FM 3-90 Tactics
FM 3-90 Tactics
FM 3-90 Tactics
TACTICS
Contents
Page
FIGURES.................................................................................................................... vi
TABLES .................................................................................................................... xii
PREFACE..................................................................................................................xiii
PART ONE TACTICAL FUNDAMENTALS
Chapter 1 THE ART OF TACTICS ...........................................................................................1-1
The Tactical Level of War.........................................................................................1-2
The Science and Art of Tactics ................................................................................1-3
Historical Example....................................................................................................1-6
Hasty Versus Deliberate Operations ........................................................................1-9
Solving Tactical Problems ......................................................................................1-13
ii
Contents
iii
FM 3-90
iv
Contents
v
Figures
Figure Page
1-1. Initial Situation ............................................................................................. 1-7
1-2. British Moves............................................................................................... 1-8
1-3. Final Battle Stage ........................................................................................ 1-8
1-4. Risk Reduction Factors ............................................................................. 1-13
2-1. Doctrinal Hierarchy of Operations ............................................................... 2-2
2-2. Flanks of a Stationary Unit .......................................................................... 2-7
2-3. Flanks of an Armor-Heavy Team Moving in an Echelon Right Formation .. 2-7
2-4. Generic Air Corridor .................................................................................. 2-12
2-5 Corps with Contiguous Areas of Operations ............................................. 2-16
2-6. Corps with Noncontiguous Areas of Operations ....................................... 2-17
2-7. Assembly Areas ........................................................................................ 2-19
2-8. Checkpoint 13 ........................................................................................... 2-19
2-9. Contact Point 8.......................................................................................... 2-20
2-10. Engagement Areas ................................................................................... 2-21
2-11. Sectors of Fire........................................................................................... 2-22
2-12. Target Reference Point ............................................................................. 2-23
2-13. Trigger Lines ............................................................................................. 2-23
2-14. Deep, Close, and Rear Areas ................................................................... 2-25
2-15. Coordinated Fire Line................................................................................ 2-27
2-16. Fire Support Coordination Line ................................................................. 2-27
2-17. Free-Fire Area........................................................................................... 2-28
2-18. A Formal Airspace Coordination Measure ................................................ 2-29
2-19. No-Fire Area.............................................................................................. 2-30
2-20. Restrictive Fire Area.................................................................................. 2-30
2-21. Restrictive Fire Line .................................................................................. 2-31
2-22. Targets ...................................................................................................... 2-31
2-23. Forward Line of Own Troops..................................................................... 2-32
2-24. Line of Contact .......................................................................................... 2-32
2-25. Named Area of Interest ............................................................................. 2-33
2-26. Obstacle Control Measure Graphics ......................................................... 2-34
2-27. Phase Lines Used with Other Control Measures ...................................... 2-37
2-28. Position Area for Artillery........................................................................... 2-38
2-29. Routes ....................................................................................................... 2-38
vi
Figures
vii
FM 3-90
viii
Figures
ix
FM 3-90
x
Figures
xi
FM 3-90
Tables
Table Page
5-1. Advantages and Disadvantages of Limited-Visibility Attacks...................... 5-8
11-1. Advantages and Disadvantages of Delay Techniques............................ 11-10
12-1. Typical Size of Security Forces for a Given Mission and Echelon ............ 12-6
12-2. Screen Movement Methods .................................................................... 12-17
13-1. Typical ISR Assets Available..................................................................... 13-6
13-2. Dedicated Reconnaissance Units and Forms of Reconnaissance
Operations................................................................................................. 13-8
xii
Preface
Doctrine provides a military organization with a common philosophy, a language,
a purpose, and unity of effort. Tactics is the art and science of employing all
available means to win battles and engagements. Specifically, it comprises the
actions taken by a commander to arrange units and activities in relation to each
other and the enemy.
PURPOSE
FM 3-90 introduces the basic concepts and control measures associated with the
art of tactics. It cannot be read in isolation. To understand FM 3-90, the reader
must understand the operational art, principles of war, and links between the
operational and tactical levels of war described in FM 3-0, Operations. He should
understand how the activities described in FM 3-07, Stability Operations and
Support Operations, carry over and affect offensive and defensive operations and
vice versa. He should understand the operations (plan, prepare, execute, and
assess) process described in FM 6-0, Command and Control, and how that
process relates to the military decision making process and troop-leading
procedures described in FM 5-0, Army Planning and Orders Production. FM 3-90
also refers to joint publications (JPs). Reviewing referenced JPs will also aid in
understanding FM 3-90.
FM 3-90 focuses on the tactics used to employ available means to win in combat.
Those tactics require judgment in application. The ability to seize and secure
terrain, with its populations and productive capacity, distinguishes land forces
conducting decisive offensive and defensive operations. FM 3-90 provides a com-
mon discussion of how commanders from the battalion task force level through
the corps echelon conduct tactical offensive and defensive operations and their
supporting tactical enabling operations. It is not prescriptive, but authoritative.
Tactical fundamentals do not change with the fielding of each new piece of
equipment. However, the integration of new equipment and organizations
usually requires changes in related techniques and procedures. FM 3-90 provides
guidance in the form of combat-tested concepts and ideas modified to exploit
emerging Army and joint capabilities.
