Action Officer-Level Draft for Collaboration Purposes Only Joint Forcible Entry Operations Joint Integrating Concept Version .92A3 Legend: Yellow: Changes from GO/FO review Blue: Senior Concept Developer review 15 September 2004 Action Officer-Level Draft for Collaboration Purposes Only Action Officer-Level Draft for Collaboration Purposes Only Table of Contents 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 EXECUTIVE SUMMARY 3 Section 1 -- Introduction and Scope 6 1.A 1.B Introduction Scope Section 2 – Description of the Military Problem 2.A Operational Environment 2.A.1 Providing Access 2.A.2 Gaining Operational Access 2.A.3 Forcible Entry 2.B Effects-Based Operations 2.C Operational Art Section 3 – Joint Forcible Entry Operations – The Concept 3.A 3.B Synopsis of the Central Idea Preparing for Joint Forcible Entry Operations 3.B.1 Create organizations and processes 3.B.2 Develop joint leaders for joint forcible entry operations 3.B.3 Train under the right conditions as a cohesive joint force 3.B.4 Shape, develop and maintain infrastructure and resources 3.C Principles of joint forcible entry operations 3.C.1 Start with the end in mind 3.C.2 Gain and maintain Access 3.C.3 Shape the operational battlespace 3.C.4 Establish persistent intelligence, surveillance and reconnaissance profile 3.C.5 Overwhelm and overmatch the adversary in order to achieve end state 3.C.6 Mitigate risk 3.C.7 Achieve desired effects 3.C.8 Achieve decisive conclusions 3.C.9 Provide focused sustainment 3.C.10 Protect the force Section 4 – Capabilities 4.A Future Capabilities 4.A.1 Joint command and control Action Officer-Level Draft for Collaboration Purposes Only 6 7 9 9 11 12 13 15 17 20 20 26 26 27 28 28 30 30 31 32 33 33 34 35 36 37 39 40 40 40 Action Officer-Level Draft for Collaboration Purposes Only 44 45 46 47 48 49 50 51 52 53 54 55 4.A.2 Battlespace awareness 4.A.3 Force application 4.A.4 Focused logistics 4.A.5 Protection 4.B Immediate Actions 2 41 42 43 44 44 CONCLUSION 46 Appendix A – Assumptions and Risks 47 Appendix B – Potential Enemy Capabilities – 2015 49 Action Officer-Level Draft for Collaboration Purposes Only 56 EXECUTIVE SUMMARY 57 "…a future force that is defined less by size and more by mobility and swiftness; one 58 that is easier to deploy and sustain; one that relies more heavily on stealth, precision 59 weaponry and information technologies." 3 George W. Bush 60 61 Joint Publication for Forcible Entry Operations (Joint Publication 3-18) defines 62 forcible entry as “seizing and holding of a military lodgment in the face of armed 63 opposition.” This concept envisions joint forcible entry operations in broader terms. The 64 concept includes using future capabilities to establish a single lodgment for follow-on 65 operations; establishing multiple lodgments for larger-scale, extensive campaigns; or 66 forcible entry as a singular operation. The following definition presents the broader 67 aspects of joint forcible entry operations: 68 69 70 71 72 73 Joint Forcible Entry: A joint military operation conducted against armed opposition to gain entry into the territory of an adversary as rapidly as possible in order to enable the conduct of follow-on operations or conduct a singular operation. The operational environment that will confront commanders in 2015 will be 74 challenging. Future adversaries will have learned to apply all of their capabilities and 75 resources to deny U.S. forces the freedom of movement and unencumbered access our 76 forces, for the most part, have enjoyed to date. Our future opponents will take advantage 77 of natural obstacles, will apply force, and will apply diplomatic and cultural pressures on 78 regional governments—all to prevent or significantly diminish U.S. force access. Their 79 intent will be to disrupt, slow or prevent access, thereby setting conditions for their own 80 strategic success. 81 The Regional Combatant Commanders will endeavor in peacetime to provide access 82 within their areas of responsibility. Where access is denied or restricted commanders will 83 need the capability to gain and maintain operational access and conduct forcible entry 84 operations to accomplish assigned tasks. Forcible entry will require well-trained, well- 85 prepared, interdependent joint forces capable of executing on short-notice. These forces 86 will require dynamically tasked, immediately available lift and tailored joint logistics Action Officer-Level Draft for Collaboration Purposes Only 87 support that can operate from strategic or operational distances and can use non- 88 traditional support bases (e.g. Joint Seabase). 89 4 Joint forcible entry operations require appropriate organizations and processes that 90 facilitate forming, deploying and executing on demand. Critically important: Joint 91 forcible entry operations require the development and training of a cadre of joint leaders 92 and organizations. Developing these leaders and employing them during exercises and 93 actual operations will create that cadre. Joint forcible entry operations training under 94 tough, realistic, and stressful conditions will establish and refine organizational processes 95 and procedures required for coherent, joint, distributed tactical actions. 96 97 98 99 100 101 102 103 104 105 106 107 Joint forcible entry operations are guided by the following principles: Start with the end in mind Gain and maintain operational access Shape the operational battlespace Establish persistent intelligence, surveillance and reconnaissance profile Overwhelm and overmatch the adversary in order to achieve end state Mitigate risk Achieve desired effects Achieve decisive conclusions Provide focused sustainment Protect the force 108 109 Joint forcible entry operations capabilities will continue to be required in the future. 110 Therefore, combatant commanders will require a complete menu of joint forcible entry 111 operations capabilities. The size and composition of a future joint forcible entry 112 operations force are dependent upon the mission assigned, how quickly forcible entry is 113 required, operational conditions, constraints, and capabilities of the opposition. 114 115 116 117 This concept is focused on the time horizon just beyond the Future Years’ Defense Plan (FYDP), roughly 2015 and rests upon the following assumptions: Action Officer-Level Draft for Collaboration Purposes Only 118 Assumptions: 119 The global war on terrorism will continue through 2015. 120 The U.S. will require robust joint forcible entry operations capabilities 121 122 through 2015. Potential adversaries will benefit from the ongoing global diffusion and 123 proliferation of anti-access technologies, including long-range, accurate 124 missiles with supporting information architectures, weapons of mass 125 destruction, weapons of mass effects, and inexpensive technologies. 126 A determined adversary with sophisticated anti-access capabilities may 127 initiate preemptive combat operations on the U.S. C-day in an attempt to 128 preempt a U.S. deployment and prevent the introduction of U.S. combat 129 forces into its operational area. 130 Limitations in overseas port, airfield, infrastructure, and overseas logistics 131 hubs will require alternative basing means and alternative means for 132 deployment and sustainment of the force. 133 5 Action Officer-Level Draft for Collaboration Purposes Only 134 6 Section 1 -- INTRODUCTION AND SCOPE 135 136 “We need to change not only the capabilities at our disposal, but also how we think 137 about war. All the high-tech weapons in the world will not transform the US armed 138 forces unless we also transform the way we think, the way we train, the way we 139 exercise and the way we fight.” 140 U.S. Secretary of Defense Donald Rumsfeld, 141 National Defense University, 31 Jan 02 142 143 1.A Introduction. Four strategic conditions will affect joint forcible entry operations 144 in 2015: 145 First, the U.S. will continue to have global interests and remain engaged with a 146 variety of regional players. The U.S. will continue to develop and nurture 147 alliances and security cooperation agreements that may provide access, but in 148 many cases we will still have to fight for the operational access essential for joint 149 forcible entry operations. 150 151 152 Second, potential adversaries will have access to the global commercial industrial base and many of the same technologies as the U.S. military. Third, potential adversaries will adapt as our capabilities evolve. Future 153 adversaries will look for niche capabilities and employ asymmetric methods to 154 offset U.S. strengths. They will seek to intimidate allies and friendly nations from 155 supporting American military operations. Potential adversaries will continue to 156 operate and acquire new modern surveillance systems and advanced cruise 157 missiles, ballistic missiles and air defense systems. They may possess 158 sophisticated mines and weapons of mass destruction to deter, preempt, delay or 159 defeat U.S. power projection operations as noted in the 2001 Quadrennial Defense 160 Review. These sophisticated anti-access capabilities will be used aggressively in 161 the effort to deny the United States access to regions where its interests are 162 threatened. Action Officer-Level Draft for Collaboration Purposes Only 163 7 Fourth, the U.S. cannot always predict where it may have to conduct a forcible 164 entry, the type of opponent U.S forces will face or the coalition with which we 165 will fight. Forcible entry could take place on the littorals, well inland, or in some 166 combination. 167 These strategic conditions mandate that the United States maintain a credible joint 168 forcible entry operations capability to enter when, where, and how it is needed. Joint 169 forcible entry operations capabilities will provide the future combatant commander with 170 the options he needs, when he needs them. Joint forcible entry operations may be used to 171 establish a lodgment to enable follow-on military operations. Simultaneous joint forcible 172 entry operations may be used to establish a set of distributed lodgments to set the 173 conditions to support larger-scale, extensive campaigns. Joint forcible entry operations 174 may also be executed as a single operation. Each of these situations will present future 175 joint commanders with complex and distinct operational challenges. 176 Joint Publication 3-18 defines forcible entry as the “seizing and holding of a military 177 lodgment in the face of armed opposition.” This definition is too restrictive. It does not 178 describe the full set of forcible entry cases. The definition below provides a more 179 descriptive treatment of the complex nature of joint forcible entry operations. 180 181 182 183 184 Joint Forcible Entry: A joint military operation conducted against armed opposition to gain entry into the territory of an adversary as rapidly as possible in order to enable the conduct of follow-on operations or conduct a singular operation. 185 186 1.B Scope. Herein we focus on joint forcible entry operations against a high-end 187 regional competitor possessing significant military capabilities. No set blueprint for joint 188 forcible entry operations exists. Each joint forcible entry operation is unique, driven by 189 discrete variables and specific situations. Each joint forcible entry operation will be 190 conducted against different opponents, in different geo-political environments, with 191 different coalitions, and for different purposes. Regardless, this joint forcible entry 192 concept presents a set of principles that future joint force commanders can apply to the Action Officer-Level Draft for Collaboration Purposes Only 193 specific case he faces. The paper will also identify the joint operational capabilities 194 essential to execute joint forcible entry operations. 195 8 Action Officer-Level Draft for Collaboration Purposes Only 196 9 Section 2 – DESCRIPTION OF THE MILITARY PROBLEM 197 198 “Future adversaries are seeking capabilities to render ineffective much of the 199 current U.S. military’s ability to project military power overseas…New approaches for 200 projecting power are needed to meet these threats…conducting distributed operations; 201 reducing the dependence of U.S. forces on major air and sea ports for insertion; 202 increasing U.S. advantages in stealth, standoff, hypersonic, and network attacks…” 203 will be required. 204 U.S. Deputy Secretary of Defense Paul Wolfowitz, Prepared Statement for the Senate 205 Armed Services Committee Hearing on Military Transformation, 9 April 2002. 