1 / 40

F505

F505. Defensive Operations. Terminal Learning Objective . TLO-MLC-5001 Action: Analyze US Army doctrine.

adina
Download Presentation

F505

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. F505 Defensive Operations

  2. Terminal Learning Objective TLO-MLC-5001 Action: Analyze US Army doctrine. Condition:In a staff group classroom environment, given readings, references, successful completion of the ALA or the on-line OSD-1, and classroom discussions on doctrinal concepts and tactical operations. Standard: Analysis includes- • Analyzing impact of enemy forces; • Analyzing the Army’s operational concept – full spectrum operations; • Analyzing mission command; • Explaining modular force logistical concepts; and, • Examining US Army tactical doctrine. Learning Domain: Cognitive Level of Learning: Analysis

  3. Enabling Learning Objective TLO 701-MLC-5001: Analyze US Army doctrinal concepts ELO 701-MLC-5001.05 Action: Apply US Army tactical doctrine. Condition: In a staff group classroom environment, given readings and references, successful completion of the ALA or the online OSD-1, and classroom discussions on doctrinal concepts and tactical operations using a simulation Standard: Application includes using the principles of— The offense; The defense; Stability operations; Defense Support of Civil Authorities (DSCA) Tactical enabling operations. Learning Domain: Cognitive Level of Learning: Application

  4. FM 1-02, Operational Terms and Graphics (SEP 04) FM 3-0, with Change 1, Operations (FEB 11) FM 3-90, Tactics (JUL 01) FM 3-90.6, The Brigade Combat Team (SEP 10) References

  5. Golan Heights 1973

  6. Offensive Operations • Primary tasks • Movement to contact • Attack • Exploitation • Pursuit • Purposes • Dislocate, isolate, disrupt, and destroy enemy forces • Seize key terrain • Deprive the enemy of resources • Develop intelligence • Deceive and divert the enemy • Create a secure environment for stability operations • Defensive Operations • Primary tasks • Mobile defense • Area defense • Retrograde • Purposes • Deter or defeat enemy offensive operations • Gain time • Achieve economy of force • Retain key terrain • Protect the populace, critical assets, and • infrastructure • Develop intelligence Elements of Full Spectrum Operations • Stability Operations • Primary tasks • Civil security (including security force assistance) • Civil control • Restore essential services • Support to governance • Support to economic and infrastructure development • Purposes • Provide a secure environment • Secure land areas • Meet the critical needs of the populace • Gain support for host nation government • Shape the environment for interagency and host- • nation success • Defense Support of Civil Authorities • Primary tasks • Provide support for domestic disasters • Provide support for domestic chemical, biological, radiological, nuclear, and high-yield explosives incidents • Provide support for domestic civil law enforcement agencies • Provide other designated support • Purposes • Save lives • Restore essential services • Maintain or restore law and order • Protect infrastructure and property • Maintain or restore local government • Shape the environment for interagency success FM 3-0, C1,22 FEB 11, Fig. 3-2

  7. Defensive Operations Primary tasks • Mobile defense • Area defense • Retrograde Purposes • Deter or defeat enemy offensive operations • Gain time • Achieve economy of force • Retain key terrain • Protect the populace, critical assets, and infrastructure • Develop intelligence FM 3-0, C1, 22 FEB 11, pp 3-9 to 3-10

  8. PREPARATION RECONNAISSANCE AND SECURITY DISRUPTION MASSING OVERWHELMING COMBAT POWER FLEXIBILITY Characteristics of Defensive Operations FM 3-0, C1, 22 FEB 11, paragraph 3-47 FM 3-90.6, 15 SEP 10, paragraphs 3-2 to 3-8

  9. Preparation • Defensive preparations include: • Designating a reserve. • Conducting rehearsals to include rehearsing the reserve and counterattacks if OPSEC allows. • Positioning forces in depth. • Reinforcing terrain with obstacles. • Designating, prioritizing, and preparing battle positions and survivability positions. FM 3-90.6, 15 SEP 10, paragraph 3-2