SCOPE
FM 3-90 focuses on the organization of forces, minimum essential control
measures, and general planning, preparation, and execution considerations for
each type and form of combat operation. It is the common reference for all
students of the tactical art, both in the field and the Army school system. A fam-
ily of subordinate manuals address the techniques and procedures used by
tactical combat forces at each echelon. Assessment concepts described in FM 6-0
and FM 6-22, Army Leadership, also apply. All operations process considerations
are modified as necessary to account for the specific factors of METT-TC existing
during each operation.
xiii
Tactical enabling operations and special environments discussed in other man-
uals are not repeated in FM 3-90. That is why FM 3-90 does not discuss why
information operations (FM 3-13), river-crossing operations (FM 3-97.13), and
combined arms breaching operations (FM 3-34.2).
ADMINISTRATIVE INFORMATION
Readers of FM 3-90 should be aware that the rules regarding the use of land
mines are evolving. A commander should seek legal guidance concerning
currently applicable rules and policies regarding land mines before directing
their employment. The rules of engagement he provides to his subordinates
should reflect those guidelines.
The historical examples used in FM 3-90 were deliberately chosen to illustrate
the fact that American tacticians should widen their areas of study of the
military profession to include other armies and other times.
In FM 3-90, the term heavy applies to armored, aviation, cavalry, mechanized
infantry and their associated combined arms elements. The term light applies to
airborne, air assault, and light infantry and their associated combined arms
elements. The term special operations forces applies to rangers, special forces,
special operations aviation, civil affairs, and psychological operations elements.
The initial brigade combat teams (IBCTs) are the prototypes of a medium force
and are included in the discussion of heavy and light forces as appropriate.
In FM 3-90, the term battalion applies to a battalion, battalion task force, or a
cavalry squadron unless differences in capabilities requires that a specific
organization be named. The term company refers to a company, company team,
battery, or troop size organization.
FM 3-90 uses planning process to indicate both the military decision making
process and troop leading procedures. Battalion-sized and larger units use the
military decision making process. Company-sized and smaller units follow troop
leading procedures.
Unless otherwise stated, whenever FM 3-90 uses the singular form of decisive
operation or shaping operation; both the singular and plural forms are included.
The glossary lists most terms used in FM 3-90 that have joint or Army
definitions. Terms for which FM 3-90 is the proponent manual (the authority) are
indicated with an asterisk. Definitions for which FM 3-90 is the proponent
manual are printed in boldface in the text. For other definitions the term is
italicized and the number of the proponent manual follows the definition.
Cross-references use the new field manual numbering system. The bibliography
lists field manuals by new number followed by old number.
Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to
men.
Headquarters, US Army Training and Doctrine Command is the proponent for
this publication. Send comments and recommended changes and the rational for
those changes to: Commander, US Army Combined Arms Center and Fort
Leavenworth, ATTN: ATZL-SWW, 1 Reynolds Road, Fort Leavenworth, KS
66027-1352.
xiv
PART ONE
Tactical Fundamentals
Chapter 1
1-1
FM 3-90
1-2
The Art of Tactics
THE SCIENCE
1-10. The science of tactics encompasses the understanding of those
military aspects of tactics—capabilities, techniques, and proced-
ures—that can be measured and codified. The science of tactics includes
the physical capabilities of friendly and enemy organizations and systems,
such as determining how long it takes a division to move a certain distance. It
also includes techniques and procedures used to accomplish specific tasks,
such as the tactical terms and control graphics that comprise the language of
tactics. While not easy, the science of tactics is fairly straightforward. Much of
what is contained in this manual is the science of tactics—techniques and
procedures for employing the various elements of the combined arms team to
achieve greater effects.
1-11. Mastery of the science of tactics is necessary for the tactician to under-
stand the physical and procedural constraints under which he must work.
These constraints include the effects of terrain, time, space, and weather on
friendly and enemy forces. However—because combat is an intensely human
activity—the solution to tactical problems cannot be reduced to a formula.
This realization necessitates the study of the art of tactics.
1-3
FM 3-90
THE ART
1-12. The art of tactics consists of three interrelated aspects: the
creative and flexible array of means to accomplish assigned mis-
sions, decision making under conditions of uncertainty when faced
with an intelligent enemy, and understanding the human dimen-
sion—the effects of combat on soldiers. An art, as opposed to a science,
requires exercising intuitive faculties that cannot be learned solely by study.
The tactician must temper his study and evolve his skill through a variety of
relevant, practical experiences. The more experience the tactician gains from
practice under a variety of circumstances, the greater his mastery of the art
of tactics.
1-13. The tactician invokes the art of tactics to solve tactical problems within
his commander’s intent by choosing from interrelated options, including—
· Types and forms of operations, forms of maneuver, and tactical mission
tasks.
· Task organization of available forces, to include allocating scarce re-
sources.
· Arrangement and choice of control measures.
· Tempo of the operation.
· Risks the commander is willing to take.
1-14. These options represent a starting point for the tactician to create a
unique solution to a specific tactical problem. Each decision represents a
choice among a range of options; each balances competing demands requiring
judgment at every turn. While there may be checklists for techniques and
procedures, there are no checklists for solving tactical problems. The com-
mander must not look for a checklist approach to tactics; instead, he must use
his experience and creativity to outthink his enemy.
