The Basics of Offense Explain Offensive Operations What are they: Offensive actions are combat operations to What is their purpose: defeat ENY forces, destroy ENY forces, and gain control of terrain, resources, and population centers, gain information, deceive or divert ENY forces, fix an ENY force in position, or disrupt an ENY’s ATK. When and Why are they conducted: CDRs use offensive actions to seize, retain, and exploit the initiative in support of friendly operations in the air, maritime, space, and cyberspace domains, as well as the information environment. (ADP 3-90, CH 3) Intent of the Offensive The intent of the offense is to defeat OPFOR preventing them from achieving their objectives (OBJ) and set conditions for successful future operations. (ADP 3-0, CH 3) Mechanisms of Defeat (ADP 3-0, CH 2) A defeat mechanism is a method through which Friendly Forces (FF) accomplish their mission against ENY opposition. Used individually, a defeat mechanism achieves results relative to how much effort is expended. Using defeat mechanisms in combination creates ENY dilemmas that magnify their effects significantly. 1. Destroy. This is the application of lethal combat power on an ENY capability so that it can no longer perform any function. (When used against ENY elements, it is to render the ENY force combat-ineffective until it is reconstituted. When used against ENY combat systems, it is to damage so badly that it cannot perform any function or be restored to a useable condition without being entirely rebuilt.) 2. Dislocate. This is the employment of forces to obtain significant positional advantage, rendering the ENY’s dispositions less valuable, perhaps even irrelevant. (CDRs often achieve this by placing forces in locations the ENY does not expect them.) 3. Disintegrate. This is the disruption of the ENY’s Command and Control (C2) system, degrading its ability to conduct operations while leading to a rapid collapse of the ENY’s capabilities and will to fight. (CDRs achieve this by specifically targeting an ENY’s command structure and communications systems.) 4. Isolate. This is the separation of a force from its source(s) of support to reduce its effectiveness and increase its vulnerability to defeat. (This can encompass multiple domains and have physical and psychological effects detrimental to accomplishing the mission.) Characteristics of the Offense (ADP 3-90, CH 3) CDRs conduct offensive operations by maneuvering forces to advantageous positions before an operation, shaping their decisive operation by initiating selective contact with ENY forces. The decisive operation capitalizes on the successful application of the characteristics of the offense. 1. Surprise. This is done by ATKing ENY forces at a time or place or in a manner for which ENY forces did not prepare or expect. (CDRs achieve this by showing the ENY what they expect while actually doing something different.) 2. Concentration. This is massing the effects of combat power in time and space at the decisive point to achieve a single purpose. (This requires the coordination of unified action partner capabilities in multiple domains to create opportunities that enable offensive land operations. CDRs adopt the tactics for the situation, protect the force, and sustain the ATK’s tempo.) 3. Audacity. This is the willingness to take bold risks. (CDRs display audacity by accepting risks commensurate with the value of their OBJ and dispelling uncertainty by acting decisively.) 4. Tempo. This is the relative speed and rhythm of military operations over time with respect to the ENY. (CDRs adjust tempo continuously, maintaining flexibility regarding the tactical situation, sustainment realities, and ENY actions.) Forms of Contact (FM 3-90, CH 1) Contact is an interaction between two forces. The forms of contact describe the method of interaction that positively identifies the location or activity of a force. FF will use and many different forms of contact as possible, when engaging an ENY, to create a dilemma for the ENY and allow FF to accomplish its mission. There are nine forms of contact that form the memory aid DINOCAVE-I. 1. Direct. Interactions from ground-based, line-of-sight (LOS) weapon systems (including small arms, tank main guns, and anti-tank (AT) missiles.) 2. Indirect. Interactions from non-LOS weapons systems (including cannon artillery, mortars, and rockets.) 3. Non-hostile. Neutral interactions that may degrade military operations (including civilians (CIV) on the battlefield, nongovernmental organizations (NGO), or neutral forces.) 4. Obstacle. Interactions from natural or man-made obstacles (including rivers and minefields.) 5. CBRN. Interactions from friendly, ENY, and CIV CBRN effects (including chemical ATKs, nuclear ATKs, industrial accidents, and toxic or hazardous.) 6. Aerial. Interactions from air-based combat platforms (including ATK helicopters, armed UAS, and fixed-wing aircraft.) 7. Visual. Interactions from acquisition via the human eye, optical, or electro-optical (EO) systems (including ground reconnaissance, telescopic, thermal, and infrared (IR) sights on weapons and sensor platforms such as UAS and satellites.) 