206 207 2.A The operational environment. Countering an adversary’s anti-access and area 208 denial efforts presents the Regional Combatant Commander with a difficult military 209 challenge. Future adversaries will take advantage of natural or geographic obstacles, 210 employ both overt and covert actions, and use complex defense capabilities to deny 211 access or defend against direct Joint or multinational force action. The most complex 212 joint forcible entry operations challenge occurs when all are combined. 213 Distance or geographic obstacles may prevent or inhibit access. Political conditions 214 or actions can also limit access. Adversaries will attempt to shape the regional 215 battlespace in terms of alliances in order to threaten or to prevent our access in a region. 216 Most joint forcible entry operations will occur far from our shores. The enemy may 217 position forces to defend key joint forcible entry operations’ objectives both well inland 218 and along the littorals. This combination of issues presents a complex problem to the 219 joint forcible entry operations commander. Future adversaries will use distance in 220 conjunction with advances in their intelligence, surveillance and reconnaissance 221 capabilities to increase their warning and reaction time. They will use knowledge of 222 tactical lift limitations in an attempt to restrict U.S. and coalition maneuver. Adversaries 223 will most likely seek to offset our intelligence, surveillance and reconnaissance as well as 224 our precision munitions by embedding their forces within urban areas. They will seek to 225 conceal themselves and their assets in complex and difficult terrain. Adversaries may 226 operate in mountainous regions, in caves, in the desert or anywhere else where geography Action Officer-Level Draft for Collaboration Purposes Only 10 227 becomes their ally. Future adversaries may blend in with the indigenous population to 228 further complicate access and joint forcible entry operations efforts. They will combine 229 distance, demographics and geography to their advantage. 230 Attempts to impede joint forcible entry operations may involve overt as well as covert 231 and clandestine enemy actions. Overt efforts to oppose joint forcible entry operations 232 may range from diplomatic or cultural pressure on regional governments to the use of 233 theater or tactical missiles, offensive, defensive, and protective maritime mining, 234 terrorism, asymmetric warfare, or the threat or actual use of weapons of mass destruction 235 or mass effect. Adversaries will use the full range of their military capabilities to directly 236 attack or they may employ hit and hide tactics to prevent or slow the entry of our forces. 237 Our adversaries are adaptable. They have learned lessons from past operations and 238 will further evolve as they learn from future operations. Adversaries will not wait for the 239 U.S. to establish lodgments and to conduct a massive buildup before initiating action. 240 Future adversaries may possess robust intelligence, surveillance, and reconnaissance 241 systems that can be used for targeting and for combat assessment. They may combine 242 well-developed cruise and ballistic missile capabilities to attack in-theater bases and 243 staging areas. Future adversaries will likely employ highly integrated air defense systems 244 to protect their offensive capabilities and infrastructure. Additionally, enemy maritime 245 capabilities, including mines and subsurface assets, may be used to deny U.S. and 246 coalition forces access. Expect future adversaries to use all necessary means to degrade, 247 disrupt or deny U.S. use of space-based intelligence, surveillance, and reconnaissance 248 systems. Combinations of these actions will be used to thwart U.S. attempts to achieve 249 military objectives. Potential enemy capabilities in 2015 are addressed further in 250 Appendix B. 251 Covert and clandestine operations include actions the adversary will employ that can 252 be concealed or allow plausible denial.1 These actions may include the use of special 253 operations forces, agents, provocateurs, and surrogates to pressure regional governments 254 or directly attack U.S. or coalition forces or bases in theater, en route or at home. The 255 local populations may even be used to disrupt or deny U.S. and coalition forces freedom 1 Joint Publication 1-02, 12 April 2001. Action Officer-Level Draft for Collaboration Purposes Only 11 256 of action. Such actions may include the use of labor unions, religious gatherings or 257 student rallies in the joint forcible entry operations area of operations. Covert actions 258 may include cyberspace attacks as part of information operations. Covert activities often 259 target the hearts and minds of the local population and attempt to influence U.S. or 260 coalition resolve or world opinion. Through information operations, adversaries may use 261 neutral countries with cultural or religious ties to advance their cause with the local 262 population. Clandestine operations may include the use of spies and deep-planted agents 263 within friendly governments and agencies. These actions may attempt to intimidate or 264 convince the target audience to support our adversary and oppose U.S. forcible entry or 265 the follow-on operations. Whatever the intent, the goal is to elicit local, regional and 266 world support against our interests and actions. 267 Future adversaries may also employ overt, covert, and clandestine actions around 268 bases and ports in the U.S. and during deployment, employment and sustainment 269 operations. These actions, coupled with the problems of distance and geography, present 270 a complex challenge to joint forcible entry operations. 271 Future conflicts will be uncertain at best, and increasingly dangerous. Future 272 commanders have to think of access in terms of three major requirements: initial access 273 provided, operational access that needs to be gained, and operational access that needs to 274 be maintained throughout joint forcible entry operations. 275 2.A.1 Providing access. Long-term access is a result of continuous shaping efforts. 276 Shaping the operational environment involves the Regional Combatant Commanders, 277 Defense Agencies, State Department, potentially the United Nations and other 278 international agencies, alliances and coalition partners. All instruments of government 279 and international action are applied to ensure access. 280 The Regional Combatant Commander conducts cooperative activities with selected 281 allies and friendly nations to support military superiority and coalition effectiveness 282 across the full range of military operations. His actions enhance multi-national 283 interoperability and self-defense capabilities through standardization agreements, 284 armaments cooperation, security assistance, foreign technologies assessment programs, 285 information and personnel exchanges, and multinational training events and exercises. Action Officer-Level Draft for Collaboration Purposes Only 12 286 This set of military shaping efforts attempts to establish habitual relationships between 287 commanders and forces that are critical to providing access as well as gaining operational 288 access or executing the joint forcible entry operations option when required. 289 The U.S. military supports the other instruments of government or international 290 action in attaining long-term strategic aims. Diplomacy is maintained through consistent 291 contact at the Ambassadorial and Envoy level to encourage cooperation and to support 292 regional stability backed by U.S. military capabilities. Diplomacy may support access 293 through contacts between friendly governments that have diplomatic relations with an 294 adversary government. Providing information is a powerful government action. The 295 print and broadcast media afford both the U.S. and foreign governments’ opportunities to 296 inform public opinion. The economic element of government action includes economic 297 aid, grants, loans, trade and other forms of economic action between governments. 298 Economic packages can be promised or withheld as necessary to influence access. 299 Foreign aid signals U.S. resolve and support, targeting the receiving government and 300 population. Foreign trade agreements, including granting or withholding Most Favored 301 Nation status, are powerful government actions. The instruments of government action 302 are most effective when applied in concert with one another collectively. A future 303 concept will describe in detail military actions necessary for providing access. 304 2.A.2 Gaining Operational Access. Despite our best efforts to provide access 305 wherever and whenever it is needed, operational threats and practical realities may still 306 deny the access required for a military operation. A competent adversary will employ 307 anti-access and area denial capabilities to deny forcible entry forces easy access to areas 308 under his control or influence. The anti-access threat begins at our home stations and 309 ports of embarkation and extends globally to the objective area. Area denial capabilities 310 also include information warfare, inclusive of deception and threats to space platforms. 311 In conjunction with these efforts, the adversary may attempt to establish and enforce an 312 operational exclusion zone encompassing areas within his reach. He may target U.S. and 313 coalition forces and their ports of debarkation, lodgments, entry points, staging bases, 314 operating bases, and logistical support systems. Finally, the enemy may seek to coerce or 315 intimidate the U.S. and allies with threats to non-combatants. The adversary orchestrates 316 these multiple and diverse capabilities to create friction and to deny, delay or disrupt Action Officer-Level Draft for Collaboration Purposes Only 317 access. Failing to confront any one of these possible capabilities may adversely impact 318 U.S. and coalition operations. 319 13 To gain operational access in a competent anti-access and area denial environment, 320 the joint force commander employs tailored, interdependent and capabilities-based 321 forces. This force, informed by pervasive knowledge, can be immediately employed 322 using stealth, standoff, speed and precision. Initial actions employed by the commander 323 will shape the battlespace, setting conditions for success. The joint force subjects the 324 enemy to, and overwhelms him by, immediate, effects-based, knowledge-enhanced, 325 precision engagement and rapid maneuver. In this manner the joint force gains access 326 when and where it is needed throughout the geographic and chronological course of the 327 campaign. 328 2.A.3 Forcible entry. With conditions set for the joint force assault, a joint forcible 329 entry operation is tailored to seize and maintain the initiative, maintain operational 330 access, accomplish the mission and achieve end state employing an effects-based 331 approach. The commander’s intent, derived from assigned strategic aims, identifies the 332 required effects. The joint forcible entry operations commander uses accurate and timely 333 information to assess where he is in the operation and if he is still achieving the effects he 334 desires. He adapts, shifting tasks to his subordinates and adjusting priorities as the 335 situation unfolds. Given the operational environment and the mission assigned, forcible 336 entry operations set the conditions for follow-on operations; support a larger-scale, 337 extensive campaign; or are executed as a singular operation. 338 Joint forcible entry operations are not benign actions. We should expect the enemy 339 force to use all of its capabilities to fight the entry forces. The joint forcible entry 340 operations force uses pervasive knowledge to provide as clear a picture as possible of the 341 enemy location and disposition. No enemy “picture” will ever be perfect, but the effect 342 we want to achieve is that we can “observe” every enemy action and even his intent. 343 That picture must be shared and updated in real time among all elements of the joint 344 forcible entry operations force. The commander requires all available knowledge on the 345 area of operations and adversary options, reactions and potential complications. In many 346 cases, pervasive knowledge will lead to predictive analysis and anticipatory action. Our 347 ability to see and understand first enables us to decide and act first. Knowledge will Action Officer-Level Draft for Collaboration Purposes Only 348 never be perfect; uncertainty remains. We must be prepared with less than perfect 349 knowledge, but better real-time relevant knowledge minimizes risk, increases the 350 probability of success and reduces uncertainty. 