radio communications.
Activities at facilities previously associated with SSM activities.
Unusual placement of air defense assets.
Employment of large security forces.
9-40
_________________________________________________________________________________Chapter 9
9-195. The TTPs are applicable to all indirect fire units. These techniques
also provide the battery commander with more flexibility to conduct multiple
fire missions simultaneously, since the battery can organize into more than
one distinct firing unit. The techniques include
Fire from dispersed locations.
Fire and decoy.
Shoot and move.
Fire from fixed locations.
Split Battery
9-197. Split battery is a tactic designed to increase the survivability of
OPFOR artillery against enemy counterfire and counterbattery fire. Position-
ing the firing platoons 200 to 500 m apart can move at least one platoon from
the beaten zone of a conventional fire strike. As a countermeasure to preci-
sion munitions and submunitions, the increased dispersion can keep one pla-
toon out of the seeker footprint of munitions employed against the other pla-
toon. This can force the enemy to either employ more munitions over a larger
target area or increase the number of targets to be serviced. In most cases,
the battery COP can control the fires of both platoons. The battery FDC
would deploy with one of the platoons but maintain communications with the
other platoon.
9-198. When using advanced or precision munitions, a single firing platoon
can provide fire support with the lethality of a battery or battalion using con-
ventional munitions. The use of such munitions reduces the time required for
a unit to execute fire missions, thereby reducing its exposure time to enemy
9-41
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RISTA systems and precision weapons strikes. This reduction involves the
battery engaging targets from hide positions and engaging only one, or at
most two, targets from one position without moving.
Dispersed Platoon
9-199. Dispersed platoon is another tactic designed to increase the survivabil-
ity of OPFOR indirect fire support weapons against enemy counterfire and
counterbattery fire. The tactic also facilitates the employment of single firing
systems or pairs in multiple small areas that would not accommodate larger
groups of firing systems. Thus, the firing unit is able to maximize scarce ter-
rain resources and still maintain the ability to mass the effects of indirect
fires. If the battery is organized as a six-gun (3x6 battalion) configuration,
the platoon occupies positions with the guns dispersed up to 150 m apart.
Each platoon is dispersed at least 500 to 1000 m apart. If the battery is or-
ganized as an eight-gun (3x8 battalion) configuration, the firing systems are
dispersed in sections of two each. In this case, each two-gun section is dis-
persed at least 300 m apart with each platoon at 500 to 1000 m apart.
9-200. The dispersed platoon is clearly the most survivable technique against
enemy counterfire. The tactic requires highly trained personnel capable of
executing a very complex, decentralized type of operation. The tactic also
works best with firing systems incorporating onboard position location (such
as GPS), fire direction, and survey systems.
Roving Gun
9-202. Roving gun is a technique designed as a countermeasure against an
enemy that has a sophisticated target acquisition capability. The goal is for
the enemy to detect and engage this target, thinking that it is an entire unit,
expending munitions that would otherwise have been used on an actual tar-
get. Enemy units that are particularly susceptible to this technique are those
capable of accurately detecting units as soon as they begin firing and then at-
tacking the target within a matter of minutes.
9-203. Within his assigned area, the battery commander selects a primary
roving gun position and one or more alternate firing positions. Each position
is at least 500 m away from the previous position. The battery commander
also selects the primary and alternate positions for the remainder of the bat-
tery at least 500 m away from the roving gun primary and alternate posi-
tions. One or two weapons occupy a firing position apart from the rest of the
unit and begin to fire on the enemy. Upon completion of the firing mission,
the roving gun immediately moves or displaces to an alternate firing position.
Depending on the enemy and friendly tactical situation, the remainder of the
battery may remain silent or fire close support, counterfire, or counterbattery
missions
9-42
_________________________________________________________________________________Chapter 9
Roving Unit
9-205. Roving unit is another technique designed as a countermeasure
against an enemy that has a sophisticated target acquisition capability. It is
similar to the roving-gun technique. The difference is that roving unit in-
volves the displacement of the firing unit versus the individual indirect fire
weapon system. Taking advantage of the mobility of SP artillery, the OPFOR
can move artillery batteries or platoons within an assigned firing position
area to escape enemy counterbattery fire. Within his assigned area, the bat-
tery commander selects a primary position and one or more alternate firing
positions. Each position is at least 500 m away from the previous position.
The roving battery or platoon fires a mission of no more than 3 to 4 minutes
duration and then moves to an alternate position. This technique is useful
during a long offensive preparation or in the defense when forward or rear-
ward movement is limited.
9-206. The goal of roving indirect fire support units is to confuse the enemy
as to the deployment and fire support plans of friendly artillery forces. They
can also engage important targets without disclosing the location of the main
fire support formation. Therefore, the brigade CFS usually develops the plans
for the deployment of roving units in detail.
9-207. Based on instructions from the senior commander or CFS, the indirect
fire support battalion commander organizes the execution of the plan by a
battery or platoon. The roving unit may leave camouflaged decoys in the pri-
mary firing position to create the impression of use. For convenience or to en-
hance the deception, the roving unit could fire from a site prepared as a de-
ception firing position. The COP of the battery supplying the roving element
controls the fire of the entire battery. When one platoon performs the roving
mission, the battery FDC may maneuver with the roving platoon or remain
in the primary firing position.
Deception Battery
9-208. The deception battery is a technique where the OPFOR creates an ad-
ditional battery in an attempt to deceive the enemy of the actual battalion lo-
cation. This technique is also referred to as the fourth battery technique.
The OPFOR may use two methods to create a deception battery.
9-209. The preferred method is for a battery to split into two platoons with
the battery commander in charge of one platoon and the battery senior officer
in charge of the other platoon. The battery FDC also splits into two sections
to support each platoon. Additional weapon systems are allocated to the two
9-43
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
platoons from the remaining two batteries to provide each platoon a signa-
ture of a battery.
9-210. A second method is for the battalion commander to issue instructions
for each firing battery to provide one to two weapons systems to create the
deception battery. Either a battery commander or battery senior officer (or a
separate officer such as the battalions most experienced platoon leader) is di-
rected by the battalion commander to command the deception battery. Fire
direction for the deception battery is provided from the battalion COP.
False Battery
9-211. The false battery is a technique that involves the use of active and de-
coy weapon firing positions to give the appearance of a battery firing position.
Depending on conditions such as the terrain, enemy situation, and mission,
the battery commander may employ up to two indirect fire support weapons
in each platoon position with the camouflaged decoys or derelict equipment in
the primary firing position to create the impression of use. (Derelict equip-
ment is real pieces of military equipment that are non-operationaloften
damaged or unserviceable. Given that it is a real piece of equipment, a dere-
lict has the same visual and radar characteristics of an operational piece of
equipment.) The remaining indirect fire support weapons move to a hide site
500 m from the decoy position. The FDC is capable of producing the firing or-
ders for the two firing units.
9-212. The OPFOR also use this technique to exploit a vulnerability of
weapon-locating radars (WLRs). Enemy commanders realize that the number
of OPFOR indirect fire support weapons firing will influence their radar per-
formance. This is because the number of weapons rapidly firing many rounds
can quickly fill the radar temporary display queue. Thus, indirect fire support
weapons firing from new locations will not be detected unless the technician
reduces the backlog from the temporary display queue. Location averaging
and automatic censoring modes are used to prevent the overloading of the
target display queue. The automatic censoring mode causes an examination
of each round for proximity to previous weapons locations in permanent stor-
age. Enemy commanders also establish a predetermined threshold criterion
(certain number of rounds coming out of a certain diameter) for WLR. If a
round appears to originate from a previous indirect fire support weapon loca-
tion and/or the threshold criterion from one location is not reached, the radar
technician deletes the track. For example, an enemy commander establishes
a threshold criterion of six or eight rounds to represent a battery firing posi-
tion. If the WLR technician receive detections that are less than the estab-
lished criterion, the tracks are deleted. If the OPFOR firing unit occupying a
false battery position meets the threshold criterion, the WLR technician
passes the target to the respective enemy counterfire unit. Thus the OPFOR
has accomplished the objective of deceiving the enemy to either fire at a false
unit location or ignore the location.
9-213. The false battery technique can create a stealthy condition during the
employment of an indirect fire support special weapons battery. For example,
a special weapons battery normally fires one to two SALP rounds per firing
mission. If the enemy WLR technician receives detections that are less than
9-44
_________________________________________________________________________________Chapter 9
the established criterion for a battery (six to eight rounds) the tracks are de-
leted. Thus, the special weapons battery virtually goes undetected.
9-217. The artillery sniper team consists of two basic elements: ob-
server/sniper and firing. The observer/sniper element may cover an area that
has been mined, act as part of a raiding or ambush force, or operate inde-
pendently. The following is an example of the composition of an LTD-
equipped observer/sniper element:
1 x sniper and 1 x observer.
2 x LTD operators.
1 X radioman (can call for fire).
1 x team leader.
9-45
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-218. The firing element is equipped with laser guided projectiles and can
range in size from a battery to an autonomous weapon. The OPFOR takes a
different approach from an extraregional force on the use of SALP. The
OPFOR realizes that the extraregional force considers SALPs as artillery-
fired ATGMs against armored formations. However, the OPFOR views
SALPs as a compliment to traditional sniper missions.
9-222. The OPFOR often uses SP and towed MRLs and single-round rocket
launchers to conduct autonomous weapon attacks. Both the single-round
rocket launchers and towed MRL may be configured for mounting on a vehi-
cle or waterborne craft. Whenever possible, the OPFOR use fabricated covers
(canvas, metal, or other materials) to disguise the MRLs and single-round
rocket launchers. The goal is to reduce the signature of the firing system and
allow it to blend in with commercial vehicular or waterborne traffic.
9-223. The OPFOR continuously analyzes the enemys counterfire tactics to
determine strengths and exploit weaknesses. Then it employs countermea-
9-46
_________________________________________________________________________________Chapter 9
9-47
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-48
_________________________________________________________________________________Chapter 9
BY BOUNDS
9-235. The indirect fire support unit normally displaces by bounds, attempt-
ing to retain two-thirds of its weapons in positions within range to provide
continuous support for the attacking or withdrawing force. In planning de-
ployment of their units, indirect fire support commanders follow the rule of a
third. For example, when only a third of the maximum range of their indi-
rect fire support weapons remains in front of the attacking OPFOR troops,
they move a third of their force forward. Once redeployment starts, no more
than a third of the available guns is moving at any one time. This leaves two-
thirds of the weapons in position to support tactical maneuver actions.
BY BATTALION
9-236. Movement by battalion is possible only when the battalion has not
been committed to battle or when there are other units available to perform
any required fire missions while the battalion is moving. All elements of the
battalion displace at the same time (based on a movement schedule) and are
typically expected to be in their new positions at the same time.
BY BATTERY
9-237. In the offense or defense, the most common movement technique is for
an indirect fire support battalion to move by battery. The battalion moves its
batteries individually by bounds. Depending on the route and the pace of
combat, there may be a temporary halt to rearm and refuel during the
movement. Once the battery is in position and ready to fire, the next battery
starts to displace. Typically, the battalion FDC displaces with the center bat-
tery.
9-238. Movement of an indirect fire support battery is typically by order of
the battery or battalion commander and is under the command of the battery
senior officer. The battery senior officers vehicle (battery FDC) leads the bat-
tery column, followed by the indirect fire support weapons. The indirect fire
support weapon designated as the base weapon leads the other indirect fire
support weapons. They are followed, in turn, by battery ammunition and
supply vehicles.
9-49
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
WEAPON-LOCATING RADARS
9-240. WLRs are probably the most reliable artillery target acquisition sys-
tem. They are programmed to detect targets following a ballistic path, and
they are almost impossible to deceive. (Any system that follows a non-
ballistic or altered ballistic path may not be locatable to the same degree of
accuracy, if at all.) Older radars tracked the projectile in flight or used the
position and time difference as the projectile passed through the radars split
or dual beam. These systems were easily overloaded, and multiple targets led
to inaccurate locations or a complete inability to determine a location.
Phased-array radars have effectively solved this problem.
SOUND RANGING
9-241. Sound ranging was the high-technology artillery target acquisition
system of World War I. Although its basic principle (using a sound waves dif-
ferent arrival times at a series of microphones) is unchanged, numerous up-
grades have occurred. The most common one involves using surface-emplaced
microphones and a computer (with graphical display) to process the data. The
required parameters and microphone coordinates are fed into the computer
for the different functions of the system. Most modern-day sound-ranging
systems can be characterized as completely automated, EMP-protected, ac-
companied by a meteorological unit, resistant to electronic jamming, and
completely passive. However, sound ranging is still limited by a number of
factors, particularly the requirement that each microphone location be sur-
veyed. Microphones cannot process targets when sound waves arrive at less
than 0.5-second interval. Thus, sound ranging requires data to measure the
effects of meteorological changes on the speed of sound. High winds, other
meteorological conditions, and terrain can degrade the performance of sound-
ranging systems.
FLASH RANGING
9-242. Flash ranging is often used as a companion to sound ranging. Flash
ranging involves determining the lines of bearing to a muzzle flash from sev-
eral surveyed OPs. Flash ranging is very slow and not automated. It is easily
fooled by flash simulators and generally requiring commanding terrain for
9-50
_________________________________________________________________________________Chapter 9
the OPs. Therefore, flash ranging has been deleted from the inventory of
most OPFOR target acquisition units.
HUMAN INTELLIGENCE
9-245. Artillery target acquisition assets also include human intelligence
(HUMINT) sources or observer units. HUMINT is another RISTA asset that
can be used to support a counterfire mission. HUMINT assets are units such
as FOPs, artillery reconnaissance patrols, and special reconnaissance forces.
OBSERVATION POSTS
9-246. The OPFOR uses an extensive system of OPs to provide fire support to
the maneuver forces. These OPs are mobile in order to accompany rapidly
moving forces. They may be in wheeled or tracked vehicles, or in the air. The
configuration depends upon the level of command and the type of units.
9-247. After establishing a functional OP, scout observers can construct a de-
ception OP to confuse the enemy about the actual position of the OP. Figure
8-7 shows an example of the deployment of some of the most common types of
OPs discussed below. Other vehicles serve as FDCs and mobile reconnais-
sance posts (MRPs). Artillery commanders can also send out artillery recon-
naissance patrols.
9-51
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
I
FOP
2
I
FOP
3
I
1 LOP
II
II I
2
Temporary Firing
Position
I
I
2
2
Figure 9-7. Observation Posts in the Battle Formation of an Artillery Battalion (Example)
9-249. The battalion COP normally contains the battalion commander, chief
of reconnaissance, and chief of communications. 11 The battery COP normally
10
An indirect fire support regiment or brigade can have a COP, sometimes called a forward CP. It
can also have other types of OPs. Although these observers could adjust fire on selected targets, they
normally pass target information to subordinate battalions for engagement.
11
Depending on the type of combat action, the chief of communications may be part of the battal-
ion FDC, rather than the COP.
9-52
_________________________________________________________________________________Chapter 9
includes the battery commander and the control platoon leader (who is re-
sponsible for reconnaissance and signal functions). 12 In addition to these of-
ficers, COPs at both battalion and battery level include fire direction, com-
munications, and reconnaissance personnel. In either case, these personnel
can operate the COP either on the ground or mounted in an ACRV.
9-250. In most cases, the commander of an attached or supporting artillery
unit colocates his COP with the COP or forward CP of the maneuver unit
commander to which the artillery unit is attached or which it is supporting,
or at least locates it near that COP. From that position, both the maneuver
and artillery commanders should be able to observe the zone of responsibility
or sector of fire. When the artillery unit is neither attached nor supporting,
but remains directly subordinate to the senior maneuver or IFC commander,
its COP is positioned near that commanders CP or COP.
9-251. Other OPs and artillery reconnaissance patrols send reconnaissance
data to the COP. The artillery commander determines which targets are to be
engaged, and the COP relays target data to the firing position.
12
Depending on the type of combat action, the platoon leader of the control platoon may be part of
the battery FDC, rather than the COP.
9-53
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Computational Method
9-259. The preferred technique for identifying targets is to provide the orien-
tation data for the observer. This would normally be done in situations where
the indirect fire support regiments FDC is passing a target it has located to a
subordinate indirect fire support battalion commander or when a battalion
commander passes a target to a subordinate battery commander. Using the
standard plotting board, the original observer can plot the location of the tar-
get and the new observer, and then compute the new observers direction and
range to the target. At that point, the new observer can simply orient his ob-
servation equipment on the directed azimuth and locate the target at the in-
dicated range. While leaving little room for error, this technique is time-
consuming and not well suited to a fluid or fast-moving battle.
9-54
_________________________________________________________________________________Chapter 9
Target-Marking Smoke
9-260. The fastest and easiest method of target marking is simply to mark
the target with a colored smoke projectile. This allows all observers to imme-
diately identify and locate the target. This also has the disadvantage of warn-
ing the target, but is acceptable when the target is unable to move (at least
between being marked and being engaged). Almost any projectile could be
used to mark the target, but smoke projectiles offer longer dwell times and
therefore increase the chance of all observers being able to locate the target.
Censor Zones
9-264. The censor zone (CZ) is an area from which the commander wishes to
ignore all target detections. A CZ may be used to ignore a friendly indirect
fire support position that, because of its aspect angle to the WLR, could be
detected as enemy artillery. This situation is common in nonlinear, non-
contiguous operations as well as linear operations where friendly units are in
enemy territory.
9-55
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Radar attenuation.
Routes of approach.
Security.
Survey.
Slope.
Aspect angle.
Cable length.
ACCESSIBILITY
9-266. Depending on mission requirements, the radar site must be accessible
by road, air, or water. Accessibility depends on the mobility characteristics of
the radar platform.
COMMUNICATIONS
9-267. The communications requirements depend on the mission and there-
fore will vary. The site must permit establishment of the required communi-
cations. If large hills or mountainous terrain exists between the radar site
and the supported unit, direct communications may not be possible by radio
unless a radio relay station is used. Another deciding factor is the effective-
ness of enemy electronic countermeasures (ECM). If the enemys ECM are ac-
tive and effective, wire communications may be necessary.
CONCEALMENT
9-268. The maximum use of natural concealment, such as trees and shrubs,
should be considered in selecting a site for the radar. However, the conceal-
ment must not interfere with the radar beam. The edge of a tree line is the
most desirable location for a radar site. The radar can be placed on the outer
edge of the tree line and camouflaged to blend into the background trees. The
remaining support vehicles and equipment can be placed in the woods and
hidden from view by camouflage nets, trees, and other types of camouflage.
Camouflage should be a continuous function of the radar section.
COVER
9-269. If possible, the radar should be emplaced in defilade. This affords pro-
tection from enemy observation and fires. The exception to this is a BSR,
which must have a line of sight to the target area.
RADAR ATTENUATION
9-270. The area in front of the antenna is important when selecting a site.
Items such as trees, foliage, buildings, and equipment may cause attenuation
of the radar beams or multipath errors. Attenuation of the radar beams re-
duces the chance of detecting enemy projectiles.
9-271. If other radar sets are operating in the same area, care should be
taken to ensure that the antennas do not face each other. This is especially
true of radars of the same type that operate on the same frequency.
9-56
_________________________________________________________________________________Chapter 9
ROUTES OF APPROACH
9-272. The radar site selected should have more than one covered route of
approach. These routes will allow occupation of the site that is unobserved by
the enemy. One must consider road conditions, overhead clearances, bridges,
and water crossing areas.
SECURITY
9-273. The radar technician should try to locate the radar site within the pe-
rimeter of an adjacent maneuver unit. This will improve his local security. If
feasible, the radar section could be augmented with a reinforced maneuver
squad or platoon.
SURVEY
9-274. A WLR must be sited accurately in order to provide accurate target lo-
cations. A survey section should be available near the site to assist in deter-
mining site data. If a survey team is not available, the radar section will con-
duct a hasty survey. The hasty survey will provide the data required to ini-
tialize the radar.
SLOPE
9-275. The slope of the ground is important for proper drainage and quick
leveling of the antenna. The radar will not function properly without leveling.
The drainage must also be checked to ensure that radar equipment will not
become stuck in heavy rain.
ASPECT ANGLE
9-276. The aspect angle is the angle between the radar antenna and the tar-
get path. The aspect angle is similar to Angle T. Angle T is the angle formed
by the intersection of the gun-target line and the observer target line with its
vertex at the target.
CABLE LENGTH
9-277. Once the technical aspects of choosing a radar site have been ad-
dressed, the length of the systems cables must be considered for systems that
are either mounted on a trailer or configured in a two-vehicle set. The two-
vehicle set consists of one vehicle that carries the radar while the other vehi-
cle carries the command cabin and system power supply. The cables attach
the command cabin and system power supply to the radar. The cable lengths
are limiting factors in the actual layout of the radar position area.
WLR SURVIVABILTY
9-278. Every effort should be made to reduce the vulnerability of WLRs to di-
rection finding and analysis. These efforts include occupying optimum sites,
reducing radiation times, and narrowing the sector of search.
Optimum Sites
9-279. The best countermeasure to enemy electronic warfare (EW) is to oc-
cupy an optimum site. An optimum site is one in which the WLR is emplaced
9-57
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
on level terrain having a gentle downward slope for the first 200 m in front of
the radar and then a sharp rise to a screening crest. In an optimum site, tun-
neling is effective in reducing side-lobe radiation. However, the number of op-
timum sites for positioning may be limited.
Screening Crest
9-280. The use of a screening crest is absolutely critical to radar survivability
in an environment where the enemy has ECM capability. A screening crest is
not essential for locating enemy weapons with the WLR. However, it does in-
crease survivability of the system by serving as a defense against enemy ob-
servation, direct fire, and ECM. A WLR site must be selected to ensure that
the screening crest is high enough to protect the radar section from the en-
emy yet low enough to allow the WLR to track an enemy projectile on its as-
cending trajectory. The WLR technician conducts a map reconnaissance and
estimates his mask angle for future positions. The WLR technician should try
to select his radar site so that the screening crest is within 1,000 m of the
site.
Tunneling
9-282. Tunneling is the technique of reducing the side, top, and back lobes of
radiation by careful site selection. Positioning the WLR so that vegetation is
to the sides and rear is an example of tunneling. Tunneling also may be ac-
complished by the use of digging-in or by sandbagging the position.
Background
9-283. Background is the area against which the target is detected. Nor-
mally, background considerations are associated with moving target locating
radars. Backgrounds can be open, hard, or soft. An open background just
above a screening crest is optimum for a WLR.
BSR SURVIVABILTY
9-286. Like WLRs, BSRs produce a distinctive electromagnetic signature that
makes them particularly vulnerable to enemy ECM. Additionally, BSRs re-
9-58
_________________________________________________________________________________Chapter 9
quire an electronic line of sight to the target and are emplaced in areas that
make them extremely vulnerable to visual detection.
Optimum Site
9-287. A site that facilitates good cover and concealment is critical for a BSR
to survive. Normally, the system should be elevated and employed during
pertiods of limited visibility. Tunneling and narrowing of sectors of search, as
discussed for WLRs, also apply to BSRs.
Background
9-290. If there are no terrain features or vegetation to reflect or absorb the
radar beam beyond the target area, the background is open. Unrestricted ac-
cess to unreflected radar beams is an ideal situation for enemy EW operators.
Hard backgrounds such as rock, buildings, bunkers, or structures reflect ra-
dar beams. During reflection, the beam is bent and some phase shifting oc-
curs. A phenomenon know as multipath effect (the receiving of the same sig-
nal from different directions and out of phase with each other) makes it diffi-
cult to obtain good direction-finding bearings to the radar. However, this does
not keep the radar intercept operator from performing signal analysis. Hard
backgrounds are better than open backgrounds but not as good as soft back-
grounds such as foliage, tree lines, or brush. If a BSR is oriented toward soft
ground and is sighted to take advantage of tunneling, its vulnerability to in-
tercept and direction-finding will be reduced considerably.
WLR CUEING
9-291. Cueing is the process designed to prompt, or notify, another target ac-
quisition asset to begin a search for a target in a specific area. Cueing of
WLRs is one of the most difficult planning decisions. Although individually
scheduled cueings may be random, preplanned cueing schedules are often
ineffective and unnecessarily subject the radars to enemy-direction finding
and analysis. Target acquisition commanders who operate under specific cue-
ing guidance can cue radars more effectively. The cueing guidance is designed
to fully exploit the radar potential and still minimize or eliminate unneces-
sary radiation. The situation will dictate who can best cue the radar and the
specific conditions under which it can be cued.
9-292. Cueing must be based on real-time information so that the WLR has a
high probability of tracking projectiles when it is turned on. Cueing sources
capable of providing this information may include
Fire support observers such as COPs, AOPs, or MRPs.
9-59
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
9-293. Cueing of WLRs may be centralized, with all requests going through
the radar controlling headquarters, or it may be decentralized. For decentral-
ized cueing, the controlling indirect fire support headquarters will establish
cueing guidance, to include authorized cueing sources, communications links,
and conditions under which the radar may be cued.
9-294. Communications links used to cue radars should be defined in the cue-
ing guidance. The preferred means of communications between the WLR and
the indirect fire support unit is wire. However, voice radio nets that are nor-
mally monitored by the radar are the most responsive means. Messages are
normally sent by voice unless the radar and the cueing source are provided
with a digital communications capability. Because this link is usually an in-
direct fire support unit command net, cueing sources should restrict the time
they use the net. Cueing sources should use the radio net only in the time re-
quired to initially establish communications and then to cue the radar as
necessary.
9-295. The special conditions under which the WLR should be cued must be
passed to the cueing sources. For example, enemy artillery or mortar attacks
that are observed by a cueing source but does no serious damage may not
constitute cause for cueing the radar. Rather, the criterion for cueing the
WLR are fires causing significant damage such as enemy neutralizing or an-
nihilation fires.
9-296. The maneuver unit and/or fire support rehearsals should include the
activation of cueing sources by use of the appropriate cueing guidance. Clari-
fication of the cueing guidance or designation of other cueing sources, if re-
quired, should be issued at that time.
9-60
_________________________________________________________________________________Chapter 9
FIRE COMPUTATION
9-303. The OPFOR may employ either manual or automated computation to
determine firing data. Figure 8-8 reflects the average processing time for the
indicated computational method for an average FDC.
Figure 9-8. Average Time Required for an FDC to Compute Firing Data
Manual
9-304. Manual computation requires the FDC to mark the firing units loca-
tion a chart and then determining the direction and range to the target. The
range determines the propelling charge, and the effect of the two determines
the elevation setting and time of flight. Time of flight is used to determine
the fuze setting. The major factor determining responsiveness is operator
training, while accuracy depends on both operator training and the validity of
supporting data (such as survey, meteorological data, and propellant tem-
9-61
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Automated
9-305. Automation can greatly enhance the responsiveness of fire direction
computations. The level of automation can range from a single battalion- or
battery-level computer that determines a single solution for each battery to
computers (located at the battery FDC) capable of determining data for indi-
vidual weapon platforms. These fire direction computers can quickly calcu-
late corrections in elevation and deflection settings for each firing platoon
and possibly for each weapon. This is particularly useful during frequent
moves.
9-306. The fire direction computers may be part of an automated fire control
system (AFCS). An AFCS is comprised of subsystems for reconnaissance, ini-
tial orientation and location fixing, weather and ballistic information, com-
munications, and data transmission The OPFOR can employ AFCSs that are
automatically linked to a data-processing computer. Automatic connections to
external reconnaissance means can include radars, sound-ranging systems,
UAVs, and reconnaissance helicopters. The system can also have links with
higher, lower, and adjacent headquarters. The OPFOR can adapt the AFCS
to new types of weapon platforms, ammunition, and reconnaissance systems.
9-62
_________________________________________________________________________________Chapter 9
FIRING DATA
9-307. The following individuals are responsible for the preparation and ac-
curacy of firing data:
The battalion chief of staff (in the battalion FDC).
The battery senior officer (in the battery FDC).
The fire direction specialists located in the firing position (in the bat-
tery FDC).
The fire direction specialists located in the battalion FDC.
The fire direction specialists located in the battalion and battery COPs.
9-308. This system demands that the battery commander, senior officer, and
battalion chief of staff be as proficient in computing firing data as the fire di-
rection specialists. The independent computation of firing data by different
individuals significantly reduces the chances for a large error. This technique
also ensures that a fire direction system is readily available if the fire direc-
tion capability at either the COP or FDC is destroyed or suppressed.
9-309. The battalion and battery commanders have overall responsibility for
the execution of fire missions. Therefore, they supervise the fire direction
specialists in their respective COPs, who must be prepared to assume the
functions of the FDC if the latter is put out of action. The battery senior offi-
cer and the battalion chief of staff supervise the work of the fire direction
specialists in their respective FDCs.
9-310. The FDC in the battery firing position receives target data from artil-
lery reconnaissance patrols, OPs, or COPs. The fire direction specialists lo-
cated at the battery firing position compute (either manually or electroni-
cally) the firing data for the targets. A battery FDC may receive fully com-
puted firing data from the battalion FDC, or even the battalion COP. In any
case, the battery senior officer (or his designated representative) verifies the
firing data and relays the data to the gun platoons, where the gunners set the
data on the gun in preparation to fire. He also reports this data to the battal-
ion FDC and the battery commander.
9-311. The fire direction specialists in the battery COP may also compute the
firing data as a separate check on the data supplied by the firing position fire
direction specialists. If for some reason the data from the battery COP is
ready before that of the firing position, the battery commander transmits his
data directly to the firing position. If a difference exists between the firing
data supplied by the fire direction specialists at the firing position and the
COP, the battery commander or battalion chief of staff decides which data is
passed to the gun platoons to fire.
9-312. When the indirect fire support battalion controls the conduct of fire, it
conducts the observation, computation, and firing similar to battery level.
The battalion commander is at the battalion COP near the COP or CP of the
supported commander. Target acquisition and fire direction specialists assist
him in acquiring targets, computing fire missions, and adjusting fire. Nor-
mally the battalion chief of staff is in charge of the battalion firing position
area and the battalion FDC. Depending on the type of mission, battalion dis-
9-63
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
persion, and time available, battalion fire direction personnel may compute
the gunnery problem for the entire battalion or run check computations while
each battery computes its own data. The battalion commander gives the or-
der to fire. He can require each battery commander to adjust fire for his own
unit by weapon or by battery salvos.
9-313. Forward ground or air OPs supplement battery and battalion COPs.
Observation teams can locate forward in armored vehicles. Forward and air
observers transmit target data to the battalion chief of staff, at the battalion
FDC, for computation.
9-314. The OPFOR also integrates electronic computers into its field artillery
battalions to exploit this new capability for firing procedures. The battalion
probably still has centralized control of fire mission computation and fire con-
trol. It can give battery fire direction personnel fully computed data that is
ready to pass to the guns. Centralizing electronic computation at battalion
level is consistent with establishing the battalion as the basic firing unit in
OPFOR artillery. The battalion and battery may run check computations
manually on a routine or random basis.
LOGISTICS
9-315. The OPFOR applies the push forward concept of logistics. Units do
not request ammunition; rather they are allocated ammunition in the fire
support plan to support the maneuver battle. Ammunition has the highest
priority within the OPFOR supply system. The determination of required ex-
penditures is the responsibility of the IFC commander or CFS, while the chief
of logistics is responsible for delivery.
AMMUNITION RESUPPLY
9-316. The OPFOR uses standard cargo trucks as resupply vehicles for can-
non and mortar systems; for towed systems, the trucks also serve as prime
movers. The only dedicated ammunition resupply vehicles are for some MRL
systems. These vehicles have the same chassis as the rocket launcher and are
fitted with racks to hold the rockets during transport. Resupply vehicles for
large-caliber MRLs have cranes for reloading the launcher.
9-317. To the maximum extent possible, the ammunition remains loaded on
resupply vehicles to maintain mobility. In most cases, the ammunition pack-
aging is designed so that two men can easily move any single item, lessening
the requirement for materiel-handling equipment at ammunition transfer
points and in the firing position.
9-318. To facilitate the movement of ammunition, general practice is to es-
tablish ammunition transfer points for each IFC or maneuver brigade. Under
normal circumstances, the artillery battalion sends its resupply vehicles to
this point to pick up ammunition and deliver it to the firing unit. Transport
units may skip an echelon, if necessary, to keep units resupplied.
BATTERY RESUPPLY
9-319. When necessary, the battery will make one halt to reload the indirect
fire support weapons, refuel (if required), and conduct necessary mainte-
9-64
_________________________________________________________________________________Chapter 9
nance. Normally, this halt is short in duration and the unit will proceed to its
next firing position once resupply and maintenance actions are completed.
The resupply point is normally a location that is ideally covered and con-
cealed along the route to the next firing position. If the size of the resupply
point is large enough, all of the batterys indirect fire support weapons are re-
supplied simultaneously. If not, the maximum number of indirect fire support
weapons that can be occupy the site at one time are resupplied followed by
the remaining indirect fire support weapons. The resupply action is normally
done in the order of movement. All of the vehicles remain in the area until
the resupply action is completed.
9-320. If there is sufficient time available, the senior officer of the battery
will take an advance party forward to prepare the next location. The battery
senior officer may exercise the option to return and guide the battery to the
next location. Or, the senior officer may designate personnel to guide the bat-
tery to the next firing location.
9-321. Depending on the threat, time, terrain, and other conditions, the bat-
tery commander may accept the risk of conducting a resupply in the firing
point. Whenever feasible, the transport unit offloads in the firing position any
ammunition the firing unit will consume prior to repositioning. However, this
is the least preferable method of resupply and if all possible should not be at-
tempted.
9-323. The OPFOR makes an effort to keep some units at full strength rather
than all units at an equally reduced level. Usually, the unit with the fewest
losses is the first to receive replacement personnel and equipment. However,
once the casualties or equipment losses are sufficient to threaten the total
loss of combat effectiveness, the commander may apply the concept of com-
posite unit replacement. The composite unit concept involves a unit formed
from other units reduced by combat action.
9-65
Chapter 10
Aviation
The ability of the OPFOR to employ its aviation assets will be dependent
on the level of airspace dominance the OPFOR possesses. When fighting a
regional opponent, the OPFOR expects to establish and maintain air
superiority and thus to employ its aviation with relative ease. When faced
with a superior enemy, however, the OPFOR will alter aviation missions
to ensure the most effective use of its air power without the unnecessary
loss of assets. This chapter will discuss the OPFOR aviation tactics of
both fixed- and rotary-wing aircraft. When appropriate, the discussion
will include the distinctions of fighting a regional foe versus an
extraregional foe. For more information on the impact of strategic
concepts on aviation operations and airspace dominance, see FM 7-100.1.
ORGANIZATION
10-1. Aviation forces are constituent or dedicated to specified levels of
command to meet mission requirements. Organizational structures are
designed to maintain the appropriate level of centralized control to ensure
the limited number of assets are available at the right place and time. For
more information on the organization of aviation units at the operational-
level or above, see FM 7-100.1. However, even aviation units that are task
organized above the tactical level can perform missions that have tactical-
level impact and, therefore, must be addressed in a tactical context.
10-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
thoroughly plan missions, and improve reaction time during the limited
windows of opportunity.
Constituent
10-5. A constituent command relationship is the assignment of a unit to a
headquarters. The headquarters has the authority for its employment and
the responsibility for all of its logistics support. An example of this type of
command relationship would be a medium-lift helicopter battalion assigned
to a DTG to provide the transportation capabilities for its ground forces.
Dedicated
10-6. A dedicated command relationship is similar to constituent with the
exception of logistics support. The subordinate unit still receives logistics
support from its parent aviation unit. An example of a dedicated relationship
is an attack helicopter battalion dedicated to a DTG. The battalion continues
to receive logistics support from its parent combat helicopter brigade, while
the DTG has sole employment authority of the battalion.