8. Electromagnetic. Interactions via systems used to acquire, degrade, or destroy using select portions of the electromagnetic spectrum (EMS) (including radar systems, jamming, cyberspace, and electromagnetic pulse (EMP).) 9. Influence. Interactions through the information dimension intended to shape the perceptions, behaviors, and decision making of people relative to a policy or military OBJ (including through social media, telecommunications, human interactions, and other forms of communication and contact.) Types of Offensive Operations (FM 3-90, CH 3 & ADP 3-90, CH 3) 1. Movement to Contact. A type of offensive operation designed to establish or regain contact to develop the situation. A movement to contact is conducted when the tactical situation is unclear, or the ENY force succeeds in breaking contact with FF. A movement to contact is characterized by the employment of purposeful and aggressive movement, decentralized control, and the hasty deployment of combined arms formations from the march. The general considerations consist of: Focusing all efforts on finding ENY forces. Initial contact force should be small, mobile, self-contained, and avoid becoming decisively engaged. Task-organize the force and use movement formations and battle drills to deploy and ATK rapidly in any direction. Keep subordinate forces within supporting distances to facilitate gaining and maintaining contact. Upon gaining contact, maintain contact regardless of the COA adopted. Close air support (CAS), air interdiction, and counterair operations are essential to the success of large-scale movements to contact. Local air superiority or, at a minimum, air parity is vital to the operation’s success. There are two types of movement to contact; (1) search and attack and (2) cordon and search. A. Search and Attack – is a variation of a movement to contact where a FF conducts coordinated ATKs to defeat a distributed ENY force. This variation is primarily conducted by dismounted infantry forces during irregular warfare, but may also be necessary when conducting noncontiguous operations during combat operations or consolidating gains. This variation is used when the ENY is operating in small, dispersed elements and units cannot target them by any method other than physical search. It may also be used when the task is to deny the ENY the ability to move within a given area. All echelons can conduct this variation. However, Divisions rarely conduct search and attack simultaneously throughout its assigned area. B. Cordon and Search – is the second variation of a movement to contact where a FF isolates and searches a target area. This variation is normally conducted by maneuver battalions and lower. This variation is typically conducted to capture or destroy possible ENY forces or contraband and occur throughout the range of military operations. However, they are generally conducted during stability operations or situations where large-scale organized violence is unlikely. 2. Attack. A type of offensive operation that defeats ENY forces, seizes terrain, or secures terrain. An ATK masses the effects of overwhelming combat power against selected portions of an ENY force with a tempo and intensity that the ENY cannot match. The general considerations consist of: Protecting the force. Task-organizing. Performing reconnaissance. Refining the plan. Briefing the troops. Pre-Combat Checks (PCC) Pre-Combat Inspections (PCI) Moving logistics and medical support FWD. Conducting Rehearsals. Promoting adequate rest for both leaders and Soldiers. Positioning the force for subsequent action. There are four types of ATK; (1) Ambush, (2) Counterattack, (3) Raid, and (4) Spoiling ATK. 1. Ambush. Is a variation of ATK from concealed positions against a moving or temporarily halted ENY. An ambush is conducted to stop, deny, or destroy ENY forces by maximizing the element of surprise and may be conducted by all forces. An ambush may consist of a combination of direct fire systems, indirect fire systems, obstacles, and supporting nonlethal effects. Typically, the ambush force does not seize and hold ground OBJs. There are two methods of ambush; (1) point and (2) area. A. Point. A unit deploys to ATK a single kill zone. B. Area. A unit deploys into two or more related ambushes. A unit smaller than PLT does not conduct an area ambush. 2. Counterattack. Is a variation of ATK by a defending force against an ATKing ENY force. A counterattack is conducted to deny the ENY the attainment of their purpose and regain the initiative through offensive action. There are two methods of counterattack; (1) major and (2) local. A. Major. ATKs to seize the initiative from an ENY through offensive action after an ENY launches an ATK. The major counterattack is also conducted to defeat or block an ENY penetration that endangers the integrity of the defense or to attrite an ENY by the defeat or destruction of isolated portions of the defense. This variation can be conducted at Division and higher. B. Local. ATKs to retake positions lost to ENY action or to exploit targets of opportunity. This variation may be conducted by all echelons. 