  10. Reconnaissance and Security • Reconnaissance and security operations: • Seek to confuse the enemy about the location of the unit’s main battle positions (BPs), • Prevent enemy observation of preparations and positions, • Keep the enemy from delivering observed fire on the positions, • Force the enemy to deploy prematurely. FM 3-90.6, 15 SEP 10, paragraph 3-3

  11. Disruption • To disrupt the enemy’s attack and break his will to continue offensive operations units combines: • Fires, • Countermobility obstacles including scatterable mines (SCATMINES), and • Local counterattacks at all levels. • Repositioning forces, aggressive local protective measures, and employment of roadblocks, ambushes, checkpoints, and information engagement combine to disrupt the threat of asymmetrical attack. FM 3-90.6, 15 SEP 10, paragraphs 3-4 to 3-5

  12. Massing Overwhelming Combat Power • A unit must mass the effects of its combat power to overwhelm the enemy and regain initiative. To mass the effects of his forces in the area where he seeks a decision, the commander uses economy of force measures in areas that do not involve his decisive operation. This decisive point can be a geographical objective or an enemy force. • In an area defense, defending units use engagement areas to concentrate the effects of overwhelming combat power from mutually supporting positions. • Another way to generate the effects of mass is by committing the reserve. • The commander must be audacious in achieving overwhelming combat power at the decisive point while accepting risk, if necessary, in other areas. FM 3-90.6, 15 SEP 10, paras 3-6 to 3-7

  13. Flexibility • The defender gains flexibility through: • Sound preparation, • Disposition in depth, • Retention of reserves, and • Effective command and control. • Contingency planning permits flexibility. • Flexibility also requires that the commander understand and visualize the battlefield to detect the enemy’s concept of operations early. FM 3-90.6, 15 SEP 10, paragraph 3-8

  14. Common Planning Considerations(1 of 2) • Where is the key and decisive terrain? How can the unit use key and decisive terrain to defeat/destroy the enemy? Answers to these questions help define the decisive point; that is, where the unit can best defeat and/or destroy the enemy. • What conditions must be set to get the enemy to go to the decisive point? This will define shaping operations. • How will friendly forces and their capabilities combine to bring about synergistic effects? This determines how the engagement area is prepared and how the employment of direct and indirect fires and obstacles will be teamed and synchronized over time or by threat actions. FM 3-90.6, 15 SEP 10, paragraph 3-9

  15. Common Planning Considerations(2 of 2) • How will friendly intentions, plans, and actions be protected and/or portrayed to the enemy (e.g. counterreconnaissance fight or deception operations)? • Which defensive scheme of maneuver must friendly forces employ? This is answered by analyzing the mission variables with special considerations to terrain, mission (higher commanders’ intents), and friendly troops. FM 3-90.6, 15 SEP 10, paragraph 3-9

  16. Defensive Planning Considerations(1 of 5) • Understand the commander’s intent • Establish priorities of work • Execute security and reconnaissance operations • Combine natural and manmade obstacles to canalize enemy forces into engagement areas • Position forces in depth • Prepare reserves • Designate counterattack forces • Conduct rehearsals • Preparation continues until offense begins or defenders retrograde

  17. Defensive Planning Considerations(2 of 5) • Security operations: • Deceive the enemy as to friendly locations, strengths, and weaknesses • Inhibit or defeat enemy reconnaissance operations • Provide early warning and disrupt enemy attacks • Force protection: preserve combat power • Information operations inaccurately portray friendly forces and mislead enemy commanders through: • Military deception • Operations security • Electronic warfare

  18. Defensive Planning Considerations(3 of 5) • Disrupt enemy’s tempo and synchronization: • Defeat or misdirect enemy reconnaissance • Break up formations • Isolate units • Interrupt fire support • Interrupt enemy reserves • Spoiling attacks • Counterattacks • Offensive IO targeted against enemy C2

  19. Defensive Planning Considerations(4 of 5) • Area defense: engagement areas to concentrate combat power from mutually supporting battle positions • Mobile defense: striking force to generate combat power at the decisive time • Retrograde: • Fire support and obstacle plans • Reserve in a support by fire role • Commanders accept risk in some areas to mass effects elsewhere • Commanders may surrender some ground to gain time to concentrate forces