Supporting
10-7. A supporting aviation unit remains under the command of its parent
organization. It also receives all of its support from its parent unit. It
executes missions according to the supported units priorities. The supported
unit plans and employs the asset for the time allotted by the higher
headquarters. The principle advantage of this is to the parent commander
who retains maximum control of his most flexible assets. An example of a
supporting relationship is the employment of theater or OSC attack aircraft
in the DAS role at division or brigade level.
FIXED-WING AVIATION
10-8. Fixed-wing assets of the Air Force are not task organized in a
constituent or dedicated relationship below the OSC level, since that is the
lowest level of joint command. However, Air Force units retained at higher
levels of command might have a supporting relationship with a division,
DTG, brigade, or BTG. Subject to the approval of the theater or OSC commander
to whom they are subordinate, they can also respond to mission requests from
tactical-level units (see the section on Request Process later in this chapter).
ROTARY-WING AVIATION
10-9. Helicopters are employed across the battlefield to support the ground
commander in the combined arms fight. Because of their flexibility,
maneuverability, speed, and firepower, they have the capability to execute
missions down to the BTG level. Helicopters can be called upon to execute
10-2
________________________________________________________________________________Chapter 10
any mission to support both the offense and defense. Based on mission,
command and support relationship, and availability of aircraft, the OPFOR
organizes its helicopters using three methods: Attack helicopters and possibly
some combat support (CS) and combat service support (CSS) helicopters with
missions related to fire support can be part of a DTGs integrated fires
command (IFC); other CS and CSS helicopters can be directly subordinate to
the DTG commander; still other attack, CS, and/or CSS helicopters can be
subordinate to a BTG commander.
DTG
COMMANDER
IFC
COMMANDER
COMMANDERS
OF OTHER
SUBORDINATE
FORCES
ATTACK MEDIUM-LIFT
HELICOPTER HELICOPTER
BATTALION BATTALION
10-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
assets, and duration of the mission. If the IFC requires continuous lift
capabilities to rapidly employ forces, a lift helicopter battalion may be
constituent or dedicated to the IFC. On the other hand, if the movement of
troops is a one-time requirement, the helicopter battalion may not become
part of the IFC, but instead may have a supporting relationship for the
duration of the mission while remaining under the control of the parent
aviation unit. The same applies to the attack helicopter units. See Chapter 2
and Chapter 8 for more details on the IFC.
DTG
COMMANDER
IFC
10-4
________________________________________________________________________________Chapter 10
Aviation in BTG
10-18. Attack, CS, and/or CSS helicopters can be directly subordinate to a
BTG commander. An example of this would be an infantry BTG conducting
heliborne assaults. Such a BTG may include a medium-lift helicopter
battalion to insert infantry units and an attack helicopter battalion to provide
security and armed escort for the troop-carrying helicopters or to prepare the
landing zone (LZ) by fire (see Figure 10-3).
BTG
COMMANDER
HOWITZER
ATGM
BATTERY
BATTERY
(122-mm)
10-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
AIRSPACE MANAGEMENT
10-19. The OPFOR assigns its organizations an area of responsibility (AOR)
that includes not only the surface area of a defined geographic space but also
the associated airspace. The coordinated use of battlefield airspace and aerial
delivery of ordnance close to friendly troops are two problems any combined
arms force faces. OPFOR doctrine stresses the need to provide maximum
aviation support to ground force commanders. Therefore, aviation control and
communications are closely aligned with those of the ground force to ensure
effective and continuous communications.
10-20. To reduce air-to-ground coordination problems during the execution of
missions, the OPFOR employs proactive staff elements and control measures
to ensure coordination with ground maneuver units. Planners can use attack
helicopters, fixed-wing ground-attack aircraft, unmanned aerial vehicles
(UAVs), and artillery simultaneously in the same part of the AOR only if
coordination measures exist and controlling elements are working in
conjunction with each other to ensure deconfliction.
10-6
________________________________________________________________________________Chapter 10
into two or more cells. The primary cell is located in the main command post
(CP), while smaller AOS cells may be in the forward CP and/or IFC CP.
Theater-Level
10-25. For issues related to air support and interface, the theater-level CAO
coordinates with aviation assets within the theater, including the theater air
army CP (Air Force) and army aviation CP, and elements of the subordinate
air defense and artillery units. The AOS at theater level consists of several
dozen individuals with aviation, artillery, or air defense coordination
experience filling permanent staff positions and interfacing with their
respective subordinate units.
10-26. The AOS is the theater commanders primary means of turning his
guidance into a comprehensive plan for air operations. It allocates resources
and tasks forces through the publishing of the aviation support plan (ASP).
For more information, see the Aviation Support Plan section of this chapter.
10-27. The AOS establishes vectoring and target designation posts (VTDPs)
as necessary to exercise control of aircraft in a designated AOR. These posts
are air traffic control facilities that support the movement of aviation assets
within an AOR and can also direct aircraft to ground targets. The VTDPs are
primarily ground-based and serve as an intermediate air traffic control
facility between the aircrafts parent unit and the forward air controller
(FAC). (See below under BTG.) They accomplish direct coordination among
helicopters, ground-attack and fighter aircraft, ground-based air defense
units, and FACs, primarily through VHF voice transmission. These posts are
equipped with radar, communications, and automated equipment used for
identification and tracking of both friendly and enemy aircraft.
10-28. Occasionally the OPFOR can employ airborne command and control
(C2) aircraft to perform the same intercept function as a VTDP. These aircraft
are referred to as airborne control stations (ABNCSs), and may be used to
augment or replace VTDPs within the OPFOR AOR.
10-29. In mountainous terrain with VTDP radar deadspace, visual observers
(VOs) are used. These observers are connected into the VTDP network via
VHF communications. Each observer section is equipped with radios,
binoculars, and sound detection devices.
10-30. If the OPFOR uses ABNCSs or VOs, their employment is no different
than that of a VTDP. They control the flow of friendly aircraft, and provide
enemy intercept data to OPFOR counterair aircraft and air defense units.
OSC-Level
10-31. The AOS at OSC level is manned and equipped similar to the theater-
level AOS. When the theater only has one OSC, the theater AOS functions
are performed by the OSC AOS.
DTG-Level
10-32. At the DTG level, this subsection has some personnel filling
permanent staff positions and some liaisons from subordinate units. Air
support coordination is controlled by the interaction between staffs within
10-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
the fire support coordination center, army aviation CP, and subordinate air
defense unit CP. These staffs provide deconfliction for all aircraft operating
within their AOR by monitoring radar and radio communications.
10-33. Since Air Force aviation units are not constituent or dedicated to a
ground forces division or DTG, the supporting aviation regiments or
squadrons normally colocate a CP with the division or DTG main CP. This
facilitates the close coordination required by the AOS.
BTG-Level
10-34. The BTG-level AOS is located with the BTG main CP to assist the
commander and staff in all tasks associated with planning and employing air
support assets. The AOS is responsible for coordinating air support by
serving as the primary
Liaison between the BTG staff and the DTGs AOS.
Liaison between ground forces and supporting fixed- or rotary-wing
aircraft.
Director for attacking aircraft by passing messages directly to the flight
leader about targets.
10-35. The CAO is responsible for the operation of the AOS. He coordinates
with the BTG commander to ensure proper integration of air missions into
the overall scheme of maneuver. If a BTG employs a forward CP, a
subelement or representative of the AOS may locate forward with the
commander, if required. These representatives are also qualified to perform
the duties of a FAC if necessary, but this is not preferred.
10-36. The BTG AOS is responsible for the coordination of all airspace and
air routes within the BTGs AOR. It coordinates with the air defense units,
aviation units, and the chief of fire support. The AOS serves as the central
point of contact for all actions between the ground force and aviation units. It
continually monitors the status of ongoing and planned missions and the
availability of air support.
10-37. FACs may colocate with the maneuver battalions when air strikes or
support missions are planned, or when the brigade or BTG commander
expects the battalions to require immediate or on-call air support. The FAC is
a senior helicopter pilot experienced in combat helicopter brigade support
procedures. The FACs goal is to employ fixed- and/or rotary-wing aircraft
simultaneously in the same area, and coordinate aircraft employment with
artillery fires. If successful, impacts coincide in time, with different target
sectors allocated.
10-38. The FAC arrives at the maneuver battalions CP prior to a mission
with his own radio set for communications with helicopters and/or fixed-wing
aircraft. The type of radio, which he must provide, is based on the type of
aviation he supports, since fixed-wing and rotary-wing missions use different
frequencies for communication. The radio is either VHF or UHF. Provision is
made in the brigade or BTG headquarters for a FAC vehicle, and it has
unique mounts for these radio sets.
10-8
________________________________________________________________________________Chapter 10
10-39. A FAC plans air missions to support the ground commanders scheme
of maneuver (based on the sortie allocations from higher headquarters),
establishes control procedures, and orchestrates mission execution. He serves
as the ground commanders direct liaison with aviation support.
Battalion
10-40. A maneuver battalion seldom has a staff member dedicated to serve as
an air representative and rarely receives a dedicated FAC. The brigade or
BTG may allocate a FAC to a battalion when air support is planned
specifically in its AOR. In such cases, a FAC works in conjunction with the
commander and an artillery observer to coordinate the actions of attack
aircraft with the artillery fires and the ground scheme of maneuver.
Positive Control
10-42. Positive control is a method of airspace control that relies on electronic
means such as positive identification, tracking, and aircraft vectoring, done
by radar control or electronic monitoring. Positive control is established by
air traffic control services around airbases and in the support zone. As
aircraft depart these areas, they are handed off to subordinate airspace
coordination facilities (such as a VTDP, ABNCS, or VO) and then finally to
the FAC as they approach his AOR.
Procedural Control
10-43. Procedural control relies on previously coordinated and disseminated
orders or procedures to control the operation and flow of air traffic. These
procedures, coupled with the OPFOR emphasis that combined arms forces
must be generally familiar with each others tactics and equipment, help
alleviate problems that arise in coordination during combat.
10-44. The OPFOR employs coordination procedures that separate airspace
horizontally, vertically, or both. This buffer zone minimizes the possibility of
fratricide while maximizing ordnance effects. Figure 10-4 depicts the
different airspace coordination procedures available to the OPFOR.
10-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
ROZ
ROZ
Airspace DTG
Control
OSC
Zone
DTG
10-10
________________________________________________________________________________Chapter 10
vertically and by time of usage. A ROZ, for example, may be set up to restrict
airspace from 1,500 to 3,000 m AGL, 5 km in all directions from a given
point, from 0200 to 0600 hours, for the purpose of UAV overflights. The
requesting authority, such as a brigade or division commander, controls air
defense weapon control status within the ROZ.
10-48. Air Routes. Air routes are made up of air corridors and air control
points. These control measures are implemented to control the travel of
aircraft through friendly airspace and to prevent friendly forces from firing
on friendly aircraft. Air control points are predetermined points over the
ground at a given altitude where the air route changes direction or links with
another air route. An air corridor is the path of linked air control points
starting at the initial point (IP) and ending at the release point.
10-49. Some air routes may include the use of mandatory reporting points.
These points serve to control and monitor the flow of air traffic by requiring
radio calls to the controlling authority stating the aircrafts position. An air
route, for example, may dictate: returning aircraft fly above 1,500 m AGL,
outbound aircraft fly below 1,500 m AGL, all helicopters below 30 m AGL. All
aircraft should see and avoid other aircraft and remain within 500 m of the
corridor centerline for safe transit.
10-50. Every level of command down to BTG has a unique airspace structure
supporting the movement of aircraft within its AOR. Air routes run from the
supporting airfields, through the theater and/or OSC airspace controlled by
the VTDPs, to a crossing checkpoint at the DTG boundary. The aircraft
then follows the airspace structure unique to that particular DTG until it
reaches a BTG boundary. The BTG will provide routes that support the
mission taking the aircraft to the landing zone (LZ), pick-up zone (PZ), or to
an initial contact point where control is assumed by the FAC. Using the ASP,
the routes are published and distributed to each level of command. Each air
defense element is responsible to disseminate the information to the troops
within those boundaries to prevent the fratricide of friendly aircraft. The ASP
incorporates all forward arming and refueling points (FARPs) and all
planned LZ/PZs. The ASP may change the route structure on a daily basis.
10-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
possible loss of aircraft through fratricide as a lesser risk than allowing gaps
in its radar and air defense coverage that the enemy might exploit. See also
Chapter 10 for more information on air defense asset employment.
MISSIONS
10-54. The OPFOR considers the ability of its aviation assets to provide
responsive and continuous fire support to ground forces a tremendous
influence on the battlefield. It emphasizes that aviation must be employed
early to achieve the following goals:
Early attainment of air superiority.
Effective reconnaissance and targeting.
A coordinated attack on enemy targets at all tactical and operational
depths.
Employment in mass during all phases of combat.
Survivability and responsiveness using effective planning and preparation.
AIR FORCE
10-56. As enemy air and ground forces are introduced into an AOR, the Air
Force must concentrate missions to gain the desired degree of airspace
dominance. However, the operational situation dictates the amount of
aircraft dedicated to the attainment of air dominance versus support of
ground forces.
10-57. Initially, most theater air assets conduct strategic- and operational-
level missions. Examples of these higher-level missions are strategic
bombing, counterair, air interdiction, theater air reconnaissance, EW, and
NBC delivery.
10-58. Early operational and tactical aviation missionssuch as air
interdiction and attacks (air strikes) on ground targetsmay allow the
OPFOR to attain air superiority from the outset, at least against a regional
opponent. The degree of airspace dominance dictates aircraft employment
throughout the theater at the strategic, operational, and tactical levels.
10-12
________________________________________________________________________________Chapter 10
10-60. The OPFOR uses standardized terms to define the degree of airspace
dominance. This allows planners to best employ assets in the theater to
satisfy the requirements to support ground forces.
10-61. Air Supremacy. Air supremacy is defined as the condition when the
enemy air force is incapable of effective interference. Through the complete
destruction of the enemy air forces, this condition is the ultimate goal of air
operations. Yet, this condition may be difficult or even impossible to achieve.
It may occur, however, through the establishment of a diplomatic no-fly
zone. Under the condition of air supremacy, the OPFOR commander employs
all of his aircraft at will.
10-62. Air Superiority. Air superiority is defined as the condition when the
conduct of operations is possible at a given time and place without prohibitive
interference by the enemy. The most efficient method of attaining air superiority
is to attack enemy early warning, C2, and ground-based air defense sites, and
enemy aviation assets close to their source of maintenance and launch facilities.
10-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
More aircraft are dedicated to interdiction and attack missions to gain air
superiority.
Counterair
10-66. Counterair missions integrate offensive and defensive actions to
establish and maintain the desired degree of air dominance. For the mission
of countering enemy air forces, the OPFOR is heavily reliant on VTDPs as
well as friendly air defense assets. OPFOR aircraft survivability and success
in counterair missions depend on the ability of the VTDP network to identify
enemy targets and redirect fighters in flight to the proper location at the
most opportune time for a successful engagement. This mission primarily
falls on the assets at the operational or theater level. OPFOR ground force
commanders may feel the effects of this, because assets needed to support
counterair missions may detract from the ability of the theater or OSC to
support the tactical maneuver.
Interdiction
10-69. The theater air forces conduct air interdiction missions to annihilate,
or neutralize the enemys military potential before it can be used to inflict
damage on friendly forces. These missions are flown to the extent of the
enemys operational width and depth, and they require little integration
between friendly air and ground assets.
10-70. Interdiction missions are flown to attack targets beyond the range of
friendly surface weapons. These missions are usually planned and conducted
at an operational level by the OSC to achieve theater and/or OSC objectives.
Therefore, the tactical ground force commanders provide very little input to
target selection and little or no assistance during the mission execution.
Maneuver commanders may notice the impact of these missions and factor
the results into their planning process.
10-71. Air interdiction missions are planned at the highest level to
synchronize, complement, and reinforce the ground force scheme of
10-14
________________________________________________________________________________Chapter 10
Attack
10-72. The OPFOR considers air strikes within the enemys tactical depth to
be attack missions. These are deliberate missions to attack priority enemy
targets such as assembly areas, supply routes, artillery or antitank positions,
multiple rocket launcher (MRL) positions, forward air bases, and reserves.
10-73. With attack missions, the ground force commander nominates targets
to facilitate his scheme of maneuver. (For more information, see Planning
and Preparation later in this chapter.) Targets are classified as single,
multiple, line, or area. Figure 10-5 shows the OPFOR classification of targets
and attack techniques.
10-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
10-80. As the aircraft travel inbound from the IP, the FAC provides the pilots
with target location (either in grid coordinates or in relation to a
predetermined reference point), the exact time to execute the attack, and
information on the ground situation. He may also give the flight leader a
signal to direct the flight to climb, acquire the target, and attack.
10-81. The primary responsibility of pinpointing the target is left up to the flight
leader; he orders the flight into different formations, divides the target, and
assigns individual sectors to the aircraft in his flight. The FAC assesses damage
and adjusts the flight for successive target runs if necessary. So, the FAC must
maintain visual contact with the target while the aircraft are on station.
2
Air Force or army aviation helicopter units and mixed aviation units can also perform some of these
missions.
10-16
________________________________________________________________________________Chapter 10
ARMY AVIATION
10-83. Army aviation is a component of the ground forces and is intended for
actions directly in the interests of combined arms organizations. Based on the
type of missions performed, army aviation is divided by predominate aircraft
capabilities into attack, CS, and CSS aviation.
10-84. Attack helicopters are the primary assets used to provide firepower to
ground forces. These assets can perform armed reconnaissance or fire support
in all types and phases of ground combat. They can also provide fire support
for heliborne landings. Other helicopters can also conduct heliborne landings,
lay minefields, or perform a variety of logistics, reconnaissance, liaison, and
communications functions in accordance with the plans of the supported
combined arms organizations. Some helicopters are capable of performing in
multiple roles.
Attack Helicopters
10-85. Attack helicopters (also referred to as fire support helicopters), rather
than fixed-wing aircraft, provide the preponderance of the support to the
ground force and provide an excellent fire and maneuver capability to the
ground commander. The primary categories of tactical missions for attack
helicopters are attack, DAS, and reconnaissance and security. Some attack
helicopters may be modified to perform air-to-air combat roles.
10-86. Attack helicopters may have integral cannons or miniguns, and have
the provisions to mount antitank guided missiles (ATGMs), rockets, bombs,
or other ordnance on fuselage or under-wing hardpoints. Most employ target
acquisition and sighting systems.
10-87. The OPFOR may employ multirole helicopters in the same capacity as
a pure attack helicopters, but generally with less firepower. These aircraft
have the provisions to carry a limited number of passengers and may have
mounts for a cannon, rocket pods, or a few ATGMs. They are small, relatively
quiet, and easy to conceal from radar and visual detection when silhouetted
against background clutter.
10-88. Helicopter Attack. Helicopter attack missions are conducted within
the enemys tactical depth. Similar to the fixed-wing attack mission, the
purpose of helicopter attack missions is to destroy priority enemy targets
such as artillery or antitank positions, MRL positions, and reserves. The
OPFOR may employ army aviation helicopters to attack counterattacking
enemy armor columns or enemy columns moving forward to reinforce
engaged units.
10-89. Deep autonomous attack helicopter missions in the disruption zone
are the exception rather than the rule, yet they may occur against an
extremely high-priority target. The commander understands the risks involved
10-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
in missions such as these and realizes the high probability of loss of aircraft and
crews.
10-90. For these disruption zone attacks, the OPFOR will launch the
minimal number of aircraft (two to four) to accomplish the mission.
Suppression of air enemy defenses (SEAD) is normally executed in support of
the mission. The focus of the SEAD is to destroy, degrade, or neutralize
enemy air defense systems in a specific area through either attack or
electronic jamming. The depth of these helicopter attacks will be primarily
limited by the range or endurance of the aircraft. Consideration is given for
planning additional contingency time for the aircrews to react to unexpected
actions in enemy territory. The distance may also be limited by the range of
the artillery. Normally, if attack helicopters are operating deep, they are
operating as part of an IFC at OSC or DTG level. If the target cannot be
engaged with (precision) artillery, the OPFOR can send attack helicopters.
10-91. The primary deep mission in the disruption zone for attack helicopters
is in support of heliborne landings. These helicopters can provide security
and armed escort for troop-carrying helicopters. They may prepare the LZ by
fire and remain after the insertion to provide DAS to the ground force. The
number of aircraft employed depends on the size of the force, the degree of
protection desired, and expected enemy resistance. For more information on
the heliborne landings, see Combat Support Helicopters.
10-92. Like fixed-wing attack missions, helicopter attack missions are
planned by the AOS to ensure coordination between the aviation force and
the ground force, and minimize the risk of the mission. Based on the target,
number of available helicopters, and required ammunition, missions are
planned to achieve the desired results. The missions are planned in detail
with triggers to signal aircraft launch. Rehearsals are performed to identify
any problems and increase the probability of mission success.
10-93. Direct Air Support. The disruption and battle zones provide
opportunities to the commander to effectively employ attack helicopters when
the enemy presents numerous targets in the open. Armed with ATGMs and
rockets, helicopters provide DAS for the advance of the ground forces by
flying behind OPFOR ground forces and firing over them. This places the
helicopters out of friendly direct fire ranges and behind or under friendly
artillery trajectories.
10-94. Since army aviation serves as the ground force commanders primary
asset for air support, DAS is the most common type of mission. In the DAS
role, helicopters can augment fixed-wing DAS, ground-based artillery, and
direct fires from ground forces. This fire support is conducted throughout the
disruption and battle zones. Attack helicopters destroy tanks, antitank
weapons, and other armored targets located in proximity to friendly units.
10-95. DAS missions use two to eight aircraft per mission. They are flown
using the wingman concept with a minimum of two aircraft. The wingman
has the responsibility to provide local security while lead is focused on the
target. Helicopters firing ATGMs are exposed and vulnerable during missile
flight. To minimize exposure time, the helicopters can also employ rockets or
the main gun in lieu of ATGMs, but with less effectiveness.
10-18
________________________________________________________________________________Chapter 10
3
While attack helicopters are likely candidates for this role, other types of helicopter could be configured to mount
air-to-air weapons.
10-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
10-20
________________________________________________________________________________Chapter 10
TARGET SELECTION
10-114. At theater and OSC levels, the targets are selected based on strategic
or operational-level goals. At tactical levels, targets are selected to shape the
battlefield for the success of the ground forces. The targeting process is
mostly preplanned, based on integrating the fires of ground assets (such as
artillery, MRLs, and SSMs) and aviation assets. It is a continuous, ongoing
process designed to exploit current intelligence and attack high-priority
targets in all phases of the battle to best achieve the commanders scheme of
maneuver. As the tactical battle continues, targets are selected from the existing
targeting database, or new ones emerge as windows of opportunities develop.
4
Air Force helicopter units would also use the same tactics.
10-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
10-115. Target lists are categorized and prioritized based on depth into the
enemy forces. The OPFOR attempts to plan targets for its attack aircraft
which shape the battlefield versus reacting to ground maneuver forces that
require immediate support. However, the following priorities are established:
Enemy forward positions, maneuver units, artillery, and C2 nodes.
Deeper artillery, C2 nodes, reserves, assembly areas, supply routes,
artillery or antitank positions, MRL positions, and forward air bases.
Deeper reserves, lines of communication, airbases, and troop support
and logistics facilities.
10-116. From these target lists, requests for artillery fire and air support are
generated at every level down to battalion. The targeting responsibilities of
the ground force do not end with target nomination. Commanders and their
AOSs planning fires must continue to refine and update target information
until the desired results are achieved. The forum for this is the targeting
meeting held within the AOS at every level of command. These ASEs
correlate the ground force commanders targeting priorities with actual
targets, plan attack positions, incorporate FAC input from prior missions,
and discuss mobile targets. The latter is particularly important, since mobile
targets represent the most difficult problem facing ground force commanders.
When considering mobile targets, commanders may employ one of three methods
to control the timing of the air attack: on-call, immediate, or preplanned. For
more information on this subject, see Aviation Support Plan below.
10-117. Commanders plan for targeting contingencies during the course of a
battle. When a target of opportunity presents itself, the commanderthrough
his AOS and FACshas the ability to redirect his air support to attack the
new target. Additionally, pilots have the capability of acquiring targets in the
performance of their mission. This presents an ability to exploit targets of
opportunity that present themselves to the pilots, provided the targets are
included on the commanders targeting list.
REQUEST PROCESS
10-118. Formally, the lowest command level capable of requesting aviation
support is the brigade or BTG. Battalion commanders input requests to the
brigade or BTG. However, as every commander plans and conducts combat
actions, he identifies situations where aviation attacks or DAS can be
employed to enhance mission accomplishment. The brigade or BTG AOS also
assists in nominating targets and integrating aviation into the overall
scheme of maneuver. This same procedure occurs at each level of
organization by the supporting AOS.
10-119. Air support requests from ground maneuver forces are screened at
every level of command to determine whether or not
Ground support missions can be supported while meeting strategic- or
operational-level air requirements.
The level of air support to ground forces meets operational and tactical
requirements for achieving the goals of ground battle plan.
Alternate systems (such as artillery, MRLs, or SSMs) would be more
effective to accomplish the mission.
10-22
________________________________________________________________________________Chapter 10
10-120. All requests for aviation support are compiled and submitted through
AOS channels for approval by the theater and OSC commander. The DTG
commander will approve missions for rotary-wing aircraft constituent or
dedicated to his level of command. The AOS must divide the requests
between those supportable by rotary-wing assets and those supportable by
fixed-wing assets. Helicopter missions are ranked by assigned priority and
precedence, and given to the executing army aviation headquarters for
planning. Some air support requests continue on to be filled by theater or
OSC fixed-wing assets. If approved, these requests are also assigned a
priority and precedence. Requests for air support are submitted as early as
72 hours prior to the requested aircraft on-station time and no later than 24
hours prior to the start of the ASP.
10-121. Preplanned, immediate, and on-call refer to the requests themselves.
Preplanned requests are those submitted in time to be included in the
published ASP. Immediate requests fill operational or tactical requirements
that are too late to be published in the ASP. On-call mission requests do not
state a specific aircraft time-on-target. They involve aircraft placed on an
appropriate alert status and employed when requested by the supported unit.
Aircraft used to fill immediate requests may come from on-call missions
established for this purpose.
10-122. Starting at the brigade or BTG level, the CAO submits the air
support requests. He submits preplanned requests through ground command
and staff channels, or immediate requests through AOS channels. On-call
requests are transmitted by the FACs or the AOS to the division or DTG AOS
using VHF communications.
10-123. The AOS at every level is of key importance in the processing of
immediate air support requests. This type of request is primarily passed via
the FACs and AOSs to the level of command that controls the required
aircraft. If an OSC aviation unit can support the requesting ground force, it
fills the requirement. If not, the request will be passed up to the theater ASE.
Once an immediate request is approved at the theater or OSC level
(depending on the type of supporting aircraft), the ASE tasks on-call missions
or diverts scheduled missions to satisfy that request.
10-124. Once a request is approved at either theater or OSC level, it is
forwarded to the aviation unit to determine if it is supportable based on the
projected sortie generation rate and operational tempo. If disapproved at any
level, the requests are returned to the originator through AOS channels with an
explanation.
10-125. For all requests, the higher aviation command or IFC provides the
required information (including target, location, required on-station time,
and radio frequency) to the tasked unit. Each aviation unit then conducts its
own mission planning and coordinates directly with the ground maneuver
unit. The approved missions and enacted airspace procedures are
disseminated to all levels of ground and aviation commands through the ASP.
10-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
SORTIE GENERATION
10-126. The aviation units are able to manipulate and predict to some extent
their ability to launch and sustain aircraft. This information is compiled and
forwarded up to the AOS at theater and OSC level where it is reconciled with
the commanders scheme of maneuver and the requests for air support.
There, the commander determines the number of air assets to best fit into his
plans for the operation. The decision is made how to employ all of the
available air assets to accomplish the theater or operational goals, including
support to ground forces. The resulting product is known as the maximum
sorties available in a single 24-hour period.
10-127. The OPFOR defines an aircraft sortie as a flight by one aircraft in an
air action. Across the theater, the maximum aircraft sortie rates are
determined daily incorporating many factors, at every level of organization.
Figure 10-6 contains a generic formula that holds true for both fixed- and
rotary-wing aircraft. It can incorporate many of the factors involved, which
are listed in the paragraphs following the figure.
Conditions:
110 total aircraft.
10 lost yesterday through combat action.
The commander wants 40 % dedicated to DAS, 30 % to attack, and 30 % to interdiction.
OR rate today = 80 % based on logistics sustainability and maintenance posture.
Aircraft sorties/day are: 3.5 DAS, 2.0 attack, and 2.5 interdiction.
Attrition
10-129. Attritted, or non-flyable, aircraft is the number of aircraft losses
due to combat, fratricide, or irreparable enemy damage since the last sortie
generation calculation. Attritted aircraft may be returned to service for
future sortie generation cycles.
Allocation
10-130. Allocation or how flying, is the ground force commanders intent on
how sorties should be allocated to individual missions, such as interdiction,
10-24
________________________________________________________________________________Chapter 10
10-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
operational tempo over the long term, since more extensive maintenance
needs to be performed on these aircraft. Eventually logistics stocks are
depleted and fatigue increases. Following an extended surge, a unit must
recover by performing the maintenance that has been neglected. If the unit
returns to surge rate prior to recovery, its sortie generation capability may
continue to fall, and future recovery time increases.
10-26
________________________________________________________________________________Chapter 10
Preplanned
10-141. DAS missions are primarily preplanned. The ground force
commander identifies the targets, times, and desired damage for the
missions. The IFC commander determines the force, size, ordnance, and
technique that can accomplish the mission. The IFC staff plans these
missions in great detail and integrates them with other forms of fire support.
The target selection process identifies possible kill zones for the application of
aviation assets. The sortie generation process coupled with the ASP cycle,
assigns aviation assets to the highest-priority missions to attack targets
allowing the ground force commander to achieve his scheme of maneuver.
Aircraft are allocated, prepared with the proper ordnance and
countermeasures, and launched to attack a target at a specific time and place
as a part of an integrated ground and air scheme of maneuver.
10-142. After ASP confirmation of preplanned requests for air support, a
ground force commander consults his IFC staff to finalize detailed plans for
the coordinated air and ground scheme of maneuver in his AOR. If they plan
to use attack helicopters, the planners coordinate directly with the army
aviation unit to ensure target deconfliction and to limit fratricide. The
planned attack allows the ground force to update targets, current enemy and
friendly situation, and disposition of enemy air defenses just prior to the
mission.
10-143. Additional detailed pre-mission planning and coordination done prior
to a preplanned mission by the ground force and the aviation force specifies
Target description and desired results.
Type and number of assets required to accomplish the mission.
Time.
Location.
Attack technique.
Ordnance required.
Communication frequencies and codes.
Approach and departure routes.
EW support.
10-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Immediate
10-146. Most air support missions are preplanned, but immediate missions
also are used extensively. Ground force commanders can request them
through AOS channels for inclusion in the ASP. By doing this, ground force
commanders identify general times and places where they believe air support
is required, but without finalizing the intricate details as in a preplanned
mission. An immediate mission allows the ground force commander to have
air support assets readily available to employ at a given time against targets.
This type of request is used primarily for attack aircraft. If a CS aircraft is
needed for this type of mission, it locates in the vicinity of the requesting CP
and assumes more of an on-call role.
10-147. The ASP allocates air support assets for immediate missions. Some
pre-mission planning and coordination occurs between the supported and
supporting forces to ensure aircraft survivability. Aircraft designated for
immediate missions can be airborne or on the ground at airfields. Before
takeoff, pilots are briefed on a checkpoint to proceed to, and possible target
type and location. Aircraft are prepared with the ordnance and
countermeasures for the most probable target they may encounter. As the
ground force commander decides he needs the air support to engage, he
notifies the AOS or the FAC to pass the request. The request is passed to the
attack helicopter battalions or to the fixed-wing units. See Figure 10-7 for
details on the immediate DAS request process.
10-28
________________________________________________________________________________Chapter 10
or
1. Unit detects target.
10-148. The aircraft are launched from airbases, or released from holding
areas. 5 The flight or formation establishes communications with the VTDP as
it moves forward. En route, the aircraft are briefed on the frequency and contact
point to establish communications with the FAC, and receive critical mission
updates. With communication established, the FAC gives them final target
designation and confirmation, and the aircraft depart the IP for the attack.
10-149. In some cases, there may be an excess of aircraft available as
compared to requested missions outlined in the ASP. Then the theater or
OSC IFC commander can establish a pool of aircraft to be available for
immediate missions if unforeseen contingencies develop. He may also
designate that multirole aircraft be configured for DAS. These extra aircraft
may be armed and prepared for generic targets and launched to holding
areas. Once in the holding area, they serve as an available asset to
subordinate ground force commanders that require immediate air support.
The ground commanders FAC requests these aircraft and briefs them on the
target en route. Sometimes the OPFOR refers to this practice as push DAS.
5
A holding area is a site (on the ground or in the air) located between airbases or FARPs and IPs that may be
occupied for short periods of time by aircraft while coordination is being made for movement to the IPs.
10-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
On-Call
10-150. Planners may allocate aviation assets for on-call missions where the
ground force commander can time the attack at his discretion. He bases the
trigger for the attack on the enemys reaction to the OPFOR scheme of
maneuver at planned decision points. This allows him to mass his fires at
decisive places and times on the battlefield, and to refrain from employing
the attack assets if the target no longer threatens. Additionally, he may elect
to shift the assets to attack another target. If not supporting a preplanned
mission, CS and CSS helicopters assume an on-call role. By using these
methods of employment, the commander can conserve his air assets for use
when needed, or avoid the need for the ground forces to halt their attack to
wait for an unnecessary preplanned air support mission.
10-151. On-call mission requests do not state a specific aircraft time-on-
target. They involve aircraft placed on an appropriate alert status and then
employed when requested by the supported unit. Prior to the employment of
air assets, the ground force will have established communications or liaison
with the aviation unit. On cue from the ground force, the aviation unit
performs the necessary preparations to launch when the ground force
requires the air support.
READINESS CONDITIONS
10-152. The OPFOR recognizes three levels of combat readiness for fixed- and
rotary-wing aircraft and aircrews. Aviation unit CPs use these three
categories to describe varying levels of alert status or readiness conditions
and thus to guide the units to total mission preparedness for the most
probable launch execution order. Aircraft in categories one and two can be
expected to respond to on-call missions timed by the ground force
commander. Figure 10-8 lists the categories and shows their duration and
time before assets can be in the air. Based on his decision points, the ground
force commander tells the designated aviation unit when to increase the level
of readiness. Under these conditions, both parties prepare to execute the air
support mission when needed.
One Aircraft are fully serviced and armed. Combat crews are briefed on 1-2 hours 3-5
their mission and are in the aircraft ready to start engines. Ground minutes
personnel are assisting the combat crews.
Two Aircraft are fully serviced and armed. Combat crews are briefed and 2-4 hours 15
are on standby in the vicinity of the aircraft, ready to take off within a minutes
specified short period of time after receiving a mission order.
10-30
________________________________________________________________________________Chapter 10
Three Aircraft are refueled and serviced. Cannons are loaded. External 2-4 days 1-2 hours
systems (bombs, rockets, missiles, fuel tanks, etc.) are not loaded.
Combat crews are designated, but not on standby; they have not
been briefed on the air and ground situation, but will be before takeoff.
10-153. Army aviation tends to operate from FARPs or holding areas. A flight
of helicopters held at the highest state of readiness should reach its target in
15 to 20 minutes; a full squadron requires up to 25 minutes. Preparation of a
follow-on attack could take as little as 15 to 20 minutes depending on the
number of helicopters involved and refuel and rearm procedures. Fixed-wing
aircraft, at the highest readiness state, should reach their target in 20 to 30
minutes after launch, since the aircraft are based further away, but travel at
much faster speeds. Ground commanders are aware of these approximate
aircraft transit times and factor them into the launch trigger.