1-15. There are three aspects to the art of tactics that define a competent tac-
tician. The first is the creative and flexible application of the tools available to
the commander, such as doctrine, tactics, techniques, procedures, training,
organizations, materiel, and soldiers in an attempt to render the enemy’s sit-
uational tactics ineffective. The tactician must understand how to train and
employ his forces in full spectrum operations. The factors of mission, enemy,
terrain and weather, troops, time available, and civil considerations
(METT-TC) are variables whose infinite mutations always combine to form a
new tactical pattern. (FM 6-0 discusses the factors of METT-TC in detail.)
They never produce exactly the same situation; thus there can be no check-
lists that adequately address each unique situation. Because the enemy
changes and adapts to friendly moves during the planning, preparation, and
execution of an operation, there is no guarantee that a technique which
worked in one situation will work again. Each tactical problem is unique and
must be solved on its own merits.
1-16. The second aspect of the art of tactics is decision making under condi-
tions of uncertainty in a time-constrained environment and demonstrated by
the clash of opposing wills—a violent struggle between two hostile, thinking,
and independent opposing commanders with irreconcilable goals. Each com-
mander wants to impose his will on his opponent, defeat his opponent’s plans,
1-4
The Art of Tactics
and destroy his opponent’s forces. Combat consists of the interplay between
these two opposing commanders, with each commander seeking to accomplish
his mission while preventing the other from doing the same. Every command-
er needs a high degree of creativity and clarity of thought to outwit a willing
and able opponent. He must quickly apply his judgment to a less than omni-
scient common operational picture provided by his command and control (C2)
system to understand the implications and opportunities afforded him by the
situation. The commander always uses the most current intelligence in order
to facilitate his visualization of the enemy and environment. That same C2
system transmits the decisions resulting from his situational understanding
to those individuals and units required to engage and destroy the enemy
force.
1-17. The third and final aspect of the art of tactics is understanding the
human dimension—what differentiates actual combat from the problems en-
countered during training and in a classroom. Combat is one of the most com-
plex human activities, characterized by violent death, friction, uncertainty,
and chance. Success depends at least as much on this human aspect as it does
on any numerical and technological superiority.
1-5
FM 3-90
1-18. The tactician cannot ignore the human aspect. He seeks to recognize
and exploit indicators of fear and weakness in his enemy, and to defeat the
enemy’s will, since soldiers remain key to generating combat power. More
than any other human activity, continuous combat operations against an in-
telligent enemy takes a toll on soldiers, severely straining their physical and
mental stamina. This creates in soldiers the tangible and intangible effects of
courage, fear, combat experience, exhaustion, isolation, confidence, thirst,
and anger. If left unchecked these effects can result in decreased vigilance,
slowed perception, inability to concentrate, communication difficulties, and
an inability to accomplish manual tasks.
1-19. Leaders must be alert to indicators of fatigue, fear, lapses in discipline
standards, and reduced morale in friendly and enemy soldiers. They must
work to counteract the effects on the friendly force while taking measures to
enhance these effects on the enemy. When the friendly force has the initia-
tive, it can force the enemy to conduct continuous operations to react to
friendly actions and then exploit the effects of continuous operations on the
enemy. These conditions can have a cumulative effect on units that can lead
to collapse. The tactician must understand how they affect human endurance
and factor them into his plans. He must understand the limits of human en-
durance in combat. This is the subtle difference between pushing soldiers be-
yond their limits to exploit success versus resting them to prevent the col-
lapse of unit cohesion. (FM 6-22.5 discusses the effects of continuous combat
operations.)
HISTORICAL EXAMPLE
1-20. The following vignette discusses the Battle of Cowpens fought during
the American Revolution. It illustrates the need for the tactician to combine
the effects of the science of tactics with his application of the tactical art.
1-6
The Art of Tactics
infantry, and no artillery. However, his militia force’s rifles had a longer range than
the British muskets, and the terrain allowed him to mask his reserves from view.
Morgan deployed his forces on the battlefield, confident that Tarleton would not
attempt to flank his position. Rather, Morgan believed that Tarleton would initially
attack him with part of his cavalry supported by infantry, wait for confusion, and
then exploit those vulnerabilities with his cavalry reserve. This had been his pat-
tern of operations in previous engagements with the Americans.
In the main line of battle, LEGEND
Morgan placed his Continen- American Forces
SITUATION AS OF
were former Continentals, on III
920
3rd (WASHINGTON)
0700
980
-N
mand. They numbered 450.