351 14 The joint forcible entry operations force should also be network-centric. The degree 352 to which force entities are networked will determine the quality of information that is 353 available to various entities and their ability to interact in the information domain. The 354 level of interoperability achieved and the characteristics of command and control 355 processes will determine the extent that information is shared, as well as the nature and 356 quality of the interactions that occur between and among force entities. Taken together, 357 these capabilities and other organizational characteristics will determine the effectiveness 358 of the force, its agility, and the degree to which decisions, plans, action, and entities are 359 synchronized2. Network-centricity provides all involved with joint forcible entry 360 operations immediate information and access to joint maneuver and fires. Additionally, 361 network-centricity enhances the commander’s ability to orchestrate the actions of his 362 joint forcible entry operations force. The different elements within the force can 363 communicate and coordinate their logistical requirements and shift assets to react to 364 planned contingencies or to cover unexpected requirements. The importance of the 365 networked force and the information flow supporting command and control necessitates 366 protecting the network from all threats. 367 Joint forcible entry operations are combat operations supported by the other 368 instruments of national and international action—diplomacy, information and economic. 369 At the strategic level, the scope of providing access includes the full application of all 370 elements of government action. The military is a supporting element. At the operational 371 level, the scope of joint forcible entry operations is such that the military is the supported 372 element of government action. These operations are effects-based in approach and are 373 intended to create the perception by the adversary that they are simultaneous in 374 execution. 375 2 Alberts, David and Hayes, Richard. Power to the Edge Washington, DC: CCRP Publications, June 2003 Action Officer-Level Draft for Collaboration Purposes Only 15 376 2.B Effects-based operations. Effects-based operations are coordinated sets of actions 377 directed at shaping the behavior of friends, foes, and neutrals in peace, crises, and war. 378 Effects-based operations focus “coordinated sets of actions” on objectives defined in 379 terms of human behavior in multiple dimensions and on multiple levels, and measure 380 their success in terms of behavior produced. Effects can occur simultaneously on the 381 tactical, operational, military-strategic, and geo-strategic levels of military operations, in 382 domestic and international political arenas, and in the economic arena as well.3 Effects- 383 based operations encompass the full range of diplomatic, informational, military and 384 economic actions that the U.S. might undertake to shape the behavior of the enemy and 385 attain the assigned strategic aims. 386 Forcible entry forces, tapping the technologies and thinking of network-centric 387 operations, can apply the four key ingredients of successful effects-based operations: 388 options, agility, coordination, and knowledge mobilization. Decision makers tailor 389 actions to produce a useful option to deal with a given situation and employ responsive, 390 networked forces with shared awareness and speed of command. Shared situational 391 awareness and an understanding of command intent facilitate synchronization and 392 coordination of complex actions and effects. Mobilizing knowledge provides timely, 393 relevant support to decision makers at all levels.4 394 Effects-based operations increase the probability of preventing the enemy from 395 interfering with forcible entry forces by focusing on more efficient destruction of the 396 enemy’s decision-making capability and his ability to create coherent actions. Through 397 the execution of overwhelming asymmetrical attacks, the defeat of enemy will be both 398 psychological and physical. To achieve the desired effects, joint force packaging, the 399 blending of packaged joint forces and adapting those forces to specific theater 400 requirements will be required to shape and sustain the entry forces and allow for a more 401 seamless transition to follow-on operations. 402 There are several overall objectives to be achieved in support of joint forcible entry 403 operations: to prevent the enemy from interfering with the forcible entry operation at any 404 point; to overmatch the enemy in all domains when and where the joint commander 3 Smith, Edward A. Effects-based Operations, Applying Network Centric Warfare in Peace, Crisis, and War, Washington, DC: CCRP Publications, November 2002 Action Officer-Level Draft for Collaboration Purposes Only 16 405 directs; to facilitate transition to follow-on operations, if any, as quickly as possible; and 406 to create the sense of simultaneity of actions in the eyes of the enemy. 407 To create these effects, the commander must continuously analyze the operating 408 environment. This analysis will result in a decision as to how to conduct the joint 409 forcible entry operation. Neither simultaneity nor sequentiality of actions is always the 410 “right” approach. It is the balance that must be right and is up to the commander to 411 “dial” the correct blend. 412 Figure 1 that follows illustrates how the commander must set the dial to apply actions and 413 create effects, given the mission he is assigned and the situation he is in. Historical 414 examples can illustrate how the blend between sequential and simultaneous actions 415 results in mission accomplishment. During WWII, OPERATION OVERLORD was 416 conducted at the left end of the meter. OPERATION DESERT STORM, more toward 417 the left center; OPERATION IRAQI FREEDOM, more to the right center. 418 OPERATION JUST CAUSE was executed more towards the far right side of the meter. 419 420 421 Figure 1 How a JFEO Commander achieves effects is situational dependent 422 423 Interagency and multinational action at the operational level of war provides the 424 commander the opportunity to affect the enemy’s warmaking ability to a greater extent 425 than U.S. military action alone. In the application of an effects-based approach to 426 operations, the joint forcible entry commander must be cognizant of effects that occur in 4 Ibid Action Officer-Level Draft for Collaboration Purposes Only 427 three domains: physical, informational and cognitive. How a joint forcible entry 428 operations commander of the future embodies the effects-based operations approach 429 requires operational art. 17 430 431 2.C Operational art. Operational art begins in the mind of the commander and is 432 implemented through his organization. Joint forcible entry operations will, in most cases, 433 be employed in support of or as an element of Major Combat Operations. Therefore, the 434 operational art described in this section is naturally linked to and supports what has been 435 described in the Major Combat Operations concept. While the joint forcible entry 436 commander is cognizant of this linkage, there are specific considerations he must address 437 relative to the unique characteristics of joint forcible entry operations. 438 The joint forcible entry commander must envision the scope of the forcible entry 439 mission within the broader context of the campaign he supports. He must also visualize it 440 in terms of time, space, cyberspace and physical dimensions. The commander must also 441 understand the actual conditions (friendly and enemy, political and military, domestic and 442 international) that dictate the most appropriate action. Finally, the joint forcible entry 443 commander must visualize, describe and direct a clear, coherent plan that expresses the 444 unitary vision of his senior commanders and achieves strategic aims and operational 445 objectives. 446 The joint forcible entry commander determines the best way to conduct joint forcible 447 entry operations anywhere in the world with globally sourced and interdependent forces. 448 He must visualize the physical space in which he will conduct the forcible entry, and then 449 use that space to his advantage to both defeat the adversary’s attempts to deny entry and 450 set conditions for follow-on operations, if any. The joint forcible entry commander 451 continuously adapts as the situation unfolds. 452 The nature and pace of joint forcible entry operations accentuates the requirement for 453 a well-established informational domain. The joint force commander must also be able to 454 communicate information required to maintain international and domestic public support 455 of the operation while simultaneously conducting offensive and deceptive information 456 operations against the adversary. The joint forcible entry commander’s objective in the 457 information domain is to diminish his adversary’s capabilities while retaining and Action Officer-Level Draft for Collaboration Purposes Only 18 458 expanding his own. The commander requires an information system that is flexible, fully 459 networked and secure. Joint forcible entry operations include the ability to employ 460 computer network operations as appropriate when the opportunity warrants. Finally, the 461 joint forcible entry information network provides the commander the means to observe, 462 decide and act faster than the enemy. 463 Actions taken in the physical and information domains create effects in the cognitive 464 domain. The joint forcible entry commander must have a good understanding of what is 465 in the mind of the enemy, as well as the enemy’s capability and will to fight. His 466 Information Operations plan should exploit every capability in order to outwit and 467 outfight the enemy. Integration of Information Operations, and in particular deception 468 operations, is critical throughout the conduct of joint forcible entry operations. When 469 applicable, the commander attempts to impart to the enemy that the joint forcible entry 470 force could strike any place at any time. Execution of the forcible entry not only defeats 471 enemy capabilities but also conveys a sense of futility in the mind of the adversary. The 472 joint forcible entry commander introduces confusion and doubt in the adversary in order 473 to upset the enemy’s ability to command and control his forces. 474 The joint forcible entry operations commander acts through his organizational staff 475 and subordinates. Because of the expeditionary nature of joint forcible entry forces, the 476 organization must be adaptive and capable of collaborative, parallel planning to include 477 planning while enroute to the objective. The challenge to the commander and his staff is 478 to integrate actions at the tactical level while employing forces from across the globe. 479 Fully integrated within the Regional Combatant Command, his organizational structure 480 should encompass agility, robustness, and the capability to self-synchronize. A self- 481 synchronizing force demonstrates clear and consistent understanding of the commander’s 482 intent, high quality information and shared situational awareness, competence at all levels 483 of the force, and mutual trust throughout the organization. 484 The commander, practicing operational art, creates harmony among the previously 485 stated characteristics. That is to say that the plan developed can be executed by the 486 forces and leaders on hand, within the space available, and leveraging all capabilities in 487 place. The force must be imbued with a sense of a mission and have the trust and 488 confidence of the commander to act with initiative, creativity and audacity. If any of Action Officer-Level Draft for Collaboration Purposes Only 489 these components are inadequate, the commander must be adaptive, adjusting either his 490 aims or plans in order to address these deficiencies. 491 19 Action Officer-Level Draft for Collaboration Purposes Only 492 20 Section 3 – JOINT FORCIBLE ENTRY OPERATIONS – THE CONCEPT 493 494 “The idea… is to create a U.S. global military capability where "individuals and 495 units will receive training and experience in joint operations at the strategic, 496 operational and tactical levels…to train as we fight - as a coherently integrated team." 497 U.S. Deputy Secretary of Defense Paul Wolfowitz, 498 Naval War College Graduation, June 20, 2003 499 500 3.A Synopsis of the central idea. Joint forcible entry operations require a tailored 501 combination of forward-based, forward deployed, pre-positioned and CONUS surge 502 forces. These various force postures will enhance the ability to maneuver from 503 operational and strategic distances. Additionally, using an effects-based approach, the 504 joint forcible entry operations force will employ complimentary force multiplying effects 505 that will result from synchronizing Joint, inter-agency, and possibly multinational forces. 