RISK MANAGEMENT
10-154. Effective pre-mission planning and preparation are paramount to
increasing the survivability of aircraft in combat. Prior to any aviation
mission, aircrews must have a detailed intelligence picture of the battlefield.
They use this information to plan every aspect of the mission. This helps
crews to determine ingress and egress routes through gaps in enemy air
defense coverage and to plan tactical maneuvers. Similarly, they try to use
routes that afford cover and concealment from the enemy, while allowing the
protection of friendly air defense assets.
10-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
FLIGHT TACTICS
10-158. To obtain the full potential desired from an air assets, different
tactics are employed by fixed-wing and rotary-wing aircraft. The OPFOR
prefers to employ fixed-wing aircraft more frequently on missions with
previously reconnoitered routes, fixed or semifixed targets, and greater
depths. Fixed-wing aircraft are vulnerable to ground-based air defenses when
executing ground attacks. This necessitates a low-altitude, high-speed target
approach and minimum time in the target area. Under such conditions the
pilots ability to visually acquire and properly identify the target may be
extremely limited.
10-159. The OPFOR prefers to use helicopters for time-sensitive attacks close
to friendly forces. Helicopters have reduced logistics requirements compared
to fixed-wing aircraft, allowing their deployment close to the battle zone. This
proximity enhances their ability to respond to requests for air support.
Tactically, helicopters have two advantages over fixed-wing aircraft: their
ability to maneuver relatively undetected, and systems that allow the pilots
to rapidly evaluate and react to battlefield conditions.
FIXED-WING TACTICS
10-160. Fixed-wing assets can be employed at the strategic, operational, and
tactical levels simultaneously. The tactics employed by fixed-wing assets to
support tactical ground force battles are designed to ensure aircraft
survivability in a high-threat air defense environment and provide
supporting fires to the scheme of maneuver. Fixed-wing aircraft are employed
much less often than attack helicopters to support the ground force
commander. Yet, when effectively employed, these aircraft have the ability to
give friendly forces great advantages in firepower, mobility, and shock effects.
Formations
10-161. Fixed-wing interdiction, attack, and DAS missions are usually
conducted in two-ship formations. The wingman flies in an echelon or trail
position, with lateral and vertical separation depending on terrain and enemy
air defense threat.
10-32
________________________________________________________________________________Chapter 10
are the 90-degree battle curve, 180-degree battle curve, attack from the
loop, and the combined looping battle curve. All four profiles begin in the
same way: the aircraft approach the target at low altitude (typically 30 to
100 m AGL) and then initiate a climb to an altitude of 500 to 2,500 m
AGL. The differences among these profiles are in where the aircraft start
the climb and how they maneuver during the climb and subsequent dive.
All four profiles end in the same way: from the altitude reached in the
climb, the aircraft dive toward the target at a 10- to 20-degree angle,
release their ordnance, and then egress the area at a high-speed, in low-
level flight.
10-163. In the 90-degree battle curve (Figure 10-9), the attacking aircraft
approach a position 3 to 8 km abeam of the target. At that point, the aircraft
initiate a 90-degree turn toward the target. As the aircraft turn, they gain
altitude. The aircraft are at the peak of their climb when they turn the full 90
degrees and should be aligned with the target.
500-2,500 m AGL
10o-20o
30-100 m AGL
3-8 km
10-164. The 180-degree battle curve (Figure 9-11) requires the attacking
aircraft to fly at least 3 km past the target. They continue past this point for
another 10 seconds, then begin a climb while executing a sweeping 180-
degree turn. The aircraft are at the peak of their climb when they end the
turn, and should be aligned with the target.
10-165. In the attack from the loop (Figure 9-11), the aircraft execute a
climbing inside loop beginning approximately 3 km away from the target. On
the downward side of the loop, the aircraft align themselves with the target.
10-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
500-2,500 m AGL
10o-20o
30-100 m AGL
3 km
500-2,500 m AGL
30-100 m AGL
Approx. 3 km
10-34
________________________________________________________________________________Chapter 10
10-166. Another possibility is the combined looping battle curve (Figure 9-13),
which is a combination of the loop, and the 180-degree battle curve. This
profile requires the attacking aircraft to fly at least 3 km past the target. The
aircraft will continue past this point for another 10 seconds, then begin a
climb while executing an inside loop. At the apex of the loop, the aircraft roll
level, and align with the target.
500-2,500 m AGL
10o-20o
30-100 m AGL
3 km
ROTARY-WING TACTICS
10-168. Many of the tactics and techniques used by the OPFOR are similar to
tactics employed worldwide. Helicopter design dictates the capabilities and
limitations of each aircraft and, to a large extent, their employment. Some
minor variations among models can cause similarly designed helicopters to
differ in hovering capabilities, cargo and load capacities, and employment
characteristics.
Flight Modes
10-169. All OPFOR helicopters can employ any of three differing flight modes:
nap-of-the earth (NOE), contour, or low-level. See Figure 9-14.
10-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Low-Leve l
Conto ur
NOE
Low-Leve l
Conto ur
NOE
10-36
________________________________________________________________________________Chapter 10
Maximum
FARP
or
Holding Area
Alternating
FARP
or
Holding Area
Continual
FARP
or
Holding Area
= Represents one company of an attack helicopter battalion
10-37
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
10-38
________________________________________________________________________________Chapter 10
Trail
20-40 sec.
Up to 90 m
Echelon (Right)
30o 30o
Line Abreast
Not to Scale
10-180. Once the FAC provides the flight with target location, the flight
commander executes attack control. Inbound to the AP from the IP, he orders
the appropriate formation, divides the target, assigns individual target
sectors, and determines the movement technique and engagement profile.
10-39
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Movement Techniques
10-181. Approaching the AP from the IP, the flight commander may employ
movement techniques based on the likelihood of enemy contact. The
techniques are traveling, traveling overwatch, and bounding overwatch. 6 See
Figure 9-17 for additional clarification.
Traveling
1. Both aircraft move simultaneously
and continuously at low-level altitudes.
2. Aircraft fly at constant altitude.
3. Aircraft move at constant rate of speed.
Traveling Overwatch
1. Lead aircraft moves continuously
at contour altitudes at constant speed.
2. Trail aircraft moves as necessary
to overwatch the lead aircraft.
Bounding Overwatch
1. Both aircraft fly at contour or NOE
altitudes at low airspeed.
2. Only one aircraft moves at a time.
3. Each moves into a new position under
the protection of the trailing aircraft.
Engagement Techniques
10-182. OPFOR engagement techniques, like much of the helicopter doctrine
and employment techniques used worldwide, are based on the capabilities
and performance of the aircraft and the ordnance they carry. The flight
commander selects the appropriate engagement profile for his flight as
determined by the situation. Either a hovering fire or a running fire is
employed. The design of some helicopters makes them more conducive to the
6
The traveling overwatch and bounding overwatch techniques can be used by all armed helicopters, not just attack
helicopters.
10-40
________________________________________________________________________________Chapter 10
50-80 m
10-40 m
5-10 m 50-80 m 5-10 m 10-40 m
0 1 2 3 4 5 6 7 8 km 0 1 2 3 4 5 6 7 8 km
10-40 m
50-80 m
5-10 m
Target
0 1 2 3 4 5 6 7 8 km
0-30 km/h
Not to Scale
10-184. In the APs, the aircraft form into the attack pair, and mask
themselves behind covering terrain. They unmask vertically or horizontally,
fire their ordnance, and then remask. Based on a quick battle damage
assessment, the FAC then directs the aircraft to engage the enemy again or
to disengage. Because the AP was compromised, standard practice is to move
to another location within the AP or to an alternate AP before firing again.
10-41
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
10-40 m
< 60 m 10-40 m < 60 m
Target
0 1 2 3 4 5 6 7 8 km 0 1 2 3 4 5 6 7 8 km
10-188. The running fire profile is flown with an altitude that is terrain-
dependant and is characterized by an increase in altitude prior to weapons
release in order to acquire line of sight to the target. Airspeed varies between
90 and 280 km/h. The forward airspeed during running fire adds stability to
the helicopter and thus increases the accuracy of ordnance delivery,
especially for rockets. The dive to engage the target also results in fewer rotor
down-wash effects on munitions, further increasing accuracy.
10-189. Engagements using running fire begin with a high-speed, low-
altitude run using one of the movement techniques from the IP to the AP.
The flight commander selects an IP about 8 to 10 km from the target. The IP
is typically an easily identifiable terrain feature along the desired route to
the target. Beginning at the IP, the helicopters move toward the target,
usually at contour altitudes, using terrain to mask the approach. Once the
AP is reached, the flight commander directs the helicopters to climb and
acquire the target. When the target is identified, the helicopters execute a
10-42
________________________________________________________________________________Chapter 10
shallow dive toward the target and engage it. Depending on the range of the
weapon system to be used for the engagement, they may level off for a short
distance, between acquiring the target and beginning a dive toward the
target.
10-190. The distance at which the helicopters begin the dive and begin firing
depends on the type of ordnance to be used. The helicopters begin firing
during the dive, as they reach the most effective range for their munitions.
The wingman maintains his position during the firing run and releases his
ordnance simultaneously with the lead. The running fire profile can be used
for delivery of either guided or unguided munitions.
10-191. For firing guns or delivering unguided rockets, helicopter pairs
acquire the target and enter a shallow dive, not exceeding 20 degrees, along
the attack heading. For delivery of fire from guns, the dive may begin about 1
km to 1.5 km from the target and the helicopters begin firing. For firing
rockets, the dive might begin from 1 to 5 km from the target, depending on
the range of the rockets used. The wingman generally maintains an echelon
position behind the lead, and both aircraft fire their guns and/or rockets,
disengaging as soon as the ordnance is expended. Disengaging the firing run
features a descending turn in an attempt to remask. The disengagement turn
is away from the wingman. This maneuver allows multiple pairs to attack the
same target, with each pair covering the disengagement maneuvers of the
preceding pair. Timing between pairs can be as little as 15 seconds, but is
normally 20 to 30 seconds. The timing is dependent on the overall threat to
helicopters, and their ability to cycle sorties into the target area. Total
exposure time from attack initiation to remasking averages 15 to 30 seconds,
dependant on whether the target location is known or the pilots must search
before acquiring.
10-192. The running fire profile can also be used when employing ATGMs,
but with some modifications. Altitude on the approach may vary with terrain,
but usually is within a contour flight mode. During the pass, the pilot
initiates the approach, while the weapons operator attempts to visually
acquire the target and gain line of sight for the weapon system. Once the
target is acquired, the helicopter must be kept on a stable flight path as the
weapons operator tracks the target and fires the ATGM. Firing usually
occurs from 2 to 8 km away from the target, depending on ATGM carried.
After launch, the helicopter must remain stable to keep the target within the
constraints of the operators sights to maintain line-of-sight with the target.
Minimum aircraft exposure times, at missile maximum effective ranges, can
be up to 25 seconds depending on type of missile.
10-193. At the end of the firing run (regardless of the types of munitions
delivered), all aircraft break off and dive down and away from the target
area, leaving at minimum altitude and using terrain masking. The FAC then
directs the aircraft to return to the same AP, a different AP, the IP, a holding
area, or a refueling point. If more than one pass is needed, helicopters may
approach from another direction, or from the sun, to hinder visual
identification. This type of attack is normally conducted during daylight. Yet,
attacks using this technique can be conducted with the use of flares during
darkness or periods of limited visibility if the target is illuminated. Target
10-43
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
10-44
________________________________________________________________________________Chapter 10
operations in bad weather and at night. Although most aircraft are equipped
for navigation during darkness and limited visibility, they are not equipped
well enough to perform their tactical mission the same as if it were daylight.
Night systems, infrared radar, or avionics upgrades are readily available for
procurement on the open market. Regardless of modern systems capabilities,
the OPFOR still expects pilots to navigate by land, search for targets
visually, and determine distances to targets. The effectiveness of air support
depends on the ability of aircrews to positively identify targets in prevailing
weather and light conditions.
10-200. The OPFOR realizes that system upgrades and improvements are
financially more attainable and easier to procure in smaller numbers. It also
understands that every aircraft in the inventory does not require the
modification. Similarly equipped units or higher-capability aircraft working
in conjunction with unimproved aircraft can still present a definitive edge to
OPFOR aviation and the ground force commander. Even a limited number of
upgraded aircraft may have a significant impact on the battle.
10-201. Currently, flights in poor weather or at night are primarily conducted
by helicopters, since they are routinely employed in marginal weather
conditions, well below those acceptable to fixed-wing aircraft. They navigate
through the use of instruments. This forces air assets to fly at a higher
altitude and at slower airspeeds. Although this allows the OPFOR to
accomplish missions in less than ideal conditions, it exposes the aircraft to
greater danger. They are no longer afforded the cover and concealment of
terrain, and may be unsupported by direct fire coverage from friendly ground
force units.
10-202. Older or unmodified OPFOR aircraft are not likely to have any night-
fighting capabilities without the aid of artificial illumination. Artificial
illumination is still not adequate to fire ATGMs using day-only visual
sighting, although guns and rockets can be effective under these conditions. If
employed, illumination (flares or illuminating rounds) is fired from artillery
or aerial platforms to assist friendly forces in engaging the enemy during
periods of darkness or limited visibility.
10-203. The use of precision munitions offers a higher probability of the
ordnance hitting the target than conventional projectiles or rockets that have
ballistic trajectories. Precision munitions may be used for surgical air attacks
in minimal weather conditions against targets like bridges, small targets
(weapon emplacements or armored vehicles), and specific buildings. External
stores racks may allow OPFOR aircraft to carry precision munitions, yet most
aircraft do not have the systems to aim or deliver these weapons to hit their
intended targets. The munitions must be guided by other ground-based
sources. Newer or recently modified aircraft may be able to deliver precision
munitions in bad weather or at night.
10-45
Chapter 11
CONCEPTS
11-2. OPFOR air defense doctrine emphasizes two key and interrelated con-
cepts. The first is that air defense is an integral part of combined arms com-
bat. The maneuver unit commander who disregards the enemy air threat or
fails to properly plan for defending against it risks mission failure.
11-3. The second concept is that air defense weapons, radars, and associated
equipment cannot be regarded as single pieces of equipment or even units
engaged in combat actions but as parts of an integrated system of air defense.
Proper integration of these assets as both a system and integral part of mis-
sion planning and execution for mission accomplishment is the ideal way the
commander can effectively deal with the enemy air threat.
11-4. Against a regional neighbor the OPFOR has confidence that it can ef-
fectively conduct a totally integrated air defense; however, it also recognizes
that it is unlikely to be able to defend its entire airspace in the event of ex-
traregional intervention. Fundamentally, the OPFOR accepts that it may not
be able to employ a nationally integrated air defense system against a mod-
ern extraregional force. Thus the OPFOR is prepared to adapt its air defense
operations and tactics to employ integrated air defense at sector levels. At
sector level units may be hard-wired and do not require as large a footprint
physically and electronically.
11-5. In choosing to fight within sectors, the OPFOR accepts risks, in that air
defense sectors present seams in the defenses and may be unable to provide
mutual support. On the other hand sector defense porvides three descrete
benefits: facilitating passive air defense, reducing the signature of defensive
11-1
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
systems, and enabling the OPFOR to mass air defense assets from dispersed
sites to protect the most critical targets. The OPFOR also employs passive
air defense techniques including dispersal, deception, and camouflage. To
the exent possible,it disperses high value assets.
PHASES
11-6. Essential to integration and successful employment at the strategic and
operational level is the use of three phases. The first includes all actions
taken to destroy enemy aircraft before they are employed. Aviation, surface-
to-surface missiles (SSM), special-purpose forces (SPF), affiliated organiza-
tions, and artillery are used to destroy air command and control (C2) facili-
ties, aviation support facilities, and the enemys aircraft while they are still
on the ground. This phase is conducted using primarily strategic and opera-
tional assets of the Army and the Air Force. The second phase aims at de-
stroying enemy aircraft while in flight and before they enter the airspace over
OPFOR ground maneuver forces. Again this mission is performed primarily
at the strategic and operational levels. Interceptor aircraft and long- and me-
dium-range surface-to-air missiles (SAMs) conduct this phase of the air de-
fense. The third phase entails the destruction of enemy aircraft that have
penetrated into the airspace over OPFOR ground maneuver forces. Tactical
fighters, short- to medium-range SAMs, antiaircraft (AA) guns, and other
weapons of the ground maneuver units execute this phase. It is in this phase
that ground-based tactical air defense plays its primary role. The objective is
to deny enemy aviation the ability to interfere with ground maneuver units.
Air defense forces can accomplish this either by destroying enemy aircraft or
by forcing them to expend their munitions beyond effective range or diverting
their aircraft before reaching their targets.
PRINCIPLES
11-7. The OPFOR follows several basic principles when conducting air de-
fense: surprise, firepower, mobility, continuity, initiative, coordination, and
security. Of these, the element of surprise is the most critical.
Surprise
11-8. Achieving surprise is fundamental to any successful air defense battle.
At the tactical level, surprise can be achieved through a variety of means.
The positioning of air defense systems in unexpected locations; the use of
camouflage, concealment, cover and deception (C3D), and the use of non-air
defense systems in conjunction with air defense systems can all be important
in creating the element of surprise.
Firepower
11-9. The OPFOR force structure includes a wide variety of air defense
weapons (both missiles and guns). This mix of capabilities gives ground force
commanders outstanding firepower for air defense. It is important that air
defense planning consider and employ all assets available, across all arms to
achieve maximum firepower.
11-2
________________________________________________________________________________Chapter 11
Mobility
11-10. When planning air defense, the commander must always consider the
mobility of air defense weapons and the time required for their deployment.
The ground forces, for which air defenses provide cover, are quite mobile and
frequently change formation as they deploy. The air enemy is mobile and can
attack from many directions or altitudes. Therefore, the commander must use
to the maximum the mobility and firepower of his assets, creating optimum
groupings and fire plans. Tactical dispersion of ground maneuver forces has
become increasingly important and the commander must take this require-
ment into consideration when assigning missions and deploying air defense
assets.
Continuity
11-11. Air defense forces must provide continuous protection of critical or-
ganizations and assets. Only constantly moving air defense units that have
adequate logistics support can ensure comprehensive coverage. They must
provide air defense day or night in all weather conditions. Mobility contrib-
utes directly to continuity.
Initiative
11-12. The modern battlefield is a fluid and volatile environment where air
defense unit commanders must respond to constant changes in the situation.
This demands aggressive action, initiative, and originality. Commanders
must operate efficiently when communications with other air defense units
fail. If the supported unit receives a modified mission, the commander must
reevaluate his own units deployment in light of the new requirements. He
also must be aware of changes in the tactics enemy air forces employ.
Coordination
11-13. The OPFOR stresses coordination between supported maneuver and
supporting air defense units, between air defense units, and with other arms.
It views air defense as a single system composed of various parts. All tactical-
level air defense weapons must coordinate precisely with flanking units, with
operational-level air defense, and with aviation. Failure to coordinate can re-
sult in gaps where they are not wanted, excessive ammunition expenditure,
and casualties to friendly air forces.
Security
11-14. The OPFOR recognizes that enemy air assets can attack from any
quarter. Therefore, it must provide security for units at any depth and from
any direction. Air defense must function with unremitting reliability and
overall security. This requires careful deployment, uninterrupted ammuni-
tion supply, and a comprehensive early warning system. Commanders must
factor security into air defense planning.
ASSETS
11-15. The OPFOR inventory of ground-based air defense weapons includes a
variety of missiles, guns, and support equipment. The OPFOR has an admin-
istrative force structure that manages its military forces in peacetime. This
11-3
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
Operational-Strategic Commands
11-19. The OSC is the OPFORs primary operational organization. It is to
these operational-level headquarters, activated during time of war, that
forces are allocated from the administrative force structure. Most of the air
defense organizations located at army group, army or Corps level will nor-
mally but, not always, be found at OSC level. It is also at this level that air
defense, would be able to use joint assets of the Army and the Air Force.
Divisions
11-20. Most maneuver divisions contain a SAM regiment. The regiment is
fully capable of providing air defense coverage for the entire division. Divi-
sions can be assigned to create task-organized division tactical groups
(DTGs). When this occurs, consideration must be given to allocating addi-
tional air defense assets to insure protection of the augmented force. In some
situations the DTG may be allocated assets normally associated with opera-
tional-level organizations.
11-4
________________________________________________________________________________Chapter 11
Battalions
11-22. Maneuver battalions may or may not have organic air defense assets.
Battalions, like brigades, can serve as detachments to perform a specific of-
fensive mission. When assigning air defense assets to battalions or brigades
designated detachments, planners need to pay special attention to the com-
mand and support relationship they assign (see Chapter 2).
11-5
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
11-28. The OPFOR also recognizes that air defense is a combined arms effort.
The use of artillery in conjunction with anti-helicopters mines against attack
helicopter firing postions is just one example of this approach. The OPFOR
continuosly looks for new and adaptive ways of employing not only air de-
fense systems but also systems not traditionally associated with air defense.
(See the All Arms Air Defense portion of Chapter 5.) It attempts to adapt
these systems and develop new tactics which may help to fill the void when a
specific capability is denied by a more sophisticated enemy.
Corner Reflectors
11-33. Passive systems such as radar corner reflectors provide a low-cost and
effective addition to expensive air defense jammers. These systems can de-
ceive enemy airborne surveillance and target acquisition radars by providing
false or multiple targets. Corner reflectors can also mask or distort radar ref-
erence points.
GPS Jammers
11-34. The OPFOR also can employ low-cost GPS jammers to disrupt aircraft
navigation and precision munitions targeting. GPS jammers are also effective
against cruise missiles.
11-6
________________________________________________________________________________Chapter 11
11-7
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
SAM launchers and the distances of air defense systems from the battle line.
Ideally, the degree of dispersal for units would be the same whether the en-
emy is employing conventional or precision weapons or even tactical nuclear
weapons. A general rule for the degree of dispersion is that the enemy strike
should not destroy two adjacent units simultaneously. A maximum of one-
third of a unit should be vulnerable to a single precision weapon or nuclear
strike.
11-8
________________________________________________________________________________Chapter 11
11-47. It is the unit commander who is responsible for the success or failure
of these operations. For example, during the planning phase, the division or
brigade commander (assisted by the aerospace operations officer and force
protection staff officers) personally directs the deployment of his air defense
weapons to support his mission and establishes priorities and procedures for
logistics support. At the maneuver battalion level, the maneuver battalion
commander has overall responsibility for the organization and conduct of air
defense.
11-48. The OSC commander plays a major role in the control of air defense
assets of his subordinates. He may direct some assets be used to augment the
air defenses of the OSC. He may direct that other assets be used to provide
OSC-wide coverage of gaps. There may be situations when the OSC will spec-
ify how divisional maneuver brigades employ their air defense batteries. Al-
though this would not be common practice, a lack of assets within the com-
mand could require that the OSC commander take such action. The division
can dictate how maneuver brigades employ their air defense batteries. Fi-
nally, the maneuver brigades air defense commander has overall responsibil-
ity for the coordinated air defense coverage and administrative control of the
shoulder-fired SAM gunners constituent to the maneuver battalions.
11-9
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
11-49. The operations section is the primary staff section responsible for air
defense. Within that section is the aerospace subsection that does the plan-
ning and insures that those plans are executed within the commanders in-
tent. The aerospace subsection is assisted in this effort by the force protection
staff element. It is the force protection staff element that receives liaison
teams from constituent, dedicated and supporting air defense units associ-
ated with the division or DTG.
RECONNAISSANCE
11-52. Reconnaissance is a perfect example of the systematic approach the
OPFOR takes in conducting air defense. Although this chapter primarily ad-
dresses ground-based air defense at the tactical level, ground-based and air-
borne reconnaissance assets at the operational level play a major role in
gathering, integrating, and disseminating information to tactical units. The
principal objective of reconnaissance is to establish a system that not only
provides the earliest possible warning of approaching enemy aircraft but also
develops target information for planning and conducting the air defense. The
OPFOR concept of air defense reconnaissance includes terrain reconnais-
sance and air surveillance.
TERRAIN RECONNAISSANCE
11-53. Both the commander of the supported maneuver unit and the com-
mander of the supporting air defense element usually conduct terrain recon-
naissance. A preliminary map reconnaissance can tentatively identify posi-
tions for deployment of air defense weapons in defensive positions, along
movement routes, or in areas to be seized by advancing forces. (See also
Movement of Air Defense Units in this chapter.) Significant emphasis is
11-10
________________________________________________________________________________Chapter 11
placed on identifying all potential attack routes for low-flying enemy aircraft
of all types. Routes of approach suitable for armed helicopters and positions
from which these helicopters might fire ATGMs are of special concern, since
the OPFOR considers such helicopters an especially serious threat to ground
maneuver units.
AIR SURVEILLANCE
11-54. Air surveillance is conducted by radar, electro-optical means, and by
visual observation. Radar is used for technical surveillance, providing an all-
weather detection capability. Radars fall into the general categories of sur-
veillance and fire control. Surveillance radars include early warning, target
acquisition, and height-finding radars. Some fire control radars also have a
limited target acquisition capability.
11-55. Preliminary target data is passed from higher-level radar units to air
defense commanders and their firing batteries; this practice reduces the vul-
nerability of battery radars and radar-equipped gun carriages and missile
launchers to ECM. Ideally, only those aircraft that have been positively iden-
tified as hostile will be engaged.
11-56. Despite the presence of a technologically advanced early warning sys-
tem, the OPFOR continues to stress the importance of visual surveillance. An
effective system of visual surveillance may often provide the first warning of
an enemy air attack, especially one conducted by armed helicopters using
nap-of-the-earth techniques. This is especially true at the small unit level.
Air observers are posted in all units when operating close to enemy forces or
in areas where enemy air attack is considered likely. In the defense, posts are
set up at suitable locations, usually on terrain offering good visibility, near
CPs, and/or close to air defense units in firing positions. During tactical
movement and during both the defense and offense, observers are posted on
each vehicle. Observers are changed frequently to reduce fatigue and main-
tain their effectiveness.
11-57. The information required by air defense units is divided into two cate-
gories. The first category includes all data from which a determination of
probable enemy air actions may be derived. These data are necessary for
planning and organizing the air defense system. Included in this category
are
Tactical-technical characteristics and combat capability of enemy air-
craft.
Composition and strength of enemy air power.
Locations of airfields and forward arming and refueling points
(FARPs).
Avenues of low-level flight.
C2 sites.
Potential armed helicopter firing positions.
11-58. The second category includes data on which to develop a clear picture
of the air situation and determine the enemys plans, air order of battle, and
strike objectives. These data are needed to conduct the air battle (assign tar-
gets to fire units or reposition units. Included in this category are the exact
11-11
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
MISSION ASSIGNMENT
11-59. Whatever the nature of combat being conducted by maneuver forces,
the actions of supporting air defense units are, as the term implies, inher-
ently defensive. Assigning specific missions to air defense units requires an
understanding of the types of missions, the planning considerations involved,
and the engagement procedures used.
MISSIONS
11-60. The primary mission of OPFOR ground-based air defense systems is to
protect maneuver units and installations from attack by fixed- and rotary-
wing aircraft, thus reducing the availability of enemy air assets to influence
the development of the ground battle. As part of the overall air defense effort,
these forces also perform a variety of other missions, including the following:
Timely detection of incoming aircraft, continuous tracking of airborne
targets, and warning troops of attacking aircraft.
Protection of the immediate rear with a primary emphasis on protect-
ing targets that play key roles in supplying troops.
Destruction of enemy reconnaissance aircraft.
Destruction of airborne or air assaults during overflight, airdrop, or
landing.
Prevention of deeper penetration by enemy aircraft, in cooperation
with adjacent air defense elements.
The prevention of reinforcement or resupply of encircled enemy forces.
MISSION PLANNING AND EMPLOYMENT CONSIDERATIONS
11-61. Missions are assigned to air defense units after detailed studies of the
role and features of the defended unit or area. Assignment of an air defense
mission normally is based on the availability and technical characteristics of
air defense units. Consideration is given to
The effective range of the air defense units specific weapon system. If
the effective range does not exceed 10 km, the air defense unit is not
assigned a mission covering 30 km. The same applies to altitude; a unit
of small-caliber AA guns is not assigned a mission of independently
protecting an object that can be successfully hit by an airstrike from al-
titudes over 2,000 m.
Effectiveness of fire of an air defense units weapon usually is described
by its probability of destroying an air target. If the probability is small,
the object may be covered by several air defense elements.
11-12
________________________________________________________________________________Chapter 11
If enemy aircraft are capable of striking the object during any weather
condition, units without fire control radar are not capable of providing
adequate air defense.
An air defense system chosen to defend a given object must have at
least the same mobility as the object defended.
The availability and capability of early warning and target acquisition
radars, weapons, electronic jamming and electronic protection meas-
ures ability, and the operating requirements of these systems.
11-62. The essence of an air defense units combat mission can be expressed
in two words: to cover. Combat orders indicate the combat units to be cov-
ered, as well as the starting time and duration of the air defense mission.
Also given are the degree of readiness and procedures for conducting fire,
procedures for organizing early warning, target acquisition, and communica-
tions; routes of movement to the fire or launch position area; coordination be-
tween ground troops and friendly aviation, control, communications, and lo-
gistics elements, and other applicable instructions.
11-63. The characteristics of the objects to be defended are the determining
factors in the tactical employment of air defense units. Primary among these
are the combat function and location of the defended unit or object. This is
determined primarily by the role and location of ground combat units, logis-
tics units, and the current tactical situation. Other factors have a consider-
able influence on a decision as to the type and quantity of air defense units
assigned, such as
Sensitivity of the target. A fuel dump is more sensitive to air strikes
than a fuel depot. A mountain road is considerably more critical than a
road on a plain, since damage to the road surface would forces troops to
halt in the first case, but not necessarily in the second.
Geometric dimensions of a target. The larger the target, the
greater the probability of its being hit. If a targets dimensions are
large, it can be attacked from horizontal flight at medium-to-high alti-
tudes. In most cases, targets of smaller dimensions would be attacked
from very low altitudes or by diving aircraft.
Mobility of a target. Targets maneuvering on the battlefield are
harder to locate and attack than are fixed targets. The enemy will,
therefore, most likely attempt to destroy them immediately upon detec-
tion. Stationary or immobile targets are not necessarily subject to air
strikes immediately upon their detection, but as the tactical situation
warrants.
Weather and visibility. Various kinds of weather and night time
conditions can affect the possibility of attacking aircraft locating a tar-
get. The possibility of attacking aircraft locating a target in various
kinds of weather and at night. Reference points on the approaches to
the target, and at the targets location, can be used for navigational
fixes to more accurately acquire the target.
11-64. The tactical importance of units and facilities is not constant but
changes during the course of combat as assigned missions are accomplished.
For example, the role of a battalion advancing along the main axis and that
of a battalion removed to the reserve are not of equal importance with respect
11-13
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
ENGAGEMENT PROCEDURES
11-66. Aircraft posing the greatest threat are engaged on a priority basis.
Aircraft are engaged with as many weapons as possible and in the shortest
time possible to achieve the greatest destructive and deterrent effect. The
preferred engagement technique is to continue firing at an already engaged
target rather than to switch from target to target, unless a later-acquired
target seriously threatens the air defense unit itself or a high-priority target.
The OPFOR would rather engage an enemy aircraft prematurely and waste
some ammunition than wait too long and allow the aircraft to gain a favor-
able attack position. Aircraft are fired on as long as they remain within
range. Air observers and weapons crews outside the attacked sector maintain
continuous observation and readiness to fire in order to prevent the enemy
from conducting a successful attack from several directions simultaneously.
11-67. The OPFOR emphasizes that air defense units do not have to destroy
aircraft to accomplish their mission, although such destruction is obviously
desirable. The mission is accomplished if air defense units prevent enemy
aircraft from conducting successful air activities. For example, air defense
units can force enemy aircraft to break off their attacks or to expend their
ordnance inaccurately without having to destroy the aircraft. In fact, the
mere presence of active and effective air defense weapons systems can reduce
the effectiveness of enemy air activities by forcing aircraft to avoid the sys-
tems or to operate using less than optimum procedures.
EMPLOYMENT TECHNIQUES
11-68. The details of the employment of air defense assets are not templated,
carbon copy solutions. Employment options depend on several factors, some
of which are
11-14
________________________________________________________________________________Chapter 11
Missions assigned.
Scale of the missions.
Availability and capability of systems.
Enemy air order of battle.
Priority of the protected target.
Conditions under which combat is waged and the type of combat.
Specific terrain and meteorological conditions.
Whatever the nature of combat actions conducted by maneuver forces, the ac-
tions of supporting air defense units must prevent enemy aircraft from suc-
cessfully attacking maneuver forces engaged in either offensive or defensive
actions.
MOVEMENT OF AIR DEFENSE UNITS
11-69. Where time permits, alternate positions are reconnoitered and pre-
pared in advance. Ideally, major movements are conducted at night or in ad-
verse weather. The OPFOR seeks to maintain effective air defense coverage
by ensuring that not all elements relocate at the same time, leaving one or
more firing batteries in their positions to provide coverage while others move.
If the air threat is not imminent, the air defense unit may move separately to
its new position. In this case, the air defense battery commander usually con-
ducts an initial map reconnaissance and designates the movement route and
tentative firing positions in the new area. He sends out a reconnaissance pa-
trol that normally consists of one of the firing platoon leaders, several sol-
diers and a vehicle. This patrol conducts route reconnaissance, identifies
temporary firing positions along the movement route, and conducts limited
NBC reconnaissance. The reconnaissance patrol then confirms the suitability
and location of the new positions. The reconnaissance patrol can operate as
part of a supported maneuver units reconnaissance patrol, as part of the re-
connaissance patrol of the next-higher air defense unit, or it can carry out its
mission independently.
11-70. Ideally, every air defense unit should have two to three alternate posi-
tions; movement to them can be carried out at night or under conditions of
limited visibility whenever possible. Air defense units would most likely move
to alternate positions immediately after enemy reconnaissance aircraft have
overflown their current position, after an air strike has been repulsed, or af-
ter units have been at a single position for an extended period.
11-71. For divisional air defense assets, this extended period of time would
consist of approximately 4 to 6 hours, after which they would move to alter-
nate positions. This time could obviously be reduced when there is a high
threat of air or precision attack. In some cases, given the systems capability
to do so, moves could take place as often as every 10 minutes. For more in-
formation see Passive Air Defense Measures.
11-72. The total time for movement of air defense units includes the time for
leaving the position, moving to the area of the new position, and occupying
this position. It is the mission of commanders and staffs to reduce this time to
the minimum, since during this period the unit is removed from battle. How-
ever, a necessary condition for air defense effectiveness is the destruction of
11-15
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
enemy aircraft on the approaches to the supported units. This must be taken
into account, along with survivability considerations, when determining the
frequency of changing positions. The procedure and time periods for move-
ment, and occupying and preparing positions, are determined during plan-
ning for combat.
11-16
________________________________________________________________________________Chapter 11
11-17
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
heights to shoot down onto them; or placed just behind a crest to catch air-
craft from behind as they clear a ridge. Single launcher shoulder-fired SAM
ambushes may be set up on wooden platforms built in treetops to catch air-
craft flying over a forest.
11-83. In urban areas, AA guns or blinding lasers could be set up within the
top or middle floors of buildings to fire laterally or even down on low-flying
aircraft while remaining unseen from almost every angle. Weather conditions
may also facilitate the use of an air defense ambush. For example, low cloud
bases may force enemy aircraft down into the envelope of a particular
weapon. Ambushing units may work in concert with smoke/aerosol dispens-
ing units, or ground-based jammers that jam low-flying aircrafts terrain-
following radar, forcing it up into the ambush weapons optimum engagement
envelope.
11-84. Occasionally AA guns may choose not to employ their radars, using
strictly electro-optical sights. This tactic takes into account the capability of
modern aircraft, including attack helicopters, to detect radar and infared sys-
tems.