3. Raid. Is a variation of ATK to temporarily seize an OBJ with a planned withdrawal. A raid is conducted to secure information, capture personnel or equipment, destroy a capability, rescue and recover individuals and equipment, or confuse an adversary. This variation usually involves battalion-sized or smaller forces. A raid requires a simplified chain of command, precise and time-sensitive intelligence, and is usually task-organized to neutralize ENY forces operating near an OBJ and to perform the specified function(s) of the raid. 4. Spoiling ATK. Is a variation of ATK employed against an ENY preparing for an ATK. A spoiling ATK is conducted to disrupt the ENY’s offensive capabilities and timelines while destroying targeted ENY personnel and equipment. It is not to seize terrain or other physical objectives. Spoiling ATKs usually involve armored, ATK helicopter, or fire support elements ATKing the ENY assembly positions in front of the main battle area. This variation can be conducted by PLT and higher echelons. 3. Exploitation. A type of offensive operation following a successful ATK to disorganize the ENY in depth. Exploitation reinforces disorganization and confusion in the ENY’s C2 systems. Exploitations are conducted to take advantage of the reduction in ENY capabilities to make permanent what would only be a temporary tactical effect. This operation is conducted by BCT and higher. 4. Pursuit. A type of offensive operation to catch or cut off a disorganized hostile force attempting to escape, with the aim of destroying it. A pursuit leaves ENY forces trapped, unprepared, unable to defend, and faced with the options of surrender or destruction. It is characterized by the rapid shifting of units, continuous day and night movements, hasty ATKs, containment of bypassed ENY forces, large numbers of prisoners, and a willingness to forego some synchronization to maintain pressure on a fleeing ENY. The general considerations consist of: Flexible forces. Initiative by CDRs at all echelons. High tempo during execution. This operation is typically ordered by Corps and Division CDRs for subordinate echelons to conduct. Forms of Maneuver (FM 3-90, CH 2) A form of maneuver is a distinct tactical combination of fire and movement with a unique set of doctrinal characteristics that differ primarily in the relationship between the maneuvering force and the ENY. It is a broad way of describing a scheme of maneuver. The five forms of maneuver are (1) Frontal ATK, (2) Penetration, (3) Envelopment, (4) Turning Movement, and (5) Infiltration. 1. Frontal ATK. A form of maneuver in which an ATKing force seeks to destroy a weaker ENY force or fix a larger ENY force in place over a broad front. It is normally used to clear ENY security forces, overwhelm a shattered ENY force during an exploitation or pursuit, fix ENY forces in place as part of another operation, or conduct a reconnaissance in force. Units organize into a security force, main body, and a reserve. It is necessary when n assailable flanks exist. Frontal ATKs maintain continuous pressure along the entire front. Units rarely conduct the Frontal ATK when they lack overwhelming combat power unless fixing the ENY is vital to a larger operation’s success; however, the Frontal ATK forms the basis for every other form of maneuver. This is a BN maneuver. 2. Penetration. A form of maneuver in which a force ATKs on a narrow front. Conducting a penetration requires overwhelming combat power (combat ratio 18:1). Penetrations are organized into a support force, breach force, assault force and reserve to fix ENY reserves and long-range weapons in their current locations to isolate ENY forces within the area selected for penetration. Divisions and Corps may conduct this form of maneuver. 3. Envelopment. A form of maneuver in which an ATKing force avoids an ENY’s principal defense by ATKing along an assailable flank. Envelopments focus either on seizing terrain, destroying ENY forces, or interdicting ENY withdrawal routes. They force the ENY to fight in two or more directions simultaneously to meet the converging efforts of an ATK. Units prefer to conduct an envelopment instead of a penetration or frontal ATK because generally the flanks of the defending forces are weaker and provide the ATKing force the most opportunities to destroy the ENY. Units organize forces in a fixing force, enveloping force(s), security force, and a reserve. The goal of an envelopment is to maneuver FF behind the ENY’s main defenses to secure OBJs in the ENY’s flanks or rear. These OBJs provide FF with positional advantage to employ superior combat power against the ENY in an unexpected manner so the ENY is oriented in the wrong direction. There are three variations of the envelopment: (1) single envelopment, (2) double envelopment, and (3) vertical envelopment. 1. Single envelopment. Is a variation of envelopment where a force ATKs along one flank of an ENY force. (It is generally easier to control and does not require a significant number of forces.) 