506 Joint forcible entry operations take full advantage of forward presence, a mix of basing 507 options, and operational and strategic maneuver in order to gain and maintain access 508 to ensure entry. Joint forcible entry operations employ distributed operations to attack 509 from multiple directions and dimensions throughout the battlespace. The net result 510 will be a coordinated attack to overwhelm the adversary and achieve the desired effects 511 before the adversary has time to react, thus ensuring conditions for follow-on 512 operations or achieving end state for a singular operation. 513 One challenge facing national defense leaders structuring the future force will be to 514 determine the most appropriate and effective mix of forward-based, CONUS-based and 515 forward-presence forces. The advantageous placement of the force will both enhance and 516 be reinforced by our capability to conduct strategic and operational maneuver. For those 517 forces located in forward locations, intra-theater lift assets will support operational 518 maneuver, while CONUS-based and more distant forward-based forces will use inter- 519 theater lift to support strategic maneuver. 520 Regardless of the lift used, the force will require the ability to attack the adversary 521 from multiple directions, using multiple entry points, and multiple dimensions—air, land, 522 sea, space and cyberspace. To be most effective the attack should appear simultaneous to Action Officer-Level Draft for Collaboration Purposes Only 21 523 the adversary, achieve at least tactical surprise, and immediately seize the initiative. With 524 appropriate access gained and maintained, multidirectional, multidimensional and 525 simultaneous entry execution should confound and overwhelm the adversary’s decision- 526 making process and contribute to a successful joint forcible entry operation and the 527 adversary’s defeat. 528 One method for contributing to the aforementioned desired effects is Joint Seabasing. 529 Joint Seabasing represents the ability to rapidly employ networked expeditionary joint 530 forces; contribute to assuring access and entry; project, support and sustain distributed 531 and dispersed offensive and defensive combat power from the sea; and significantly 532 reduce reliance on land bases within the Joint Operating Area. This capability mitigates 533 risks associated with joint forcible entry operations. Joint Seabasing is an emerging 534 concept consisting of a system of systems, ships, forces, offensive and defensive 535 weapons, aircraft, communications and logistics. Joint Seabasing, various fixed facilities, 536 rapid expeditionary basing, and CONUS-bases, provide the potential for forward 537 deterrence and provide national leaders and joint force commanders the set of options 538 required. This set provides the joint forcible entry commander with operational reach for 539 a credible and rapid response for forcible entry operations in an anti-access environment. 540 The set also poses multiple problems an adversary must be prepared to solve 541 simultaneously. Access, or the adversary’s attempt to deny access, is central when planning for 542 543 military operations. The following diagram conceptually frames the tasks that create the 544 framework for successful joint forcible entry operations.5 Figure 2 illustrates that 545 shaping operations are continuously ongoing. Shaping may take form during peacetime 546 operations in the diplomatic, information, economic, or military arenas. One of the 547 important objectives of peacetime shaping is to provide access in the geographic area. 548 Shaping will not only be prevalent during forward presence but during operations to gain 549 and maintain operational access. The extent to which forward presence is required will 550 be situationally dependent. Events might transpire that a significant forward presence 551 will be established to deter aggression or to provide access or the reverse might be true. 5 The tasks, and the capabilities that enable them, will be the focus of rigorous experimentation directed by DepSecDef memorandum dtd 12 Dec 03, Forcible Entry PDM II Study, and JROCM 199-03 dtd 20 Oct 03. Action Officer-Level Draft for Collaboration Purposes Only 22 552 In almost every case, however, if access is denied and the need for forcible entry 553 operations arises, forward presence may be used as a springboard to gain and maintain 554 operational access. Operational access sets conditions for opening entry points and 555 assault by establishing the necessary control of air, sea, space and cyberspace required to 556 deliver forcible entry forces. Continued access will be required to receive follow-on 557 forces or transition to follow-on operations should the need require. Sustainment will be 558 paramount throughout the entire operation. Although an apparent sequential series of 559 actions was just described, ensuring access and executing forcible entry tasks may be 560 simultaneously executed depending on the range, depth and persistent nature of the anti- 561 access capabilities of our adversary. This construct is illustrated by overlapping tasks. 562 563 564 565 566 567 568 569 570 Figure 2 Joint Forcible Entry Operations Tasks in context with access 571 572 The following series of diagrams depict the three types of joint forcible entry 573 operations treated in this concept. Each of the diagrams suggests a number of actions to 574 be accomplished. These actions are guided by the enduring principles described in 575 section 3.C. The actions are non-prescriptive in nature. There is no standardized solution 576 to meet all contingencies. These tasks are not necessarily sequential; they may be 577 executed near simultaneously to gain surprise and momentum, reduce risk, and achieve 578 success. The commander should develop his specific plan of “how to” conduct joint 579 forcible entry operations using the principles applicable to his unique situation. 580 Figure 3 depicts using joint forcible entry operations to establish a single lodgment to 581 support follow-on military action. A single lodgment joint forcible entry operation may 582 begin by establishing forward presence or by repositioning deployed expeditionary Action Officer-Level Draft for Collaboration Purposes Only 583 assets. Either the entire or selected portions of the Joint Task Force for forcible entry 584 may move forward. In some cases, a headquarters element could be formed forward to 585 establish communications links and reachback capabilities. 586 23 The joint forcible entry operations force will prepare, or shape, the operational area. 587 Preparing the operational area may include insertion of special operations forces or other 588 agency assets. The special operations forces or inter-agency assets provide intelligence, 589 surveillance and reconnaissance capabilities and may conduct direct action operations. 590 The enhanced intelligence capabilities provide improved, accurate and timely information 591 that helps defeat anti-access strategies and helps preposition lift and sustainment. The 592 Joint Force Commander will gain and maintain operational access to the battlespace he 593 deems necessary for joint forcible entry operations and supporting operations. Setting 594 conditions for joint forcible entry operations and supporting operations requires close 595 coordination. The entry force may open several entry points. Some will be used to 596 approach objective areas from multiple directions; others may be used for deception. 597 Forcible entry point lodgments allow a smooth transition without operational pause to 598 follow-on force arrival. Follow-on operations may commence and the lodgment 599 expanded to support sustainment of the follow-on operations. Action Officer-Level Draft for Collaboration Purposes Only 24 600 601 602 603 Figure 3 Joint Forcible Entry Operations to Establish a Single Lodgment for Follow-on Operations Figure 4 depicts joint forcible entry operations using multiple entry points to establish 604 multiple, interconnected and distributed lodgments to support a larger-scale extensive 605 campaign. Most of the actions previously discussed for establishing a single lodgment 606 are also applicable for multiple lodgments. Multiple entry points will also be required for 607 this operation to support moving forces to different objectives or deceptions. Receiving 608 follow-on forces for larger-scale, extensive campaigns require close coordination. 609 Establishing and sustaining the joint forcible entry operation and the follow-on forces 610 requires agility, coordination and strategic and operational lift that does not necessarily 611 rely upon fixed air and sea ports. By conducting forcible entry into remote coastal or 612 austere landing areas, we force our adversary to react to the joint forcible entry operation 613 where he does not expect it. This reaction provides the forcible entry force a measure of 614 protection and time to further develop the situation as the enemy reacts. Action Officer-Level Draft for Collaboration Purposes Only 25 615 616 617 Figure 4 Joint Forcible Entry Operations to Establish Multiple Lodgments for Large Scale Follow-on Campaign 618 The multiple lodgment operation is the most complex and challenging scenario for 619 forcible operations. Joint forcible entry operations to establish multiple lodgments may 620 require different joint forcible entry forces operating in close proximity to each other and 621 requiring well-coordinated execution. Establishing multiple lodgments through joint 622 forcible entry operations could require a single joint forcible entry force, or multiple joint 623 forcible entry forces under the overall command and control of single joint forcible entry 624 operations commander. 625 Figure 5 presents a joint forcible entry operation situation where a lodgment is not 626 established for follow-on operations. This type of joint forcible entry operation uses a 627 force that directly attacks the objective or distributed objectives as a singular mission. 628 Examples of singular operations where joint forcible entry operations may be required 629 range from assaults, raids or evacuation operations up to large-scale operations. Action Officer-Level Draft for Collaboration Purposes Only 26 630 631 Figure 5 Joint Forcible Entry Operations as a singular operation 632 633 3.B Preparing for joint forcible entry operations. The U.S. may no longer have a 634 “grace” period while transitioning to war. In this case, there is no “time-out” to catch up 635 and absolutely no reprieve from being strategically and operationally prepared. The U.S. 636 prepares by creating adaptive organizations and processes, emphasizing an expeditionary 637 posture and rapid surge capabilities, and developing and educating its leaders. Joint 638 training should be conducted under realistic conditions using collaborative planning and 639 continuous assessment. Preparing for success requires adaptability, flexibility, creativity, 640 and audacity. 641 642 3.B.1 Create organizations and processes. A near-immediate response to 643 developing crises enhances the probability of success by friendly forces. Little time may 644 be available to stand up a traditional Joint Task Force, identify forces, deploy to the area 645 of concern, and conduct reception, staging, onward movement, and integration as is the Action Officer-Level Draft for Collaboration Purposes Only 27 646 current practice. The dynamic nature of joint forcible entry operations may require the 647 creation of at least one standing Joint Task Force Headquarters with assigned component 648 commands specializing in joint forcible entry operations. Commanders could then assign 649 rotational forces that would be available for immediate response. This headquarters and 650 subordinate forces will refine the concept as well as train and exercise together to master 651 expertise in the joint forcible entry operations mission and be ready to respond 652 immediately. Such a standing force allows rapid, dynamic, and aggressive response 653 diminishing the adversary’s advantage of anticipating our actions. Additionally, the 654 standing Joint Task Force Headquarters will benefit from deliberate planning and 655 repetitive, focused training. 