11-85. Air defense ambushes are often employed when there is a perceived
inadequacy of air defense assets. Typical missions include defending second-
echelon maneuver units, CPs and reserves, artillery and missile units, other
air defense units in firing positions, river-crossing sites, and first-echelon
maneuver units.
11-86. The unit or weapon assigned to an air defense ambush usually occu-
pies the site in hours of darkness or under the cover of poor visibility condi-
tions. The unit or weapon is carefully camouflaged and keeps all its emitters
off or in dummy load until ordered to engage a target. It may assume a hide
position and establish local ground security and air observers. Depending on
the unit or weapon involved and the situation, it may be able to receive
automated surveillance and target tracking data from its parent unit. More
than one air defense ambush, involving more than one weapon type may be
established along an air avenue of approach. These may work independently
or in concert depending on the situation. Target engagement decisions may
be left up to the ambushing unit commander.
11-87. Air defense ambushes may be planned and executed on short notice
with little preparation, or involve elaborate preparation and camouflage,
tracking enemy aircraft over several days to discern operational patterns and
possibly weaknesses, optimum weather patterns for a specific ambush site.
Detailed preparations can involve removal of tracer ammunition from AA gun
ammunition belts so that near misses do not alert the target aircraft, or con-
struction of air observers/shoulder-fired SAM tree-stands in remote loca-
tions, with provision made for the alert of the ambush unit through wire, vis-
ual, or radio signals. Decoys or derelict weapons may be placed to draw the
attention of enemy aircrews, causing them to enter the ambush zone or fire at
the wrong target. Visual decoys can be made more believeable through the
use of imitative communications or even decoy emitters. The key to a suc-
cessful pre-planned ambush is creating a credible target or set of targets that
the enemy will attack. Special engagement techniques may be used, such as
11-18
________________________________________________________________________________Chapter 11
delaying radar illumination until the last possible moment, coupled with a
favorable cloud base and remote track information from other sensors.
11-88. When a target is detected, the ambushing weapon or unit prepares to
engage, which may involve removal of some camouflage, or a short movement
from its hide position to its firing position. The ambushing unit fires on the
target until it is destroyed or until the target moves out of its firing zone. Af-
ter ensuring that it is safe to move, the ambushing unit or weapon immedi-
ately displaces via a concealed route to a new ambush site or returns to its
parent unit.
11-89. Employment of roving units is similar to that of air defense ambushes.
The primary difference is that, while an ambushing unit lies in wait for ap-
proaching enemy aircraft, a roving unit moves to the most likely areas of en-
emy air attack and occupies a series of predesignated positions in the sup-
ported units area of responsibility (AOR). The commander of the roving unit
identifies these positions during his terrain reconnaissance and coordinates
them with the air defense and maneuver unit commanders. The roving unit
occupies these positions according to a prearranged schedule or on order of
the air defense unit commander. Ambushing and roving units terminate their
missions and return to previously designated primary firing positions upon
direction of the commander of the parent air defense unit.
11-19
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
PASSIVE
11-93. Since the mission the UAV is executing may not be apparent, actions
should be taken to counter all possibilities. The integrated use of the passive
measures described under survivability combined with C3D can reduce the ef-
fectiveness of UAVs. The use of a variety of decoys provides a false picture of
the mission area to the enemy and to a large extent can deny information or
distort the information collected by the UAV.
ACTIVE
11-94. A wide variety and large number of active measures are available to
the OPFOR to counter UAVs. The effectiveness of air defense radars can vary
dependent on the radar cross section (RCS) and altitude of the vehicle. Of
course, this does not preclude the use of radar, since these factors are consid-
erations in detecting any aircraft. The relative small size of many UAVs obvi-
ously reduces their RCS.
11-95. A of sound-ranging systems are available which can provide early
warning and azimuth of an approaching UAV. This in turn provides air de-
fense weapons and maneuver unit weapons an opportunity to prepare for the
vehicles approach and to put up a large volume of fire, provided the UAV can
subsequently be visually detected. The early warning provided by sound
ranging increases the probability that visual observers will be able to spot the
vehicle.
11-96. The location of UAV ground stations and launchers should constitute
a high priority for reconnaissance. Since UAVs can also support enemy mul-
tiple rocket launchers (MRL) targeting and fires from long range, their prior-
ity for destruction increases. Locating these targets can be tied to artillery,
MRL or aircraft strike complexes which can quickly engage the targets once
the information is received. The use special-purpose forces operating in the
enemy rear can also be a valuable asset in locating launchers and ground sta-
tions. They can either take direct action to destroy the targets or relay loca-
tion information to allow other means to be employed against them.
11-97. Jamming techniques can also be used to counter UAV system data
links. In some cases data links cannot be jammed but they can be monitored.
The effectiveness of these procedures varies according to the UAV system be-
ing attacked. High power spot/barrage noise jammers can be effectively used
to mask ground targets from side looking airborne radars. Many satellite up-
and downlinks employed are through the use of the commercial telecommuni-
cation infrastructure. This infrastructure and supporting satellites can be
jammed or monitored to some degree. Countering UAVs should not be viewed
as just a defense against the aerial vehicle, although that is important. The
air defense staff must coordinate with other arms to ensure that UAVs are
being attacked not just in the air, but that their related subsystems are also
addressed. The successful destruction of a UAV ground station has a far
greater impact than the destruction of a single air vehicle.
11-20
________________________________________________________________________________Chapter 11
because of the numerous surveillance and fire control radars in air defense
units and the inherent limitations of enemy aircraft maneuvers and coordina-
tion at night. Commanders prefer to move or realign units at night or during
other periods of reduced visibility to reduce the likelihood of detection by the
enemy, and such moves must be covered by air defenses.
11-99. Air defense units frequently deploy closer to supported units at night
and, like other units are more likely to conduct maintenance and resupply at
night. The OPFOR recognizes, however, that the increasing night capabilities
of aircraft and the proliferation of night strike packages requires air de-
fenses be ready 24 hours a day.
11-100. The greatest difficulty in tactical night air defense is in evaluating
the impact of terrain on a units tactical mission, especially if the unit is mov-
ing into a previously unoccupied area. If a timely and comprehensive terrain
reconnaissance cannot be conducted because of darkness, movement and es-
tablishment of new positions are far more difficult. To assist in the accurate
assessment of local terrain positions, air defense units use reconnaissance pa-
trols when they relocate at night.
11-101. From a technical standpoint, IR systems have trouble acquiring tar-
gets during hours of darkness, because the gunner must visually acquire the
target before launch. (This problem is shared by all shoulder-fired SAM sys-
tems. Thus, it is a target acquisition problem not a seeker limitation.) These
problems can be significantly reduced with the use of available night-vision
devices. In addition, various clip-on image-intensifier night sights can be
fitted to some shoulder-fired SAMs. Some radar-guided SAMs possess electro-
optical tracking backup that can be used in daylight hours in the event the
radar is jammed, and a night low-light-level television channel for engage-
ments in clear nighttime conditions. On some systems, the electro-optical
mode is considered the primary mode for target engagement, with radar-only
engagement mode being the second choice.
OFFENSE
11-102. The OPFOR ground force structure includes air defense units, which
are equipped with a variety of systems having the firepower, mobility, and
range to fully support fast-moving tank and mechanized forces in dynamic of-
fensive operations. Air defense units of an OSC conduct basically an area de-
fense, engaging enemy aircraft at some distance from the supported maneu-
ver divisions and themselves. The divisional air defense regiments conduct
primarily an area defense, though there is a significant element of point de-
fense in support of the divisions maneuver brigades. Air defense by batteries
and the shoulder-fired SAMs of the maneuver brigades is largely of the point
type, owing to the nature of the units to be defended and the capabilities of
their weapons.
ASSEMBLY AREA
11-103. Assembly areas are most commonly used in the offense and therefore
are addressed in this section. Brigade or division assembly areas are essen-
tially composed of a series of battalion assembly areas. The brigade com-
mander assigns air defense elements, normally a platoon of AA gun or gun-
11-21
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
11-22
________________________________________________________________________________Chapter 11
and vehicle-mounted weapons engage enemy aircraft that pass over the ma-
neuver battalions positions.
Attack
11-111. There are two forms of attack: the integrated attack and the dis-
persed attack. An integrated attack has as its ultimate goal the penetration
of enemy defenses and subsequent destruction of his support infrastructure.
The integrated attack may be conducted from positions in direct contact with
the enemy, or require a tactical movement forward from behind forces in con-
tact. In the former case, the forces in contact constitute the bulk of the fixing
force. While protection of this force is important, the situation may permit
the allocation of fewer air defense assets in favor of the assault and exploita-
tion forces.
11-112. The dispersed attack is normally conducted when confronted by a
superior enemy and/or when unable to mass or provide integrated command
and control. An important consideration in task organizing air defense assets
11-23
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
for the integrated or dispersed attack is the degree of movement required for
the fixing force, the assault force, and the exploitation force to accomplish
their missions. It is especially important to support units conducting the
penetration, prevent the enemy from conducting air reconnaissance, and pre-
vent him from locating the movement of forces and assets. During troop
movement and deployment for the attack, an attack from the air represents
the greatest danger; therefore, the primary mission of air defense is to protect
that movement and deployment. During the attack, the positions of sup-
ported maneuver units change and the success of air defense units in per-
forming their missions is determined by their ability to accompany maneuver
forces without separating from them by a distance at which effective coverage
is not maintained. The complexity and dynamism of the situation require sys-
tematic analysis of the supported units missions and maintaining continuous
communication with them.
11-113. The assets contained in the divisions air defense units are capable of
providing the commander with true area defense and medium-altitude cover-
age. Their mission is to protect the divisions maneuver elements and other
units within its AOR. Assets redeploy as necessary to maintain coverage of
advancing forces. Many systems are capable of providing air surveillance on
the move and rely on their short setup time to respond to detected enemy air-
craft. They can also displace by pairs or as batteries to provide stationary
coverage of the force as it moves.
11-114. There is no fixed pattern of deployment. The decision for deployment
depends primarily on the supported units mission, the terrain, and on the
ground and air tactical situations. Generally, OSC level weapons deploy
rearward from the forward edge at from one-third to one-half their engage-
ment range. This rule of thumb applies to both the offense and the defense.
(Some differences are identified in the defense section of this chapter.) The
OPFOR recognizes that rules of thumb are just that, and the tactical situa-
tion and common sense may dictate that these distances and positioning be
modified. Redeployment takes into account the requirement for maintaining
mutual support among air defense units, covering the main threat, and pro-
viding comprehensive coverage to all elements within the division AOR. In
addition to maneuver units, coverage must include the division headquarters,
artillery units, and logistics units. C2, terrain mobility, and dispersion to re-
duce vulnerability are also considered in both deploying and redeploying.
11-115. In the dispersed attack it is still the goal for the division to be able to
provide coverage for all units in its AOR. There may be times when disper-
sion is so great that this is not possible. In these cases the commander must
strive to position his assets to support forces in priority of their importance to
mission accomplishment. Some risk may have to be taken in certain areas
and commanders should plan for increased C3D and the increased use of
other arms to assist in those areas. Allocation of air defense units is weighted
in favor of maneuver units in those areas where the threat is perceived to be
the greatest. Accordingly, maneuver elements normally have their organic air
defense assets augmented by divisional air defense assets. If these batteries
are equipped with SAMs, they need not operate in the maneuver brigades
formation; the range capability of their radars and missiles allows them to
provide support from positions farther away. This provides an additional ad-
11-24
________________________________________________________________________________Chapter 11
Limited-Objective Attack
11-117. A limited-objective attack seeks to achieve results critical to the bat-
tle by destroying or denying the enemy key capabilities through primarily
military means. The primary objective of this type of attack is a particular
enemy capability. This section discusses the role of air defense in protecting
units involved in a limited objective attack. Air defense systems or organiza-
tions can also have a role as a key system conducting the attack. For exam-
ple, air defense may be the principle means of destroying certain airborne
flagship systems. There are four types of limited-objective attack: the sophis-
ticated ambush, the raid, the spoiling attack, and the counterattack.
11-118. Air defense support to a sophisticated ambush requires special atten-
tion to task organizing. Elements involved may not have the constituent air
defense assets required to protect them during the conduct of the sophisti-
cated ambush. As in other situations, the commander must ensure that the
assets allocated to them have the necessary mobility and capabilities to sup-
port the mission. Finally, consideration should be given to the amount of cov-
erage provided by assets located at higher levels of command. The reposition-
ing of some air defense assets within a division, for example, may allow con-
tinued protection of the division while also providing mid-altitude coverage
for the sophisticated ambush element. From an air defense perspective, the
key element in the sophisticated ambush is the fixing force. Since its mission
is to prevent enemy response and security forces from discovering the exploi-
tation force it must be prepared to engage and defeat aircraft supporting
suchforces.
11-119. The raid is similar to the sophisticated ambush in terms of the con-
siderations for air defense. Given the nature of the forces normally associated
with conducting a raid, air defense assets accompanying the raiding unit
should be man-portable. The commander may also consider providing the ma-
jority of air defense support of the raid with systems not actually accompany-
ing the raiding element. When assets do accompany the raiding elements, the
situation and terrain may be particularly conducive to the establishment of
air defense ambushes as a primary means of providing local coverage.
11-120. The spoiling attack allows less time for the commander to allocate
additional assets to the force conducting the attack. This problem can be
largely mitigated when initially allocating assets to the forces that typically
conduct this mission. The commander must also be prepared to shift the pri-
orities of available air defense units that on short notice could support the ac-
11-25
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
Strike
11-122. A strike seeks to achieve a tactical or operational decision through
the rapid destruction of a key enemy organization through a synergistic com-
bination of massed fires and maneuver. Divisions conduct strikes. The ma-
neuver is normally conducted in the form of a dispersed attack. Obviously the
two key priorities for air defense units are protecting the maneuver force and
precision fire assets. More than in any of the previously described offensive
actions, a key component of the air defense plan is its integration into the de-
ception plan. It is extremely important that air defense not serve as a means
of assisting enemy forces in determining the disposition, location, and inten-
tion of units participating in the strike. This can be accomplished in a variety
of ways. The most important is that air defense planners ensure that air de-
fense units and decoy units or systems are arrayed in a fashion that will sup-
port the deception plan.
DEFENSE
11-123. As in the offense, the division and its subordinate brigades have suffi-
cient assets to provide air defense coverage for all of their units. In cases
where a DTG or BTG has been formed, additional air defense assets should
be allocated to satisfy increased requirements. During transition and adap-
tive operations the employment of a decentralized defense, where C2 capabili-
ties have been degraded, sufficient assets are available to protect forces, but
the ability to integrate horizontally and thus provide mutual support will
likely be effected. The same would apply to the commanders ability to
achieve vertical integration between brigade and division assets. In the inte-
grated defense, the ability to integrate air defense assets is higher.
11-124. In a situational defense the limited time available determines the air
defense organization. Under these conditions the role of mobility, actions of
commanders and staffs, speed and secrecy in the maneuver of units and of
their deployment, and the organization of C2 increases.
11-26
________________________________________________________________________________Chapter 11
Disruption Zone
11-126. The forces defending the disruption zone are tasked to force the en-
emy to reveal his intentions, delay his advance, and to create lucrative tar-
gets. It is the area from which the division executes long-range fires and
strikes and mounts an aggressive counter-reconnaissance battle. Air defense
should provide area coverage to defend forces in the zone and provide point
defense for key assets involved in conducting fires. It is essential that air de-
fense assets assigned have mobility equal to those they are defending. Even
the systems providing point defense must be highly mobile and capable of
moving with units as they displace to hides or new firing positions or conduct
survivability moves. Paramount to the success of air defense in the disruption
zone is participation in the counter-reconnaissance effort. This effort must be
both creative and aggressive. The extensive use of air defense ambushes lo-
cated along likely routes of ingress and egress is essential. Early warning,
tracking, and remote cueing are key. When necessary the OPFOR will move
divisional assets normally located in the battle zone well into the disruption
zone to accomplish this. This, in conjunction with the well-planned use of
other arms to achieve what is traditionally thought of counter-air or air de-
fense missions, allows the OPFOR to attack air platforms in the disruption
zone and beyond.
Battle Zone
11-127. In the battle zone where the main defense force operates, emphasis is
on protecting the fighting forces. This is accomplished through a combination
of area and point defense. Priority for divisional assets is the protection of
those forces where an enemy penetration is expected or those assigned to kill
zones. Protection of long-range fire systems and reserves are the next priori-
ties. Forces designated to stay behind in the disruption zone and move to hide
positions are activated to conduct air defense ambushes from within enemy
depth. The use of other arms to attack enemy rotary-wing aircraft at their fir-
ing positions is also part of the air defense effort.
11-128. Elements of the maneuver brigades air defense unit deploy to cover
its battalions. Their fires are integrated with those of the division. Where
necessary divisional assets are assigned supporting missions to brigades.
Brigade assets are pushed down to battalions when required. Shoulder-fired
SAMs can augment the maneuver battalions, to close gaps in the coverage or
establish ambushes.
Support Zone
11-27
Draft FM 7-100.2 (Final Draft Sep 04) __________________________________________________________
11-129. In the support zone, the commander can assign less mobile air de-
fense elements to protect assets. The use of point protection is increased rela-
tive to the other zones within the AOR. C3D, particularly the use of deception
positions, also take on special emphasis within the support zone.
Maneuver Defense
11-131. The key to air defense support of the maneuver defense lies in mobil-
ity. Air defense units must be positioned to cover defending elements but ca-
pable of displacing with rapidly-moving ground maneuver forces. Ideally,
most air defense assets can be positioned with the shielding force and provide
adequate coverage for the contact force. Distances between the two forces are
key in determining if systems can provide coverage to the depth required. In
any case, it is essential that sufficient mobile assets be allocated to the con-
tact force to cover its movement to the rear and to cover the flanks.
11-132. As the contact force initiates its movement to begin the hand-off to
the shielding force, assets positioned with the shielding force to cover the con-
tact force can begin movement by alternating bounds to the line where the
the new shielding force position is located. In many situations, it may be pos-
sible to position longer-range systems behind the initial positions of both the
contact and shielding forces. This increases the time and continuity of cover-
age and allows more time for displacement. Again, units could displace to po-
sitions behind the subsequent contact or shielding force positions. It is essen-
tial that planners allocate and position systems that are capable of respond-
ing to a highly fluid situation. Commanders should take advantage of range,
mobility, and creative means of positioning to allow sufficient standoff to pre-
vent their systems from being destroyed by enemy direct fire systems.
11-133. Air defense planners need to take into account the requirement to
support rapidly executed ground counterattacks. Assets supporting and mov-
ing with counterattacking forces could be man-portable shoulder-fired SAMs.
Longer-range systems are positioned with defending forces where they can
cover the counterattacking force. In the maneuver defense, air defense units
must displace more frequently than in the area defense. This displacement
requires units or parts of units to move by bounds. One element continues
cover while the other moves. This means reduced coverage for at least part of
the time. Taking this into account, additional assets could be allocated to
make up the difference. In any case, moves should be planned in detail and
every effort made to reduce the number required. In the maneuver defense,
the need for frequent displacement often mitigates the requirement for sur-
vivability moves.
11-28
________________________________________________________________________________Chapter 11
Area Defense
11-134. The OPFOR conducts an area defense to deny key areas or when it is
overmatched. The defense may be intended to preserve forces, force the en-
emy to withdraw, or inflict sufficient casualties to cause him to loose the abil-
ity to continue offensive operations. The main defense force occupies battle
positions set in complex terrain. The disruption force conducts continuous
combat actions to allow enemy forces no respite. Logistics are decentralized,
often relying on caches that have been pre-positioned.
11-135. Air defense considerations in the disruption zone are similar to those
found in the maneuver defense. Forces in the disrutption zone must be capa-
ble of rapidly attacking the enemy or shifting to a maneuver defense or a
combination of the two. Frequent displacement is the rule. In many cases
dispersed ambush forces and precision weapons systems will require point
protection. Area coverage is desirable in trying to attack enemy aerial recon-
naissance assets and preventing effective employment of ground-attack plat-
forms. The disruption zone will require a relatively high density of shoulder-
fired SAMs and a well thought out and executed air defense ambush plan.
11-136. The battle zone, set in complex terrain, presents a whole set of prob-
lems which the air defender must solve. Complex terrain limits the capabili-
ties of line-of-sight systems. This includes acquisition, tracking, and firing
systems. A detailed terrain analysis, which takes into account the masking
features of the terrain, is essential. Although not desirable, some acquisition
systems will have to be positioned on high ground to be effective. The use of
C3D is key to mitigating the vulnerabilities of systems so sited. No matter
what techniques are used, there will be gaps in coverage. Some of these gaps
may be areas in which the commander chooses to take risks. Others can be
covered by shorter-range but more suitable systems. The use of ambushes
from hides could be particularly effective as the enemy attempts to exploit
these gaps.
11-29
Chapter 12
Engineer Support
The OPFOR realizes that engineer support is vital for the successful exe-
cution of combat. Due to the fluid nature of modern combat, effective en-
gineer support is essential for ground forces to employ or preserve combat
power, as the conditions dictate. Engineer support can give combat forces
the ability to maneuver quickly to exploit windows of opportunity, and it
can help change the nature of the conflict to something for which the en-
emy is not prepared.
12-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-3. The OPFOR plans the complete integration of civilian and military en-
gineer resources. For example, maneuver commanders may use civilian
earthmoving, road-building, and construction equipment and personnel in
support zones. This allows constituent combat engineer equipment and per-
sonnel to accompany maneuver forces in battle. Civilian workers or maneu-
ver units can perform many basic combat engineer tasks, with engineers pro-
viding guidance and technical expertise.
12-4. Engineer tasks are a shared responsibility throughout the OPFOR. For
instance, combat troops, as well as engineers, perform mine warfare tasks
such as minelaying, minefield recording, and mine removal or breaching. En-
gineer and combat arms personnel also perform survivability tasks such as
constructing fortifications, clearing fields of fire, and camouflage. The same is
true for water-obstacle crossings, where some units and equipment can ford,
swim, or snorkel across with little or no engineer support. Although the high-
est level of engineer training and the greatest technical capabilities exist in
the engineer troops, all military personnel and units train in fundamental
engineer tasks.
12-5. The OPFORs intent is to make the entire force as flexible and capable
as possible while minimizing dependence on limited engineer support. This
allows maneuver forces to autonomously execute rudimentary or basic engi-
neer tasks. It also frees the engineer troops to
Perform engineer-specific or critical tasks supporting the maneuver
commanders intent.
Exploit and expand successful engineer effort begun by the combat
troops.
Support units that have little or no engineer capability.
12-2
________________________________________________________________________________Chapter 12
STAFF RESPONSIBILITY
12-8. In maneuver divisions and brigades, engineer officers are permanent
members of functional staff subsections under the chief of force protection
and the chief of infrastructure management, who in turn advise the opera-
tions officer within their respective areas of expertise. Additionally, an engi-
neer liaison team from each subordinate or supporting engineer unit sup-
ports the staff. It provides the operations officer with detailed expertise on
engineer functions and direct communications to subordinate units executing
such functions. The engineer liaison team also coordinates, as necessary,
with other staff elements, including the chief of information warfare (IW).
Liaison team leaders speak for the commanders of their respective units.
12-9. The maneuver commander specifies the tactical combat action(s) of his
subordinate and supporting units, their start time and duration, and the area
for these actions to take place. With this information, the engineer officers on
his staff determine the required engineer missions to support the maneuver
commanders plan. They prioritize engineer efforts to execute the technical
tasks necessary to accomplish the overall mission. They can then determine
the appropriate mix of troops, equipment, and materials necessary to perform
the tasks under current conditions. They advise the commander and his staff on
the best employment of available engineer assets to support the maneuver com-
manders mission, intent, and objectives.
12-10. The engineer liaison teams keep their respective engineer unit com-
manders informed of requirements for engineer support and pass on any
guidance from the maneuver unit commander and staff on possible task or-
ganization. Then they monitor the execution of the directed missions. They
provide input to the maneuver commanders combat orders and battle plans,
the reconnaissance plan, the obstacle plan, and deception plans. They help
organize the crossing of water obstacles and other barriers, and the prepara-
tion and maintenance of movement routes. They coordinate with the division
or brigade chief of logistics regarding the preparation, improvement, and
maintenance of supply and evacuation routes.
12-11. The main steps that the liaison teams perform in support of combat
actions are
Helping the engineer unit commander decide the appropriate organiza-
tion of engineer support and reporting it to the maneuver commander.
Participating in the reconnaissance conducted by the maneuver com-
mander.
Monitoring the completion of tasks by engineer units during the prepa-
ration for, and conduct of, combat.
Reporting the status of engineer support to the maneuver commander.
12-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
TASK ORGANIZATION
12-12. There are no doctrinal constraints on task organization for mission
success. The ability to allocate assets downward and to task organize is re-
strained only by the availability of assets and the nature of the mission.
12-13. Although engineer assets generally are constituent at no lower than
brigade level, the OPFOR prefers to task organize for mission success at even
lower levels, when the assets are available. This may dictate that, instead of
maintaining engineer units, the commander may choose to break them down
and combine them into smaller (sometimes much, much smaller) multirole
engineer support elements. These engineer elements range in size from com-
panies down to multirole platoons and engineer squads.
12-14. Engineer assets deploy throughout the battlefield and perform nu-
merous distinct missions simultaneously during the course of the battle. In
this way, route-clearing assets perform one function, while others perform
demolitions, lay mines, construct obstacles, prepare defensive fighting posi-
tions, or set up water purification sites. Occasionally, the combined arms
commander can also attach to these groupings additional non-engineer as-
sets, such as artillery, tank, or infantry troops. He can also augment maneu-
ver elements with the engineer groups.
12-15. The following is a list of typical task-oriented engineer groupings:
Obstacle detachment (OD, see Countermobility).
Movement support detachment (MSD, see Mobility).
Engineer reconnaissance patrol (ERP, see Engineer Reconnaissance).
ENGINEER RECONNAISSANCE
12-18. Engineers conduct reconnaissance independently, or combined with
chemical and reconnaissance elements. If the maneuver unit commander
needs unique, specific engineer data for planning and preparation, he may
order or request the use of engineer assets to form engineer reconnaissance
12-4
________________________________________________________________________________Chapter 12
RECONNAISSANCE PATROLS
12-20. To provide engineer expertise, the OPFOR can attach engineer spe-
cialists to accompany a division, brigade, or even battalion tactical reconnais-
sance patrols. Additionally, reconnaissance elements of maneuver units can
provide limited engineer-related information, although with less technical
precision. However, under most conditions, the missions of all these recon-
naissance elements preclude them from concentrating solely on engineer re-
quirements. Therefore, the maneuver commander may order or request the
engineer unit to form its own engineer reconnaissance elements to provide
the specific data he needs for planning.
12-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-21. A brigade (or in some cases, a maneuver battalion) can include two or
three engineer reconnaissance personnel in a regular reconnaissance patrol
or security element. When engineer personnel augment other patrols in this
manner, there is not likely to be a separate engineer reconnaissance patrol.
ROUTE RECONNAISSANCE
12-24. When engineers reconnoiter routes, one of their goals is to identify
anything that could impede mobility. They report information on the condi-
tion of the roads, obstacles and bypasses, and bridge locations to the com-
manders of the engineer and/or maneuver units that sent them out. Taking
into consideration any guidance from supported commanders and their staffs,
the engineer unit commander can increase the size of his reconnaissance
element and divide it into smaller teams in order to cover several points si-
multaneously. This allows him to assess a large number of features in the
shortest amount of time.
12-25. When moving in areas where contact with enemy forces is unlikely,
the engineer or maneuver commander can send an engineer reconnaissance
patrol ahead to obtain the required data. When anticipating enemy contact,
engineer reconnaissance and data collection may be limited to reports from
troop reconnaissance elements reporting on the engineer aspects observed
along the route.
12-26. When reconnoitering routes, engineers attempt to
Verify the condition of the route.
Determine aspects of off-road terrain.
Identify all obstacles and locate bypasses or recommended breach sites.
Inspect bridges and dams.
Identify suitable halt and assembly areas.
12-6
________________________________________________________________________________Chapter 12
12-27. When the OPFOR route of advance encompasses potential water ob-
stacles, engineer reconnaissance patrols try to find spots to set up ferry and
bridge crossings, plus assembly or preparation areas. If bridges exist, engi-
neers gather information on the support structure, load capacity, necessary
repairs, and the presence of mines and demolitions on the approaches and on
the bridge itself.
MOBILITY
12-28. Due the dominance of the OPFOR in the region when fighting a re-
gional foe, the OPFOR generally has freedom to maneuver wherever it wants
whenever it wants. If the enemy hinders the movement of the OPFOR the
OPFOR has alternatives because it dominates the region. However when
fighting an extraregional foe, it is especially critical that the OPFOR main-
tain the ability to move unimpeded. This ability allows the OPFOR to control
the access and tempo of enemy forces. As long as the OPFOR has complete
access to the battlefield, it will allow no sanctuary to the enemy and deter-
mine the nature of the conflict. Engineer support can create opportunities for
infiltration of small forces into unexpected locations, to inflict damage or to
support IW.
12-29. Engineers are responsible for accomplishing tasks permitting the un-
impeded movement of forces along the movement route, plus activities at as-
sembly and halt areas. They also support the crossing of water obstacles. Fig-
ure 12-1 lists the specific engineer technical tasks that provide the required
support for tactical missions prior to and during tactical movement.
Preparation of assembly and halt areas. Conduct engineer reconnaissance of enemy and terrain.
Tactical movement. Clear passages in obstacles and perform demolition work.
Crossing water obstacles. Establish and maintain water obstacle-crossing sites.
Extract/purify water and establish water supply points.
Carry out engineer camouflage measures.
Prepare and maintain movement routes.
Prepare fortifications at assembly and halt areas.
Eliminate aftereffects of NBC attacks.
Figure 12-1. Engineer Support for Preparation and Conduct of Tactical Movement
MOVEMENT ROUTES
12-30. A maneuver commander determines the movement route. It can follow
any line and may include existing roads, cross-country roads, and off-road ar-
eas. After careful consideration of reconnaissance data and consultation with
engineer officers on his staff, he specifies the particular movement route(s)
12-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
his force will use. The engineer units and their liaison teams in the maneu-
ver units staff are then responsible for planning and coordinating engineer
support to prepare and maintain the specified movement routes. They pro-
vide input to the engineer support plan for the commander, who then issues
orders, missions, and requirements to the constituent and dedicated engineer
unit commanders for execution.
12-33. Since its different technical tasks involve different types of equipment,
the MSD frequently task organizes into elements to allow concurrent actions
along the movement route. Typical groups are a reconnaissance and obstacle-
clearing element, plus one or two road and bridge construction and repair
elements.
12-34. Reconnaissance and Obstacle-Clearing Element. Responsibili-
ties of the reconnaissance and obstacle-clearing element include
Marking the movement route.
Making immediate assessments of the terrain and obstacles.
Identifying bypasses.
Creating and marking passages through obstacles.
Determining the character of destruction along the route.
Locating building materials.
12-35. Reinforcing assets from the division engineer battalion can use explo-
sive charges or mechanical equipment to overcome rubble, rock barriers, and
dragons teeth (concrete pillars or iron posts). Engineers can breach wire ob-
stacles after examining them for boobytraps and electrification. Tree barriers
may require the use of dozer blades or explosives.
12-36. The reconnaissance and obstacle-clearing element typically includes
An engineer unit base.
Hand-held or vehicle-mounted mine-detection equipment.
Explosives.
Mineclearing vehicles such a tank with roller and plows.
12-8
________________________________________________________________________________Chapter 12
OFFENSE
12-40. In support of the offense, engineers are responsible for providing the
troops, equipment, and materials required to satisfy the tactical missions
specified in Figure 12-2. This figure also identifies technical tasks that the
engineers must perform in support of the offense.
12-41. During preparation for the offense, the engineers focus on four major
activities:
Preparing routes for the advance and employment of combat forces.
Providing survivability support to units in assembly areas.
Establishing passages in obstacles and minefields.
Equipping crossings over water obstacles.
12-42. During the offense, the engineers primary mission is to support the
attack and assist in maintaining a high tempo of combat. Once the attack has
started, engineer troops continue to perform tasks contributing to high rates
of advance. Occasionally, they create obstacles to protect flanks, disrupt
counterattacks, and block enemy reinforcements. Ongoing engineer reconnais-
12-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Movement forward, deployment, and transition to the Conduct engineer reconnaissance of enemy and
offense. terrain.
Preparation of assembly areas. Prepare fortifications in assembly areas.
Crossing water obstacles. Clear passages in obstacles and perform demo-
Supporting disruption and battle zones. lition work.
Repelling counterattacks. Establish and maintain water obstacle-crossing
Penetration of enemy defenses. sites.
Conduct of the battle. Establish obstacles.
Commitment of exploitation force or reserve. Extract/purify water and establish water supply
Reinforcing captured positions. points.
Carry out engineer camouflage measures.
Prepare and maintain movement routes.
Eliminate aftereffects of NBC strikes.
Figure 12-2. Engineer Support for Preparation and Conduct of the Offense
OBSTACLE BREACHING
12-44. The OPFOR is prepared to overcome obstacles during all phases of
combat. In the offense, the OPFOR expects to cross obstacles on movement
routes, and throughout the enemy defense. Creating passages for the ad-
vance of the force in the face of enemy resistance is a combined arms task.
12-10
________________________________________________________________________________Chapter 12
1 Dismounted infiltration.
2
Feint.
3
Covert breach.
12-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Mechanized Breaching
12-55. Mechanized units make use of all three breaching methods to rapidly
create lanes through obstacles with minimal delay. All OPFOR mechanized
units are trained, equipped and expected to breach explosive obstacles with-
out resorting to requests for help to higher levels of command.
12-12
________________________________________________________________________________Chapter 12
ll
Legend: Tank with Bangalore Roller Lane Widened
Roller-Plow Torpedo Installation Point by Roller-Plow
Tank with Plow Tank
AT Minefield Roller-Plow Breach Breach
Plow
12-59. During the offense, an MSD also creates lanes through nonexplosive
obstacles. In this case, the MSD may group require additional engineer aug-
12-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-14
________________________________________________________________________________Chapter 12
Categories
12-72. The width of the water obstacle affects the method of crossing, the
type of crossing, the need for reinforcement, and the length of time to conduct
the crossing. In terms of width, obstacle categories are narrow (less than 100
m), medium (100 to 250 m), wide (250 to 600 m), and large (greater than 600
m). In terms of depth, shallow water obstacles are up to 1.5 m in depth, deep
obstacles are 1.5 to 5 m in depth, and very deep obstacles are over 5 m deep.
12-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-73. Although canals are narrow obstacles, engineers place them in a spe-
cial category because their deep water and steep banks make it difficult to
use tracked amphibians, ferries, and standard bridging equipment. It is often
necessary to erect piers and special constructions to negotiate them.
Reconnaissance
12-74. Depending on the situation, an engineer reconnaissance patrol, the
reconnaissance element of an MSD, or engineers attached to other division
and brigade reconnaissance elements can reconnoiter a water obstacle. The
reconnaissance includes determining
The depth, width, and current velocity.
The composition of the bottom.
The presence of underwater obstructions or mines.
Possible fording, ferrying, bridging, and snorkeling sites.
The composition, height, and slope of the banks.
Approach and exit routes.
The camouflage potential of the area.
The presence and nature of obstacles on the banks.
Critical terrain features overlooking both banks.
Information on enemy defenses.
The engineers transmit this information to the CELT for planning purposes.
They mark recommended crossing sites, bypasses, routes, and critical areas
for the follow-on engineer elements responsible for establishing the crossing.
12-75. The divisions engineer battalion has qualified divers with scuba gear;
specialized vehicles and equipment to analyze soil data, stream velocities and
depth; and mine-detection equipment. Commanders can also use maps, aerial
photographs, engineer and combat patrols, radars, signals reconnaissance,
and human intelligence to gather data on crossing sites.