940
980
-
About 150 meters downhill, 960
yards
500
1-7
FM 3-90
SITUATION AS OF
was more ragged as it began 920 0730
980
-N
his right-hand troop of dra- 980 III 940
-
3rd (WASHINGTON)
goons to charge the militia as 960
CONTINENTALS
it withdrew. The American
940 920
(HOWARD)
Y II
I
I
As the British moved hastily
960
940
900 940
960
SITUATION AS OF
nized the danger to their right 920 0750
flank and ordered the right 940
960
940
980
-
3rd (WASHINGTON)
920 900
900 940
960
1-8
The Art of Tactics
into the British lines. Simultaneously, Morgan’s cavalry attacked the British right
from the rear. Meanwhile, the militia, having reformed, returned to the field on the
American right and attacked the British left flank units. (See Figure 1-3.) The bat-
tle was over within an hour of Tarleton’s first assault. The British losses were 110
killed, 200 wounded, and 700 prisoners, although Tarleton personally escaped
with about 140 of his cavalry. The British could not replace the mobile forces that
Tarleton lost at the Cowpens. Without a mobile force, the British no longer had an
effective counter to American partisans and light forces. The British later won at
Guilford Court House, but suffered such heavy losses that they had to abandon
their operations in the interior of the Carolinas.
Morgan combined the science of tactics with his application of the tactical art to
defeat superior numbers of British forces under Tarleton. Morgan arrived at a
unique and creative solution to his tactical problems. Trusted information about
Tarleton’s style was a crucial part of his deployment plan. Morgan understood the
diverse military and social elements of his force (untried militia, Continentals, and
volunteers). He asked no more of any element than it could deliver and used the
strengths of each to the fullest. Daniel Morgan used tactical art to convert his
understanding of American troops, knowledge of human nature, and rapport with
his soldiers into the vital components of a brilliant tactical victory.
1-9
FM 3-90
of the enemy situation, and his assessment of whether the assets available (to
include time), and the means to coordinate and synchronize those assets, are
adequate to accomplish the mission. If they are not he takes additional time
to plan and prepare for the operation or bring additional forces to bear on the
problem. The commander makes that choice in an environment of uncer-
tainty, which always entails some risk.
1-24. The commander may have to act based only on his available combat in-
formation in a time-constrained environment. Combat information is uneval-
uated data gathered by or provided to a commander that, due to its highly
perishable nature or the critical nature of the tactical situation, cannot be
processed into tactical intelligence or other staff products in time to meet the
commander’s information requirements (FM 6-0). The commander must un-
derstand the inherent risk of acting only on combat information since it is
vulnerable to enemy deception operations and can be misinterpreted at any
stage up through reporting channels. The unit intelligence staff helps the
commander assign a level of confidence to combat information he uses in deci-
sion making.
1-25. Uncertainty and risk are inherent in tactical operations and cannot be
eliminated. A commander cannot be successful without the capability of act-
ing under conditions of uncertainty while balancing various risks and taking
advantage of opportunities. Although the commander strives to maximize his
knowledge about his forces, the terrain and weather, civil considerations, and
the enemy, he cannot let a lack of information paralyze him. The more intelli-
gence on the enemy, the better able the commander is to make his assess-
ment. Less information means that the commander has a greater risk of
making a poor decision for the specific situation. A commander never has per-
fect intelligence, but knowing when he has enough information to make a de-
cision within the higher commander’s intent and constraints is part of the art
of tactics and is a critical skill for a commander.
1-26. The commander should take the minimum time necessary in planning
and preparing to ensure a reasonable chance of success. Reduced coordination
at the start of the operation results in less than optimum combat power
brought to bear on the enemy, but often allows for increased speed and mo-
mentum while possibly achieving surprise. The commander must balance the
effects of reduced coordination against the risk that the effects of increased
coordination will not match the enemy’s improved posture over time. The
more time the commander takes to prepare for the operation, including im-
proving his situational understanding, the more time the enemy has to pre-
pare and move additional units within supporting range or distance. Addi-
tionally, it reduces the time his subordinates have to conduct their own
planning and preparations. If the enemy can improve his disposition faster
than the friendly force can, the delays in execution decrease the commander’s
chances of success.
1-27. It is better to err on the side of speed, audacity, and momentum than on
the side of caution when conducting military operations, all else being equal.
Bold decisions give the best promise of success; however, one must differenti-
ate between calculated risks and a military gamble. A calculated risk is an
operation in which success is not a certainty but which, in case of failure,
leaves sufficient forces to cope with whatever situations arise (FM 6-0). The
1-10
The Art of Tactics
RISK REDUCTION
1-30. An important factor in reducing a commander’s risk is how much intel-
ligence he has about the enemy. As intelligence becomes available, the com-
mander determines where along the continuum of hasty versus deliberate
operations he will operate to accomplish his mission. There is no set of rules
to determine this point—any choice entails risk. If the commander decides to
execute a hasty operation based on limited intelligence, he risks an uncoordi-
nated operation against an enemy about which he knows little. Moreover his
forces may not be strong enough to accomplish their mission with minimum
casualties. This could lead to piecemeal commitment and potential defeat in
detail. He must balance this option against the risk of waiting to attack,
which allows the enemy time to reinforce or conduct additional preparation.
1-31. When higher headquarters determines the time to start an operation,
or in a defense when the enemy initiates the operation, the commander has
little flexibility regarding where to operate along the continuum of hasty
versus deliberate operations. In these situations he must use all the time
1-11
FM 3-90
1-12
The Art of Tactics
the disposition of the main body may change frequently. The commander
must continually weigh this balance and make adjustments as needed.