656 657 3.B.2 Develop joint leaders for joint forcible entry operations. By their nature 658 joint forcible entry operations are distributed and decentralized. Although centralization 659 may accommodate some aspects of joint military activity, the reliance on decentralized 660 decision-making and execution expands in importance during joint forcible entry 661 operations. The dynamic nature of a joint forcible entry operation demands leaders who 662 can anticipate and adapt; are agile, flexible, and audacious. For example, in the initial 663 period of a forcible entry operation, organic ground fire support assets are limited. 664 Ground forces will be extremely dependent on the joint force for fire support. Trained 665 leaders will enhance the effectiveness of joint forcible entry operations. 666 Future joint forcible entry operations leaders will require not only mastery in their 667 own specialization in joint forcible entry operations, but also require an in-depth 668 understanding of the capabilities and limitations of joint, inter-agency and coalition 669 partners. These leaders must be able to think on the move, adapting to an ever-changing 670 environment. At all levels, leaders must be skilled as communicators, flexible thinkers, 671 and in empowering others during the ebb and flow of joint forcible entry operations. 672 Working together as a team, well in advance of a crisis requiring joint forcible entry 673 operations, enhances teamwork and mitigates the stress of execution under fire. The 674 future joint forcible entry operations force will practice adaptive command and control 675 and resourceful teamwork under realistic conditions so they are ready when called upon. 676 Action Officer-Level Draft for Collaboration Purposes Only 677 28 3.B.3 Train under the right conditions as a cohesive joint force. Joint forcible 678 entry operations are “tip of the spear” operations. Joint forcible entry forces, more than 679 any other force, will have to transition from peacetime to combat quickly. Joint forcible 680 entry operations training strengthens joint, interagency, and multi-national coordination 681 and prepares the force for the unique and demanding aspects of their operations. 682 Training involving the U.S. military, the interagency community, and multinational 683 partners expands our capabilities to conduct forcible entry. Training under realistic 684 conditions contributes to building trust, confidence, and shared understanding among the 685 joint forcible entry operations partners who will execute joint forcible entry operations. 686 Training should be geared to stimulate synergy, adaptability, and opportunism. These 687 are critical attributes for leaders and forces charged with the joint forcible entry 688 operations mission. Training forces to accept and cope with uncertainty, risk, change, 689 friction, chaos, and the fog of war is likewise critical to joint forcible entry operations. 690 This training will enhance the development of individuals and organizations that 691 intuitively improvise and adapt to joint forcible entry operations requirements. 692 693 3.B.4 Shape, develop and maintain infrastructure and resources. Through global 694 engagement the U.S. will continue to develop long term conditions and capabilities that 695 provide the foundation for access. Coherent involvement of the interagency and 696 multinational communities creates powerful partnerships. Interagency and multinational 697 support is essential to acquiring basing rights, developing airports and seaports of 698 debarkation, and establishing a network of contingency bases tailored to specific mission 699 needs (i.e., aerial strike, air assault, fixed-wing air-landed air assault, etc.). Fielding 700 assured access capabilities, advanced force delivery means, and reducing lift 701 requirements through tailored, capabilities-based modular force packages are enablers 702 that provide joint forcible entry operations forces speedy access to objective areas. 703 The U.S. and coalition partners will employ various means to ensure the use of 704 needed lines of communication and infrastructure. Forward deployment and presence of 705 U.S. forces reassure friends and allies and tend to dissuade potential adversaries. These 706 forward-deployed forces are likely to be the first responders to counter anti-access and 707 area denial strategies. Forward presence capabilities depend on establishing long-term Action Officer-Level Draft for Collaboration Purposes Only 29 708 basing rights within the Regional Combatant Commanders areas of responsibility. These 709 bases may include a combination of fixed, long-term, continuously available facilities 710 and bases that are available on an as-needed basis joint sea basing or joint 711 expeditionary land basing, for example. 712 Providing the kind of access required by joint forcible entry operations forces 713 necessitates rapid maneuver capabilities. Key to providing access is the development of 714 assured access and lift capabilities that enable strategic and operational maneuver. This 715 lift must also provide the joint forcible entry force the capability to go where the enemy is 716 not; go where the joint forcible entry commander wants without relying on the 717 predictable use of air and sea ports.6 Additionally, creating tailorable, modular forces 718 that require little or no reception, staging, onward movement, and integration provides 719 the foundation for conducting joint forcible entry operations when required. These lift 720 and tailorable, modular force packages must operate from the existing fixed bases, sea 721 bases and austere bases. The tailorable, modular force packages assembled to execute 722 joint forcible entry operations must seamlessly and rapidly reinforce, reconstitute and or 723 reconfigure as the mission progresses and the situation changes. 724 The joint forcible entry forces will be expeditionary, more deployable, more 725 maneuverable and survivable. These fast, agile forces will reduce logistics demand by 726 displacing mass with tempo and responsiveness. A joint logistics system that employs 727 speed, accuracy and agility, combines Service capabilities, and creates a small footprint 728 supports distributed operations. Rapid integration of technological advances in 729 alternative fuels, multi-power systems and materials sciences (composites, etc.) will 730 provide the next generation of smaller, lighter, faster and less energy consuming 731 platforms. These new weapon systems should additionally offer increased precision, 732 effectiveness, firepower and reliability further reducing required lift. Better intelligence 733 will help meet logistics requirements, especially for common bulk items such as water 734 and fuel, in the operations area reducing the need to ship from CONUS or from 735 intermediate supply bases. 736 6 Lift capabilities will be developed through experimentation process Action Officer-Level Draft for Collaboration Purposes Only 737 30 3.C Principles for joint forcible entry operations. Figures 3-5 depicted the general 738 shape of forcible entry operations. While described in sequence for clarity’s sake, many 739 of the actions are executed simultaneously. A forcible entry operation begins with the 740 establishment of a forward presence and the conduct of shaping operations—overt, 741 covert, and clandestine. When directed, the joint force gains operational access and 742 opens multiple entry points — some for actual use, others possibly for deception 743 purposes. Access is maintained and entry points are kept open as long as they are needed 744 to conduct and sustain forcible entry operations or introduce follow-on forces and their 745 sustainment. 746 While every joint forcible entry operation will be different, the following principles 747 attempt to capture what will be common to some degree in every joint forcible entry 748 operation. They provide a set of tools that commanders may use to help guide their 749 thoughts. Not every principle is “new.” Most are evolutionary applications of new tools 750 or methods to classic principles of military art. Joint force commanders use these 751 principles when planning, preparing and executing joint forcible entry operations tasks. 752 753 754 755 756 757 758 759 760 761 762 Start with the end in mind Gain and maintain operational access Shape the operational battlespace Establish persistent intelligence, surveillance and reconnaissance profile Overwhelm and overmatch the adversary in order to achieve end state Mitigate risk Achieve desired effects Achieve decisive conclusions Provide focused sustainment Protect the force 763 764 3.C.1 Start with the end in mind 765 766 Determine the final purpose of the forcible entry 767 Derive from that purpose the desired effects in terms of: 768 - Task organization 769 - Courses of action 770 - Distributed marshalling and delivery plans Action Officer-Level Draft for Collaboration Purposes Only 771 The joint forcible entry commander begins by determining the final purpose of the 772 forcible entry, either to support follow-on operations or as a singular operation. From 773 that purpose the commander develops operational objectives that translate into desired 774 effects. He then crafts the course of action. The distributed marshalling and delivery 775 plan supports final preparations to maneuver the forces to the objective area. All 776 supporting actions focus on the final purpose. 777 31 The joint forcible entry commander must ensure he clearly communicates the final 778 purpose of the mission to his subordinate commanders to ensure singular focus. The 779 actions of the entire joint forcible entry force should be intent on achieving that purpose. 780 781 3.C.2 Gain and maintain operational access 782 783 784 Establish necessary control of air, sea, space and cyberspace required to gain operational access 785 Thwart enemy efforts to establish operational exclusion zones 786 Overwhelm the enemy through right-timed employment of rapid maneuver 787 and precision engagement capabilities 788 Collaborate with Joint Inter-Agency Coordination Group 789 Use immediately employable forces to conduct operations that neutralize 790 competent anti-access capabilities when and where freedom of movement and 791 maneuver is needed to set conditions for direct delivery, sustainment and 792 support of distributed forcible entry forces 793 Use stealth, stand-off, speed, precision, and pervasive knowledge to force our 794 way through the anti-access exclusion zone and defeat the adversary’s area 795 denial forces 796 Gaining operational access is a condition upon which the conduct of forcible entry 797 operations depends. It includes continued application of all elements of government 798 power. These activities are coordinated with the Joint Inter-Agency Coordination Group 799 (JIACG) to ensure synchronization with the planning staff of the commander. In most 800 cases, future adversaries will defend centers of gravity, critical vulnerabilities, and their 801 multi-dimensional, multi-directional approaches with competent anti-access capabilities. Action Officer-Level Draft for Collaboration Purposes Only 32 802 Joint forcible entry operations depend upon the ability to move through the battlespace in 803 order to employ distributed operations and attack from multiple directions and 804 dimensions. Even more critical, most of the capabilities upon which entry forces depend 805 also require the ability to move or maneuver through the battlespace to accomplish 806 interdependent tasks. The joint force will knock down anti-access threats and forces 807 setting conditions as directed. The opening of multiple entry points and lodgments can 808 continue to expand access into the battlespace as required. A multidimensional joint 809 interdependency exists between providing, gaining, and maintaining access. 810 811 3.C.3 Shape the operational battlespace 812 813 814 815 Create a networked, integrated force that includes intelligence, strike and sustainment forces with robust command and control 816 Integrate inter-agency and multi-national capabilities during planning and operations 817 Exploit the capabilities provided by Special Operations Forces 818 Employ Information Operations assets to shape the battlespace environment 819 Maximize the use of all intelligence assets 820 Shaping actions are ubiquitous. Shaping occurs throughout joint forcible entry 821 operations ─ from forward presence through transition to follow-on operations. The 822 commander must be cognizant of the shaping efforts that have occurred in attempts to 823 provide access, but in preparing for forcible entry his focus will be on creating a 824 networked, integrated force to execute shaping actions that enable gaining and 825 maintaining access. These shaping actions are designed to set the conditions necessary 826 for successful forcible entry. Shaping actions in this context also pertain to actions 827 required to open entry points and sustain the force. 