2. Double envelopment. Is a variation of envelopment where forces simultaneously ATK along both flanks of an ENY force. (Units executing a double envelopment must have a substantial mobility advantage. This variation is conducting by first performing a frontal ATK to fix ENY forces in place while enveloping both the ENY’s flanks. This variation generally requires more forces than a single envelopment and is more difficult to control.) Due to the number of forces required, this variation is normally conducted by DIV and higher echelons. 3. Vertical envelopment. Is a variation of envelopment where air-dropped or airlanded troops ATK an ENY force’s rear, flank, or both. (Units seeking to execute this variation require the necessary vertical lift capabilities and indirect fire assets to suppress ENY AD capabilities.) A vertical envelopment allows CDRs to: Overcome distances quickly, overfly barriers, and bypass ENY defenses. Extend the area over which the CDR can exert influence. Leaves the ENY defenses more vulnerable to ATK from the main body. Disperse reserve forces widely for survivability reasons while maintaining their capability for effective and rapid response. Exploit combat power by increasing tactical mobility. Seize key terrain to deny the ENY’s use. Due to the number of forces required, this variation is normally conducted by DIV and higher echelons. 4. Turning Movement. Is a form of maneuver in which the ATKing force seeks to avoid the ENY’s principal defensive positions by ATKing to the rear of their current positions forcing them to move or divert forces to the threat. The turning movement differs from an envelopment because it seeks to make the ENY displace from their current positions, whereas the envelopment seeks to engage the ENY in their current position from an unexpected direction. This maneuver can be conducted using waterborne or amphibious means and is frequently used to transition into an exploitation or pursuit. Units organize into a security force, diversion force, turning force, and a reserve. This is a DIV and higher maneuver due to the resources required to conduct the maneuver and the requirement that the turning force be capable of operating outside supporting distances for a set time, indicating an element of substantial size and combat power. 5. Infiltration. Is a form of maneuver in which an ATKing force conducts undetected movement through or into an area occupied by ENY forces. Infiltration occurs by land, water, air, or a combination of means. This maneuver is time intensive to allow FF to move and assemble covertly through ENY positions. Successful infiltration requires the infiltration force to avoid detection and engagement by the ENY. This requirement limits the size and strength of the infiltrating force. Infiltrating forces can rarely defeat an ENY force along, so infiltration typically is executed in conjunction with and in support of other forms of offensive maneuver. This maneuver is best suited for SOF and dismounted infantry units up to BDE size. Relief-in-Place (RIP) (FM 3-90, CH 15) An operation in which, by direction of higher authority, all or part of a unit is replaced in an area by the incoming unit and the responsibilities of the replaced elements for the mission and the assigned zone of operations are transferred to the incoming unit. CDRs conduct the RIP as part of a larger operation, primarily to maintain the combat effectiveness of committed forces. There are three types of RIP; (1) sequential, (2) simultaneous, and (3) staggered. 1. Sequential. Occurs when each element within the relieved unit is relieved in succession, from right to left or left to right, depending on how it is deployed. 2. Simultaneous. Occurs when all elements are relieved at the same time. 3. Staggered. Occurs when a CDR relieves each element in a sequence determined by the tactical situation, not its geographical orientation. Passage-of-Lines (POL) (FM 3-90, CH 16) Is an operation in which a force moves FWD or RWD through another force’s combat positions with the intention of moving into or out of contact with the ENY. Units conduct a POL for several reasons. They include to sustain offensive tempo, maintain the viability of the defense by transferring responsibility from one unit to another, transition from the performance of delay or security operations by one force to the defense, and transition a unit from another mission or task. There are two conditions when a POL occurs; (1) forward POL and (2) rearward POL. 1. FWD POL. Occurs when a unit passes through another unit’s positions while moving towards the ENY. (Example: a unit with a task to follow and assume). 2. RWD POL. Occurs when a unit passes through another unit’s positions while moving away from the ENY. (Example: a unit conducting a retrograde). Forms of Reconnaissance (FM 3-90, CH 12) Reconnaissance is a mission undertaken to obtain information about the activities and resources of an ENY or adversary, or to secure data concerning the meteorological, hydrographic, geographic or other characteristics of a particular area, by visual observation or other detection methods. This is done through five forms of reconnaissance. The five forms of reconnaissance operations are; (1) Zone reconnaissance, (2) Area reconnaissance, (3) Route reconnaissance, (4) Reconnaissance in Force, and (5) Special reconnaissance. 