1-37. These adjustments can create problems. Too many changes or changes
made too rapidly in task organization, mission, and priorities can have nega-
tive effects on the operations process. For example, if a commander changes
the task organization of his force too frequently, the force fails to develop the
flexibility provided by teamwork. On the other hand, if he fails to change the
task organization when dictated by circumstances, the force lacks flexibility
to adapt to those changing circumstances. It is then unable to react effectively
to enemy moves or act with the concentration of effects that lead to mission
success.
1-13
FM 3-90
1-14
The Art of Tactics
solves the specific tactical problem facing him by following the general princi-
ples outlined in this manual, there is no single, doctrinally correct, procedur-
ally derived solution to any problem. The tactician who employs the more
appropriate tactics given the existing situation has a distinct advantage over
his opponent, even if their forces have equal combat power.
1-44. The tactician uses his mastery of the art and science of tactics, his
understanding of the situation, and his judgment to create unique solutions
appropriate to the mission and the other specific factors of METT-TC. There
are usually several solutions that might work, although some will be more ef-
fective. He seeks a solution that defeats the enemy in the time available at
the least cost in men and materiel. It should be a decisive solution that pos-
tures the unit for future missions and provides for the greatest flexibility to
account for unexpected enemy actions or reactions. The solution must be in
accordance with the higher commander’s intent. A thorough understanding of
the enemy greatly assists the commander in his development of workable so-
lutions. Commander’s visualization is the doctrinal term for this process.
(FM 6-0 describes commander’s visualization.)
1-45. The tactician learns to cut to the heart of a situation, recognize its im-
portant elements, and base his decisions on those important elements as he
masters his profession. The ability to do this cannot be acquired overnight. A
tactician develops this capability after years of schooling, self-study, and
practical training experiences, which eventually develop the intuitive facul-
ties required to solve tactical problems. He rarely gets the opportunity to
practice the science and art of tactics under actual combat conditions.
1-46. Doctrine requires human judgment when applied to a specific situation.
In choosing a solution to a tactical problem, applicable laws and regulations,
the mission, the laws of physics, human behavior, and logistic realities con-
strain the tactician, not standardized techniques and procedures. The true
test of the tactician’s solution is not whether it uses the specific techniques or
procedures contained in this manual, but whether the techniques and proce-
dures used were appropriate to the situation. Tactical proficiency is not de-
fined by mastery of written doctrine, but by the ability to employ available
means to win battles and engagements. A solution may not match any previ-
ous doctrinal example; however, the language used to communicate that con-
cept must be technically precise and doctrinally consistent, using commonly
understood and accepted doctrinal terms and concepts.
1-47. Transitions between the types and forms of operations are difficult and,
during execution, may create unexpected opportunities for Army or enemy
forces. The tactician must quickly recognize such opportunities. He develops
transitions as branches during the planning process and acts on them immed-
iately as they occur. Transition between one type or form of an operation to
another is a complex operational consideration.
1-48. Tactical victory occurs when the opposing enemy force can no longer
prevent the friendly force from accomplishing its mission. That is the end
goal of all military operations. Decisive tactical victory occurs when the en-
emy no longer has the means to oppose the friendly force. It also occurs when
the enemy admits defeat and agrees to a negotiated end of hostilities. Histori-
cally, a rapid tactical victory results in fewer friendly casualties and reduced
1-15
FM 3-90
resource expenditures. However, the tactician avoids gambling his forces and
losing his combined arms synchronization in search of rapid victory.
1-49. In closing, solutions to tactical problems are a collective effort. Success
results from the commander’s plan and the ability of subordinates to execute
it. The commander must have full confidence in his subordinates’ mastery of
the art and science of tactics and in their ability to execute the chosen solu-
tion. (See FM 6-0 for a full discussion of this concept.)
1-16
Chapter 2
The tactician must understand the common tactical concepts and defini-
tions used by the military profession in the conduct of offensive and de-
fensive operations. This chapter introduces the doctrinal hierarchy that
forms the framework by which this manual is organized. The concepts
and terms in this chapter are common to most operations. This manual
discusses those concepts and terms specific to a type or form of operations
in the corresponding chapter. For example, Chapter 4 discusses the objec-
tive as a control measure.