12-76. The number of engineer reconnaissance patrols depends on the width
of the water obstacle and the number of required crossing sitespatrols vary
from squad to platoon size. The patrols can be equipped with tracked am-
phibians, scout cars, or APCs and sometimes with special engineer recon-
naissance vehicles.
12-16
________________________________________________________________________________Chapter 12
Means
12-80. The OPFOR places high priority on the fielding of water obstacle-
crossing systems. Any obstacle that slows the tactical movement causes a
concentration of forces and invites destruction. To ensure a rapid advance,
many OPFOR APCs, IFVs, and reconnaissance vehicles are amphibious, as
are some self-propelled artillery and tactical SAM carriers. Therefore, the
OPFOR employs amphibious combat vehicles and specialized water obstacle-
crossing systems at the brigade and division level whenever possible. If APCs
and IFVs are amphibious, virtually all vehicles within mechanized infantry
or tank battalions would have either an amphibious or snorkeling capability.
During crossings, tracked amphibians are primarily used for carrying towed
artillery pieces, trucks, small vehicles, and troops. When not engaged in a
crossing, they may be used as tracked cargo carriers. The OPFOR recognizes
the need for tactical water obstacle-crossing assets during all types of combat
and ensures sufficient assets are readily available in engineer units at higher
levels.
12-81. The OPFOR crosses some narrow water obstacles by fording, by
swimming with amphibious combat vehicles, or by using tank- or truck-
mounted and low-water bridges. Other narrow obstacles (up to 100 m) and
medium obstacles require tracked amphibians, ferries, or pontoon bridges.
Wide and large water obstacles require tracked amphibians, ferries, or pon-
toon bridges (sometimes configured as rafts or ferries). Crossing large water
obstacles may necessitate the use of heavy floating bridges or girder bridges
erected by special-category engineers of the strategic-level transportation
services.
12-82. The characteristics of the water obstacle mainly determine the
method chosen for the crossing, although the nature of enemy defenses, the
mission, and the availability of engineer systems are also factors. Figure 12-3
lists the preferred crossing methods.
12-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Opposed Crossing
12-84. Opposed water crossings are the least preferred method of overcoming
an obstacle. This type of crossing requires secrecy, surprise, and high speed
supported by C3D and direct and indirect fire. To preserve the secrecy of the
intended crossing and its location, the OPFOR generally uses minimal prepa-
ration or construction prior to its execution. It emphasizes conducting the
crossing while moving as swiftly as possible and then continuing the offense
on the opposite bank.
12-85. In a mechanized crossing, the OPFOR maximizes the speed and ma-
neuverability advantages of combat vehicles. In the initial wave of the lead
elements, amphibious APCs or IFVs make a rapid amphibious crossing to
seize a bridgehead on the far bank. The crossing is usually covered from the
near bank by all available fires and usually takes place either at night or un-
der a smokescreen. These fires include direct artillery and tank fires, as well
as all available indirect fires. Direct air support, generally fixed-wing, is
more critical during water obstacle crossings than during other types of
ground combat action. See Chapter 11 for details on air defense support of
the crossing. Heliborne (or, less probably, airborne) forces may seize and hold
a bridgehead on the far bank.
12-86. In non-mechanized opposed crossings, C3D generally takes a greater
role. Feints and demonstrations may be used to confuse the enemy as to the
actual crossing zone. Low-visibility conditions are also ideal for conducting
both opposed and unopposed crossings.
12-18
________________________________________________________________________________Chapter 12
Unopposed Crossings
12-89. After an opposed crossing, the OPFOR can move company- or platoon-
size pontoon bridge units to the crossing site. If preceding units (including
the SD of a brigade) have eliminated enemy resistance at the water obstacle,
battalions in the main body of a brigade can conduct an unopposed crossing.
If the brigade(s) must conduct an opposed crossing and are successful, this al-
lows the divisions follow-on forces to conduct an unopposed crossing.
12-90. Bridges. Bridge crossings are a typical feature of unopposed cross-
ings. Construction of bridges starts when the enemy is denied the ability to
subject the crossing to direct or observed fire. Bridges have greater load-
bearing and throughput capacities than other crossing means and are pre-
ferred in order to maintain high rates of advance.
12-91. The division commander may send out an independent mission de-
tachment (IMD) ahead of the SDs of his lead brigades when there is an op-
portunity to seize a bridgehead over an undefended or poorly defended water
obstacle or bridge. The brigade can possibly send out an IMD of its own. In
either case, the IMD attempts to bypass enemy resistance forward of the wa-
ter obstacle and infiltrates to the far side of the water obstacle to establish a
bridgehead.
12-92. If the air situation is unfavorable, the OPFOR may only use bridges
during periods of limited visibility. At other times, it would tuck the bridges
into the bank and camouflage them.
12-93. The crossing commander designates TCPs, OPs, and work teams at
the crossing site. A bridge team is assigned to inspect pontoon couplings and
bank moorings, to evaluate and repair damage, and to monitor entry and exit
of vehicles.
12-94. Low-water bridges can free pontoon bridges, ferries, and tracked am-
phibians for use in other crossings. Low-water bridging is relatively perma-
nent, using piling to provide support.
12-95. Ferries. Ferry crossings are used to transport nonamphibious heavy
equipment across medium to wide water obstacles. This usually requires
three to four ferries per site. Ferries can be joined into a pontoon bridge or
can be used as individual ferries. Individual folding pontoon bridge sections
can also be used as ferries. Ferries are not usually employed in the initial
wave of an opposed or unopposed crossing but rather in subsequent waves of
tanks and other combat vehicles.
12-96. Ferry crossings begin can 15 to 20 minutes after the start of an op-
posed crossing. Ferries are launched from prepared ramps, and personnel
from the ferry platoon create landing ramps on the far bank. Floating pon-
toon bridge rafts are maneuvered and positioned by powerboats.
12-97. Engineer missions in the unopposed crossing are the same as they are
in the opposed crossing, but engineers are also assigned to prepare mooring
and launching sites and to assemble the ferries. Based on engineer recon-
naissance data, the crossing commander selects mooring sites, determines
the number and disposition of ferries or pontoon bridges used as ferries, and
12-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-20
________________________________________________________________________________Chapter 12
Up to 5 km
CC
ACC
CC
I ERP
Battalion
ACC Assembly
Area
RI I
VE
R
Legend:
CC Crossing Commander
CC Tracked Amphibian
Assistant Crossing Crossing Site
ACC
Commander
Ferry
Engineer Regulating Crossing
ERP Site
ACC Point
Platoon Columns
IV
E
R
Air Defense
12-103. Forces conducting water obstacle crossings are high priority targets
for enemy air strikes. Thus, the importance of air defense increases. The mis-
sion of air defense units is to protect the airspace above and around the cross-
ing site. For more information on air defense, see Chapter 10.
12-104. The OPFOR expects that most water obstacle crossings will be op-
posed by enemy air and ground defense and made without the advantage of
an existing bridge, convenient fording sites, or defensive air cover. Accord-
ingly, doctrine calls for conducting such opposed crossings rapidly, without
slowing the pace of the offense. The leading maneuver battalions and bri-
gades may have to provide their own air defense while crossing and then
cover the crossing of follow-on forces.
12-105. For unopposed crossings, the maneuver unit may cross a water obsta-
cle without deploying from its movement formation. In this case, division- or
brigade-level air defense units can establish firing positions on the near bank
to cover the site for the time it takes the column to cross. The air defense
units then move to the far bank and either establish firing positions or con-
tinue to move.
Smoke
12-106. Most opposed crossings are conducted under the cover of smoke or
other obscurants, which can degrade the enemys ability to locate and target
the actual crossing sites. However, smoke can also degrade or prevent visual
12-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
DEFENSE
12-107. The necessity for OPFOR engineers to support two basic battles, one
against a regional enemy and one against an extraregional enemy, was dis-
cussed earlier in this chapter. Since the extraregional enemy is the dominant
force in the region the OPFOR generally fights a defensive fight. In order to
defeat this extraregional force the OPFOR employs innovative engineer
methods to level the battlefield in addition to those employed in the more
conventional battle. Some examples of these methods are found later in this
section.
12-108. Engineer support for the defense focuses on reconnaissance, coun-
termobility support, and survivability support. It places emphasis on fortify-
ing battle positions and assembly areas, performing engineer C3D measures,
and adapting the terrain for defense. The defense is also conducive to the ex-
tensive use of various obstacles to interfere with the enemys advance.
12-109. The general aims of engineer support the defense include
Control access and tempo by delaying, disaggregating, and canalizing
enemy forces.
Establishing conditions necessary for organizing the defense.
Preparing and maintaining maneuver (and supply) routes.
Building fortifications of lines, battle positions, and assembly areas.
Ensure the integration of engineer support to IW and preparing de-
ception positions.
Protecting personnel and equipment from the effects of conventional
direct and indirect fires, precision munitions, and NBC strikes.
Creating or improving existing obstacles.
Providing potable water to the force.
12-110. The type and scale of engineer support depends on the tactical situa-
tion, enemy forces, and the conditions under which the DTG assumes the de-
fense. If the OPFOR does so during the course of the offense, support may
have to begin with the protection of threatened axes by ODs and ATRs and
the route work needed for regrouping. If the OPFOR assumes a defense when
not in contact with the enemy, support can begin with the creation of defen-
sive works and the improvement of routes necessary for the OPFOR units to
deploy. In the disruption and battle zones, the goals of engineer support are
to hold up the enemy advance. In the battle zones, engineer support facili-
tates organized withdrawal, maneuver, or counterattack by friendly forces.
12-111. Defensive planning measures ensure extensive use of obstacles, inte-
grated with preplanned direct and indirect fires, to affect the enemys ad-
vance and facilitate his destruction. Figure 12-5 identifies tactical missions
12-22
________________________________________________________________________________Chapter 12
Repelling enemy attacks in front of the battle line. Conduct engineer reconnaissance of enemy and ter-
Preparation of defensive areas. rain.
Troop movement. Prepare fortifications in defensive positions.
Battle to hold positions. Clear passages in obstacles and perform demolition
Repelling enemy penetrations of defense. work.
Overcoming covering force zone. Establish and maintain water obstacle-crossing sites.
Counterattack by exploitation forces or reserve. Establish and improve obstacles.
Reinforcing lines taken in counterattack. Extract/purify water and establish water supply points.
Transition to the offense. Carry out engineer camouflage measures.
Prepare and maintain movement routes.
Eliminate aftereffects of NBC strikes.
Figure 12-7. Engineer Support for Preparation and Conduct of the Defense
COUNTERMOBILITY
12-113. The OPFOR makes extensive use of countermobility operations to
control access and tempo by delaying, disaggregating, and canalizing enemy
forces. The obstacle plan is innovative and completely integrated with the
maneuver, fire support, and IW plans.
12-114. OPFOR engineer obstacles include any actions taken to inflict losses
and to delay and impede enemy movement. The creation of engineer obsta-
cles and execution of demolition activities are critical engineer functions in
all phases of the battle.
12-115. Countermobility support is extremely innovative, especially when the
OPFOR fights an extraregional enemy. Minefields may be irregular-shaped
and are thoroughly merged with the terrain. They also tend to be much
smaller than those laid in regional operations (especially linear operations),
which may easily be over a kilometer in length. Some example adaptive en-
gineer countermobility methods likely to be employed against an extrare-
gional enemy (in addition to methods used in a more conventional battle)
are
12-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
The intermittent laying of mines along road or trails involves the en-
emy in prolonged, potentially dangerous and time-consuming detection
and clearance operations, and requires a great deal of manpower.
Enemy LOCs will be mined and re-mined. This requires the extrare-
gional forces to constantly sweep for mines. Once a road is swept and
left unsecured, the OPFOR re-mines it.
Control access by denying the enemy key facilities. For example, de-
stroying airfield runways in the APOD or docks in the SPOD.
Deny LOCs from APOD/SPODs to enemy maneuver units, staging ar-
eas, or base camps. Contain (or trap) enemy forces in specific areas
such as APOD/SPOD and built-up areas.
Maximize the use of controlled minefields. This lets the OPFOR pass
through the minefield and activate it prior to the arrival of enemy
units. It can also be used to trap enemy units. This is used in conjunc-
tion with artillery as a kill zone.
Use off-road and chemical mines whenever possible. Always use anti-
handling devices (AHD) to slow clearing efforts.
Target vehicle mine plows/rollers as HPTs.
Use plastic mines to defeat mine detection sweeps.
Plant underwater mines at port or ford sites.
12-118. Of the three categories, explosive obstacles are the most common.
Engineers and others can emplace minefields more easily and quickly when
compared to the construction effort for nonexplosive obstacles. Additionally,
the OPFOR plans for the self-destruct or self-neutralization capabilities fre-
quently found in scatterable mines. It can also lay mines with remote-control
devices to activate or deactivate the minefield at will. This minimizes the ad-
12-24
________________________________________________________________________________Chapter 12
verse effect of friendly minefields on future actions and reduces the need for
the OPFOR to breach its own obstacles.
12-119. However, this is not the case with nonexplosive obstacles, which are
time- and resource-intensive to install and eliminate. For these reasons, the
OPFOR usually emplaces mines and other explosive obstacles first, and even-
tually supplements them by constructing nonexplosive obstacles.
12-120. When this occurs, they create combination obstacles, which are the
next most common after the explosive type. It is extremely rare for the
OPFOR to use a nonexplosive obstacle in isolation without any mines, explo-
sives, or booby traps.
OBSTACLE DETACHMENT
12-121. The OD is the basic building block of the OPFORs countermobility
effort. It is a task organization composed primarily of engineers. An OD can
vary in size depending on the tactical situation and the needs of the com-
mander.
12-122. ODs are temporary, task-organized groupings of engineer assets in-
tended to create minefields and obstacles. Their basic equipment includes
mechanical minelayers and trucks carrying mines, explosives, and other
equipment. They are sometimes augmented with mechanized infantry troops
for close protection and extra labor. The size and composition of the OD de-
pend on the tactical situation and the needs of the maneuver commander..
12-123. In addition to minelayers, ODs may add other engineer resources to
support critical obstacle development. The division may supplement the OD
with engineers for demolition work, ditchers to create antitank (AT) ditches,
and other engineer systems. This augmentation does not normally occur until
the earthmoving equipment completes other tasks, such as preparing fortifi-
cations.
12-124. The OD uses its ability to rapidly lay minefields and construct obsta-
cles to
Close gaps in the defense.
Deny the enemy access to key terrain.
Block the axis of an enemy armored advance.
Block enemy penetrations.
Channel the enemy into a kill zone and contain him there.
Protect the flank of a counterattacking force.
12-125. In the defense, the OPFOR commander may hold the OD and other
forces in reserve and can quickly employ them during an enemy attack, to
mine potentially vulnerable gaps. Engineer tasks during the defense imple-
ment obstacle plans, particularly AT obstacles. Together with ATRs, ODs
provide a quick-reaction AT force to block enemy penetrations.
12-126. Engineers create obstacles on possible enemy approaches to OPFOR
battle positions or artillery and air defense firing positions, in the gaps be-
12-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
tween battle positions, and on flanks. They normally construct barrier sys-
tems in coordination with the overall fire support plan.
12-127. Engineers can lay mines and construct obstacles in the disruption
zone and on likely enemy armored avenues of approach. They can also lay
obstacles in the depth of friendly units in the battle zone, and at subsequent
defensive lines throughout the AOR. However, simultaneous obstacle con-
struction throughout the AOR can only occur when sufficient time, equip-
ment, and personnel are available. In any part of the AOR, minefields and
other obstacles require barriers, security, and marked maneuver passages.
12-128. In preparation for movement, the division or brigade creates one or
more ODs to maximize mechanical minelaying and explosive obstacle sup-
port for maneuver forces. The OD provides countermobility support and de-
nies key terrain to the enemy. Its mission is to alter the tactical situation by
emplacing obstacles in response to enemy actions. During the tactical move-
ment, the OPFOR commanders greatest concern is armor attacks against the
flanks. Therefore, the OD emplaces AT obstacles in front of detected armor
threats or along possible routes suitable for armored vehicles. For additional
information on the employment and augmentation of the OD, see the discus-
sion of Obstacle Detachment [WHERE?].
12-129. Although the OD can act independently, the division or brigade often
assigns it to move and act in close coordination with the antitank reserve
(ATR). Even in the latter case, the OD still reports directly to the engineer
unit commander, who assigns its priorities, areas of concern, and task or-
ganization. This arrangement provides the maneuver commander with a
combination of organizations capable of rapidly emplacing AT obstacles as
well as covering the obstacles with AT fires. A minelaying squad of an engi-
neer mine warfare platoon or minelayer platoon usually serves as the core of
an OD.
12-130. While conducting tactical movement, the OD may travel behind the
SD and in front of the main body. Sometimes, it may move on a threatened
flank or forward within the main body, ready to deploy to either flank.
12-131. Following the maneuver commanders guidance, the engineer liaison
team recommends positioning of the OD so it can quickly deploy in response
to enemy actions. This may be to seal a critical area or to provide time to
shift forces and fires. The maneuver commander, the engineer liaison
team(s), and other staff elements monitor the progress of the tactical move-
ment and plan for possible enemy courses of action. They then identify possi-
ble deployment lines for the ATR and obstacle-emplacement locations for the
OD. If reconnaissance assets report enemy activity along a given axis that
confirms a course of action, the commander dispatches an OD and an ATR to
the appropriate deployment line to conduct their missions.
OBSTACLE PLANNING
12-132. Creating engineer obstacles and carrying out demolition activities are
significant engineer functions in all phases of the battle. The obstacle plan is
tailored and integrated into the overall operation plan with mutually sup-
porting systems of fire, as exemplified by the habitual association between
the OD and the ATR. Just as it develops a fire support plan, it also develops
12-26
________________________________________________________________________________Chapter 12
12-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Explosive Obstacles
12-135. The OPFOR emphasizes the use of explosive obstacles. These include
mines and demolitions. The widespread use of landmines on todays battle-
fields results from a combination of mass production, plastic mines, improved
battlefield delivery systems, and development of sophisticated fuzing. Re-
motely-delivered mines have expanded capability for changing the tempo of
battle.
12-136. Mines. Mines are the most significant obstacles the OPFOR can em-
ploy and are usually emplaced in groups or in minefields. Therefore, mine-
fields and minelaying are afforded separate sections below.
12-137. Demolitions. The OPFOR emphasizes the importance of roads as
high-speed avenues of attack for both friendly and enemy forces. Therefore, it
views the use of demolitions on roads as a significant way to disrupt enemy
movement. Critical points at which the OPFOR might use demolitions in-
clude overpasses, bridges, ravines, intersections, bypasses, approaches to wa-
ter obstacles, and roadways through urban or other complex terrain.
Nonexplosive Obstacles
12-138. Nonexplosive obstacles fall into three categories: AT, AP, and anti-
landing. Nonexplosive AT obstacles include ditches, dragons teeth, and vari-
ous other manmade and natural barriers. AP obstacles include concertina
and barbed wire. Antilanding obstacles include dragons teeth, AT ditches,
and wire obstacles. The OPFOR uses these obstacles at potential drop or
landing zones for amphibious, airborne, or heliborne assaults. The primary
12-28
________________________________________________________________________________Chapter 12
MINEFIELDS
12-139. The OPFOR frequently uses minefields during all phases of combat.
There are five basic types of OPFOR minefield:
Antitank (AT).
Antipersonnel (AP).
Mixed.
Decoy.
Antilanding.
12-140. The OPFOR stresses the importance of covering minefields with both
direct and indirect fires, particularly with long-range AT weapons. Minefields
inflict damage on attacking enemy forces and slow and canalize enemy forces
into kill zones covered by massed fires. Whenever possible, the OPFOR con-
tains enemy forces in a window of vulnerability for the longest time possible.
This facilitates the destruction of the enemy.
12-141. Conventional OPFOR minefields generally conform to doctrinal stan-
dards. This standardization ensures that engineers and combat personnel fol-
low consistent, uniform practices. Scatterable minefields, however, are much
less predictable in pattern. Maneuver commanders use combat personnel to
emplace protective minefields around fighting positions, while engineers
shape the battlefield for the maneuver commander.
12-142. Commanders of battalions and companies emplacing mines prepare
minefield records in three copies: one for the unit, one to the brigade, and one
to the division. The CELT at division and brigade level then uses the records
to prepare combined obstacle overlays for the maneuver commander. Mine-
fields are a fundamental part of the total obstacle plan that incorporates bar-
riers and terrain features.
Antitank
12-143. AT minefields are the primary type of OPFOR engineer obstacle and
serve to destroy or disable armored vehicles. They are primarily established
in belts consisting of multiple rows on avenues that are favorable for tanks in
front of the battle line and on the flanks. Where difficult terrain is available,
minefield belts will be tied into terrain obstacles to reduce the mine require-
ment. They are also placed at unit boundaries and in the depths to cover ar-
tillery firing positions, command posts (CPs), and other objectives.
12-144. The OPFOR usually emplaces AT minefields on a frontage of 200 to
300 m or more and to a depth of 60 to 120 m. The mines are laid in three or
four rows with approximately 20 to 40 m separating each row. The normal
spacing between AT mines in the rows is 4 to 5.5 m for pressure-activated
mines, and 9 to 12 m for full-width-attack mines. The normal mine outlay for
1 km of frontage in AT minefields is usually 300 to 400 full-width-attack
mines, or 550 to 750 pressure-activated mines. This mine outlay can reach
1,000 or more AT mines per km of frontage on major avenues of approach.
12-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Track-Attack Mines
Enemy
Row 1
4-5.5 m
20-40 m
Row 2
Row 3
Full-Width-Attack Mines
Enemy
Row 1
9-12 m
20-40 m
Row 2
Row 3
Row 4
12-30
________________________________________________________________________________Chapter 12
Antipersonnel
12-146. On the battlefield, the modern AP mine is used to
Inflict personnel casualties.
Hinder soldiers in clearing AT minefields.
Establish defensive positions.
Deny access to terrain.
12-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Enemy
X X X X X Row 1
Row 1
5-6 m
No Less Than 1 m
Row 2 X X X X Row 2
5m+ 5m+
Row 3 Row 3
Blast Mines
X X X Row 1 X X X X X X Row 1
15-20 m
13 m + 25 m
X X X Row 2 X X X X Row 2
25-50 m
Row 3
Row 3
Mixed
12-150. Mixed minefields contain both AT and AP mines. A mixed minefield
is generally viewed as a minefield with pure homogenous rows of either AP or
AT mines. This is mainly due to the physical constraints of mechanical mine-
layers. They cannot lay both AT and AP mines in the same row. This does not
preclude mixed minefields from having a mixture of both AT and AP mines.
They can be laid manually or remotely. It is easy to remotely seed an area
with a combination of both. However, the AT mine requirements govern the
mixed minefields parameters, outlay, and density. In areas that are not suit-
able for armored vehicles, AP mines constitute the majority of mixed mine
obstacles. Figure 12-10 shows an example of a mixed minefield with blast AP
rows between AT rows.
12-32
________________________________________________________________________________Chapter 12
Enemy
Row 1
Row 2
Row 3
Row 4
Figure 12-12. Mixed Minefield with Blast AP Rows between AT Rows (Example)
12-151. Combat arms personnel set up nonexplosive and mixed minefield ob-
stacles to cover their defensive positions. Engineers lay mixed minefields in
front of the battle line and on primary avenues into the defensive depth.
Mixed minefields are usually established in front of unit positions that are
transitioning to the defense. Figure 12-11 illustrates an example of a mixed
minefield with an AP minefield leading to full width AT minefield.
Decoy
12-152. Decoy minefields are a significant form of deception to slow move-
ment or deceive as to true unit locations. The OPFOR uses decoy, or false
minefields to mislead the enemy as to the locations of actual minefields. As
part of tactical deception, units typically give the impression of minelaying
activity, usually scarification of the soil, minelaying debris, minefield fences
and markers.
Antilanding
12-153. Antilanding minefields prevent landings by amphibious, airborne, or
heliborne assault forces. The OPFOR uses antilanding mines at possible
landing or drop zones (LZs or DZs) or when conducting combat along the sea-
coast or inland water features. It employs explosive, nonexplosive, and com-
bination obstacles. Minefields established in the water consist of bottom and
anchored mines and, at shallower depths, waterproof mines. The OPFOR
uses all types of mines above the shoreline, emplacing them following normal
minefield doctrine. At LZs and DZs it uses fragmentation and directional AP
mines. It also emplaces antihelicopter mines in locations it believes will be
used as firing (battle) positions for enemy attack helicopters or in possible
LZs to be used by lift helicopters.
12-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Enemy
5+ m
Row 1
9-12 m
20-40 m
Row 2
Row 3
Row 4
Figure 12-13. Mixed Minefield with an AP Minefield Leading to Full-Width AT Minefield (Exam-
ple)
Controlled
12-154. Some OPFOR units have the capability to lay controlled minefields.
These minefields consist of landmines with electronic switches (on/off) giving
the operator control over the operational status of the minefield. The opera-
tor can change the status of an area of the battlefield and make it either haz-
ardous for the enemy or render the area safe for friendly troops. This is done
either by a direct hardwire link or by radio. An entire minefield can be em-
placed and turned on or off, as necessary, to best support friendly operations.
12-155. On a smaller scale, select passages in a conventional minefield can
contain controllable landmines, allowing for the option of clearing safe lanes
for friendly use. The addition of selectable anti-removal and self-destruct fea-
tures to controlled mines enhances flexibility and overall effectiveness. Con-
trolled minefields can also be established in a maneuver defense to ensure
unrestricted maneuver of units over mined areas and to cut off enemy units
in pursuit.
MINELAYING
12-156. Mines are an essential element of both offensive and defensive com-
bat. The means of emplacing minefields can be manual, mechanical, or re-
mote. Since minelaying is a common task skill, manual emplacement is per-
formed by anybody and is the method employed by maneuver units. How-
ever, manual minelaying is labor-intensive and requires the expenditure of
more time than may be available during high-speed maneuver. Therefore,
OPFOR engineers may have towed and/or tracked conventional mechanical
minelaying vehicles that can quickly emplace both buried and surface-laid
minefields. The engineers may also have vehicle-mounted scatterable mine-
laying systems. These mechanical systems to allow engineer forces to quickly
12-34
________________________________________________________________________________Chapter 12
mine an area just prior to or during the battle. Engineer resources are sup-
plemented by remote mine delivery from artillery and aircraft. Infantry units
can also have man-portable remote mine dispensers.
12-157. The methods and extent of minelaying depend on
The OPFORs intentions.
The tactical situation.
Terrain characteristics.
The type of mine.
Time available.
Available engineer support.
12-158. With the high tempo of the modern mobile battlefield, the use of re-
motely-delivered mines is increasing. In volume, however, they do not exceed
the use of conventional landmines. Conventional minefields are better suited
to protecting defensive positions that the OPFOR intends to maintain for
some time. In this case, it expends greater time and effort to bury and cam-
ouflage the mines and integrate the minefields into the total defensive
scheme. Mine density in these types of fields is also greater. These minefields
are more likely to have a mix of AT and AP mines. In setting up a fully pre-
pared defense, troops of all units take part in preparing obstacles and laying
mines.
Manual
12-159. The OPFOR manually emplaces minefields when
There is no contact with the enemy.
Mechanical minelayers are unavailable.
Use of mechanical minelayers is inadvisable because of terrain restric-
tions.
A mine warfare platoon can manually lay 200 to 300 AT mines in 1 to 2
hours. It can recover about 200 AT mines an hour, if the mines are not
equipped with self-destruct or antihandling devices.
Mechanical
12-160. OPFOR engineers rely extensively on mechanical minelayers. These
can bury or surface-lay AT mines. The layout of mechanically emplaced mine-
fields is the same as those emplaced by hand.
12-161. The normal sequence for mechanically laying mines is to emplace the
most forward minefield first and to work progressively back to friendly de-
fensive positions. The engineers align the mechanical minelayers parallel to
the battle line. The minelayers start at separate intervals. This staggers the
minelayers in a 30- to 45-degree echelon formation as they travel along the
battle line. This method ensures that mines in one row are not directly be-
hind those in another when approached by the enemy. This increases the
probability for a mine encounter by ensuring that if an attacker misses the
first mine, he should still encounter one in subsequent rows. Mines can also
be emplaced by helicopters or vehicles with the use of chutes (slides). Mine
12-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Remote
12-162. Remote minelaying gives the OPFOR a capability to strike targets
and rapidly project mines deep in enemy territory or anywhere in the AOR. It
provides increased tactical responsiveness and flexibility and reduces the
manpower requirement for minelaying, as well as minimizes exposure of the
minelaying equipment to enemy fire. Once emplaced, these minefields can
instantaneously affect the tactical situation and degrade the enemys reac-
tion time to the sudden appearance of the obstacle. Thus, they are ideally
suited to the highly mobile, lethal battlefield of modern warfare. Since many
scatterable landmines feature self-destruct and antidisturbance fuzing, they
are well suited for missions that deny terrain for a specific period.
12-163. Remote delivery is useful against enemy reinforcing units, areas of
troop concentration, CPs, firing positions, and other objectives. It can protect
flanks or block enemy penetrations. The OPFOR prefers to trap a force inside
a minefield rather than merely creating an obstacle that the enemy can by-
pass. Therefore, remote minelaying can create two types of minefields: cover-
ing and containing. A covering minefield can block the movement route of an
advancing or withdrawing enemy. A containing minefield can prevent the
enemy unit from moving out of a deployment area (or firing position) or
within the area.
12-164. The OPFOR uses remotely-delivered or scatterable mines to reduce
enemy mobility, inflict losses, and to create the conditions for the destruction
of an enemy force. Scatterable mines also have a psychological effect on en-
emy morale. They can be laid close to friendly positions and covered by
friendly fire or laid deep in enemy territory. Minefields created by scatterable
mines lack precise boundaries or a definitive mine emplacement pattern, and
generally remain on or near the surface of the ground.
12-36
________________________________________________________________________________Chapter 12
12-165. Scatterable mines can be delivered from jet aircraft, helicopters, mul-
tiple rocket launchers (MRLs), trucks, and other ground vehicles, or by dis-
mounted soldiers in the forward parapet of fighting positions. These mines
are scattered randomly on the ground with no semblance to classical pat-
terns. Frequently, these types of landmines also incorporate self-destruct or
self-neutralization features to control and limit their active duration once
emplaced. After the allotted time has expired, the terrain can again be used
by friendly forces.
12-166. The OPFOR prefers to retain the element of surprise and therefore
employs remotely-delivered, scatterable mines immediately before combat or
during the course of the battle. When dispensed, these minefields are gener-
ally laid immediately in front of attacking, reinforcing, and withdrawing en-
emy troops, or may be emplaced directly on enemy formations. Possible uses
of scatterable mines are to
Isolate enemy forces.
Disrupt the attacking forces, causing them to deploy early and expend
mineclearing assets.
Disrupt and delay enemy exploitation forces, reserves, or counterattack
forces.
Prevent enemy artillery from displacing during counterbattery fire.
Interdict lines of communication.
Prevent the use of a logistics site.
Obstruct a choke point.
Protect flanks.
Seal breaches in friendly obstacles or gaps between units.
12-37
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-169. Infantry-fired ground dispensers are ideal for installing small, defen-
sive, AP or AT minefields. They allow low-level units to remotely emplace
minefields to protect their battle positions, flanks, and boundaries between
units, or to cover firing lines and gaps in combat formations. They can
quickly close breaches in existing protective minefields and increase the den-
sity of mines on armor avenues of approach.
12-170. Ground Vehicles. Within recent years, the trend has been to mount
scatterable-mine dispensers on ground vehicles. Both AP and AT mines can
be launched from ground vehicles. This also gives the engineers the ability to
re-seed or reinforce an obstacle without entering the minefield itself.
12-171. Aerial. Other than the above-mentioned ground force systems for
remote minelaying, aircraft and helicopters can remotely deliver mines. The
following paragraphs describe aerial minelaying capabilities.
12-172. Bombers or ground-attack aircraft can lay remotely-delivered mine-
fields throughout the AOR. Aircraft are only used to deliver mines beyond
the battle line when they cannot be delivered (for whatever reasons) by indi-
rect fire means. Delivering mines from low altitudes deep in enemy territory
increases the risk of losing the aircraft to enemy ground fires or air defense.
Therefore, fixed-wing aircraft are generally used to deliver ordnance such as
scatterable mines beyond the range of OPFOR artillery systems (including
MRLs). Ground-attack aircraft lay these minefields in the enemys tactical
depths.
12-173. High-performance aircraft can lay mines at a speed of 400 to 800
km/h from an elevation of 50 to 200 m. Aircraft-delivered scatterable mine
canisters are dropped on parachutes. The canisters are set to burst open at a
predetermined height to scatter the mines.
12-174. Helicopter minelaying systems are used to emplace large barrier
minefields in the execution of OSC or division offensive or defensive maneu-
ver plans. This type of aerial minelaying is normally conducted over friendly
territoryalong the flanks or in the rear areas. When supporting an airborne
or heliborne landing, helicopters may lay mines on enemy territory.
12-175. Both AT and AP minefields can be laid using aerial minelaying sys-
tems. Some attack and medium-lift helicopters and a few light helicopters
have the capability to perform minelaying missions. A light helicopter does
not carry armament when accomplishing these missions. Medium-lift and at-
tack helicopters are most commonly used for aerial minelaying.
12-176. Some helicopters can dispense conventional mines by the addition of
an internal minelaying chute within their cargo area. Mines are contained on
custom mine racks and then fed manually or automatically onto the chute.
The mines are then armed as they are dispensed. These heliborne minelaying
systems can be used in formations of two, three, or four and operate rela-
tively similar to the ground mechanical minelaying systems. The speed of
minelaying can vary from 20 to 300 km/h from an altitude of 30 to 100 m.
While at a near hover above the ground, the helicopters operate 20 to 40 m
apart, with each laying a straight-line row. The mines in each row can be
staggered and the distance between mines depends on whether the mines are
pressure-initiated or full-width attack mines.
12-38
________________________________________________________________________________Chapter 12
SURVIVABILITY
12-39
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
12-40
________________________________________________________________________________Chapter 12
12-41
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
ity for constructing simulations. The OPFOR places emphasis on those engi-
neer camouflage measures that it can transport easily and construct rapidly.
12-192. The following conditions must exist in order for decoy equipment to
be successful:
Placement must be in areas where the enemy would reasonably expect
to find that type of actual equipment in use.
Dimensions of simulated equipment must approximate those of actual
equipment.
12-193. The simulations that engineers construct can represent any type
equipment in the OPFOR inventory. Actual equipment that is not functional
due to combat damage or mechanical malfunction can be made to appear op-
erational by repainting it to conceal damage or by constructing components
to simulate destroyed parts.
12-194. Engineers can create false excavations to simulate revetments, hull-
defilade vehicle trenches, or individual fighting positions. These false excava-
tions may be only half the depth of actual excavations, although the engi-
neers may create the appearance of greater depth by adding dark materials
such as branches, grass, or soil to the bottoms. Troops can temporarily occupy
these deception positions and fire from them to aid deception.
12-195. In preparation for offensive action, the primary use of field fortifica-
tion is in the preparation of assembly areas. Even there, the tasks of prepa-
ration typically exceed the capability of engineers constituent to the brigade
and even that of those likely attached as reinforcements. Maneuver com-
manders realize that fortification of battle positions is a shared responsibil-
ity. Consequently, the preparation of assembly area positions becomes a
shared responsibility involving all available personnel and equipment.
12-196. This process is performed simultaneously throughout the force, with
infantry using shovels and armored vehicles using integral self-entrenching
blades, if available. Meanwhile, specialized engineer equipment digs posi-
tions for critical sites such as medical facilities and command and control (C2)
centers. As scarce engineer equipment becomes available, it is then tasked to
support maneuver units by augmenting and improving on the work the units
have already begun.