  20. Defensive Planning Considerations(5 of 5) • Ability to shift main effort • Preparations in depth (supplementary, subsequent, and alternate positions) • Reserves • Counterattack plans

  21. Strong point: heavily fortified position to anchor the defense or deny key terrain Primary: covers the enemy’s most likely avenue of approach Alternate: covers the enemy’s most likely avenue of approach when the primary becomes untenable or unsuitable Supplementary: covers the best sectors of fire and defensive terrain along an avenue of approach that is not the primary avenue of attack Subsequent: position that a unit expects to move to during the course of battle Battle Positions FM3-90,

  22. Defensive operations are combat operations conducted to defeat an enemy attack, gain time, economize forces, and develop conditions favorable for offensive of stability operations. Alone they normally achieve no decision and must be followed or combined with offensive action. Types of defensive operations (tasks): Area defense - deny enemy access to designated terrain for a specific time, limiting their freedom of maneuver and channeling them into killing areas. Mobile defense – force oriented defensive action that focuses on the destruction of the enemy rather than the retention of terrain. Retrograde - executed to gain time, preserve forces, place the enemy in unfavorable positions, or avoid combat under undesirable conditions. Primary Defensive Tasks FM 3-0, C1, 22 FEB 11, pp 3-8 to 3-9 FM 3-90.6, 15 SEP 10, para 3-101, p 3-20

  23. Area Defense • Traditional defense, fixed • Deny enemy access to designated terrain for a specified time • Mutual supporting positions in depth with interlocking fires • Small, mobile reserves to retain ground • Employ a reserve with priority to the counterattack • Defender has the advantage • Strongpoint may be used but requires considerable time and engineer support FM 3-90, 4 July 2001, Figure 9-2, Area Defense, p 9-6 FM 3-90, 4 July 2001, Figure 9-3, Area Defense, p 9-7

  24. Area Defense X G G PL RED (BHL) PL BLUE XX EA DOG EA CAT X XX II II II II II PL GREEN X X II II II II II X X II TCF Reserve

  25. Mobile Defense • Orients on destruction or defeat of enemyforces • Defenders must have greater mobility than attackers • Fixing force • Striking force: maximumcombat power – decisive operation • Reserve: exploits success of the striking force. FM 3-90, 4 July 2001, Figure 10-2. Mobile Defense, p 10-4 FM 3-06, 26 October 2006, Figure 8-1. Mobile Defense, p 8-4

  26. Mobile Defense II S S PL GREEN (BHL) X X PL WHITE D DTG XX II II XX PL BLUE X D DTG X II II X PL RED Striking Force OBJ STRIKE CRUSH EFF O/O X (O/O) X Reserve X II TCF?

  27. Retrograde • Defensive, organized movements that direct troops away from an enemy. • Used to protect an overwhelmed or weakened force, or to improve an untenable tactical situation. • Resist, exhaust, and damage enemy, while avoiding becoming decisively engaged. • Draw the enemy into an unfavorable situation. • Gain time. • Preserve combat power. • Disengage from the battle for use elsewhere in other missions. • Reposition forces or shorten lines of communications (LOCs). FM 3-90.6, 14 SEP 10, p 3-21

  28. Retrograde Control Measures Withdrawal Delay FM 3-90, fig. 11-9 FM 3-90, fig. 11-2 Retirement FM 3-90, fig. 11-10

  29. Area defense: defeat the enemy attack in engagement areas; destroy the enemy using massed fires, obstacles, and other assets Mobile defense: counterattack by the striking force Commanders designate a main effort; may be shifted repeatedly to defeat an attack Reserves increase flexibility and reduce uncertainty Decisive Operations in the Defense

  30. Countermobility and mobility operations Reconnaissance and security operations Aerial-delivered and long-range precision indirect fires Passage of lines (forward and rearward) Actions of fixing forces that shape to support the decisive operation Movements of units that directly facilitate other shaping operations and the decisive operation Actions by reserve forces before their commitment Shaping Operations in the Defense