DOCTRINAL HIERARCHY
2-1. Figure 2-1 on page 2-2 shows the doctrinal hierarchy and relationship
between the types and subordinate forms of operations. While an operation’s
CONTENTS
Doctrinal Hierarchy......................................2-1 Basic Tactical Graphic Control
The Operational Framework .......................2-3 Measures .............................................. 2-10
Principles of War .........................................2-3 Air Corridor........................................... 2-11
Tenets of Army Operations.........................2-4 Area of Operations and Boundaries .. 2-12
The Factors of METT-TC .............................2-4 Assembly Areas ................................... 2-18
Elements of Operational Design ................2-4 Checkpoint ........................................... 2-19
Battlefield Operating Systems....................2-5 Contact Point........................................ 2-20
Basic Tactical Concepts .............................2-5 Critical Friendly Zone .......................... 2-20
Combined Arms ......................................2-6 Direct Fire Control Measures.............. 2-20
Decisively Engaged ................................2-6 Deep, Close, and Rear Areas .............. 2-24
Defeat in Detail ........................................2-7 Fire Support Coordination
Flanks.......................................................2-7 Measures .............................................. 2-26
Maneuver .................................................2-8 Fire Support Targets............................ 2-31
Mutual Support .......................................2-8 Forward Line of Own Troops.............. 2-32
Operation .................................................2-8 Line of Contact..................................... 2-32
Piecemeal Commitment .........................2-9 Names Area of Interest ........................ 2-33
Reconstitution.........................................2-9 Obstacle Control Measures ................ 2-33
Rules of Engagement .............................2-9 Phase Line ............................................ 2-37
Supporting Distance.............................2-10 Position Area of Artillery ..................... 2-37
Supporting Range.................................2-10 Route ..................................................... 2-38
Tactical Mobility....................................2-10 Targeted Area of Interest..................... 2-38
2-1
FM 3-90
TYPES OF
MILITARY OFFENSE DEFENSE STABILITY SUPPORT
OPNS
FORMS OF TYPES OF TYPES OF FORMS OF
MANEUVER DEFENSIVE STABILITY OPNS SUPPORT
TYPES OF —
—
Envelopment
Turning Movement
OPNS — PEACE OPNS OPNS
— AREA — FOREIGN INTERNAL – Relief Opns
MILITARY — Frontal Attack
DEFENSE DEFENSE – Support to
— Penetration — SECURITY ASSIST Incidents
OPNS — Infiltration — MOBILE — HUMANITARIAN & CIVIC Involving WMD
DEFENSE ASSIST – SPT to Civil Law
AND — RETROGRADE — SUPPORT TO Enforcement
TYPES OF
THEIR OFFENSIVE OPNS
OPERATIONS INSURGENCIES
— SUPPORT TO CD OPNS
– Community
Assistance
– Delay
SUBORD- —MOVEMENT TO CONTACT – Withdrawal
— CBTING TERRORISM
– Search and Attack — NONCOMBATANT TYPES OF
INATE —ATTACK
– Ambush*
– Retirement EVACUATION OPNS
SUPPORT
– Feint* — ARMS CONTROL
FORMS –
–
Counterattack*
Demonstration*
– Raid*
— SHOW OF FORCE OPERATIONS
*Also known as
— DOMESTIC SPT
– Spoiling Attack*
—EXPLOITATION special purpose OPNS
—PURSUIT attacks — FOREIGN
HUMANITARIAN
TYPES OF ASSISTANCE
2-2. The commander conducts tactical enabling operations to assist the plan-
ning, preparation, and execution of any of the four types of military opera-
tions (offense, defense, stability, and support). Tactical enabling operations
are never decisive operations in the context of offensive and defensive opera-
tions; they are either shaping or sustaining operations. Part IV of this man-
ual discusses tactical enabling operations that are not the subject of a sepa-
rate field manual. The commander uses tactical enabling operations to help
him conduct military actions with minimal risk.
2-2
Common Tactical Concepts and Graphic Control Measures
2-3. This hierarchy does not describe discrete, mutually exclusive operations.
All tactical missions can contain elements of several different types and sub-
ordinate forms. For example, an attacking commander may have one subordi-
nate conducting an envelopment, with another subordinate conducting a
frontal attack to fix the enemy. The enveloping force usually attacks once the
direct-pressure force makes a movement to contact while repeatedly
attacking to keep pressure on the fleeing enemy. The encircling force uses an
envelopment to conduct a series of attacks to destroy or clear enemy forces in
its path on the way to its blocking position. Once it occupies the blocking posi-
tion, the unit may transition to a defense as it blocks the retreat of the fleeing
enemy force.
PRINCIPLES OF WAR
2-6. The nine principles of war defined in FM 3-0 provide general guidance
for conducting war and military operations other than war at the strategic,
operational, and tactical levels. They are fundamental truths governing
combat operations. The principles are the enduring bedrock of Army doctrine.
First published in 1923 as general principles in Field Service Regulations
United States Army, they have stood the tests of analysis, experimentation,
and practice. They are not a checklist and their degree of application varies
with the situation. Blind adherence to these principles does not guarantee
success, but each deviation may increase the risk of failure. The principles of
war lend rigor and focus to the purely creative aspects of tactics and provide a
crucial link between pure theory and actual application.
2-3
FM 3-90
2-4
Common Tactical Concepts and Graphic Control Measures
2-5
FM 3-90
COMBINED ARMS
2-12. Combined arms is the synchronized or simultaneous application of
several arms—such as infantry, armor, artillery, engineers, air defense, and
aviation—to achieve an effect on the enemy that is greater than if each arm
was used against the enemy separately or in sequence (FM 3-0). Weapons and
units are more effective when they operate in concert. No single action,
weapon, branch, or arm of service generates sufficient power to achieve the
effects required to dominate an opponent.
2-13. Combined arms is more than the combat arms working together. Each
branch of the Army provides unique capabilities that complement the other
branches. A combined arms team consists of two or more arms supporting one
another. The commander takes his available combat, combat support (CS),
and combat service support (CSS) elements and forms them into a combined
arms team focused on mission accomplishment. The proper combination of
actions and systems by the combined arms team is the essence of combined
arms. The use of combined arms provides complementary and reinforcing ef-
fects and may have asymmetrical effects on an enemy force. (See FM 3-0 for
more information on symmetrical and asymmetrical effects.)