1. Zone Reconnaissance. Is a form of RECON operation that involves a directed effort to obtain information on all routes, obstacles, terrain, and ENY forces within a zone defined by boundaries. This form of RECON takes longer than any other RECON operation. CDRs assign a zone RECON when they need additional information on a zone before committing other forces. It is appropriate when the ENY SIT is vague, existing knowledge of terrain is limited, or combat operations have altered the terrain. The zone RECON is conducted by Scout PLT through BCT echelons. 2. Area Reconnaissance. Is a form of RECON operation that focuses on obtaining detailed information about the terrain or ENY activity within a prescribed area. CDRs assign an area RECON when information on the ENY SIT is limited or when focused reconnaissance yields specific information on the area in question. The area RECON is conducted by Scout PLT through BCT echelons. 3. Route Reconnaissance. Is a form of RECON operation to obtain detailed information of a specified route and all terrain from which the ENY could influence movement along that route. CDRs normally assign this mission during a zone or area reconnaissance when they require more information on a specific route for friendly movement. It provides new or updated information on route conditions, such as obstacles and bridge classifications, and ENY, adversary, and CIV activity along the route. The route RECON is conducted by Scout PLT through Air Cavalry echelons. 4. Reconnaissance in Force. Is a form of RECON operation designed to discover or test the ENY’s strength, dispositions, and reactions or to obtain other information. CDRs assign this operation when an ENY force is operating within an area and they cannot obtain adequate intelligence about the ENY force by other means. It may also be employed in restrictive terrain where an ENY is likely to ambush small RECON forces. The goal of a RECON in force is to determine exploitable ENY weaknesses. The RECON in Force is conducted by Cavalry Squadron (if reinforced) through Division echelons. 5. Special Reconnaissance. Is RECON & SURV actions conducted as a special operation in hostile, denied, or diplomatically and/or politically sensitive environments to collect or verify information of strategic or operational significance, employing military capabilities not normally found in conventional forces. The special RECON is conducted by SOF. Security Operations (FM 3-90, CH 13) Are those operations performed by CDRs to provide early and accurate warning of ENY operations, to provide the forces being protected with time and maneuver space within which to react to the ENY, and to develop the situation to allow CDRs to effectively use their protected forces. This is done through four forms of security operations. The four forms of security operations are; (1) area security, (2) screen, (3) guard, and (4) cover. 1. Area. A type of security operation conducted to protect FF, LOCs, and activities within a specific area. It can occur during all types of operations as an economy of force operation, designed to ensure the continued conduct of sustainment operations that generate and maintain combat power. There is no set echelon that can conduct an area security. However, forces are typically organized in a manner that emphasizes their mobility, lethality, communications capabilities, and should correspond to the level of the threat. (EX: for a LV2 threat, which consists of guerrilla forces, unconventional forces and small unit tactics, a military police company may be sufficient. For a LV3 threat, which consists of air and missile attacks and NBC attacks, a combined arms team from a BCT is more appropriate.) 2. Screen. A type of security operation that primarily provides early warning to the protected force. It is designed to provide security with minimum forces, allowing CDRs to retain the bulk of their combat power for decisive action. It is an economy of force operation. Screens are conducted to cover gaps between forces, exposed flanks, or the rear of stationary and moving forces to observe, identify, and report ENY actions. Typically, units can screen an AA two echelons larger than itself. Echelons conducting a screen can range from a Scout PLT for a BN TF to a Combat Aviation Brigade (CAB), Armored or Stryker BCT for Echelons Above Corps (EAC). 3. Guard. A type of security operation conducted to protect the main body by fighting to gain time while preventing ENY ground observation of and direct fire against the main body. There are three types of guard operations: (1) advance, (2) flank, and (3) rear. CDRs assign guards to protect either stationary or moving forces when ENY contact is expected, and they require additional security beyond what a screen provides. The exact size of a guard is determined by mission variables, but they typically range from CO TMs for a BN TF to reinforced DIV or Corps for EAC in an advanced guard and CO TM or CAV SQD for a BCT to a CAB, Armored or Stryker BCT for EAC in a flank or rear guard. 