12-197. The goal is to prepare a separate assembly area for each battalion-
size unit, using engineer equipment to construct positions for vehicles shortly
after they arrive at their assigned location. Within 1 to 2 hours, engineers dig
assembly area fighting positions for all personnel. The engineers may pre-
pare prefabricated structures for battalion command posts and carefully
camouflage all structures.
12-198. During the offense, the goals of C3D are essentially the same as dur-
ing tactical movement. Offensive measures include
Selection of terrain for its screening effect.
Use of obscurants (smokescreens).
12-42
________________________________________________________________________________Chapter 12
12-43
Chapter 13
PREPAREDNESS
13-1. Due to the proliferation of NBC weapons, the OPFOR must anticipate
their use, particularly the employment of chemical weapons. OPFOR plan-
1
NBC weapons are a subset of weapons of mass destruction (WMD), although the latter exclude the de-
livery means where such means is a separable and divisible part of the weapon. WMD are weapons or
devices intended for or capable of causing a high order of physical destruction or mass casualties (death
or serious bodily injury to a significant number of people). The casualty-producing elements of WMD can
continue inflicting casualties on the enemy and exert powerful psychological effects on the enemy's mo-
rale for some time after delivery. Existing types of WMD include chemical, biological, and nuclear weap-
ons. However, technological advances are making it possible to develop WMD based on qualitatively new
principles, such as infrasonic (acoustic), radiological (enhanced-radiation), or particle-beam weapons. In
addition, conventional weapons, such as precision weapons or volumetric explosives, can also take on
the properties of WMD.
13-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
ners believe that the best solution is to locate and destroy enemy NBC weap-
ons and their supporting infrastructure before the enemy can use them
against OPFOR troops or the State. In case this fails and it is necessary to
continue combat actions despite the presence of contaminants, the OPFOR
has developed and fielded a wide range of NBC detection and warning de-
vices, individual and collective protection equipment, and decontamination
equipment.
MULTIPLE OPTIONS
13-2. Force modernization has introduced a degree of flexibility previously
unavailable to combined arms commanders. It creates multiple options for
the employment of forces at strategic, operational, and tactical levels with or
without the use of NBC weapons. Many of the same delivery means available
for NBC weapons can also be used to deliver precision weapons that can often
achieve desired effects without the stigma associated with NBC weapons.
13-3. The OPFOR might use NBC weapons either to deter aggression or as a
response to an enemy attack on the State. It has surface-to-surface missiles
(SSMs) capable of carrying nuclear, chemical, or biological warheads. Most
OPFOR artillery is capable of delivering chemical munitions, and most sys-
tems 152-mm and larger are capable of firing nuclear rounds. Additionally,
the OPFOR could use aircraft systems and cruise missiles to deliver an NBC
attack. The State has also trained special-purpose forces (SPF) as alternate
means of delivering NBC munitions packages.
13-4. The threat of using these systems to deliver NBC weapons is also an
intimidating factor. Should any regional opponent use its own NBC capabil-
ity against the State, the State is prepared to retaliate in kind. It is also pos-
sible that the State could use NBC against a regional neighbor as a warning
to any potential extraregional enemy that it is willing to use such weapons.
The fact that NBC weapons may also place noncombatants at risk is also a
positive factor from the States perspective. Thus, it may use or threaten to
use NBC weapons as a way of applying political, economic, or psychological
pressure by allowing the enemy no sanctuary.
TARGETING
13-5. The OPFOR considers the following targets to be suitable for the em-
ployment of NBC weapons:
NBC delivery means and their supply structure.
Precision weapons.
Prepared defensive positions.
Reserves and troop concentrations.
Command and control (C2); reconnaissance, intelligence, surveillance,
and target acquisition (RISTA); and communications centers.
Key air defense sites.
Logistics installations, especially port facilities.
Airfields the OPFOR does not intend to use immediately.
13-2
Chapter 13
Enemy NBC delivery means (aircraft, artillery, missiles, and rockets) nor-
mally receive the highest priority. The suitability of other targets depends on
the OPFORs missions, the current military and political situation, and the
NBC weapons available for use. 2
STAFF RESPONSIBILITY
13-6. On the functional staff of a division- or brigade-level headquarters
(such as an OSC), the chief of WMD is responsible for planning the offensive
use of WMD, including NBC weapons. (See the subsections on Release under
Chemical Warfare, Nuclear Warfare, and Biological Warfare below.) The
WMD staff element advises the command group and the primary and secon-
dary staff on issues pertaining to NBC employment. The WMD element re-
ceives liaison teams from any subordinate or supporting units that contain
WMD delivery means.
13-7. NBC defense comes under the chief of force protection. The force pro-
tection element of the functional staff may receive liaison teams from any
subordinate or supporting chemical defense units. However, those units can
also send liaison teams to other parts of the staff, as necessary (including, for
example, the chief of reconnaissance).
CHEMICAL WARFARE
13-8. The OPFOR is equipped, structured, and trained to conduct both offen-
sive and defensive chemical warfare. It is continually striving to improve its
chemical warfare capabilities. It believes that an army using chemical weap-
ons must be prepared to fight in the environment it creates. Therefore, it
views chemical defense as part of a viable offensive chemical warfare capabil-
ity. It maintains a large inventory of individual and collective chemical pro-
tection and decontamination equipment. (See the NBC Protection portion of
this chapter.)
Nerve Agents
13-11. Nerve agents are fast-acting. Practically odorless and colorless, they
attack the bodys nervous system, causing convulsions and eventually death.
Nerve agents are further classified as either G- or V-agents. At low concen-
2
The same list of targets would apply for enemy use of NBC weapons against the OPFOR.
13-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Blood Agents
13-12. Blood agents block the bodys oxygen transferal mechanisms, leading
to death by suffocation. A common blood agent is hydrogen cyanide (AC). It
kills quickly and dissipates rapidly.
Blister Agents
13-13. Blister agents, such as mustard (H) or lewisite (L) and combinations of
these two compounds, can disable or kill after contact with the skin, being
inhaled into the lungs, or being ingested. Contact with the skin can cause
painful blisters, and eye contact can cause blindness. These agents are espe-
cially lethal when inhaled.
Choking Agents
13-14. Choking agents, such as phosgene (CG) and diphosgene (DP), block
respiration by damaging the breathing mechanism, which can be fatal. As
with blood agents, this type is nonpersistent, and poisoning comes through
inhalation. Signs and symptoms of toxicity may be delayed up to 24 hours.
Incapacitants
13-15. Incapacitants include psychochemical agents and paralyzants. These
agents can disrupt a victims mental and physical capabilities. The victim
may not lose consciousness, and the effects usually wear off without leaving
permanent physical injuries.
Irritants
13-16. Irritants, also known as riot-control agents, cause a strong burning
sensation in the eyes, mouth, skin, and respiratory tract. The best known of
these agents is tear gas (CS). Their effects are also temporary. Victims re-
cover completely without having any serious aftereffects.
AGENT PERSISTENCY
13-17. Chemical agents are also categorized according to their persistency.
Generally, the OPFOR would use persistent agents on areas it does not plan
to enter and nonpersistent agents where it does.
Persistent Agents
13-18. Persistent agents can retain their disabling or lethal characteristics
from days to weeks, depending on environmental conditions. Aside from pro-
ducing mass casualties initially, persistent agents can produce a steady rate
of attrition and have a devastating effect on morale. They can seriously de-
grade the performance of personnel in protective clothing or impose delays
for decontamination.
13-4
Chapter 13
Nonpersistent Agents
13-19. Nonpersistent agents generally last a shorter period of time than per-
sistent agents, depending on weather conditions. The use of a nonpersistent
agent at a critical moment in battle can produce casualties or force enemy
troops into a higher level of individual protective measures. With proper tim-
ing and distance, the OPFOR can employ nonpersistent agents and then have
its maneuver units advance into or occupy an enemy position without having
to decontaminate the area or don protective gear.
13-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
13-25. This list does not include all chemicals with high toxicity and avail-
ability. Specifically, chemicals with low volatility are not included. Low-vapor
pressure chemicals include some of the most highly toxic chemicals widely
available, including most pesticides.
13-26. Some of the high-risk TICs are frequently present in an operational
environment. Chlorine (water treatment and cleaning materials), phosgene
(insecticides and fertilizers), and hydrogen cyanide are traditional chemical
warfare agents that are also considered TICs. Cyanide salts may be used to
contaminate food or water supplies. Hydrogen chloride is used in the produc-
tion of hydrochloric acid. Formaldehyde is a disinfectant and preservative.
Fluorine is a base element that is used to produce fluorocarbons. Fluorocar-
bons are any of various chemically inert compounds that contain both carbon
and fluorine. Fluorocarbons are present in common products are refrigerants,
lubricants, and nonstick coatings, and are used in the production of resins
and plastics.
Household Chemicals
13-27. The OPFOR understands that some everyday household chemicals
have incompatible properties that result in undesired chemical reaction when
mixed with other chemicals. This includes substances that will react to cause
an imminent threat to health and safety, such as explosion, fire, and/or the
formation of toxic materials. For example, chlorine bleach, when mixed with
ammonia, will generate the toxic gases chloramine and hydrazine that can
cause serious injury or death. Another example of such incompatibilities is
the reaction of alkali metals, such as sodium or potassium, with water. So-
dium is commonly used in the commercial manufacture of cyanide, azide, and
peroxide, and in photoelectric cells and sodium lamps. It has a very large la-
tent heat capacity and is used in molten form as a coolant in nuclear breeder
reactors. The mixture of sodium with water produces sodium hydroxide,
which can cause severe burns upon skin contact.
CHEMICAL RELEASE
13-28. Among NBC weapons, the State is most likely to use chemical weap-
ons against even an extraregional enemy, particularly if the enemy does not
have the capability to respond in kind. Since the State does not believe that
first use of chemical agents against units in the field would provoke a nuclear
response, it is less rigid than other nations in the control of chemical release.
13-29. Initially, the use of chemical weapons is subject to the same level of
decision as nuclear and biological weapons. At all levels of command, a
chemical weapons plan is part of the fire support plan. Once the National
Command Authority (NCA) has released initial authorization for the use of
chemical weapons, commanders can employ them freely, as the situation de-
mands. Then each commander at the operational-strategic command (OSC)
and lower levels who has systems capable of chemical delivery can imple-
ment the chemical portions of his fire support plan, as necessary.
13-30. After a decision for nuclear use, the OPFOR can employ chemical
weapons to complement nuclear weapons. However, the OPFOR perceives
that chemical weapons have a unique role, and their use does not depend on
initiation of nuclear warfare. It is possible that the OPFOR would use chemi-
13-6
Chapter 13
13-35. The OPFOR could use chemical attacks against such targets simulta-
neously throughout the enemy defenses. These chemical attacks combine
with other forms of conventional attack to neutralize enemy nuclear capabil-
ity, C2 systems, and aviation. Subsequent chemical attacks may target logis-
tics facilities. The OPFOR would use persistent agents deep within the en-
emys rear and along troop flanks to protect advancing units.
13-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
13-36. When the enemy is preparing to attack, the OPFOR can use chemical
attacks to disrupt activity in his assembly areas, limit his ability to maneu-
ver into axes favorable to the attack, or deny routes of advance for his re-
serves. Once the enemy attack begins, the use of chemical agents can impede
an attacking force, destroying the momentum of the attack by causing casu-
alties or causing attacking troops to adopt protective measures. Persistent
chemical agents can deny the enemy certain terrain and canalize attacking
forces into kill zones.
NUCLEAR WARFARE
13-37. The OPFOR believes a war is most likely to begin with a phase of non-
nuclear combat that may include the use of chemical weapons. The OPFOR
emphasizes the destruction of as much as possible of enemy nuclear capabil-
ity during this nonnuclear phase. To do so, it would use air and missile at-
tacks; airborne, heliborne, and special-purpose forces; and rapid, deep pene-
trations by ground forces. The OPFOR hopes these attacks can deny the en-
emy a credible nuclear option.
DELIVERY MEANS
13-38. Nuclear delivery systems may include aircraft from both national- and
theater-level aviation, and SSMs. Most artillery 152-mm or larger is capable
of firing nuclear rounds, if such rounds are available. Other possible delivery
means could include SPF. The OPFOR is unlikely to use affiliated forces for
nuclear delivery.
TRANSITION TO NUCLEAR
13-39. Even when nuclear weapons are not used at the outset of a conflict,
OPFOR commanders deploy troops based on the assumption that a nuclear-
capable enemy might attack with nuclear weapons at any moment. The
OPFOR continuously updates its own plans for nuclear employment, al-
though it prefers to avoid nuclear warfare. As long as it achieves its objec-
tives, and there are no indications that the enemy is going to use nuclear
weapons, the OPFOR would likely not use them either. However, it could at-
tempt to preempt enemy nuclear use by conducting an initial nuclear attack.
Otherwise, any OPFOR decision to go nuclear would have to be made early in
the conflict, so that sufficient nonnuclear power would remain to follow up
and to exploit the gains of nuclear employment.
13-40. If any opponent were to use nuclear weapons against the State, the
State would respond in kind, as long as it is still capable. The same would be
true of any nuclear-capable opponent, if the State were the first to use nu-
clear means. While the State recognizes the advantage of its own first use, it
may risk first use only when the payoff appears to outweigh the potential
costs. Therefore, it will probably avoid the use of nuclear weapons against an
extraregional power unless survival of the regime or the nation is at stake.
13-41. The OPFOR is probably more likely to use its nuclear capability
against a regional opponent. The likelihood increases if that opponent uses or
threatens to use its own nuclear weapons against the State or does not have
the means to retaliate in kind. This could account for a nuclear or nuclear-
13-8
Chapter 13
NUCLEAR RELEASE
13-45. At all stages of a conflict, the OPFOR keeps nuclear forces ready to
make an attack. The decision to initiate nuclear warfare occurs at the highest
level of the State government. National-level planners develop the fire plan
for the initial nuclear attack for approval by the NCA.
13-46. After the initial nuclear release, the NCA may delegate employment
authority for subsequent nuclear attacks to an OSC commander. The com-
mander of the OSCs integrated fires command (IFC) submits to the OSC
commander, for approval and integration into OSC fire support plans, rec-
ommendations for the subsequent employment of nuclear and chemical
weapons.
Planning
13-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
13-50. Although the opening stages of an offensive action are likely to be con-
ventional, OPFOR planning focuses on the necessity of
Countering enemy employment of nuclear weapons.
Maintaining the initiative and momentum.
Maintaining fire superiority over the enemy (preempting his nuclear
attack, if necessary).
Execution
13-53. Upon securing a nuclear release, the OPFOR would direct nuclear at-
tacks against the strongest points of the enemys formations and throughout
his tactical and operational depth. This would create gaps through which
maneuver units, in nuclear-dispersed formations, would attack as an ex-
ploitation force. As closely as safety and circumstances permit, maneuver
forces follow up on attacks near the battle line. Airborne troops may exploit
deep attacks.
13-54. An exploitation force would probably attack to take full advantage of
the speed of advance it could expect to achieve. The aim of these maneuver
units would be to seize or neutralize remaining enemy nuclear weapons, de-
livery systems, and C2 systems. By attacking from different directions, the
maneuver units would try to split and isolate the enemy.
13-55. Commanders would ensure a rapid tempo of advance by assigning
tank and mechanized infantry units to the exploitation force. Such units are
quite effective in this role, because they have maneuverability, firepower,
lower vulnerability to enemy nuclear attacks, and the capability to achieve
penetrations of great depth.
13-10
Chapter 13
Eliminate penetrations.
Support counterattacks.
Deny areas to the enemy.
If nuclear weapons degrade an enemy attack, the OPFOR could gain the op-
portunity to switch quickly to an offensive role.
BIOLOGICAL WARFARE
13-57. The State closely controls information about the status of its biological
warfare capabilities. This creates uncertainty among its regional neighbors
and potential extraregional opponents as to what types of biological agents
the State might possess and how it might employ them.
13-58. Biological weapons can provide a great equalizer in the face of a nu-
merically and/or technologically superior adversary that the OPFOR cannot
defeat in a conventional confrontation. However, their effects on the enemy
can be difficult to predict, and the OPFOR must also be concerned about the
possibility that the effects could spread to friendly forces.
Pathogens
13-60. Pathogens cause diseases such as anthrax, cholera, plague, smallpox,
tularemia, or various types of fever. These weapons would be used against
targets such as food supplies, port facilities, and population centers to create
panic and disrupt mobilization plans.
Toxins
13-61. Toxins are produced by pathogens and also by snakes, spiders, sea
creatures, and plants. Toxins are faster acting and more stable than live
pathogens. Most toxins are easily produced through genetic engineering. Tox-
ins produce casualties rapidly and can be used against tactical and opera-
tional targets.
Bioregulators
13-62. Bioregulators are chemical compounds that are essential for the nor-
mal psychological and physiological functions. A wide variety of bioregulators
are normally present in the human body in extremely minute concentrations.
These low-molecular-weight compounds, usually peptides (made up of amino
acids), include neurotransmitters, hormones, and enzymes. Examples of bio-
regulators are insulin (a pancreatic protein hormone that is essential for the
metabolism of carbohydrates) and enkephalin (either of two pentapeptides
with opiate and analgesic activity that occur naturally in the brain and have
a marked affinity for opiate receptors).
13-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
13-63. These compounds can produce a wide range of harmful effects if intro-
duced into the body at higher than normal concentrations or if they have
been altered. Psychological effects could include exaggerated fear and pain.
In addition, bioregulators can cause severe physiological effects such as rapid
unconsciousness and, depending on such factors as dose and route of admini-
stration, can also be lethal. Unlike pathogens, which take hours or days to
act, bioregulators could act in only minutes. The small peptides, having fewer
than 12 amino-acid groups, are most amenable to military application.
AGENT EFFECTS
13-64. Biological weapons are extremely potent and provide wide-area cover-
age. Some biological agents are extremely persistent, retaining their capa-
bilities to infect for days, weeks, or longer. Biological weapons can take some
time (depending on the agent) to achieve their full effect. To allow these
agents sufficient time to take effect, the OPFOR may use clandestine means,
such as SPF or civilian sympathizers, to deliver biological agents in advance
of a planned attack or even before the war begins.
DELIVERY MEANS
13-65. It is possible to disseminate biological agents in a number of ways.
Generally, the objective is to expose enemy forces to an agent in the form of a
suspended cloud of very fine biological agent particles. Dissemination
through aerosols, either as droplets from liquid suspensions or by small par-
ticles from dry powders, is by far the most efficient method.
13-66. There are two basic types of biological munitions: point-source bom-
blets delivered directly on targets and line-source tanks that release the
agent upwind from the target. Within each category, there can be multiple
shapes and configurations.
13-67. Military systems, as well as unconventional means, can deliver bio-
logical agents. Potential delivery means include rockets, artillery shells, air-
craft sprayers, saboteurs, and infected rodents. Aside from SPF and civilian
sympathizers, the OPFOR might use affiliated insurgent or terrorist organi-
zations to deliver biological agents within the region, outside the immediate
region (to divert enemy attention and resources), or even in the homeland of
an extraregional opponent.
TARGETS
13-68. Probable targets for biological warfare pathogen attack are nuclear
delivery units, airfields, logistics facilities, and C2 centers. The OPFOR may
target biological weapons against objectives such as food supplies, water
sources, troop concentrations, convoys, and urban and rural population cen-
ters rather than against frontline forces. The use of biological agents against
rear area targets can disrupt and degrade enemy mobilization plans as well
as the subsequent conduct of war. This type of targeting can also reduce the
likelihood that friendly forces would become infected.
BIOLOGICAL RELEASE
13-12
Chapter 13
NBC PROTECTION
13-71. The OPFORs ability to protect itself against NBC weapons and to op-
erate in contaminated environments is at least the equal of any force in the
world, including extraregional forces. OPFOR planners readily admit that
casualties would be considerable in any future war involving the use of NBC
weapons. However, they believe that the timely use of active and passive
measures can significantly reduce a combat units vulnerability. These meas-
ures include but are not limited to protective equipment, correct employment
of reconnaissance assets, and expeditious decontamination procedures. The
OPFOR conducts rigorous training for chemical defense.
13-72. The OPFOR believes the best way to protect against NBC weapons is
to destroy delivery systems, which are always high-priority targets. Other
operational-tactical responses to the threat include
Dispersion: Concentrations must last for as short a time as possible.
Speed of advance: If the advance generates enough momentum, this
can make enemy targeting difficult and keep enemy systems on the
move.
Camouflage, concealment, cover, and deception (C3D): C3D measures
complicate enemy targeting.
Continuous contact: The enemy cannot attack with NBC weapons as
long as there is intermingling of friendly and enemy forces.
ORGANIZATION
13-73. Chemical defense units are responsible for nuclear and biological, as
well as chemical, protection and reconnaissance measures. In the adminis-
trative force structure, such units are organic to all maneuver units brigade
and above. During task organization, tactical-level commands may also re-
ceive additional chemical defense units allocated from the OSC or higher-
level tactical command. However, those higher headquarters typically retain
some chemical defense assets at their respective levels to deal with the threat
to the support zone and provide chemical defense reserves.
13-74. Chemical troops are a vital element of combat support. They provide
trained specialists for chemical defense units and for units of other arms. Ba-
sic tasks chemical troops can accomplish in support of combat troops in-
clude
Reconnoitering known or likely areas of NBC contamination.
Warning troops of the presence of NBC contamination.
13-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
EQUIPMENT
13-76. OPFOR troops have protective clothing. Most combat vehicles and
many noncombat vehicles have excellent overpressure and filtration systems.
Items of equipment for individual or collective protection are adequate to pro-
tect soldiers from contamination for hours, days, or longer, depending on the
nature and concentration of the contaminant. Antidotes provide protection
from the effects of agents. Agent detector kits and automatic alarms are
available in adequate quantities and are capable of detecting all standard
agents.
13-77. Chemical troops have a wide variety of dependable equipment that,
for the most part, is in good supply and allows them to accomplish a number
of tasks in support of combat troops. They have specialized equipment for de-
tecting and monitoring NBC contamination. They have some specialized
NBC reconnaissance vehicles, and they may use helicopters for NBC recon-
naissance. Decontamination equipment is also widely available.
RECONNAISSANCE
13-78. Chemical defense personnel assigned to reconnaissance elements of
chemical defense units perform NBC reconnaissance. This involves two gen-
eral types of activity: NBC observation posts and NBC reconnaissance pa-
trols. Such posts and patrols may augment any maneuver unit down to com-
pany level.
13-79. Under the guidance of the brigade chief of force protection, NBC in-
structors in maneuver battalions and other units subordinate to the brigade
train additional combat, combat support, and combat service support troops
for NBC observation and reconnaissance missions. Medical personnel also
have instruments to check casualties for NBC contamination.
13-14
Chapter 13
though specially trained combat troops can man an NBC observation post, it
normally is manned by a chemical reconnaissance squad of two to four chemi-
cal defense specialists. In some cases, it might comprise an entire chemical
reconnaissance platoon. More likely, a brigade commander would keep one
squad from that platoon to man the NBC observation post near his forward
CP. The functions of NBC observation posts are to
Detect NBC contamination.
Determine radiation levels and types of toxic substances.
Monitor the drift of radioactive clouds.
Report NBC information and meteorological data to higher headquar-
ters.
Give a general alarm to threatened troops.
13-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
13-86. The OPFOR can also use helicopters to perform NBC reconnaissance.
Helicopters equipped with chemical and radiological area survey instruments
are particularly useful for performing reconnaissance of areas with extremely
high contamination levels.
Detection Reports
13-89. When chemical defense units establish NBC observation posts or NBC
reconnaissance patrols, these reconnaissance elements report through the
chemical defense and force protection chain. Upon detection of contamina-
tion, an NBC observer or NBC reconnaissance patrol normally transmits an
NBC detection report to the commander of the parent chemical defense unit
that dispatched it and (if capable and directed to do so) possibly to the chief
of force protection (or chief of staff) on the staff of the commander to whom
the chemical defense unit is subordinate or supporting. In any case, the
chemical defense unit commander transmits the report to the chief of force
protection of the maneuver division or brigade.
13-90. When NBC observers (whether from the chemical troops or another
branch) are attached to regular ground reconnaissance elements, security
elements, or maneuver units, the NBC element that detects contamination
would initially pass the detection report through reconnaissance or maneuver
unit reporting channels. 3 Of course, they would report the detection to the
commander of the unit to which they are attached, and a ground reconnais-
sance or security element would pass the detection report to the unit that dis-
patched it.
13-91. For example, a reconnaissance patrol leader would transmit the detec-
tion information via reconnaissance reporting channels to his parent recon-
naissance unit commander and possibly by skip-echelon communications to
the chief of reconnaissance at brigade or division level. The reconnaissance
unit commander or chief of reconnaissance would then ensure that the chief
3
If the NBC augmentees have their own special NBC reconnaissance vehicles and associated radios, they
can also send NBC detection reports back to their parent chemical defense unit or the chief of force pro-
tection.
13-16
Chapter 13
of staff and/or chief of force protection at his level receives the NBC detection
report and takes appropriate action. When a maneuver unit chief of staff or
chief of reconnaissance receives an NBC detection report through his own
channels, he immediately passes it to the chief of force protection at that
level (or to the next-higher level that has one).
13-92. Similarly, upon detection of contamination, an NBC observer in a
fighting patrol (FP) would transmit an NBC detection report to the FP
leader. The FP leader would use the battalion command net to transmit the
report to the maneuver battalion commander who sent out the FP. Using the
brigade command net, the maneuver battalion commander would inform the
maneuver brigade commander (or chief of staff) of the NBC detection report.
The brigade commander (or chief of staff) would consult with his chief of force
protection. Based on the finding of the chief of force protection, both he and
the brigade commander (or chief of staff) could then disseminate the NBC
warning report using their respective communications nets.
Warning Reports
13-93. The chief of force protection and his staff evaluate the NBC detection
report and determine whether it warrants the issuing of a warning. If it does,
they inform the maneuver commander (or his chief of staff). At this point, the
NBC detection report changes to an NBC warning report. Then, for example,
the maneuver brigade commander (or chief of staff) disseminates an NBC
warning report via the brigade command net to all subordinate unit com-
manders, and via the division command net to the division commander and
commanders of other brigades and other division subordinates. Simultane-
ously, the brigade chief of force protection disseminates the same NBC warn-
ing report to all the brigades units over the air defense and NBC warning
communications net. He would also inform the division chief of force protec-
tion. The desired goal is to rapidly disseminate NBC warning reports as soon
as possible to all affected units.
13-94. The division or brigade chief of force protection (and/or the chief of
staff) may issue an advance NBC warning based on the predicted develop-
ment of an NBC situation. NBC protective measures would change or be re-
scinded based on subsequent NBC detection reports or on warning reports
from higher, lower, or adjacent units. Changes in the NBC protective meas-
ures are disseminated by the maneuver division or brigade commander or
chief of staff and the chief force protection using their respective communica-
tions nets.
DECONTAMINATION
13-95. The OPFOR distinguishes between two types of decontamination of
personnel and equipment: partial and complete. It tries to perform one or
both as soon after exposure as possible. It also conducts decontamination of
terrain and movement routes.
Partial Decontamination
13-96. OPFOR doctrine dictates that a combat unit should conduct a partial
decontamination with organic equipment no later than one hour after expo-
13-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Complete Decontamination
13-97. The commander of a maneuver unit directs complete decontamination
when the unit has already completed its mission but is still tactically dis-
persed. This type of decontamination involves the decontamination of the en-
tire surface of a contaminated piece of equipment. This usually requires spe-
cial decontamination stations established by decontamination units. Under
some circumstances, however, it may be accomplished by troops using indi-
vidual decontamination kits.
13-98. Chemical defense troops usually perform complete decontamination of
maneuver units. Decontamination units of chemical defense companies and
battalions can operate either as a whole or in smaller elements. For example,
the decontamination company of a chemical defense battalion may function
independently. It may be separated from the rest of the battalion by as much
as 20 km to decontaminate elements of a maneuver battalion or brigade-size
force.
13-99. Decontamination units deploy to uncontaminated areas where con-
taminated units are located. They set up near movement routes or establish
centrally located decontamination points to serve several troop units. Before
deploying his equipment, the commander of a decontamination unit dis-
patches a reconnaissance element to select a favorable site, mark areas for
setting up the equipment, and mark entry and exit routes.
13-100. Site selection depends on local features such as nearby roads,
cross-country routes, and sources of uncontaminated water. Another selection
criteria is the availability of camouflage, cover, and concealment. If natural
concealment is insufficient, smokescreening of the site can provide camou-
flage. After decontamination stations are set up, the decontamination unit
commander establishes security. The supported unit can also assign person-
nel to assist in providing security for the site.
13-18
Chapter 13
DECON
Wind Direction
DECON
DECON
DECON
DECON 5m
RECOVERY ACTIVITIES
13-106. Commanders at all levels plan for restoring units that fall victim
to NBC attacks. This plan includes
Restoring comand and control.
Reconnoitering the target area.
Locating and rescuing casualties.
Decontaminating personnel and equipment.
Evacuating casualties.
Evacuating weapons and combat equipment.
Repairing vehicles.
Clearing obstructions.
Extinguishing fires.
13-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
SMOKE
13-111. The OPFOR plans to employ smoke extensively on the battlefield
whenever the situation permits. Use of smoke can make it difficult for the
enemy to conduct observation, determine the true disposition of OPFOR
troops, and conduct fires (including precision weapon fires) or air attacks.
The possible presence of toxic smokes may cause the enemy to use chemical
protection systems, thus lowering his effectiveness, even if the OPFOR is us-
ing only neutral smoke.
ORGANIZATION
13-112. In the administrative force structure, army groups, armies, and
corps typically have smoke companies in their chemical defense battalions
and/or smoke battalions. In either case, the smoke companies each consist of
nine smoke-generating trucks. These assets are often allocated to OSCs,
which can then suballocate them to tactical-level subordinates.
AGENTS
13-113. Smoke agents may be either neutral or toxic. Neutral smoke
agents are liquid agents, pyrotechnic mixtures, or phosphorus agents with no
toxic characteristics. Toxic smokes (commonly referred to as combination
smoke) degrade electro-optical (EO) devices in the visual and near-infrared
(near-IR) wavebands; they also can debilitate an unmasked soldier by induc-
ing watering of eyes, vomiting, or itching.
13-20
Chapter 13
13-114. The OPFOR may use a number of different smoke agents or other
obscurants together. For instance, obscurants such as fog oil block portions of
the electromagnetic spectrum more fully when seeded with chaff. The vast
quantities of white phosphorus (WP) on the battlefield also suggest that ran-
dom mixtures of this agent with other obscurants (both manmade and natu-
ral) could occur, by chance or by design. The OPFOR recognizes the need to
counter target acquisition and guidance systems operating in the IR and mi-
crowave regions of the electromagnetic spectrum. It has fielded obscurants,
including chaff, capable of attenuating such wavelengths.
DELIVERY SYSTEMS
13-115. The OPFOR has an ample variety of equipment for smoke dis-
semination. Its munitions and equipment include
Smoke grenades.
Vehicle engine exhaust smoke systems (VEESS).
Smoke barrels, drums, and pots.
Mortar, artillery, and rocket smoke rounds.
Spray tanks (ground and air).
Smoke bombs.
Large-area smoke generators (ground and air).
13-116. Although not designed for this purpose, some decontamination
vehicles with chemical defense units can also generate smoke.
13-117. Smoke grenades include hand grenades, munitions for various
grenade launchers, and smoke grenade-dispensing systems on armored vehi-
cles. These grenades can provide quick smoke on the battlefield or fill gaps in
smokescreens established by other means. Some armored fighting vehicles
have forward-firing smoke grenade dispensers that can produce a bispectral
screen up to 300 m ahead of vehicles.
13-118. All armored fighting vehicles can generate smoke through their
exhaust systems. With these VEESS-equipped vehicles, a platoon can pro-
duce a screen that covers a battalion frontage for 4 to 6 minutes.
13-119. Smoke-filled artillery projectiles, smoke bombs, spray tanks, and
generator systems are also common. Artillery can fire WP rounds (which
have a moderate degrading effect on thermal imagers and a major one on la-
sers). The OPFOR makes considerable use of smoke pots emplaced by chemi-
cal troops, infantrymen, or other troops. The OPFOR still uses smoke bombs
or pots dropped by fixed- or rotary-wing aircraft.
TYPES OF SMOKESCREENS
13-120. The OPFOR recognizes three types of smokescreens: blinding,
camouflage, and decoy. Classification of each type as frontal, oblique, or flank
depends on the screens placement. Smokescreens are either stationary or
mobile depending on prevailing winds and the dispensing means used. Each
basic type can serve a different purpose. However, simultaneous use of all
types is possible.
13-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Blinding
13-121. Blinding smokescreens can mask friendly forces from enemy gun-
ners, OPs, and target-acquisition systems. They can restrict the enemys abil-
ity to engage the OPFOR effectively. Delivery of WP and plasticized white
phosphorus (PWP) is possible using MRLs, artillery, mortars, fixed-wing air-
craft, or helicopters. The OPFOR lays blinding smoke directly in front of en-
emy positions, particularly those of antitank weapons and observation posts.
Blinding smoke can reduce a soldiers ability to acquire targets by a factor of
10, and its use can reduce casualties significantly.
13-122. Blinding smokescreens are part of the artillery preparation for an
attack and the fires in support of the attack. Likely targets are enemy defen-
sive positions, rear assembly areas, counterattacking forces, and fire support
positions. The screening properties of a blinding smokescreen can couple with
dust, HE combustion effects, and the incendiary effects of phosphorus. This
can create an environment in which fear and confusion add to the measured
effectiveness of the smoke.
Camouflage
13-123. The OPFOR uses camouflage smokescreens to support all kinds
of C3D measures. Such screens can cover maneuver, conceal the location of
units, hide the nature and direction of attacks, or mislead the enemy regard-
ing any of these. The camouflage smokescreen is useful on or ahead of
friendly troops.
13-124. These screens are normally effective up to the point where forces
deploy for combat. The number, size, and location of camouflage smoke-
screens vary depending on terrain, weather, and type of combat action. Cam-
ouflage also forces enemy attack helicopters to fly above or around a screen,
thus exposing themselves to attack. Camouflage smoke can also cover assem-
bly areas, approaches of exploitation forces, or withdrawals. Smokescreens
can also cover a wide surface area around fixed installations or mobile units
that do not move for extended periods.
13-125. Establishing camouflage smokescreens normally requires use of a
combination of smoke grenades, smoke barrels, smoke pots, vehicles mount-
ing smoke generating devices, and aircraft. Some decontamination vehicles
also have the capability to generate smoke.
13-126. Two smoke-generator vehicles can lay a smokescreen of sufficient
size to cover a battalion advancing to the attack. For larger smokescreens,
the OPFOR divides the smokescreen line into segments and assigns two ve-
hicles to each segment. Doctrinally, camouflage smokescreens should cover
an area at least five times the width of the attacking units frontage.
13-127. The threat of enemy helicopter-mounted antitank systems con-
cerns the OPFOR. Consequently, its doctrine calls for advancing forces to
move as close behind the smokescreen as possible. The higher the smoke-
screen, the higher an enemy helicopter must go to observe troop movement
behind the smokescreen, and the more vulnerable it is to ground-based air
defense weapons. Depending on weather and terrain, some large-area smoke
generators can produce screens up to several hundred meters high. There is
13-22
Chapter 13
Decoy
13-129. A decoy screen can deceive an enemy about the location of
friendly forces and the probable direction of attack. If the enemy fires into
the decoy smoke, the OPFOR can pinpoint the enemy firing systems and ad-
just its fire plan for the true attack. The site and location of decoy screens
depend on the type of combat action, time available, terrain, and weather
conditions. One use of decoy smoke is to screen simultaneously several possi-
ble crossing sites at a water obstacle. This makes it difficult for the enemy to
determine which site(s) the OPFOR is actually using.