828 Commanders prepare, or shape the operational battlespace through detailed 829 integration of all assets at their disposal. The commander must draw critical information 830 from multi-national and interagency sources. Human intelligence in conjunction with 831 other intelligence assets, Special Operations Forces and Information Operations provide Action Officer-Level Draft for Collaboration Purposes Only 33 832 capabilities that must be employed early and continuously to fully prepare the operational 833 battlespace and set conditions for operational and sustainment forces. 834 835 3.C.4 Establish persistent intelligence, surveillance and reconnaissance profile 836 837 Focus on the commander’s critical times, places and decisions 838 Use intelligence, surveillance and reconnaissance products to support commander’s decisions from start to finish 839 840 The speed, precision and associated high risk of joint forcible entry operations 841 requires the joint forcible entry commander to have superior intelligence, surveillance 842 and reconnaissance support. The commander applies information from all available 843 sources during critical times and at critical locations to make informed, timely decisions. 844 The establishment of a persistent intelligence, surveillance and reconnaissance profile 845 assists in setting the conditions for success in all phases of forcible entry and follow-on 846 operations. 847 848 3.C.5 Overwhelm and overmatch the adversary in order to achieve end state 849 850 Gain pervasive knowledge that allows the Joint Forcible Entry Operations 851 Commander the ability to see and understand first, enabling him to decide and 852 act quicker than the adversary 853 854 Create multiple dilemmas for the adversary: be audacious, tough, fast and strong 855 Conduct asynchronous or patternless operations 856 Employ tactical deception and surprise 857 Attack from multiple directions and dimensions; move forces swiftly with 858 859 stealth and lethality 860 861 Use multiple entry points and routes; move with rapidity to the objective area if a lodgment is established Maximize the effects of information and deception operations Action Officer-Level Draft for Collaboration Purposes Only 34 862 The joint forcible entry operations force is most effective when utilizing the full 863 capabilities of our strategic and operational lift to support multi-directional approaches. 864 Additionally, effectiveness significantly increases by employing the full spectrum of U.S. 865 military and interagency capabilities, including information and other domains. 866 Attacking the enemy where he least expects it implies knowing where the enemy is 867 located, what his capabilities are, and what his options are. By attacking the enemy 868 where he least expects it, the joint forcible entry operations commander adversely affects 869 the adversary’s ability to observe, orient, decide and act. The picture our operation 870 should paint in the enemy’s mind is an asynchronous one. While our operations must 871 retain unity of purpose and coherency of action, our unity and coherency should not be 872 recognizable from the enemy’s perspective. To him, we should be “patternless,” thus 873 diminishing his ability to react effectively. These adverse effects can be manifested via 874 combinations of surprise, seizing the initiative, psychological and disruptive shock and 875 information operations. 876 Joint forcible entry forces will employ lift to attack and maneuver from operational 877 and strategic distances using multiple entry points and approaches to overwhelm and 878 confound the adversary. Our advantages in vertical lift, stealth and lethality will be 879 maximized to envelop and attack the adversary from multiple directions further adding to 880 his confusion and defensive dilemma. 881 Joint forcible entry operations forces must be bold and audacious in accomplishing 882 their tasks. Future joint forcible entry leaders must develop the strength of character and 883 conviction to guide their actions. These leaders mitigate risk and take action based on a 884 thorough knowledge of the operating environment. Paramount is the support of the 885 higher-level military commanders to accept and defend decisions made in the heat of 886 battle. 887 888 3.C.6 Mitigate risk 889 890 891 Conduct a detailed risk assessment to identify high-risk, high-value assets and single points of failure Action Officer-Level Draft for Collaboration Purposes Only 892 893 894 Use intelligence, surveillance and reconnaissance products to detect, assess, and warn of impending actions of the adversary 895 Conduct counter reconnaissance, surveillance and target acquisition operations 896 Retain operational and tactical flexibility to react to the unexpected 897 Develop and rehearse a detailed, collaborative and effects-based operational 898 899 plan 900 901 35 Take action against enemy anti-access capabilities to ensure success of joint forcible entry operations Risk mitigation is relevant to all operations but is critical for joint forcible entry 902 operations given the nature of these missions and the uncertainty of the military 903 environment. The distances from which the force is delivered, supported and sustained 904 constrain forced entry operations. Planning for these constraints must be taken into 905 account to mitigate the risk. Maintaining persistent intelligence, surveillance and 906 reconnaissance will establish a common picture of the operational area throughout the 907 joint forcible entry operations force. At the same time, the adversary’s reconnaissance, 908 surveillance and target acquisition capabilities should be significantly impaired. A 909 common picture will enhance the force’s capability to see and hit the enemy, as well as 910 enable the force to see and maneuver from impending danger. Furthermore, dynamic 911 tasking for intelligence, surveillance and reconnaissance and protection assets should be 912 established prior to execution. 913 914 3.C.7 Achieve desired effects 915 916 Articulate an effects-based commander’s intent clearly 917 Use current operational net assessment to facilitate effects-based operations 918 Create and exploit favorable asymmetries; Fight with overmatching power in 919 all domains 920 Empower tactical forces to act decisively on the commander’s intent 921 Establish dynamic tasking of strike assets 922 Identify then disrupt, delay, destroy and disorient the enemy exclusion zone Action Officer-Level Draft for Collaboration Purposes Only 923 924 925 926 Use intelligence, surveillance and reconnaissance products to determine whether the desired effects are achieved Create simultaneity of effects as viewed from the enemy’s perspective Joint forcible entry operations require the right force with the right capabilities at the 927 right time. The force must be tailored so that it is lethal, yet properly sized such that it 928 can be delivered and sustained. Properly identified and allocated forces that habitually 929 train and exercise together as a team will directly enhance effectiveness. 930 36 The Regional Combatant Commander communicates the desired effects through his 931 intent. Once the Regional Combatant Commander defines and communicates the 932 parameters of the mission, the joint forcible entry operations commander plans and 933 executes within those parameters. Empowered by commander’s intent and in receipt of a 934 timely common operational picture, subordinate joint forcible entry operations 935 commanders will be able to visualize how well the force is achieving the desired effects 936 or to adapt as necessary to ensure the effects are achieved. 937 938 3.C.8 Achieve decisive conclusions 939 940 Align operational objectives with strategic objectives 941 Articulate goals and fight until the end-state is achieved 942 Use intelligence, surveillance and reconnaissance products to determine when 943 the final purpose is achieved 944 Plan for smooth transition to future operations 945 Seamlessly and rapidly reinforce, reconstitute or reconfigure for follow-on 946 947 948 operations as required Employ rapid battlefield assessment capability The joint forcible entry operations commander focuses on the desired effects as its 949 end-state. These effects dictate the duration required to accomplish the objectives. The 950 joint forcible entry operations commander tenaciously sustains continuous pressure for as 951 long as it takes. Prudent planning bounds the mission and articulates the commander’s 952 objectives. The joint forcible entry force must be adaptable to change and prepared to 953 rapidly reconfigure for any follow-on operation that occurs. Joint forcible entry Action Officer-Level Draft for Collaboration Purposes Only 954 operations conclude when the Commander’s end state is achieved through the 955 accomplishment of specified objectives and the planned withdrawal, redeployment, 956 extraction, or transition to a follow-on mission is completed. 37 957 958 3.C.9 Provide focused sustainment 959 960 961 Establish the smallest logistical footprint but deliver with speed, accuracy and efficiency 962 Eliminate strategic, operational and tactical boundaries 963 Distribute to the point of requirement 964 Integrate a joint deployment, employment and sustainment process which dynamically “senses” requirements and is adaptive and responsive 965 966 967 Ensure freedom of movement for sustainment platforms Joint forcible entry operations forces require the ability to rapidly deploy and be 968 sustained anywhere they execute and for as long as necessary in order to enable campaign 969 execution without the necessity of extensive force buildup or operational pauses. The 970 joint forcible entry operations force should be capable of deploying and employing with 971 the smallest possible logistics “footprint” in or near the operating area. This requires new 972 capabilities to command and direct resources, fully integrate the joint deployment, 973 employment and sustainment planning process, exponentially improve situational 974 awareness and provide dynamic logistics, which includes the use of precision all-weather 975 aerial delivery. The result is sense and respond logistics that are faster, adaptive, more 976 responsive, and that execute movement and sustainment operations through multiple 977 means. Additionally, this requires leveraging future technological advancements that will 978 reduce the requirement for lift and sustainment while increasing employment options and 979 flexibility. 980 Joint forcible entry operations forces will depend less on developed ports and large 981 destination airfields and more on smaller, distributed logistics bases and joint seabasing. 982 The force will exploit pre-positioned assets, afloat or ashore, to include enemy 983 infrastructure, to substantially improve speed and agility. The ultimate goal is to provide Action Officer-Level Draft for Collaboration Purposes Only 984 faster, more focused, better-integrated logistics with on-demand support to the joint 985 forcible entry operations force. 986 38 Action Officer-Level Draft for Collaboration Purposes Only 987 39 3.C.10 Protect the force 988 989 Protect forces from point-of-origin to the battlefield 990 Establish multi-dimensional battlespace dominance 991 Use battlespace awareness capabilities to detect, assess and warn of impending 992 actions of the adversary 993 994 Develop a detailed and collaborative plan to protect personnel, physical assets and information 995 Defeat the adversary’s electronic warfare threat capabilities 996 Rehearse the plan to identify shortfalls; fill the gaps 997 Conduct force protection exercises that prepare forces to defend and recover 998 from adversarial actions 999 With increased emphasis on rapid global force projection, protection of the Joint 1000 Force must be assured from locations of origin to points of employment. Joint forcible 1001 entry operations are missions that demand clear guidance, total support and 1002 empowerment to the lowest levels of on-scene command. Force protection is required 1003 across the entire spectrum of operations: air, land, sea, space, and cyber-space, to include 1004 chemical, biological, radiological, nuclear and high yield explosives (CBRNE). 