2-14. Armor, attack helicopter, and infantry units are normally the nucleus
of the combined arms team. However, emerging capabilities allow the com-
mander to use any combat arms unit, such as artillery and aviation, to form
that nucleus. The commander uses his combat arms forces in different combi-
nations to provide flexibility in conducting different types of operations in
varied terrain. For example, a commander may have his infantry lead in
mountains and cities when moving dismounted, while his armor leads in open
terrain. Attack helicopters can deliver large quantities of precision munitions
throughout the AO. A commander can conduct decisive operations using field
artillery Multiple Launch Rocket Systems (MLRS) and cannons augmented
by the effects of fixed-wing aviation, given the correct conditions. Air defense
artillery destroys enemy aerial assets to assist the free movement of the
friendly force. Engineers enhance the friendly force’s mobility, degrade the
enemy’s mobility, and assist in providing for survivability of the friendly
force. Combat support and CSS members of the combined arms team support
the combined arms nucleus by combining capabilities in an appropriate
manner to support and sustain the combined arms force.
DECISIVE ENGAGEMENT
2-15. A decisive engagement is an engagement in which a unit is considered
fully committed and cannot maneuver or extricate itself. In the absence of
outside assistance, the action must be fought to a conclusion and either won
or lost with the forces at hand (JP 1-02). The unit’s mission is what usually
results in the acceptance of decisive engagement rather than the unit’s
physical ability to extricate itself. For example, a unit might become
decisively engaged to hold key terrain, defeat a specific enemy force, or secure
a specific objective. Less common is a defender’s decisive engagement as a
result of being placed in a position of disadvantage by an attacker.
2-6
Common Tactical Concepts and Graphic Control Measures
DEFEAT IN DETAIL
2-16. Defeat in detail is achieved by concentrating overwhelming
combat power against separate parts of a force rather than defeating
the entire force at once. A smaller force can use this technique to achieve
success against a larger enemy. Defeat in detail can occur sequentially (de-
feat of separate elements one at a time in succession). For example, a com-
mander can mass overwhelming combat power effects against an enemy
element outside the supporting distance of the rest of the enemy force. This
allows the commander to destroy the targeted enemy element before it can be
effectively reinforced.
FLANKS
2-17. Flanks are the right
or left limits of a unit. For
a stationary unit, they are ENEMY LOCATION
designated in terms of an TEAM TEAM
enemy’s actual or expected LEFT FLANK RIGHT FLANK
location. (See Figure 2-2.)
For a moving unit, they are
defined by the direction of
movement. (See Figure 2-3.)
The commanders tries to
deny the enemy opportuni- BP 74
ties to engage his flanks be-
cause a force cannot concen-
trate as much direct fire on
the flanks as it can to the
front. Commanders seek to
engage enemy flanks for the
same reason. Figure 2-2. Flanks of a Stationary Unit
2-7
FM 3-90
link into other forces. When a commander has an assailable flank, he may at-
tempt to refuse it by using various techniques, such as supplementary posi-
tions.
2-19. A flanking position is a geographical location on the flank of a
force from which effective fires can be placed on that flank. An attack-
ing commander maneuvers to occupy flanking positions against a defending
force to place destructive fires directly against enemy vulnerabilities. A
defending commander maneuvers to occupy flanking positions on the flanks
of a hostile route of advance for the same reason. A flanking position that an
advancing enemy can readily avoid has little value to the defender unless the
enemy does not realize it is occupied.
MANEUVER
2-20. Maneuver is the employment of forces on the battlefield through move-
ment in combination with fire, or fire potential, to achieve a position of ad-
vantage in respect to the enemy in order to accomplish the mission (JP 1-02).
Maneuver creates and exposes enemy vulnerabilities to the massed effects of
friendly combat power. A commander employs his elements of combat power
in symmetrical and asymmetrical ways so as to attain positional advantage
over an enemy and be capable of applying those massed effects.
MUTUAL SUPPORT
2-21. Mutual support is that support which units render to each other
against an enemy because of their assigned tasks, their position relative to
each other and to the enemy, and their inherent capabilities (JP 1-02). Mu-
tual support exists between two or more positions when they support one
another by direct or indirect fire, thus preventing the enemy from attacking
one position without being fired on from one or more adjacent positions. That
same relationship applies to units moving with relation to each other, except
they can maneuver to obtain positional advantage to achieve that support. It
is normally associated with fire and movement (maneuver), although it can
also relate to the provision of CS and CSS.
2-22. In the defense, the commander selects tactical positions to achieve the
maximum degree of mutual support. Mutual support increases the strength
of defensive positions, prevents the enemy from attempting to defeat the at-
tacking friendly forces in detail, and helps prevent infiltration. In the offense,
the commander maneuvers his forces to ensure a similar degree of support
between attacking elements.
OPERATION
2-23. An operation is a military action or the carrying out of a strategic,
tactical, service, training, or administrative military mission (JP 1-02). It
includes the process of planning, preparing, executing, and assessing those
offensive, defensive, stability, and support operations needed to gain the
objectives of any engagement, battle, major action, or campaign. It also
includes activities that enable the performance of full spectrum operations,
such as security, reconnaissance, and troop movement.