4. Cover. A type of security operation done independent of the main body to protect them by fighting to gain time while preventing ENY ground observation of and direct fire against the main body. A cover performs all the tasks of a screen and guard. When used for a stationary force it performs a defensive mission and performs an offensive mission when used for a moving force. Due to the number of resources needed to conduct a cover, it is only used when a CDR has enough resources to conduct a cover and the main effort. Echelons conducting a cover can range from a reinforced Combined Arms Battalion (CABn), BN TF, or reinforced CAV SQD for a BCT to a reinforced DIV or Corps for EAC. Breaching Operations (FM 3-90, CH 18) A breach is a synchronized and rehearsed combined arms activity to break through or establish passage through an ENY obstacle. It is a resource intensive activity, especially EN support, and should be conducted as a last resort to allow CDRs to maintain tempo and momentum. (FM 3-90, Appendix B). The breach begins when FF detect ENY obstacles and begin to apply the breaching fundamentals. The breach ends when battle handover occurs between follow-on forces and the unit conducting the breach. The breach area is an area defined by the higher headquarters of the unit conducting the breach and consists of point of breach (location at an obstacle where the creation of the lane is being attempted), the reduction area (adjacent points of breach under the control of the breaching CDR), the far side objective (location oriented on terrain or an ENY force that an Assaulting force seizes to prevent the ENY from interfering in the reduction of obstacles and allows follow-on forces to move securely through created lanes), and the point of penetration (a ground location where CDRs concentrate efforts at the weakest point of the ENY to seize a foothold on the far side objective). There are three types of breaching: (1) deliberate, (2) hasty, and (3) covert. 1. Deliberate. Is the systematically planned and executed creation of a lane through a barrier or obstacle. 2. Hasty. Is the creation of lanes through ENY minefields by expedient methods such as blasting with demolitions, pushing rollers or disabled vehicles through the minefields when the time factor does not permit detailed reconnaissance, deliberate breaching, or bypassing the obstacle. 3. Covert. Is the creation of lanes through minefields or other obstacles that is planned and intended to be executed without detection by an adversary. Breaching operations are characterized by five tenets. They are: (1) Intelligence, (2) Breaching Fundamentals, (3) Breaching Organization, (4) Mass, and (5) Synchronization. 1. Intelligence. Templates ENY obstacles on the SITEMP for each ECOA; develops information requirements (IRs) on ENY EN units, equipment, activities, and obstacles; integrates IRs and EN RECON capabilities into the IC plan. 2. Breaching Fundamentals. Consists of five fundamentals that form the memory aid SOSRA. (1) Suppress – implements fire control measures to allow the support force to provide effective direct and indirect suppressive fires. (2) Obscure – determines the placement, density, and timing of placing obscurants on ENY positions and placing screening obscuration between the ENY and the reduction area. (3) Secure – resources the breach force based on the combat power of ENY forces overwatching the obstacle. Security should be conducted on both sides of the breach. (4) Reduce – determines the number and width of lanes based on scheme of movement and maneuver; determines reduction methods; and establishes a lane marking system. (5) Assault – completes the breach by destroying the ENY on the far side of the obstacle. 3. Breaching Organization. Units organize into three forces to conduct a breach. (1) Support Force – suppresses ENY direct fires and observed indirect fires on the reduction area; controls indirect fires and indirect fire obscuration within the breach area; and prevents the ENY from repositioning or CATKing to place direct fires on breach force. (2) Breach Force – creates and marks lanes for the breach element; secures the obstacle near side and far side for the security element; and reports lane status and location. (3) Assault Force – assaults through the obstacle and destroys the ENY on the far side. 4. Mass. Mass effects to create ENY weakness at point of breach; prevent ENY from massing effects at point of breach. 5. Synchronization. Conduct detailed reverse planning; communicate clear instructions to subordinate units; provide effective C2; perform combined arms rehearsal (CAR).
0
You can add this document to your study collection(s)
Sign in Available only to authorized usersYou can add this document to your saved list
Sign in Available only to authorized users(For complaints, use another form )