AREA SMOKESCREENS
13-130. Area smokescreens can cover wide surface areas occupied by fixed
or semifixed facilities, or by mobile facilities or units that must remain in one
location for extended periods. Screens set down on a broad frontage can also
cover maneuver forces. The OPFOR uses area smokescreens to counter en-
emy precision weapons and deep attacks.
13-131. The means of generating area smokescreens can be either subor-
dinate or supporting chemical units or the use of smoke pots, barrels, gre-
nades, and VEESS. As the situation dictates, the objects screened by area
smokescreens can include
Troop concentrations and assembly areas.
Command posts (CPs).
Radar sites.
Bridges and water obstacle-crossing sites.
13-132. The OPFOR can also screen air avenues of approach to such loca-
tions. It tries to eliminate reference points that could aid enemy aviation in
targeting a screened location. To create an effective smokescreen against air
attacks, the OPFOR must establish an effective air defense and NBC warn-
ing communications network so that a smokescreen can be generated in time
to degrade reconnaissance and targeting devices on incoming aircraft. Units
using smoke must maintain reliable communications and continuous coordi-
nation with air defense early warning units and air defense firing positions.
13-23
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
13-133. The OPFOR follows the following basic principles for generating
area smokescreens:
Screening should include not only the protected object but also surround-
ing terrain or manmade features so as to deny the enemy reference
points.
The protected installation should not be in the center of the screen.
The smoke release points must not disclose the outer contours of the
screened object.
Screening must be initiated early enough to allow the area to be blan-
keted by the time of the enemy attack.
If possible, decoy smokescreens should be used.
For larger objects (such as airfields and troop concentrations), the
screen should be at least twice as large as the object.
For smaller objects (such as depots, small crossing points, and radar
sites), the screen should be at least 15 times as large as the object.
13-134. Depending on terrain, smoke release points are set up within a
checkerboard pattern, in a ring (circle), or in a mix of the two patterns that
covers the area to be screened.
A O B O
A B C Smoke
C
2 km
O
W
ind
Di
D E F re
cti
o n
F
2 km
D O
O D
2 km 2 km 2 km
Sm O
ok O E
e
A, B, C,
- Smokescreening - Sector Smokescreening CP - Smoke
D, E, F
Sectors Release
Points
13-24
Chapter 13
n
io
N O ct
re
Di
ind
A O W
B
A B
O
W E
D C
C
D O O
A, B,
- Smokescreening - Sector Smokescreening CP - Smoke
C, D
Sectors Release
Points
13-25
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
A O B O C O
A B C D
2 km
O
F
O
E F G H
H
2 km
O
O
I J K L
2 km
O
2 km 2 km 2 km 2 km
O I O J O K O L
A, B, C, D, E, F,
- Smokescreening - Sector Smokescreening CP - Smoke
G, H, I, J, K, L
Sectors Release
Points
13-26
Chapter 13
Figure 13-5 shows tactical options for employing smoke and other obscur-
ants.
Placement Uses
Source
On On
Between Blinding Camouflage Decoy Signaling
Friendly Enemy
Smoke X X X X X X
Grenade
Smoke X X X X
Generator
Smoke X X X X X
Pot
VEESS X X X
Vehicle X X X
Dust
Helicopter X X X X X
Mortar/ X X X X X X
Artillery
Smoke
Rocket X X X
Aerial X X X
Bomb
Aircraft X X X X X X
Spray
Mortar/ X X X
Artillery
HE Dust
Figure 13-5. Tactical Employment of Smoke and Other Obscurants from Various Sources
Offense
13-139. The OPFOR emphasizes the use of smoke during the offense to
help reduce friendly battle losses. However, it understands that smoke may
hinder its own C2, battlefield observation, and target engagement capabili-
ties. In addition, the enemy may take advantage of OPFOR smokescreens to
shield his own maneuvers or to carry out a surprise attack or counterattack.
Thus, a smokescreen is successful when the OPFOR attackers are able to main-
tain their assigned axis and retain sight of the objective. To prevent the smoke
from interfering with friendly maneuver, OPFOR commanders coordinate the
13-27
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
planned location and duration of the smoke-generation lines or points with the
scheme of maneuver.
13-140. Smoke pots, artillery, mortars, and aircraft are the primary
means of smoke dissemination in the offense. Artillery and aircraft are used
to spread screening smoke throughout the tactical depth of the enemys de-
fense. They are also useful in screening the flanks of attacking units.
13-141. The OPFOR uses camouflage, blinding, and decoy smokescreens
to conceal the direction and time of attack. The OPFOR can place smoke on
enemy firing positions and observation posts before and during an attack.
Smoke has uses during any of the three basic types of offensive action: at-
tack, limited-objective attack, or strike.
I
Assault
I Force I
VEESS
I
I
I
Exploitation
Force
VEESS
Artillery-
Delivered
Win
Smoke
I
dD
irec
Fixing
Force
tion
Forest
Attack
13-142. During an situational (hasty) attack, a camouflage smokescreen is
typically used to conceal combat formations that are advancing and maneu-
vering toward the enemys defensive positions. With a tail wind, the assault
and fixing forces can generate enough smoke to adequately screen their front
and then advance behind the screen as it blows toward the enemy. The ex-
ample in Figure 12-6 shows an independent mission detachment (IMD) based
on a mechanized infantry battalion with an additional tank company. This
IMD is advancing from a wooded area in platoon formations with a flanking
13-28
Chapter 13
wind. In such conditions, the IMD may use its VEESS-equipped tanks and
IFVs and smoke grenades. After turning on their VEESS, the tanks and IFVs
advance toward the enemys defensive positions while firing on visible tar-
gets. Dismounted infantrymen equipped with smoke grenades follow on foot
behind the extended line of tanks and IFVs. As gaps develop in the smoke-
screen, the infantrymen approach and throw smoke grenades. Infantrymen
can also fire incendiary smoke charges from a variant of the encapsulated
flamethrower out to a range of up to 1 km.
13-143. During a planned (deliberate) attack, a commander usually has
more opportunity to plan and prepare for a coordinated smokescreen than in
a situational (hasty) attack. Just as with the situational (hasty) attack, a
camouflage smokescreen is typically used to prevent observation of advanc-
ing asssault and fixing forces. As the advancing force nears the rear of
friendly units already in contact with the enemy, the units in contact may set
up a camouflage smokescreen using smoke pots and VEESS of forward-
deployed armored vehicles. In addition, artillery can deliver blinding smoke
on enemy defensive positions while the assault force negotiates minefields in
front of them. Figure 13-7 shows an example of smoke employment during such
an attack.
13-29
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Exploitation
Force
VEESS
I
I
Smoke
Artillery- I (-) Pots
Delivered
Smoke I (-)
Wind Dir
Smoke
Pots
Assault
ection
Force
Artillery-
Delivered
Smoke
Smoke
Pots I
Fixing I
Force
13-144. Because they are spontaneous and fluid, integrated attacks offer
the OPFOR the least opportunity to carefully plan and execute the use of
smoke. Because of the constantly changing conditions, the use of smoke is of-
ten planned and executed after the battle has begun.
13-145. A good example of the use of smoke during an integrated attack
involves an IMD using two camouflage and one decoy smokescreen. (See Fig-
ure 12-8.) In this example, an IMD based on a mechanized infantry battalion
with an additional tank company is attacking toward the enemys left flank
(as viewed by the OPFOR). It is camouflaging that attack with a smokescreen
laid by VEESS of tanks from the tank company. The tanks move at 100-m in-
tervals to create a continuous smoke cloud. The distance was calculated on
the basis of meteorological conditions and the fact that a smokescreen can ex-
tend 300 to 400 m from a VEESS and still remain impenetrable to vision.
Meanwhile, a mechanized infantry company facing the enemys right flank
lays a decoy smokescreen to divert the enemys attention from the actual at-
tack. The company on the left flank lays smoke pots along a 1,500-m line at in-
13-30
Chapter 13
Decoy
Smokescreen Fixing
I Force
Smoke
Pots Camouflage
Smokescreen
II
Smoke
Pots
y
em
En
VEESS
I
VEESS
Wind Direction
I Exploitation
Force
I
Defense
13-148. In the defense, the OPFOR may use of smokescreens for
Camouflaging the maneuver of friendly units.
Concealing engineer activities from enemy observation.
13-31
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
I
Enemy
Smoke Smoke VEESS
Pots Pots
Co
un
ter
n
att
io
ct
ac
re
k
Di
d
in
W
13-32
Chapter 13
13-33
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Artillery-
Delivered
Smoke
Smoke
Pots I
VEESS
II
Smoke
Artillery- Pots
Delivered
Smoke River
Wi
nd
Dir
ec
tio
n
13-153. Unopposed water obstacle crossings far from the battle line may
be crucial for supporting tactical and operational missions. Therefore, they
also require the use of smokescreens for concealment whenever feasible. As
with smoke use near the battle line, it is important to establish at least one
or two decoy smokescreens for every actual crossing site, because a smoke
cloud in the rear attracts the attention of enemy reconnaissance. Area
smokescreens are best for covering crossing sites and surrounding terrain.
Combat at Night
13-154. At night, the OPFOR can conceal its forces from enemy active
and passive night-vision and thermal imaging devices by using smoke and
other obscurants that are effective in the visible through far-IR portions of
the electromagnetic spectrum. The OPFOR uses smoke in three ways to
counter various types of enemy EO sensors:
For active night-vision devices, blind with smoke.
For passive night-vision devices, blind with illumination or combined
use of illuminating and smoke projectiles.
13-34
Chapter 13
13-155. In essence, the OPFOR uses smoke when it cannot quickly de-
stroy or neutralize the enemy EO devices, or when the enemy has created
high levels of illumination within his defense. However, it can also use smoke
in conjunction with its own illumination.
13-156. In night combat, the OPFOR can use smoke to help illuminate
enemy vehicles and other targets. The most effective method is to use smoke
in conjunction with illuminating rounds to silhouette enemy vehicles and
other targets. A mechanized infantry battalion can use this method by firing
mortar smoke rounds to burst 50 to 100 m beyond the targets, interspersed
with illuminating rounds aimed just beyond the screen. This creates a broad,
bright background.
13-157. A more elaborate version of the latter method involves the use of
artillery-delivered smoke and illuminating rounds. The OPFOR can use
smoke and other obscurants to blind the enemys night-vision equipment.
Image intensifiers can be blinded by obscurants and forced to shut down by
flares or the flash of artillery shells. In the defense, therefore, OPFOR artil-
lery could use close support fire on advancing enemy forces, alternating
blinding smoke with illuminating rounds to blind enemy forces while simul-
taneously illuminating them for targeting. See Figure 12-11 for an example
of this technique.
13-35
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
Illuminating Line
Enemy
400-600 m
Blinding Line
250 m
250 m 250 m
Illuminating Line
1,600-2,400 m
Blinding Line
Illuminating Line
Enemy
Blinding Line
II II
II II
II
II
Figure 13-11. Example of Alternating Blinding Smoke and Illuminating Lines against the En-
emy at Night
SIGNALING SMOKE
13-158. Aside from smokescreens, the OPFOR also uses colored smoke for
signal purposes. Smoke can mark enemy positions or, occasionally, friendly
positions or movement routes for the information of supporting aircraft or ar-
tillery. By prearrangement, colored smoke may
Identify friendly units.
Identify targets.
Control the commencing and lifting of fire.
Coordinate fire and maneuver of combat units.
13-36
Chapter 14
TACTICAL LOGISTICS
Logistics is the process of planning and executing the sustainment of
forces in support of military actions. In its larger sense, it includes the
development, acquisition, storage, movement, distribution, and evacua-
tion of equipment and other materiel. At the tactical level, it focuses on
the traditional combat service support functions of materiel support (sup-
ply), maintenance, transportation, personnel support, and medical sup-
port.
These tasks present a challenge in modern combat, where there is not al-
ways a clearly defined frontline or a relatively secure rear area. Combat
can spread over a deep and wide area. Within such an area, combat ac-
tions and attrition may not occur evenly or predictably. There may be ar-
eas of intense battles and local destruction, while other secondary or de-
fensive sectors have much lighter logistics demands. This requires a flexi-
ble logistics system designed to continue to sustain forces throughout con-
flict, adapting as conditions change.
14-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
RESOURCES OFFICER
14-4. The resources officer is responsible for the requisition, acquisition, dis-
tribution, and care of all of the commands resources, both human and mate-
riel. He ensures the commanders logistics and administrative requirements
are met and executes staff supervision over the commands logistics and ad-
ministrative procedures. One additional major task of the resources officer is
to free the commander from the need to bring his influence to bear on priority
logistics and administrative operations. He is also the officer in charge of the
sustainment command post.
CHIEF OF LOGISTICS
14-5. The chief of logistics is responsible for managing the order, receipt, and
distribution of supplies to sustain the command. He is responsible for the
condition and combat readiness of armaments and related combat equipment
and instruments. He is also responsible for their supply, proper utilization,
repair, and evacuation. He oversees the supply and maintenance of the com-
mands combat and technical equipment. These responsibilities encompass
the essential wartime tasks of organizing and controlling the commands re-
covery, repair, and replacement system. During combat, he keeps the com-
mander informed on the status of the commands equipment.
CHIEF OF ADMINISTRATION
14-6. The chief of administration supervises all personnel actions and trans-
actions in the command. His subsection maintains daily strength reports; re-
cords changes in table of organization and equipment of units in the adminis-
trative force structure; assigns personnel; requests replacements; records
losses; administers awards and decorations; and collects, records, and dis-
poses of war booty.
1
Throughout this chapter, references to division- and brigade-level logistics support may also apply to a division tac-
tical group (DTG) and brigade tactical group (BTG), unless specifically stated otherwise.
14-2
________________________________________________________________________________Chapter 13
RESOURCES
OFFICER
CHIEF CHIEF
OF OF
LOGISTICS ADMINISTRATION
LOGISTICS ADMINISTRATIVE
SUBSECTION SUBSECTION
14-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
14-9. A careful study of the missions of the total force allows planners to pro-
gram and measure logistics requirements. This requires concurrent opera-
tional, tactical, and logistics planning. Each level of command is responsible
for the timely and complete provision of logistics support to subordinate units
from available assets. The commander allocates these assets to support the
mission of his units, shifts resources according to the combat situation, and
retains some emergency reserves to meet unexpected contingencies. The bulk
of supplies and transport resources are concentrated at the strategic and op-
erational levels. This centralization of logistics resources contributes to op-
erational and tactical flexibility. It enables operational-level commanders to
concentrate support where it is needed most, if necessary switching axes rap-
idly to take advantage of unexpected opportunities. They can quickly strip
resources from stalled divisions or brigades and reallocate them to units
making better progress. Centralization of resources at the operational level
frees divisions or brigades and their subordinates of an unnecessarily large
logistics tail, making it easier for them to engage in high-speed maneuver
battles.
14-10. Logistics units are organized and deployed to support forward. The
guiding principle is that a combat force should retain its organic support re-
sources (such as trucks, recovery equipment, and ambulances) to support its
subordinate units. It should not have to use its own resources to go to support
areas to pick up supplies or to evacuate resources that can no longer contrib-
ute to combat power.
14-11. Finally, the logistics system may have to rely on sustainment from
other than military sources. Supplies may be procured or obtained from so-
cial groups, consumer cooperatives, government farms, or individual citizens,
and by coercion or foraging in the AOR. Captured enemy supplies and
equipment are another source of outside sustainment.
LOGISTICS MISSIONS
14-12. In operational and tactical logistics, three terms are used to describe
how the OPFOR provides support to the field. These terms are primary sup-
port, area support, and depot support.
14-13. Primary support is a mission given to supply, services, transportation,
and maintenance units that normally provide support directly to other units.
This allows the primary support unit to respond directly to the supported
units request for assistance or supplies.
14-14. Area support is a mission given to supply, services, transportation,
and maintenance units that normally provide support to primary support
units and other area support units. Lower-priority units may have to rely on
area support, rather than receiving supplies and services directly from the
next-higher echelon.
14-15. Depot support is a mission given to national-level or strategic units
that normally provide support to area support units. Depot support missions
include the receipt, storage, and issue of war stocks and domestically pro-
duced armaments and materiel, and the overhaul and rebuilding of major
end items.
14-4
________________________________________________________________________________Chapter 13
14-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
ISC
COMMANDER
SOCC
14-24. The ISC headquarters is composed of the ISC commander and his
command section, an administrative section, an operations section, and a
support section. (See figure 14-2.) The administrative and support sections
provide personnel and logistics support for the ISC staff. The operations sec-
14-6
________________________________________________________________________________Chapter 13
tion provides the control, coordination, and communication for the headquar-
ters. Additionally, the operations staff provides IW support for the headquar-
ters component. Located within the operations section is the support opera-
tions coordination center (SOCC). The SOCC is the staff element responsible
for the planning and coordination of support for the division and the IFC.
The SOCC relies principally on direct liaison among all the ISC subordinate
units to ensure the necessary coordination of logistics support for combat ac-
tions.
14-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
DTG
ISC
ISG
MATERIEL TANK
TRANSPORT MAINTENANCE
SUPPORT BATTALION
HEAVY-LIFT
BRIGADE BRIGADE
CHEMICAL TRAFFIC
SMOKE
DEFENSE CONTROL
BATTALION BATTALION
BATTALION
MATERIEL SUPPORT
14-28. The OPFOR materiel support system comprises a mix of very modern
and less modern capabilities that vary depending on the priority of the sup-
ported units. Generally, high-priority or elite units enjoy the benefits of a ro-
bust materiel support system that affords a higher degree of flexibility and
responsiveness to rapid changes in plans. For such units, the system may be
fully automated to track requirements and control the issue of supplies. Less
capable units (including reserve and militia forces) typically have little or no
automation support. Both types of materiel support system are based on allo-
cating supplies and services to units in order to accomplish mission objec-
tives. However, the aim of the OPFOR is to continue the upgrade of its less
capable units to a robust supply system capable of sustaining the force in all
environments.
14-29. Supply includes actions to acquire, manage, receive, store, and issue
the materiel required to equip and sustain the force from deployment
through combat operations and recovery into State territory. The allocation
of supplies is based on the unit mission, supply reports, and the availability
of supplies. During peacetime, the OPFOR operates under the pull system
of supply. For example, units in the field may request materiel from a depot
where they must pick it up and deliver it to the field.
14-30. The OPFOR concept of services includes all troops, installations, and
duty positions that perform logistics support for combat arms units. Such ser-
14-8
________________________________________________________________________________Chapter 13
vices are not specific to the ground forces, but support other Armed Forces
components as well.
14-31. During wartime, however, the OPFOR operates under the forward
distribution or push system principle, in which the higher echelon directly
supplies and services the next-lower echelon. Supplies and services are deliv-
ered directly to subordinate elements using the organic transportation assets
of the higher headquarters. Lower-priority units may have to rely on area
support or even supply point distribution.
METHODS OF DISTRIBUTION
14-32. The three methods by which supplying units distribute supplies to us-
ing units are supply point distribution, unit distribution, and throughput. In
supply point distribution, the supplying unit issues supplies from a supply
point to a receiving unit. The receiving unit must go to the supply point and
use its own transportation to move supplies to where they are needed.
14-33. In unit distribution, the supplying unit issue supplies and delivers
supplies to the receiving units area in transportation assets the supplying
unit has arranged. Throughput is a method of distribution in which ship-
ments bypass intermediate supply points or logistics sites. Throughput elimi-
nates the need for double handling, uses transportation assets more effi-
ciently, and is more responsive to the users needs.
SUPPLY PRIORITIES
14-34. The OPFOR places primary emphasis on maintaining the supply of
ammunition, fuel, and weapons. Its logistics system typically operates on the
following sequence of priorities:
Ammunition of all types.
Petroleum, oils, and lubricants (POL).
Spare parts and technical supplies (for equipment maintenance and
repair).
Rations, clothing, and medical supplies.
14-35. These priorities can change with the combat situation. For example,
during an attack, the principal demand is for ammunition. On the other
hand, a unit conducting a pursuit or advancing rapidly with no opposition
has a greater need for POL than for ammunition. Nonessential supplies may
not be delivered if it reduces the ability to provide essential combat supplies.
Ammunition and fuel resupply can comprise 80 percent or more of total
transportation requirements. Rations may be considered nonessential, for in-
stance, when units can obtain them by foraging.
PLANNING FACTORS
14-36. Essentially, all materiel support assets, from battalion level to the
MOD, are part of one system. When planning and coordinating division or
brigade logistics allocations, the division or brigade resources officer requisi-
tions and allocates supplies according to guidance from the division or bri-
gade commander and pre-established planning factors. Standard tables of lo-
14-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
MAINTENANCE
14-39. Maintenance includes actions taken to keep materiel and equipment
in a serviceable condition, to return it to service, or to update and upgrade its
capability. Since supplies are limited, the OPFOR stresses preventive main-
tenance, technical inspections, and proper operating methods to extend the
life cycle of equipment. The maintenance system is designed to repair vehi-
cles and equipment in the battle zone or as close to it as possible. Repair fa-
cilities and units move near the scene of combat rather than waiting for dam-
aged equipment to be evacuated to them. Fixed and mobile repair units ex-
tend repair capabilities into the battle zone and provide service to the cus-
tomer unit. During wartime, the types of repair performed at each level de-
pend on the situation. Generally, they are of a lesser degree than in peace-
time. The OPFOR classifies three categories of repair: routine, medium, or
capital.
14-40. Routine repairssuch as replacements, adjustments, or repair of in-
dividual componentsrequire a short time to fix. Generally, maintenance
personnel do not disassemble major components as part of routine repair.
Medium repairs include the minor overhaul of equipment and the repair of
individual components requiring a short time to fix. Capital repairs are con-
ducted at depot level and involve the major overhaul and/or assembly of
equipment.
14-10
________________________________________________________________________________Chapter 13
TRANSPORTATION
14-41. Transportation is a critical function that cannot be looked at in isola-
tion; it is the one element that ties sustainment and all other battlefield ac-
tivities together. The OPFOR envisions an environment characterized by a
rapid tempo of nonlinear operations; wide dispersion of forces; the need to
concentrate rapidly for battle and disperse quickly; and the need to conduct a
wide range of actions simultaneously.
14-42. Military logistics planners base their estimates on the use of all
movement resources available. These estimates include tactical combat vehi-
cles as well as civilian transportation assets mobilized to move supplies,
equipment, and personnel. For example, during mobilization, civilian truck-
ing and bus companies may be organized as militia truck units to provide
transportation of cargo and personnel within the State or occupied territory.
The mobility of logistics units must match that of the supported force. If the
logistics support units fail to achieve this, they may jeopardize the overall
success of the combat action.
MOVEMENT PRINCIPLES
14-43. The principles of movement apply to all military transportation ser-
vices and remain constant throughout peace and war. Additionally, they ap-
ply regardless of the planning level. During wartime, civilian personnel,
transportation assets (including farm animals, vehicles, aircraft, and water
vessels), and materiel-handling equipment are mobilized to support the war
effort.
Regulated Movement
14-45. All movement is regulated according to command priorities. Move-
ments are not validated, approved, or initiated if any part of the transporta-
tion system cannot meet the requirement. Regulating transportation assets
and LOCs is required to prevent congestion, confusion, and conflict of move-
ments. Unregulated use of the transportation system can severely hamper
the movement of critical cargo and personnel supporting the battle or the
overall operation or strategic campaign. Therefore, traffic in the AOR is pro-
grammed to provide fluid movement throughout the transportation network.
14-46. The OPFOR traffic control service employs a system of measures or-
ganized and executed for the purpose of ensuring convoy and traffic regula-
tion as well as maintaining general order in areas where troops are deployed.
A traffic control battalion is responsible for traffic control and law enforce-
14-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
ment at the tactical level. It is responsible for directing military traffic along
convoy routes and ensuring that the proper convoy speed and spacing are
maintained. A traffic control battalion or brigade performs the same func-
tions at the operational level. The States Internal Security Forces support
movement control through protection of supply routes of movement in the
States homeland and of key transportation nodes and centers.
14-47. A movement program is a directive that allocates the available trans-
port mode capability to satisfy the movement requirements in accordance
with the commanders priorities. The program normally contains detailed in-
formation concerning origins, destinations, weights, and cube of cargo, and/or
types and number of personnel to be moved.
TRANSPORTATION MODES
14-51. Transportation operations may include motor vehicles, rail, aircraft,
and waterway (coastal and inland) transport vessels. The OPFOR generally
uses motor vehicles to move large quantities of general cargo, POL, and per-
sonnel throughout the AOR. However, waterway transport vessels may be
14-12
________________________________________________________________________________Chapter 13
used to move large quantities of supplies and personnel along coastal or in-
land waterways to remote areas that are not accessible to motor vehicles.
14-52. As requirements for transportation fluctuate, each mode must be
properly used to accomplish the commanders objective. For example, air
transport is employed if reaction speed is the priority. Motor transport is con-
sidered the most flexible surface mode. It provides door-to-door delivery ser-
vice and an interface with all other transportation modes.
14-53. Motor transport becomes essential as supplies are moved forward
from railheads, field depots, or supply points to combat units. After the relo-
cation of supplies from national-level supply bases, the OPFOR distributes
them within OSCs and divisions primarily by truck. Within an OSC, the
heaviest truck transport requirements are primarily above the division level.
14-54. Under the control of the resources officer at each level, motor trans-
port resources are centralized for operational and tactical employment, espe-
cially in the pre-offensive buildup period and for resupply of advancing columns.
This centralized control facilitates the diversion of motor transport assets of re-
serve forces to support those units engaged in the main effort when necessary.
14-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
PERSONNEL SUPPORT
14-57. The OPFOR considers people as one of the assets most critical to the
success of any military action. Thorough planning and efficient personnel
management directly influence mission readiness. During the course of bat-
tles and operations, timely personnel replacements are essential.
PERSONNEL MANAGEMENT
14-58. The division or brigade chief of administration is responsible for all
personnel actions and transactions in the command. At DTG level, a person-
nel service company or battalion provides the personnel to operate the per-
sonnel operations center. That centers major functions include providing per-
sonnel and administrative support, finance support, and legal support.
REPLACEMENT
14-59. Units may maintain strength by piecemeal replacement of casualties
during combat, particularly when lightly wounded personnel and damaged
equipment can return to parent units quickly. Once casualties are sufficient
to threaten total loss of combat effectiveness, the unit withdraws from con-
tact and reconstitutes. Timely replacement of ineffective units is vital to
maintaining momentum. The commander may choose to withdraw heavily
attritted units and consolidate them to form a smaller number of combat-
effective units.
14-60.Personnel replacement is based on unit strength reports and includes
the coordinated support and delivery of replacements and soldiers returning
from medical facilities. The unit strength report is used to assess a units
combat power, plan for future battles, and assign replacements on the battle-
field.
Individual Replacements
14-61. The OPFOR can use the system of individual replacements in both
peacetime and wartime. The sources of replacement personnel are school
graduates, reserve assignments, medical returnees, and normal assignments.
Incremental Replacements
14-62. The OPFOR may incrementally replace entire small units such as
weapons crews, squads, and platoons. Replacements can be obtained from
training units or reserve forces.
Whole-Unit Replacement
14-64. The OPFOR uses whole-unit replacement when massive losses occur
as a result of a combat action. Company-level and above units are brought
forward from reserve forces to replace combat forces rendered ineffective.
14-14
________________________________________________________________________________Chapter 13
Replacement Training
14-65. OPFOR planners realize that personnel replacement requirements
may necessitate any of the aforementioned procedures. Individual and unit
replacement exercises are held semiannually to maintain established profi-
ciency standards for personnel units. During these and other training exer-
cises, troops are moved by various modes of transportation such as motor ve-
hicles, waterway, aircraft, or rail.
14-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
MEDICAL SUPPORT
14-66. The basic principle of combat medical support is multistage evacua-
tion with minimum treatment by medical personnel at each unit level. They
treat the lightly wounded who can return to combat and those casualties who
would not survive further evacuation without immediate medical attention.
14-67. The OPFOR divides the range of medical treatment into three catego-
ries. The first category of procedures includes only mandatory lifesaving
measures. The second category includes procedures to prevent severe compli-
cations of wounds or injuries. The final category of treatment includes proce-
dures accomplished only when there is a low casualty load and reduced en-
emy activity.
14-68. In anticipation of an overtaxed combat medical support system,
OPFOR doctrine emphasizes the importance of self-help and mutual aid
among individual soldiers. This concept extends beyond the battlefield to
casualty collection points and unit aid stations. Self-help and mutual aid re-
duces the demands made on medical personnel, particularly when there is a
sudden and massive influx of casualties. Each soldier is required to attend a
first-aid training session.
MEDICAL LOGISTICS
14-69. The medical logistics system operates on a pull system. Personnel in
the field request medical materiel (including repair parts for medical equip-
ment) from a medical depot where it must be picked up and delivered to the
field. Normally, medical supplies are transported from the support zone to
the battle zone on cargo-carrying transport vehicles, water vessels, or air-
craft. However, ground ambulances returning to the battle zone may assist in
transporting medical supplies. A medical equipment maintenance unit at the
medical depot provides all medical equipment maintenance.
Company Company medic (paramedic) provides advanced first aid, pain relief, intravenous fluids,
treatment of most common illnesses.
Battalion Medical assistant (physicians assistant) provides limited medical intervention, minor sur-
gery, and treatment of most common illnesses; limited inpatient capability.
Brigade, BTG, Medical officers (physicians) provide trauma stabilization and minor surgical intervention.
and Division
DTG and Higher A field hospital provides major surgery and extended care.
OSC or Theater The Central Military Hospital and major civilian hospitals provide definitive care in fixed
Support Zone facilities.
14-16
________________________________________________________________________________Chapter 13
CASUALTY HANDLING
14-70. The OPFOR has shown success in handling combat casualties. This
success stems from emphasis placed on trauma training and close coordina-
tion with the civilian medical sector. Evacuation is based on a higher-to-
lower method. The next-higher echelon provides transportation for casual-
ties. Each level has specific responsibilities for the care of the sick and
wounded. (See Figure 13-4.) Besides treating the wounded, medical personnel
handle virtually all of their own administration, especially at lower levels. As
casualties move through the combat evacuation system, medical personnel at
each level make effective use of medical facilities by repeated sorting of the
wounded (triage). Helicopters are used for all military and civilian search
and rescue missions, medical evacuations, and domestic disaster relief
flights. During wartime situations, most casualties arrive at a hospital
within 6 to 12 hours after being wounded. The evacuation time is reduced to
2 hours during peacetime.
MEDICAL FACILITIES
14-71. A field hospital is the first level in the evacuation system capable of
conducting major surgery and giving extended care. It is mobile and capable
of deployment near the battle zone. It constitutes the largest and most exten-
sive military facility with this capability.
14-72. The best medical facility is the Central Army Hospital. During peace-
time, military personnel receive treatment at this hospital, which also is des-
ignated as one of the emergency medical care facilities for foreign diplomats,
their families, and tourists. The State also has designated some of its major
university hospitals as such emergency medical care facilities. This ensures
consistent high-quality medical staffing, care and treatment. A majority of
medical facilities or clinics in the outlying areas has sufficient numbers of
trained personnel, supplies, and reliable electric power and water. The facili-
ties also contain high-quality, sophisticated, domestic and imported medical
equipment. The pharmacies are stocked with high-quality, domestic, and for-
eign-produced pharmaceuticals. During wartime conditions, military person-
nel are treated at all of the major civilian hospitals in addition to field hospi-
tals.
NBC TREATMENT
14-73. Treating nuclear, biological, and chemical (NBC) casualties is a stan-
dard OPFOR trauma protocol. The NBC medical plan is based on three as-
sumptions:
Mass casualties will occur.
Casualties will be similar to those that medical personnel have been
trained to treat.
Medical personnel are able to treat the casualties in a decontaminated
environment.
The Central Army Hospital can be converted into a chemical decontamina-
tion center within 2 to 6 hours. Most of the remaining major hospitals require
up to 30 days to convert to a decontamination center.
14-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
BLOOD MANAGEMENT
14-74. The Ministry of Health maintains a Blood Management Office to over-
see the collection, processing, storage, and distribution of blood (to include
liquid blood and blood components) to alleviate the effects of a natural disas-
ter or war. Blood management services are provided to support both civilian
and military establishments. The main source of blood to support wartime
casualty requirements comes from the collection and processing of blood from
the civilian populace during peacetime. The blood is generally stored in pre-
positioned underground structures throughout the country.
OFFENSE
14-77. The logistics objective in supporting offensive actions is to maintain
the momentum of the attack by supporting in the battle zone or as close to it
as possible. Both the battle zone and the support zone can move as the offen-
sive battle progresses.
14-78. Planners must consider the nature of the offensive action as it affects
logistics activities. For example, high fuel consumption may dictate making
provisions to position substantial quantities in or near the battle zone with-
out signaling the OPFORs intention to attack to the enemy. Responsive sup-
port is critical and is made more difficult by lengthening of supply lines and
by critical requirements for user resupply vehicles to stay close to their re-
spective units. Planning, coordination, communication, and above all flexibil-
ity are key elements to consider. Therefore, planners develop logistics plans
flexible enough to meet the changing priorities of a fluid battlefield.
14-79. In considering the attack, materiel support units ensure that all sup-
port equipment is ready and that supplies are best located for support. They
also ensure that sufficient transportation is available to support maneuver
and logistics plans. Normally, ammunition and fuel are the most important
supplies in the offense. However, consideration must be given to all supplies,
as well as other support procedures, specifically medical and maintenance.
14-18
________________________________________________________________________________Chapter 13
14-80. The following are examples of some specific considerations for plan-
ners to use during the development of logistics plans supporting offensive ac-
tions:
Maintenance units should pre-plan maintenance collection points
along movement routes, in order to reduce recovery requirements.
Supply points consisting of fuel and ammunition are positioned in the
battle zone or as close to it as possible.
Arrangements are made in advance for aerial resupply of critical items
in order to maintain the tempo of combat.
Planners arrange to throughput obstacle-breaching and bridging mate-
rial if required.
Planners must consider potential bypassed enemy units; they must
have the latest intelligence on the enemy situation.
DEFENSE
14-81. The logistics objective in supporting defensive actions is to sustain the
attrition of enemy attacking forces through support from dispersed sites lo-
cated in the support zone. A division support zone may be dispersed within
the support zones of subordinate brigades, or the division may have a sepa-
rate support zone site of its own.
14-82. During the defense, supply activity is greatest in the preparation
stage. Supplies generally are stockpiled or pre-positioned in initial and sub-
sequent defensive positions. Critical supplies such as ammunition and bar-
rier material should be as mobile as possible to ensure continuous support as
combat power is shifted in response to enemy attacks.
14-83. To support stay-behind forces, supply stockage levels may be two to
three times higher than normal amounts. This ensures a redundancy of
caches and needed equipment that cannot be readily resupplied. Stay-behind
forces may require unique maintenance support arrangements to ensure that
equipment remains operational.
14-84. Logistics units position themselves in relatively secure positions far
enough from maneuver and fire support units to be out of the flow of the bat-
tle. However, they should not be so far removed as to render the logistics ef-
fort less effective.
14-85. The following are examples of some specific considerations for plan-
ners to use during the development of logistics plans supporting defensive ac-
tions:
Maintenance units should position maintenance teams in the battle
zone to return the maximum number of weapons systems to the battle
as soon as possible.
Emphasis is on keeping supply and evacuation routes open.
Nonessential logistics units and operations move into the depth of the
support zone as early as possible.
In a maneuver defense, supply points consisting of fuel and ammuni-
tion are positioned as far forward as possible and in successive battle
positions.
14-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
POST-COMBAT SUPPORT
14-90. OPFOR logisticians are not only focused on supporting units in com-
bat. They are also focused on other post-combat support requirements such
as personnel replacement, weapon systems replacement, reconstitution, and
receiving and preparing reinforcements. (For information on personnel re-
placement, see the Personnel Support section of this chapter.)