1005 Protection of joint forcible entry operations forces extends beyond the responsibility 1006 of the tactical commander. In peacetime, combatant commanders establish measures and 1007 procedures that preserve the combat power of their forces. In wartime, combatant 1008 commanders carry out assigned and implied missions in pursuit of strategic aims. Force 1009 protection responsibilities are modified as necessary in order to ensure the security of 1010 assigned forces and protect U.S. interests in their areas of responsibility. 1011 Force protection is significantly improved with the proper mix of intelligence and 1012 information gathering.7 In addition to intelligence gathering, the commander must 1013 designate forces responsible for acting on this intelligence. Finally, the force protection 1014 plan is developed, rehearsed and exercised in a collaborative environment. 1015 7 Joint Doctrine Encyclopedia, 16 Jul 97 Action Officer-Level Draft for Collaboration Purposes Only 1016 40 Section 4 – CAPABILITIES 1017 1018 “We need rapidly deployable, fully integrated joint forces, capable of reaching distant 1019 theaters quickly and working with our air and sea forces to strike adversaries swiftly, 1020 successfully and with devastating effect. We need improved intelligence, long-range 1021 precision strike, and sea-based platforms to help counter the “access-denial” 1022 capabilities of adversaries.” 1023 U.S. Secretary of Defense Donald Rumsfeld 1024 National Defense University, January 31, 2002 1025 1026 4.A Future Capabilities Sections 4.A.1 through 4.A.5 list the essential joint 1027 forcible entry operations capabilities. The capabilities are categorized by functional 1028 concepts of joint command and control, battlespace awareness, force application, focused 1029 logistics, and protection. To execute future joint forcible entry operations, the forcible 1030 entry commander and his force require the ability to: 1031 1032 4.A.1 Joint command and control capabilities 1033 1034 4.A.1.a Conduct dynamic and persistent joint command and control that supports 1035 planning and execution, from pre-execution through en route transit, execution at 1036 the objective area and transition to follow-on operations. 1037 4.A.1.b Plan, rehearse and synchronize missions between the deploying force, the 1038 objective area, joint forces, interagency and multi-national forces en route to an 1039 objective by accessing the global information grid to update the common 1040 operating picture. 1041 4.A.1.c Conduct collaborative decision-making under conditions of ambiguity, 1042 friction and stress. 1043 4.A.1.d Achieve coherency of action at decisive points supported by planning and 1044 decision-making tools and common rules of engagement. 1045 4.A.1.e Fully integrate fires and maneuver at the joint point of action. Action Officer-Level Draft for Collaboration Purposes Only 1046 4.A.1.f Expedite mission changes and fully informed decision-making through 1047 reach back. 1048 4.A.1.g Provide logistics command and control with complete global network 1049 visibility. 41 1050 1051 4.A.2 Battlespace awareness capabilities 1052 1053 4.A.2.a Translate pervasive knowledge and predictive analysis into anticipatory 1054 decisions and precise actions that achieve desired effects. 1055 4.A.2.b Provide persistent intelligence, surveillance and reconnaissance that 1056 integrate all intelligence capabilities, including human intelligence assets, into the 1057 overall intelligence, surveillance and reconnaissance architecture. 1058 4.A.2.c Provide a networked force linked and synchronized in time and purpose 1059 that can capitalize on near-instantaneous information and near simultaneous 1060 dissemination to turn information into action through a common operating 1061 picture. 1062 4.A.2.d Provide the joint forcible entry operations commander with field 1063 assessments that give him immediate information critical for decision making, 1064 entry point selection, force disposition, fire support and protection schemes. 1065 4.A.2.e Train with interagency and multinational partners to develop habitual 1066 associations and personal relationships to expand the network. 1067 4.A.2.f Find, isolate, and neutralize enemy elements that seek refuge in complex, 1068 difficult terrain, such as urban areas. 1069 4.A.2.g Detect and expose enemy covert and clandestine activities designed to 1070 disrupt, delay, and hinder the joint forcible entry operation. 1071 4.A.2.h Provide positive force identification. 1072 Action Officer-Level Draft for Collaboration Purposes Only 1073 42 4.A.3 Force application capabilities 1074 1075 4.A.3.a Fully integrate joint fires and maneuver through kinetic, non-kinetic, 1076 lethal and non-lethal weapons to achieve desired effects, while minimizing 1077 collateral damage. 1078 4.A.3.b Conduct offensive information operations in order to defeat the enemy 1079 without direct force. 1080 4.A.3.c Use air and sea lift to bypass fixed, predictable air and sea ports of 1081 debarkation and deliver forces in places the adversary does not expect. 1082 4.A.3.d Quickly establish or upgrade joint contingency air bases and sea bases 1083 that support tailored mission requirements. 1084 4.A.3.e Execute immediate response with modular, tailorable force packages pre- 1085 positioned in strategic locations. 1086 4.A.3.f Conduct joint forcible entry via vertical envelopment8 and surface 1087 amphibious assault across the global battlespace from strategic, operational and 1088 tactical distances. 1089 4.A.3.g Provide near-continuous force application ranging from localized small- 1090 scale effects, to persistent effects that can dominate defined geographic regions in 1091 order to deny the enemy freedom of action. 1092 4.A.3.h Defeat or bypass enemy access denial strategies to enable the use of 1093 multi-dimensional battlespace. 1094 4.A.3.i Immediately deliver forces in multiple unpredictable locations with 1095 sufficient combat power to achieve decisive effects. 1096 4.A.3.j Rapidly deploy and employ mounted forces that are lethal, mobile and 1097 survivable. 1098 4.A.3.k Produce desired effects using precise fires and maneuver in order to limit 1099 the demand on logistics sustainment. 1100 4.A.3.l Seamlessly and rapidly reinforce, reconstitute or reconfigure joint forcible 1101 entry forces. 1102 8 Vertical envelopment for this joint forcible entry operations concept includes the means to introduce land forces via air. Action Officer-Level Draft for Collaboration Purposes Only 1103 43 4.A.4 Focused logistics capabilities 1104 1105 4.A.4.a Deliver and sustain the joint forcible entry operations force, in all weather 1106 conditions, to objectives independent of existing infrastructure, from remote and 1107 austere bases; from sea-bases; and across strategic and operational distances. 1108 4.A.4.b Rapidly deploy the joint forcible entry force across the global battlespace, 1109 with little or no RSOI constraints, and transition to immediate employment in the 1110 objective area. 1111 4.A.4.c Provide a dynamic planning, tasking and execution process that supports 1112 the force flow and sustainment of the force. 1113 4.A.4.d Seamlessly and rapidly reconstitute or reconfigure joint forcible entry 1114 forces and sustain operations. 1115 4.A.4.e Establish additional contingency airfields or ports, or significantly 1116 increase the existing throughput capacity. 1117 4.A.4.f Reduce supply and re-supply demands through weapon systems with 1118 increased precision, effectiveness, firepower and reliability. 1119 4.A.4.g Recognize and rapidly apply technological advances that reduce the 1120 demand for all classes of supply in order to enhance joint forcible entry 1121 operations: e.g., reduce demand on fossil fuels, miniaturization of ordinance, etc. 1122 4.A.4.h Provide what is needed, where it is needed, and when it is needed, to 1123 distributed forces through enhanced capabilities such as predictive logistics, 1124 reachback, improved throughput systems and precise delivery systems. 1125 4.A.4.i Rapidly treat, stabilize and evacuate casualties. 1126 Action Officer-Level Draft for Collaboration Purposes Only 1127 44 4.A.5 Protection capabilities 1128 1129 4.A.5.a Disrupt, delay, destroy or disorient enemy fires through persistent, precise 1130 and timely counter fires. 1131 4.A.5.b Protect the joint force from all threats to include chemical, biological, 1132 radiological, nuclear and high yield explosives as it deploys, transits, engages, and 1133 redeploys in a multi-dimensional battlespace. 1134 4.A.5.c Provide on-call, immediate-response extraction airlift requiring little or no 1135 airfield infrastructure support. 1136 4.A.5.d Positively identify all entities in the battlespace that includes friend, foe 1137 and noncombatants. 1138 4.A.5.e Disrupt, delay, destroy or disorient the full range of enemy 1139 reconnaissance, surveillance and target acquisition. 1140 4.A.5.f Disrupt, delay, destroy or disorient electromagnetic threats. 1141 4.A.5.g Protect the joint collaborative network from all forms of attack. 1142 1143 4.B Immediate actions. Following are several recommended actions that might be 1144 considered for immediate implementation. These recommendations are derived from 1145 several sources: the various writers and reviewers of the concept, analysis of lessons 1146 learned of ongoing operations, and from the results of Joint experimentation to date. 1147 These are suggestions as to ways we might “jump start” while building the long-term 1148 capabilities described in section 4. 1149 4.B.1 Assess the requirement for a Standing Joint Task Force Headquarters to 1150 refine the concept and develop leader and organizational expertise with assigned 1151 rotational forces. 1152 4.B.2 Identification of joint forcible entry packages that conduct routine joint 1153 training, which will develop habitual operating relationships. 1154 4.B.3 Practice joint forcible entry operations using the forcible entry Standing 1155 Joint Task Force Headquarters in selected Combatant Commanders exercise 1156 programs. Action Officer-Level Draft for Collaboration Purposes Only 45 1157 4.B.4 Institute joint forcible entry operations in professional military education 1158 courses and programs of instruction. 1159 4.B.5 Develop a future concept that discusses shaping the strategic and 1160 operational environment. 1161 4.B.6 Rapidly field the hardware and software systems and doctrine that enhance 1162 the joint force’s ability to integrate fires. 1163 4.B.7 Place properly trained and certified “Joint Terminal Controllers” with 1164 current forcible entry forces capable of controlling and executing fires from all 1165 domains: air, land and sea. 1166 4.B.8 Integrate with appropriate service representatives to identify joint seabasing 1167 issues for experimentation. 1168 4.B.9 Research and develop heavy lift alternatives that enable tactical maneuver 1169 from operational distance. 1170 4.B.10 Research and develop over the horizon (OTH), beyond line of sight 1171 (BLOS) and on the move (OTM) communications. 1172 Action Officer-Level Draft for Collaboration Purposes Only 1173 46 CONCLUSION 1174 1175 “Improvement will require not only technological solutions, but also cultural change— 1176 a willingness to challenge standard practices, and question current organizational 1177 patterns and command practices.” 1178 General Richard B. Myers, Chairman Joint Chiefs of Staff 1179 1180 The complex nature and challenges of the future operational environment will require 1181 commanders to employ creative ways to conduct military operations. They will no 1182 longer have the time to move large force packages and their mountains of sustainment 1183 slowly into a region to build up to an overwhelming force. Future adversaries will use all 1184 of their available capabilities to prevent, disrupt or delay access to an area or areas. The 1185 enemy’s preference will be to defeat us before we have time to act or react. The 1186 adversary will use all means available to deny us freedom of action and maneuver. 1187 Future commanders will rely more and more on the ability to conduct joint forcible 1188 entry operations rapidly and forcefully from multiple directions and multiple dimensions 1189 to overcome access denial strategies. The dimensions include air, land, sea, space and 1190 cyberspace. A joint forcible entry operation will achieve one of three purposes: establish 1191 a lodgment for follow-on operations; establish multiple, networked lodgments to support 1192 larger-scale, extensive campaigns; or conduct a singular operations. Future commanders 1193 need the capabilities inherent to complete joint forcible entry operations. 