  31. Commanders ensure freedom of action and continuity by conducting sustainment, area and local security, LOC maintenance, movement control, and terrain management Security is a primary concern: Organize forces and terrain to protect sustaining operations and retain freedom of action Base clusters for protection and security Commanders designate response forces and tactical combat forces (TCFs) to augment base cluster self-defense Risk assessments Sustaining Operations in the Defense

  32. Offense Offense Offense Defense Defense Defense Stability Stability Stability Transitions Adapted from figure 3-1, FM 3-0, C1

  33. Two reasons for transition: If defense is successful, transition to the offense If defense is unsuccessful, transition to retrograde operations Contingency planning for transition: Establishes the required organization of forces Decreases the time needed to adjust the tempo Transition to Offensive Operations(1 of 2)

  34. The commander will take the following actions: Provide intent for transition Establish a line of departure Maintain contact with the enemy Redeploy a combined arms team Maintain or regain contact with adjacent units in a contiguous AO, or mutual support in a noncontiguous AO Transition the engineer effort to mobility Two basic techniques: Attack with forces not previously committed Attack with defending forces: faster reaction but may lack stamina to sustain Transition to Offensive Operations (2 of 2)

  35. Usually involves a combination of delay, withdrawal, and retirement Must be accompanied by efforts to: Reduce enemy combat power Provide friendly reinforcements Concentrate forces elsewhere for the attack Prepare stronger defenses elsewhere in the AO Lure or force part or all of the enemy force into areas where it can be counterattacked Centralized planning and decentralized execution Commander must be forward and visible Transition to Retrograde Operations

  36. Transition to Retrograde Operations Logistics and Sustainment Considerations Sufficient stocks to support transition “prepositioned.” • Adjust Priorities: (not inclusive) • Supply. • Transportation. • CHS (EVAC). • Push System. • Suspend non-critical Field Services. • Maintenance, recovery, & evacuation. • Destruction criteria. • Location of logistics in movement formations. • Security for logistics units during movement. • Echelonmentfor logistics (how will it be done?) • Protection for high priority assets to prevent their loss or capture. BSB FM 3-90, Tactics, Jul 01, pp 11-26 to 11-28

  37. Consolidation • Consolidation is the process of organizing and strengthening a newly occupied position. • A unit might need to consolidate in order to reorganize, avoid culmination, prepare for an enemy counterattack, or allow time for movement of adjacent units. • Actions during consolidation include: • Maintain contact with the enemy and conduct reconnaissance. • Establish security consistent with the threat. • Eliminate pockets of enemy resistance. • Position forces to enable them to conduct a hasty defense by blocking possible enemy counterattacks. • Clear obstacles or improve lanes to support friendly movement and reorganization activities. • Plan and prepare for future operations. FM 3-90.6, 14 SEP 10, p 3-28

  38. Reorganization • Reorganization refers to all measures taken to maintain the combat effectiveness of the unit or return it to a specified level of combat capability. • Reorganization tasks usually include: • Establish security consistent with the threat. This may include moving forces, adjusting boundaries, changing task organization, and adjacent unit coordination. • Destroy or contain enemy forces that still threaten the unit. • Replace or shift reconnaissance and surveillance assets, if needed. • Reestablish the unit chain of command, key staff positions, and C2 facilities lost during the battle. • Treat and evacuate casualties. • Redistribute ammunition, supplies, and equipment as necessary. • Conduct emergency resupply and refueling operations. • Recover and repair damaged equipment. • Send relevant logistics and battle reports by digital means and voice (if not digitally equipped). • Process enemy prisoners of war (EPW) and detainees as required. • Repair/emplace additional obstacles and improve/construct additional fighting positions. • Repair/restore critical routes within the unit AO to assure mobility of force. • Reposition C2 facilities, communications assets, logistics, and fire support assets for future operations. FM 3-90.6, 14 SEP 10, pp 3-28 to 3-29

  39. Questions?

  40. Develop a Defense Concept Plan • In small groups- develop a defense concept plan using the GAAT scenario • Use the concepts discussed • Apply it to a DABL scenario • Change it up, experiment, play with it, learn what works

More Related