14-20
________________________________________________________________________________Chapter 13
RECONSTITUTION
14-92. Reconstitution is performed in support of all combat actions. Although
it is mainly a command and operations function, the actual refitting, supply,
personnel fill, and medical actions are conducted by logistics units. There are
two methods for conducting reconstitution: reorganization and regeneration.
Reorganization
14-93. Reorganization is action taken to shift resources internally within a
degraded unit to increase its level of combat effectiveness. Reorganization is
normally done at unit level and requires only limited external support such
as supply replenishment, maintenance assistance, and limited personnel re-
placement. When continuity of the mission is of paramount importance, com-
posite units may be formed from other units reduced by combat actions.
Regeneration
14-94. Regeneration is action taken to rebuild a unit through large-scale re-
placement of personnel, equipment, and supplies. Additionally, it is action
taken to restore C2 and conduct mission-essential training. Overall, the effort
is directed at restoring the units cohesion, discipline, and fighting effective-
ness.
PREPARING REINFORCEMENTS
14-95. OPFOR strategic and operational logisticians prepare contingency
plans for the mobilization and reception of reserve forces. Once the unit per-
sonnel and equipment are mobilized, they are sustained, configured, and
transported to their respective OSC. Normally, strategic-level logistics units
provide this type of support. Once the units arrive at the OSC, the OSC as-
sumes responsibility for their further sustainment and transport, and they
are available for assignment to appropriate tactical-level missions.
14-21
Chapter 15
Special-Purpose Forces
The OPFOR maintains a broad array of special-purpose forces (SPF) as
means to carry the battle to the enemys depth. In its administrative force
structure, these are national-level forces that the General Staff can use
against strategic objectives or for regional power projection. However, it of-
ten task organizes these assets to perform designated missions for opera-
tional- or even tactical-level commands. It may also allocate such forces
down to the operational and tactical levels to perform designated mis-
sions. These missions may support national-, theater-, operational-, or
tactical-level objectives. However, the SPF always conduct these missions
as small teams or detachments and would use the same types of tactical
action regardless of the level of command for which they perform the mis-
sions.
This chapter describes nature of SPF and the roles they can play at vari-
ous levels of command. Then it describes the basic forms of tactical action
they perform at any level, although the purpose of the action may be dif-
ferent at different levels.
15-1
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
TASK ORGANIZATION
15-5. When the OPFOR establishes more than one theater headquarters, the
General Staff may allocate some SPF units to each theater. From those SPF
assets allocated to him in a constituent or dedicated relationship, the theater
commander can suballocate some or all of them to a subordinate operational-
strategic command (OSC).
15-6. The General Staff (or a theater commander with constituent or dedi-
cated SPF) can allocate SPF units to an OSC in a constituent or dedicated re-
lationship or place them in support of an OSC. These command and support
relationships ensure that SPF objectives support the overall mission of the
OSC to which the SPF units are allocated. Even in a supporting relationship,
the commander of the OSC receiving the SPF unit(s) establishes those units
objectives, priorities, and time of deployment. The OSC commander may em-
ploy the SPF units allocated to him as constituent or dedicated as part of his
integrated fires command (IFC), or he may suballocate them to his tactical-
level subordinates.
15-7. The SPF units of the Army, Navy, and Air Force may remain under the
control of the SHC or Theater commander or be allocated to an OSC. In the
latter case, the OSC commander may choose to suballocate them to tactical-
level subordinates.
15-8. SPF units from the SPF Command or other services can be allocated in
a constituent or dedicated status to be task organized as part of a tactical
group in order to perform specialized reconnaissance or direct action mis-
sions. In other cases, SPF units may be allocated in a supporting relation-
ship, while remaining under the command of their parent SPF organization.
15-9. Regardless of the parent administrative organization, SPF normally in-
filtrate and operate as small teams. When deployed, these teams may operate
individually, or they may be task organized into detachments. The terms
team and detachment indicate the temporary nature of the groupings. In the
course of an operation, teams can leave a detachment and join it again. Each
team may in turn break up into smaller teams (of as few as two men) or, con-
15-2
________________________________________________________________________________Chapter 15
versely, come together with other teams to form a larger team (of perhaps up
to 30 men), depending on the mission. At a designated time, several teams
can join up and form a detachment (for example, to conduct a raid), which
can at any moment split up again. This whole process can be planned before
the operation begins, or it can evolve during the course of the operation.
15-10. When deployed outside the State, each SPF team or detachment is in
direct communication with a higher headquarters. The controlling headquar-
ters may be an OSC, although in this case, typically SPF units receive orders
directly from the General Staff or theater headquarters.
SPECIAL RECONNAISSANCE
15-12. SPF are a major source of human intelligence (HUMINT), placing
eyes on target in hostile, denied, or politically sensitive territory. They can
operate in small teams beyond the battle lines of the area of responsibility
(AOR), conducting long-range reconnaissance. Their priorities include
Precision weapons.
Nuclear, biological, and chemical (NBC) delivery systems.
Headquarters and other command and control (C2) installations and
centers.
Reconnaissance, intelligence, surveillance, and target acquisition
(RISTA) systems and centers.
Rail, road, and air movement routes.
Airfields and ports.
Logistics facilities.
Air defense systems.
Once SPF teams locate such targets, they may simply monitor and report on
activity there, or they may conduct direct action or diversionary measures.
15-13. The SPF can train and employ affiliated forces and civilians to per-
form HUMINT activities. They may also operate in conjunction with
HUMINT agents controlled by the Intelligence Directorate of the General
Staff.
15-3
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
DIRECT ACTION
15-14. Direct action involves an overt, covert, or clandestine attack by armed
individuals or groups to damage or destroy high-value targets or to kill or
seize a person or persons. Examples of direct-action missions for SPF units
are assassination, abduction, hostage taking, sabotage, capture, ambushes,
raids, rescue of hostages (civilian and military), and rescue and recovery of
downed pilots or aircrews. Implementation of direct-action missions depends
on the size of the enemys defenses, the element of surprise, and the assets
available to the SPF unit commander.
15-15. The term diversionary measures refers to direct actions of groups or
individuals operating in the enemys rear area. These measures include the
destruction or degradation of key military objectives and the disruption of C2,
communications, junctions, transport, and lines of communication (LOCs).
They could include misdirecting military road movement by moving road
markers and generating false communications. They also involve killing per-
sonnel, spreading disinformation, destroying military hardware, and other
actions to weaken the morale and will of the enemy by creating confusion and
panic. Diversionary measures may be part of a larger information warfare
(IW) campaign.
MISSIONS
15-16. While SPF belonging to other service components are designed for use
at the operational and tactical level, forces from the SPF Command provide a
regional and global strategic capability. Collectively, all these SPF assets can
engage the enemy simultaneously to his tactical, operational, and even stra-
tegic depth. They are prepared to attack enemy forces anywhere in the re-
gion, at overseas bases, at home stations, and even in military communities.
They can attack his airfields, seaports, transportation infrastructures, and
LOCs. Targets include not only enemy military forces and equipment, but
also government agency heads, contractors, private firms, and nongovern-
mental organizations involved in transporting troops and materiel into the
region or supporting enemy forces in any manner.
15-17. SPF are likely to be used against key political, economic, or population
centers or tangible targets whose destruction affects intangible centers of
gravity, rather than against military targets for purely military objectives.
These efforts often place noncombatants at risk and aim to apply diplomatic-
political, economic, and psychological pressure. The goal is to present the en-
emy with a nonlinear, simultaneous battlefield. Striking such targets will not
only deny the enemy sanctuary, but also weaken his national will, particu-
larly if the OPFOR can strike targets in the enemys homeland.
15-18. SPF actions increase the depth of the battle area. The SPFs simulta-
neous attack of both front and rear areas to disrupt or destroy enemy forces
includes the following basic missions:
Neutralize weapons of mass destruction and precision weapons.
Attack air defense facilities and airfields.
Disrupt LOCs.
Attack C2 and RISTA facilities.
15-4
________________________________________________________________________________Chapter 15
PEACETIME MISSIONS
15-19. During peacetime, the Intelligence Directorate of the General Staff
carefully coordinates reconnaissance programs geared to meet the intelli-
gence requirements of the State and of the OPFOR if war should break out.
Aside from SPF troops, it maintains agent networks in the target country to
support SPF operations. Some of these agents actively engage in subversion;
others are sleepers, prepared to act on call in time of war. The SPF Com-
mand trains agents to operate as political agitators, intelligence collectors,
and saboteurs. The agents establish residence near military targets such as
airports, missile bases, arsenals, communications centers, logistics centers
and depots, and routes used for troop movements. Just before the beginning
of hostilities, SPF teams link up with agents already operating in the target
area.
15-20. Clandestine SPF sabotage agents do little intelligence collection.
Their job is to blend into the local culture, establish residences near trans-
port and power facilities, and when ordered, emplace explosive charges in
preselected targets.
15-21. Another important task for clandestine SPF sabotage agents in peace-
time is to acquire houses and plots of land to prepare safe areas where sabo-
tage teams (civilian and military) can find refuge after landing behind enemy
lines in times of hostilities. These places are usually in the countryside, in
forested areas near the sea, or in the mountains.
15-22. Agents provide incoming sabotage and assassination teams with safe
areas, motor transport, fuel, and supplies. They then guide the teams to their
objective. Both intelligence and sabotage agents can come under the control
of a theater or OSC chief of reconnaissance. The chief of reconnaissance can
transfer agents from one category to the other at any time or order them to
fulfill both roles.
TRANSITION TO WAR
15-23. Before hostilities begin, SPF conduct clandestine operations in the
target area. This increases the probability of destroying key targets well be-
15-5
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
fore enemy force protection measures tighten. This is the most critical period
because clandestine elements can efficiently use the enemy's lack of aware-
ness as an opportunity to disorganize and disrupt troops and the local popu-
lation. Since the SPF often use terror tactics, direct action during this transi-
tion period still allows plausible deniability. Missions generally include the
following:
Conduct strategic and operational reconnaissance.
Train and assist insurgents operating in foreign countries.
Organize local guerrilla or partisan groups.
Weaken the target countrys military capabilities or will to fight
through either subversion or direct action.
Assassinate key military and political figures.
Sabotage enemy mobilization and deployment.
15-24. The General Staff directs the planning of SPF wartime missions,
which form an integral part of combined arms combat. Intended to support
theater- as well as OSC-level operations and sometimes tactical-level actions,
SPF are capable of operating throughout enemy territory.
WARTIME MISSIONS
15-25. SPF play an important role in support of both the offense and defense.
They may perform their missions separately, in support of strategic objec-
tives, or in support of a theater-level campaign, an OSC-level operation, or
DTG-level tactical action. Missions generally include some of the following:
Conduct deep reconnaissance operations.
Conduct direct action along tactical, operational, or strategic axes, in-
cluding ambushes and raids.
Destroy critical air defense systems and associated radars.
Support follow-on conventional military actions.
Assist local guerrillas (or insurgents in another country) to prepare for
offensive actions.
Provide communications, liaison, and support to stay-behind partisan
activities in the defense.
15-26. The OPFOR conducts SPF actions in the enemys tactical, operational,
and strategic depth to undermine his morale and to spread panic among the
civilian population and the political leadership. SPF actions can lead to a
flow of refugees, which can hamper enemy deployment, defensive maneuver,
and logistics.
15-27. The OPFOR has trained SPF as alternate means of delivering nuclear,
biological, or chemical (NBC) munitions packages it may develop for them.
This provides a worldwide strategic means of NBC delivery that is not lim-
ited to the range of the missiles of the Strategic Forces.
15-28. SPF allocated to an OSC or DTG often become part of the disruption
force, frequently operating in enemy-held territory before the beginning of an
operation or battle. At OSC level and sometimes at DTG level, they may be-
15-6
________________________________________________________________________________Chapter 15
come part of an IFC, to assist in locating and destroying key enemy forma-
tions or systems (see Chapter 2).
LOGISTICS
15-29. The secrecy during movement or delivery complicates resupply of the
deployed SPF team or detachment. A team leader or detachment commander
requesting extensive logistics support from the outside should limit his re-
quest to essential items not readily obtainable in the AOR. This could include
major items such as weapons, ammunition, demolitions, communications
equipment, medical supplies, or other items that are normally denied to the
local population by the enemy. The team leader or detachment commander
has several techniques available that will give him the supplies required
when he needs them.
ACCOMPANYING SUPPLIES
15-30. Accompanying supplies are items taken into the AOR by the SPF
team during insertion or infiltration. These supplies are issued at the staging
base in the final briefing stages and rigged by the team for delivery. When he
plans his accompanying supplies, the team leader or detachment commander
considers automatic resupply of survival and mission-essential items that he
will receive. The accompanying supplies, plus the automatic resupply, will
constitute the supply level of items required for the mission.
AUTOMATIC RESUPPLY
15-31. Automatic resupply is prearranged for time, location, and content dur-
ing the teams or detachments final preparation stage at the staging base.
The automatic resupply gives the team or detachment flexibility by allowing
it to include backup communications equipment, weapons, ammunition, dem-
olitions, medical supplies, and other items to support small-scale tactical ac-
tions and/or training of local insurgent, guerrilla or partisan groups that may
be affiliated with the OPFOR.
15-32. The supplies designated for the automatic resupply are selected on the
basis of available intelligence, indicating items essential to complete or con-
tinue the mission, conduct exfiltration, or support affiliated forces. Once they
are issued and received, they are rigged and prepared and stored for delivery
in accordance with the predetermined schedule.
ON-CALL SUPPLIES
15-33. After commitment into an AOR, and once it has established communi-
cations with its higher headquarters, the team or detachment is ready to be-
gin requesting supplies based on mission needs and the capability to receive
and store them.
15-34. In order to expedite supply requests, ensure accurate identification of
needs, and minimize communication transmission time, the team leader or
detachment commander uses a logistics brevity code system. The code in-
cludes the general category, unit designation, unit weight, total bundle
weight, and number of individual man-loads per package. The logistics brev-
ity code system is used to request three categories of supplies:
15-7
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
EMERGENCY RESUPPLY
15-35. The emergency resupply procedure is used to restore the combat ca-
pability of a team or detachment. This procedure is initiated when requested
or after sustaining losses from enemy actions, missing a scheduled radio con-
tact, discovering faulty equipment, or other incidents. Items delivered nor-
mally consist of communications equipment and other mission-essential
equipment.
15-37. The OPFOR makes an effort to keep some units at full strength rather
than all units at an equally reduced level. Usually, the unit with the fewest
losses is the first to receive replacement personnel and equipment. However,
once the casualties or equipment losses are sufficient to threaten the total
loss of combat effectiveness, the commander may apply the concept of com-
posite unit replacement. The composite unit concept involves a unit formed
from other units reduced by combat action.
15-8
________________________________________________________________________________Chapter 15
INFILTRATION
15-39. The success of SPF air and amphibious operations in support of mili-
tary operations is primarily dependent upon detailed planning and prepara-
tion. Infiltration techniques include
Air infiltration.
Water infiltration.
Land infiltration.
Stay-behind forces.
AIR INFILTRATION
15-40. Air delivery by parachute is one of the principal means available for
the infiltration of SPF personnel. In preparing a team for infiltration by
parachute, the team leader or detachment commander considers the follow-
ing:
Aircraft capabilities.
Reception personnel in the DZ.
Equipment and supplies.
Command and control.
Ground assembly.
Emergency plans.
The Air Force fields light transport aircraft for insertion of its own SPF or
those belonging to other service components, within the region. The SPF
Command also has some tactical transport for use in inserting SPF units.
Commercial aircraft may also be used to support high-altitude air drops.
Blind Drop
15-43. Selected SPF personnel may be air dropped during the initial infiltra-
tion phase on DZs devoid of reception personnel. This technique is referred to
as a blind drop and may be employed when an area is known to contain a
local insurgent element of sufficient size and nature to warrant cultivating as
15-9
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
an affiliated force. In all probability, the insurgent force will be small, pas-
sive in nature, and untrained, but receptive to outside support. Other inter-
ested State agencies were either unable or did not have time and means to
train the insurgent element as DZ reception personnel. Additionally, the en-
emy situation might preclude normal DZ markings and recognition signals.
15-44. Once on the ground, SPF personnel move to the selected assembly
area and establish security. The SPF team or detachment attempts to make
contact with the local insurgent element.
WATER INFILTRATION
15-45. Water offers another practical means for infiltration into areas having
exposed coastlines and riverbanks. Water infiltration normally terminates in
a land movement phase. Considerations for water infiltration include the fol-
lowing:
Watercraft capabilities.
Reception personnel.
Equipment and supplies.
Command and control.
Ship-to-shore movement.
Land assembly and movement.
Emergency plans.
LAND INFILTRATION
15-47. Land infiltration involves the use of different modes of transportation
or techniques such as commercial vehicles, railway trains, or infiltration on
foot, possibly along with refugees. It is conducted in a manner similar to that
of a long-range reconnaissance patrol infiltrating into enemy territory. Gen-
erally, guides are required. If guides are not available, the SPF team or de-
tachment must have detailed intelligence of the route, particularly if it is to
cross borders. Routes are selected to take maximum advantage of cover and
concealment and to avoid enemy outposts, patrols, and installations.
15-48. Before the mission, the team or detachment is briefed on the known
locations of selected individuals who will furnish assistance and on the estab-
lished means of contacting them. These individuals may be used as local
guides and sources of information, food, and shelter. Since there are local
sources for survival items, the SPF team or detachment can restrict the
equipment and supplies to be carried to mission-essential items (individual
arms, equipment, and communications equipment).
15-10
________________________________________________________________________________Chapter 15
STAY-BEHIND
15-49. SPF teams may be pre-positioned in proposed AORs before the enemy
occupies these areas, thus providing the opportunity to organize the nucleus
of a guerilla or partisan force, conduct surveillance, or conduct direct action.
Stringent precautions are taken to preserve security, particularly that of the
refuge areas or other safe sites to be used during the initial period of enemy
occupation. Information concerning locations and identities within the in-
digenous organization is kept on a need-to-know basis. Contacts among vari-
ous elements use clandestine communications.
15-50. Dispersed caches, to include radio equipment, are pre-positioned when
possible. SPF personnel have a better chance of survival in small towns, vil-
lages, and rural areas. However, when stay-behind operations are attempted
in heavy populated urban areas, the SPF team or detachment is completely
dependent upon the indigenous organization for security, the contacts re-
quired for expansion, and the build-up effort.
RAID
15-51. A raid is a surprise attack of an enemy force, installation, or site. Such
attacks are characterized by secret movement to the objective area; brief, vio-
lent action; rapid disengagement from action; and swift, deceptive with-
drawal. Raids are conducted to destroy or damage supplies, equipment, or in-
stallations such as command posts, communication facilities, supply depots,
or radar sites; to capture supplies, equipment, or key personnel; or to cause
casualties among the enemy and his supporters. Raids also serve to distract
attention from other OPFOR actions, to keep the enemy off balance, and to
cause the enemy to deploy additional units to protect critical sites.
15-52. The raid is one of the basic tactical techniques employed by SPF in
both unconventional and counterinsurgency operations. The keys to the suc-
cessful accomplishment of any raid are flexibility and responsiveness to or-
ders and direction. In preparation for raids, the SPF team leader or detach-
ment commander should have plans (ready for implementation if necessary)
for the use of fire support, reinforcements, and immediate evacuation.
Assault Element
15-54. The assault element is organized and trained to accomplish the objec-
tives of the raid. It consists of a main action group to execute the raid mission
and may include personnel detailed to execute special tasks that aid the
main group.
15-55. The main action group executes the major task ensuring the success of
the raid. For example, if the raid mission is to destroy a critical installation
15-11
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
such as a railroad bridge or tunnel, the main action group emplaces and deto-
nates the demolition charges. If the target, such as enemy personnel, is to be
neutralized by fire, the main action group conducts its attack with a high
proportion of automatic weapons. In some instances, the main action group
moves physically onto or into the target; in other instances, it is able to ac-
complish its task from a distance. The other elements of the raid are de-
signed to allow the main action group access to the target for the time re-
quired to accomplish the raid mission.
15-56. If required, special-task elements assist the main action group to
reach the target. They execute such complementary tasks as eliminating
guards, breaching and removing obstacles to the objective, conducting diver-
sionary or holding actions, and providing fire support. The special-task ele-
ments may precede, follow, or act concurrently with the main action group.
Security Element
15-57. The security element supports the raid by preventing the enemys ei-
ther reinforcing or escaping the objective area. The security element also cov-
ers the withdrawal of the assault element and act as a rear guard for the
raiding force. The size of the security element depends upon the size of the
enemys capability to intervene and disrupt the raid.
PLANNING CONSIDERATIONS
15-58. The first step is the selection of the target, based upon its criticality,
vulnerability, and accessibility, and the recoverability of the raiding force.
Other important considerations are the nature of the terrain and the combat
effectiveness of the raiding force.
15-59. Secondly, the SPF and affiliated force commanders must consider any
possible adverse effects on their units and the civilian populace as a result of
the raid. The objective is to diminish the enemys military capability. How-
ever, an improperly timed raid may provoke an enemy counteraction for
which the OPFOR, the affiliated force, and/or the local populace are unpre-
pared. Also, an unsuccessful raid often has disastrous effects on morale. Suc-
cessful raids, on the other hand, raise morale and increase the prestige of the
SPF and affiliated units in the eyes of the local populace and make the popu-
lace more willing to provide needed support.
15-60. Thirdly, every precaution is taken to ensure that civilians are not
needlessly subjected to harsh reprisals because of the raid. The impact of suc-
cessful raids can be exploited in IW campaigns. However, it is important
that, before such action is taken, any possible unfavorable repercussions from
the population and the enemy military forces be considered. If a raid is un-
successful, IW activities will be required to lessen any adverse effects on the
SPF or affiliated force.
15-61. Fourthly, although detailed, the plan for a raid must be simple, and
its success should not depend upon too many contingencies. Activities in the
objective area are planned so as not to alert the target to be attacked. This
means that activities of the local populace and affiliated forces should con-
form to normal patterns. Time and space factors are carefully consid-
eredtime is allowed for assembly and movement, particularly during dark-
15-12
________________________________________________________________________________Chapter 15
ness. All factors are considered to determine whether movement and attack
should be made during daylight or darkness. Darkness naturally favors sur-
prise and normally is the best time, especially when the raid is simple and
the physical layout of the objective is well known. Early dawn or dusk is fa-
vored when adequate knowledge of the objective or other factors necessitates
tight control of the raid. A withdrawal late in the day or at night makes close
pursuit by the enemy more difficult.
REHEARSAL OF PARTICIPANTS
15-63. Realistic rehearsals by all participants are conducted for the raid.
During the rehearsal, the following actions are accomplished:
Terrain similar to that found in the objective area is used when avail-
able.
Sand tables, sketches, photographs, and objective mockups are used to
assist in the mission briefings.
Contingency actions are practiced.
Final rehearsals are conducted under conditions of visibility expected
in the objective area.
FINAL INSPECTION
15-64. The raiding force commander conducts a final inspection of personnel
and equipment before moving to the objective area. If possible, weapons are
test-fired, faulty equipment replaced, and the condition of the personnel
checked. During this inspection, a counterintelligence check is made of per-
sonal belongings to ensure no incriminating documents are carried on the
raid. This inspection assures the raiding force commander that his unit is
equipped and ready for the raid.
MOVEMENT
15-65. Movement to the objective area is planned and conducted to allow the
raiding force to approach undetected. Movement may be over single or multi-
ple routes. The pre-selected route or routes terminate in or near one or more
MSSs. Every effort is made to avoid contact with the enemy during move-
ment. Upon reaching the designated rendezvous and MSS, security elements
15-13
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
are deployed, and final coordination takes place prior to the assault elements
moving to the objective area.
WITHDRAWAL
15-67. Once the objective of the raid has been accomplished, the main action
group withdraws, covered by pre-selected fire support elements or part of the
security element. If the raid is unsuccessful, it is terminated to prevent un-
due loss, and the special-task elements withdraw according to plan. The main
action group assembles at one or more rallying points while the security ele-
ments remain in position to cover the withdraw according to plan. The main
action group withdraws on a prearranged signal or time.
15-68. Withdrawal is designed to achieve maximum deception of the enemy
and facilitate further action by the raiding force. The various elements of the
raiding force withdraw on order, over predetermined routes through a series
of rallying points. If the enemy organizes a close pursuit of the main action
group, the security element assists by fire and movement, distracting the en-
emy and slowing him down. Elements of the raiding force that are closely
pursued by the enemy do not attempt to reach the initial rallying point.
Rather, they lead the enemy away from the remainder of the force and at-
tempt to break contact with him by evasive action in difficult or complex ter-
rain. If the situation permits, an attempt is made either to reestablish con-
tact with the rest of the raiding force at other rallying points, to continue to
the base area as a separate group, or to reach an area for evacuation.
15-69. The raiding force, or elements of it, may separate and proceed
15-70. Frequently, the raiding force disperses as small groups or individuals
to evade close pursuit. These smaller elements withdraw in different direc-
tions and reassemble at a later time at a predetermined place to conduct fur-
ther missions. During the withdrawal, elements of the raiding force can con-
duct other actions, such as an ambush of the pursuing enemy force.
LARGE RAIDS
15-71. When an objective is large, important to the enemy, and well guarded,
a larger raiding force is required to ensure a successful attack. Large raids
may involve the use of a relatively large SPF detachment, often in conjunc-
tion with affiliated forces. Although such actions are conducted similarly to
small raids, additional factors must be considered:
Movement to the objective area.
Command and control.
Training.
Fire support.
Timing.
15-14
________________________________________________________________________________Chapter 15
Withdrawal.
Movement to the Objective Area
15-72. Surprise is just as desirable as in a smaller raid, but it is usually
harder to achieve. The number of troops to be deployed and a longer move to
the objective area require additional MSSs at a greater distance from the ob-
jective to preserve secrecy. A large raiding force usually moves by small com-
ponents over multiple routes to the objective area. In some instances, larger
raids are conducted by regular infantry troops using heliborne landings sup-
ported by SPF personnel.
Training
15-74. A high degree of training and discipline is required to execute a large
raid. Extensive rehearsals assist in preparing the force for the mission. In
particular, commanders and staffs must learn to use large numbers of small
units as a cohesive fighting force.
Fire Support
15-75. Additional fire support usually is a requirement for large raids. This
may mean secretly caching ammunition in MSSs over a period of time before
the raid. Individual members of affiliated forces and the SPF detachment
may carry a mortar, antiarmor weapon, single-shot rocket launcher, or a box
of machinegun ammunition and leave it at an MSS or firing position for a fire
support unit. Sufficient firepower is moved into areas within range of the se-
lected objective area and is on call to support the raid.
Timing
15-76. Timing is usually more difficult for a large raid. More time is required
to move units, and the main action group needs more time to perform its mis-
sion. This requires stronger security elements to isolate the objective for
longer periods. The timing of the raid takes on increased importance because
of the large numbers of personnel involved. Movement to the objective is usu-
ally accomplished during periods of limited visibility. However, because of
fire support coordination requirements and larger numbers of personnel, the
raid may take place during daylight hours.
Withdrawal
15-77. Smaller groups usually accomplish withdrawal from a large raid over
multiple routes in order to deceive the enemy and disperse his pursuit force.
Dispersed withdrawal has the added advantage of denying a lucrative target
to enemy air and fire support elements. However, the raiding force com-
mander must consider the possibility of an alert and aggressive enemy de-
15-15
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
feating the dispersed elements of the raiding force. All factors must be care-
fully weighed before deciding on how to conduct the withdrawal.
AMBUSH
15-78. An ambush is a surprise attack from a concealed position, used
against moving or temporarily halted targets such as truck convoys, railway
trains, boats, individual vehicles, and dismounted troops. In an ambush, en-
emy action determines the time, and the OPFOR sets the place. Ambushes
are conducted to destroy or capture personnel and supplies, harass and de-
moralize the enemy, delay or block movement of personnel and supplies, and
canalize enemy movement by making certain routes useless for traffic. They
usually result in concentrating the majority of movements to principal roads,
railroads, or waterways where targets are more vulnerable to attack by other
forces.
PLANNING CONSIDERATIONS
15-81. The planning and preparation of an ambush is similar that for a raid,
except that selecting an ambush site is an additional consideration. The mis-
sion may be a single ambush against one target or a series of ambushes
against targets on one or more LOCs. The probable size, strength, and com-
position of the enemy force that is to be ambushed, formations the enemy is
likely to use, and enemy reinforcement capabilities are considered. Favorable
terrain for an ambush, providing unobserved routes for approach and with-
drawal, must be selected.
15-82. The time of the ambush should coincide with periods of limited visibil-
ity, offering a wider choice of positions and better opportunities to surprise
and confuse the enemy. However, movement and control are more difficult
during a night ambush. Night ambushes are more suitable when the mission
can be accomplished during, or immediately following, the initial burst of
fire. They require a maximum number of automatic weapons to be used at
close range. Night ambushes can hinder the enemys use of LOCs at night,
while friendly aircraft can attack the same routes during the day (if the en-
emy does not have air superiority). Daylight ambushes facilitate control and
15-16
________________________________________________________________________________Chapter 15
permit offensive action for a longer period of time. Daylight ambushes also
provide an opportunity for more effective fire from such weapons as rocket
launchers and antiarmor weapons.
SITE SELECTION
15-83. In selecting the ambush site, the basic consideration is favorable ter-
rain, although limitations such as deficiencies in firepower and lack of resup-
ply during actions may govern the choice of the ambush site. The site should
have firing positions offering concealment and favorable fields of fire. When-
ever possible, firing should be conducted from the screen of foliage. The ter-
rain at the site should serve to canalize the enemy into a kill zone. The entire
killing zone is covered by fire so that there is no dead space that would allow
the enemy to organize resistance. The ambush force should take advantage of
natural obstacles such as defiles, swamps, and cliffs to restrict enemy ma-
neuvers against the force. When natural obstacles do not exist, mines, demo-
litions, camouflage barbed or concertina wire, and other concealed obstacles
are employed to canalize the enemy.
MOVEMENT
15-84. The ambush force moves over a pre-selected route or routes to the am-
bush site. One or more MSSs or rendezvous points usually are necessary
along the route to the ambush site. Last-minute intelligence is provided by
reconnaissance elements, and final coordination for the ambush is made at
the MSS or the assembly area.
15-17
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
nullified, designated assault element personnel move into the kill zone to re-
cover supplies, equipment, and ammunition.
15-88. If the purpose of the ambush is to harass and demoralize the enemy, a
different tactic may be adopted. The enemy security element is selected as
the target of the ambush and the fire of the assault element is directed
against it. Repeated attacks against the enemy security element can
Cause the use of disproportionately strong forces in the enemy security
element. This may leave other portions of the enemy main force vul-
nerable or require the diversion of additional troops to convoy duty.
Create an adverse psychological effect upon enemy troops, and the con-
tinued casualties suffered by the enemy security force may make such
duty unpopular.
TERMINATION AND WITHDRAWAL
15-89. The ambush force commander decides when to terminate the action
and withdraw. He may do so either because the mission has been accom-
plished or because superior enemy reinforcements are arriving.
15-90. Withdrawal from the ambush site is similar to withdrawal from a raid
in that the security elements cover the assault elements. Before deciding on
how to conduct the withdrawal, the ambush force commander must consider
or weigh factors such as the possibility of an alert and aggressive enemy de-
feating the ambush force. If enemy forces in or near the ambush site are still
capable of returning fire when he terminates the ambush, he withdraws the
assault element first and then the security elements that cover the with-
drawal of the assault element.
15-18
________________________________________________________________________________Chapter 15
that the enemy may include armored rail cars in the train for its protection.
Security or advance guard locomotives or inspection cars may precede impor-
tant trains to check the track.
MINING
15-96. Mining affords SPF and affiliated force commanders a means of inter-
dicting enemy LOCs and key areas with little expenditure of manpower.
Mines can be used alone or in conjunction with other actions. When they are
used alone, they are emplaced along LOCs or known enemy approaches when
traffic is light. This allows personnel emplacing the mines to complete the
task in secrecy without undue interference. The use of mines to cover the
withdrawal of a raiding or ambush force slows enemy pursuit, and their use
in the roadbeds of highways and railroads interferes with movement. Mines
can be emplaced around enemy installations or bases to cause casualties to
sentinels and patrols; limit movement; and cause low morale among enemy
troops.
SNIPING
15-97. Sniping is an interdiction technique that is economical in the use of
personnel and has a demoralizing effect on the enemy. Snipers can cause
casualties among enemy personnel, deny or hinder his use of certain routes,
and require him to employ a disproportionate number of troops to rid the
area of snipers. Snipers may cover an area that has been mined, act as part
of a raiding or ambush force, or act independently. Snipers operate best in
teams of two, alternating the duties of observer or spotter and sniper. Snip-
ers may be used effectively in access-control operations, firing from positions
in field fortifications and lookout towers.
15-19
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
COMMANDOS
15-99. The SPF Command also includes elite commando units. Like SPF
units, commandos normally operate in enemy-controlled territory. In addi-
tion to proficiency in various infantry-type tactics, these elite units receive
training for more specialized commando missions.
INFANTRY-TYPE MISSIONS
15-102. Sometimes, particularly in defensive situations, commandos may
be called on to perform regular infantry missions, filling gaps between dis-
persed regular forces. In this case, commandos would typically fight as com-
panies or battalions, using tactics similar to those of regular infantry units.
COMMANDO MISSIONS
15-103. Commando units generally conduct various types of reconnais-
sance and combat missions in the disruption zone or deep in enemy territory,
during larger operations or tactical actions that are either offensive or defen-
sive. The reconnaissance missions include actions such as surveillance, moni-
toring, and searches. Commando units are expected to conduct reconnais-
sance within the context of any combat mission. Conversely, when employed
as a reconnaissance element, the commando units activities are not limited
to reconnaissance. They are also tasked with assaulting and destroying mili-
tary or civilian targets.
15-104. Commandos provide the OPFOR with flexible, lethal forces capa-
ble of employment in a variety of roles. Typical missions that are assigned to
the commandos include but are not limited to
15-20
________________________________________________________________________________Chapter 15
15-21
FM 7-100.2 (Final Draft Sep 04) _______________________________________________________________
mined by considering the time required to arrive at the landing site, mari-
time and coastal security measures employed by the enemy forces, tidal con-
ditions, hours of moonrise and moonset, and weather conditions. Commandos
can also infiltrate using watercraft on inland waterways.
OFFENSE
15-109. Commandos are employed as infiltration units during the offense.
Following overland, airborne, seaborne, or waterborne infiltration, comman-
dosoperating independentlymay perform various reconnaissance and
combat missions described above. However, they may also act in conjunction
with regular ground forces. In the latter role, commandos can conduct the fol-
lowing missions to ensure the success of the overall offensive action:
15-110. Disruption Force. In addition to reconnaissance missions, com-
mandos can be tasked with missions as part of the disruption force to
Remove or emplace obstacles.
Raid headquarters, LOCs, and tactical missile firing locations.
Occupy key terrain features (in advance of other forces).
Occupy ambush positions on enemy withdrawal routes.
DEFENSE
15-114. During a defensive action conducted by a tactical group, com-
mando units allocated to it can support the action primarily in reconnais-
sance and tactical security roles. Commando units can conduct reconnais-
sance in the tactical group disruption zone. They may also act as a security
force. When acting as a security force, commandos are normally employed as
companies or battalions. The commando unit can be augmented with vehicles
and/or additional forces (such as tank or mechanized units, fire support, or
aviation) to act as an assault force in limited-objective attacks against enemy
airborne, air assault, or special operations forces units.
15-115. A commando battalion or company is seldom used as a combat
force in the battle zone because of organization, equipment, and limited fire-
15-22
________________________________________________________________________________Chapter 15
15-23