1194 Joint forcible entry operations begin with a coherent plan with clear and achievable 1195 aims and objectives. There are common characteristics and processes relevant to all joint 1196 forcible entry operation, but each will be unique and distinct requiring its own mission 1197 analysis, plan and preparation. Forcible entry requires tactically proficient, cohesive, 1198 properly equipped and right sized forces. Joint forcible entry operations will require 1199 dynamic execution, blurring the lines between deployment, employment and sustainment. 1200 The joint forcible entry operations force requires the dexterity to deploy from a cold start 1201 and execute immediately on arrival. The dynamic nature and fast pace of joint forcible 1202 entry operations make it imperative that there be harmony throughout the force and 1203 throughout all phases of the operation. 1204 Action Officer-Level Draft for Collaboration Purposes Only 1205 47 APPENDIX A – Assumptions and Risks 1206 1207 This concept is focused on the time horizon just beyond the Future Years’ Defense Plan 1208 (FYDP), roughly 2015 and rests upon the following assumptions: 1209 1210 Assumptions: 1211 The global war on terrorism will continue through 2015. 1212 The U.S. will require robust joint forcible entry operations capabilities 1213 through 2015. 1214 Potential adversaries will benefit from the ongoing global diffusion and 1215 proliferation of anti-access technologies, including long-range, accurate 1216 missiles with supporting information architectures, weapons of mass 1217 destruction, weapons of mass effects, and inexpensive technologies. 1218 A determined adversary with sophisticated anti-access capabilities may 1219 initiate preemptive combat operations on the U.S. C-day in an attempt to 1220 preempt a U.S. deployment and prevent the introduction of U.S. combat 1221 forces into its operational area. 1222 Limitations in overseas port, airfield, infrastructure, and overseas logistics 1223 hubs will require alternative basing means and alternative means for 1224 deployment and sustainment of the force. 1225 1226 Risks: 1227 1228 envisioned for 2015 will not be feasible. 1229 1230 The vulnerability of afloat prepositioning stocks of 2015 could jeopardize seabased joint forcible entry operations. 1231 1232 Without a range of adequate basing options, joint forcible entry operations Army air assault capabilities will be ineffective if their forward staging bases are more than 150 miles from their objective areas. Without an adequate and sufficient on-call airlift capability executing, 1233 sustaining and extracting forcible entry forces from operational and strategic 1234 distances may not be feasible. Action Officer-Level Draft for Collaboration Purposes Only 1235 1236 1237 48 Without an adequate number of joint contingency air bases, required tailored air operations to support joint forcible operations may not be available. Without an adequate Theater Air and Missile Defense capability on C-day an 1238 adversary with sophisticated anti-access capabilities may be able to effectively 1239 defeat a U.S. strategic deployment to conduct joint forcible entry operations. 1240 1241 1242 Without rapid inter-theater lift the reinforcement and sustainment of a lodgment may not be timely. Without the critical enabling capability of Regional Combatant Commanders 1243 to exercise Joint Theater Logistics Management the intratheater deployment 1244 and sustainment of joint forcible entry operations forces will be significantly 1245 less efficient and effective, especially after first 30 days when naval forces 1246 normally become dependent on a joint logistics pipeline. 1247 Without an adequate number of combat logistics and sealift ships, sustainment 1248 of large-scale joint sea-based joint forcible entry operations may not be 1249 feasible. 1250 Without adequate counter measures an adversary with an effective and 1251 survivable low-altitude air defense system can deny U.S. assault forces a 1252 vertical assault option and disrupt the air sustainment of a lodgment. 1253 Without ability to rapidly project a maritime shield against asymmetric anti- 1254 access threats (mines, small boats, etc.), joint forcible entry forces may not be 1255 able to successfully gain entry to enemy territory. 1256 1257 1258 Without a link to the Joint National Training Center, required training can not be accomplished. Action Officer-Level Draft for Collaboration Purposes Only 49 1259 1260 APPENDIX B – Potential Enemy Capabilities – 2015 1261 1262 1263 1264 1265 1266 Recognizing victory over the United States through force-on-force combat is unrealistic, adversaries are designing capabilities and doctrine to deny or limit U.S. forces ability to gain access to a region. Most potential adversaries conclude that by developing the ability to limit and/or interrupt access, it will be possible to reduce U.S. military capability to a manageable and, in certain cases, vulnerable level ― if only for a limited time. 1267 1268 1269 1270 1271 1272 1273 Adversaries are devising new and different ways to engage the United States. They will adapt to counter or degrade the United States’ overwhelming strengths — airpower, technology, precision, strategic reach, and sea control employing various methods organized around the seven operational designs described below. Threats will employ many distinct, though inextricably linked dimensions at all stages of conflict to deny or control U.S. access to the region. In turn, the U.S. must adapt and improve forcible entry capabilities to overcome these known or anticipated anti-access efforts. 1274 Threat Operational Designs 1275 1276 1277 1278 1279 1280 1281 1282 1283 Strategic Attack. Defensive operations at the operational and tactical levels will often be combined with strategic attack. Strategic attack is any enemy action designed to have direct effect on American national will, leadership, and strategy. Future adversaries will continuously employ strategic actions, such as information operations, terrorism, crime, attacks on coalition and supporting nations, and economic sabotage, to wear down America’s will to fight. Strategic attack will seek to exploit seams in alliances and coalitions, focusing on the most vulnerable partners. Strategic attack will be conducted in the U.S. homeland, on the battlefield, and anywhere in between, but in all cases will be fully integrated with tactical and operational design. 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 Operational Exclusion. Potential adversaries are developing operational methods to counter US involvement, attempting to limit the extent of U.S. involvement, or cause early termination by collapsing international and national support. Based on their perceptions of historical patterns of deployment and employment, future opponents will apply operational exclusion to prevent U.S. forces from obtaining and using operating bases in the region, and in doing so, delay or preclude American military operations. Increased threats to forward bases raise the risks to forces, hindering operational phasing and diminishing host nation support for protection of the U.S. lines of communication. Elements other than conventional belligerents—for example, terrorist groups or criminal elements—are also likely to conduct operational exclusion, either for their own purposes or to support operational exclusion of others. In the latter case, such operations would signal sympathy or accomplish complementary goals. 1296 1297 1298 1299 1300 1301 Access Limitation. Along with constant operational exclusion actions, an adversary will attempt to limit or disrupt access to the area of conflict, CONUS and/or OCONUS. The threat will conduct attacks continuously on our forces using all available means to strike key or critical force components, such as air and sea ports of embarkation/debarkation, staging bases, and lift. Success in this endeavor to extend the battlefield will greatly improve an enemy’s ability to disrupt, delay or defeat U.S. forces. Action Officer-Level Draft for Collaboration Purposes Only 50 1302 1303 1304 1305 1306 1307 1308 1309 1310 Shielding. Along with controlling or limiting the introduction of large, highly capable U.S. forces, adversaries will also attempt to manage the conflict environment. Shielding tactics involve systems, terrain and methods designed to offset the effects of precision long-range air and missile attacks, giving the opponent a degree of operational freedom and a way to preserve his military capabilities. Opponents recognize that defeating the United States is not a matter of winning battles, but rather of not losing the military power necessary to preserve the regime, while pursuing strategic and operational victory. The longer an enemy delays an effective U.S. response, the greater the chances for success. 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 Systemology. Force-on-force combat exposes the enemy to U.S. strengths. To avoid this form of combat, the enemy will focus on denying U.S. forces the ability to conduct networked “system-of-systems” operations. Potential opponents will understand that American forces derive their overwhelming force effectiveness from the synergy of their systems functioning together. Opponents will attempt to take advantage of such “systemology,” employing multi-dimensional, simultaneous, and sequential actions across a wide spectrum of operations to destroy or damage discrete U.S. capabilities in order to cause the greatest degradation of the overall force. An opponent will accomplish this by finding and attacking those critical links, nodes, seams, and vulnerabilities in U.S. systems that offer the best opportunity to “level the playing field.” 1321 1322 1323 1324 1325 1326 1327 Strike. Future opponents will use maneuver adaptively. Although the threat strategy against the United States is primarily defensive in nature, it will allow for offensive maneuver during periods of opportunity including adverse weather. Enemy maneuver will focus on massing effects rather than forces. This adaptation will allow opponents to gain the benefits of maneuver and mass without exposing themselves to the United States’ overwhelming advantage in standoff precision. However, opponents will employ maneuver in this manner only when tactical decision is likely. 1328 1329 1330 1331 1332 Recon and Surveillance Fires. Reconnaissance fires, the principal strike component of systems warfare, link intelligence, surveillance, and reconnaissance to long and shortrange precision fires from dispersed locations. As critical nodes, links, and vulnerabilities are discovered through reconnaissance, the threat employs fires to engage these decisive points, creating significant effects while avoiding force-on-force combat. 1333 1334 1335 1336 1337 1338 Threat Strategies. Having anticipated the possibility of U.S. intervention in regional conflicts, opponents’ forces, tactics, and strategy will be designed around the ability to exploit U.S. vulnerabilities and patterns while countering or mitigating strengths. Adversaries will integrate less conventional capabilities such as paramilitary forces, “hugging” civilian populations, terrorism, and weapons of mass effects while dispersing and shielding conventional forces. 1339 1340 1341 1342 1343 1344 Understanding the ready availability of technology and the limitations of their resources, potential opponents will develop investment strategies that provide them the means to achieve their regional and extra regional goals, while accounting for the need to counter the United States’ overwhelming conventional military capabilities. Generally they will invest in off-the-shelf technologies first, seeking a few high-tech niche systems such as information and communications technology, intelligence collection systems, counter- Action Officer-Level Draft for Collaboration Purposes Only 51 1345 1346 mobility technology, modern air defenses, and precision munitions, all of which enhance their anti access capabilities. 1347 1348 1349 1350 1351 1352 1353 1354 1355 It is clear from analysis and published thought on warfare design that future threats will develop asymmetric strategies that allow them to oppose the United States in the future. Opponents will seek to gain advantage by moving quickly and acting early, expecting to preempt or reduce the effectiveness of U.S. diplomacy, economic pressure, and information operations. By limiting the United States’ ability to influence the situation, opponents expect to degrade the synergy of any military operations that follow. Possessing the ability to rapidly project power whether with airborne, air assault or other forces, the U.S. demonstrates its willingness to conduct forcible entry operations to overcome these threat strategies.9 9 References: TRADOC Pam 525-2-60, The Operational Environment and the Threat.