2-8
Common Tactical Concepts and Graphic Control Measures
PIECEMEAL COMMITMENT
2-24. Piecemeal commitment is the immediate employment of units in
combat as they become available instead of waiting for larger ag-
gregations of units to ensure mass, or the unsynchronized employ-
ment of available forces so that their combat power is not employed
effectively. Piecemeal commitment subjects the smaller committed forces to
defeat in detail and prevents the massing and synchronizing of combat power
with following combat and CS elements. However, piecemeal commitment
may be advantageous to maintain momentum and to retain or exploit the ini-
tiative. A commander may require piecemeal commitment of a unit to rein-
force a faltering operation, especially if the commitment of small units pro-
vide all of the combat power needed to avert disaster. The “pile-on” technique
associated with search and attack operations employs the piecemeal commit-
ment of troops. (See Chapter 5 for a discussion of search and attack opera-
tions.)
RECONSTITUITON
2-25. Reconstitution is those actions that commanders plan and implement to
restore units to a desired level of combat effectiveness commensurate with
mission requirements and available resources. Reconstitution operations
include regeneration and reorganization (FM 4-100.9). Reconstitution is a
total process. It is not solely a CSS operation, though CSS plays an integral
role. The commander conducts reconstitution when one of his subordinate
units becomes combat ineffective or when he can raise its combat effec-
tiveness closer to the desired level by shifting available resources. Besides
normal support actions, reconstitution may include—
· Removing the unit from combat.
· Assessing it with external assets.
· Reestablishing the chain of command.
· Training the unit for future operations.
· Reestablishing unit cohesion.
2-26. Reconstitution transcends normal day-to-day force sustainment actions.
However, it uses existing systems and units to do so. No resources exist solely
to perform reconstitution. (See FM 4-100.9.)
RULES OF ENGAGEMENT
2-27. Rules of engagement (ROE) are directives issued by competent military
authority which delineate the circumstances and limitations under which
United States forces will initiate and/or continue combat engagement with
other forces encountered (JP 1-02). Operational requirements, policy, and law
define the commander’s ROE. Rules of engagement impact on how a com-
mander conducts his operations in all four types of military operations by im-
posing political, practical, operational, and legal limitations on his actions.
They may extend to criteria for initiating engagements with certain weapon
systems, such as employing unobserved indirect fires within the echelon rear
area, or reacting to an attack. They always recognize the right of self-defense
and the commander’s right and obligation to protect assigned personnel.
CJCSI 3121.01A establishes the Joint Chiefs of Staff’s standing ROE.
2-9
FM 3-90
SUPPORTING DISTANCE
2-28. Supporting distance is the distance between two units that can be
traveled in time for one to come to the aid of the other. For small units, it is
the distance between two units that can be covered effectively by their fires
(FM 3-0). Supporting distance is a factor of combat power, dispositions, com-
munications capability, and tactical mobility of friendly and enemy forces.
SUPPORTING RANGE
2-29. Supporting range is the distance one unit may be geographically
separated from a second unit, yet remain within the maximum range of the
second unit’s indirect fire weapons systems. (FM 3-0). Major factors that af-
fect supporting range are terrain relief, the range of the supporting unit’s
weapon systems, and their locations in relation to the supported unit’s posi-
tion.
TACTICAL MOBILITY
2-30. Tactical mobility is the ability to move rapidly from one part of
the battlefield to another, relative to the enemy. Tactical mobility is a
function of cross-country mobility, firepower, and protection. The terrain, soil
conditions, and weather affect cross-country mobility. Heavy ground maneu-
ver units have good tactical mobility—except in restrictive terrain—combined
with firepower and protection. They can move on the battlefield against most
enemy forces unless faced with an enemy who can defeat their protection and
cannot be suppressed by friendly fires. Light ground maneuver units have a
tactical mobility advantage against enemy heavy forces in restrictive terrain,
but limited firepower and protection. Army aviation maneuver units have
good tactical mobility in most types of terrain, good firepower, but limited
protection. Extreme weather conditions can restrict the tactical mobility of
Army aviation units.
2-10
Common Tactical Concepts and Graphic Control Measures
2-11
FM 3-90
BI
the joint force commander
RD
for land and naval forces.
ACP
Areas of operations do not
MA
3
typically encompass the A N
IR D M
N
entire operational area of
the joint force commander,
ACP B
2
but should be large enough
for component command- Figure 2-4. Generic Air Corridor
ers to accomplish their
missions and protect their forces (JP 1-02). The joint force land component
commander (JFLCC) or the Army service component command (ASCC)
commander will in turn assign their subordinates their own AOs. Those
subordinates will further assign their subordinates AOs down to the battalion
or company level based on the factors of METT-TC. A unit assigned an AO,
the owning unit, may not change control measures imposed by a higher
headquarters within their AO. However, it may establish additional control
measures to coordinate and synchronize its operations.
2-37. Assigning an AO to a subordi-
An avenue of approach is
nate headquarters maximizes decen-
the air or ground route
tralized execution by empowering
leading to an objective (or
subordinate commanders to use their
key terrain in its path) that
own initiative to accomplish their
an attacking force can use.
assigned missions. This encourages
the use of mission command. (See FM 6-0 for a discussion of mission com-
mand.) At the same time it adds the responsibilities listed in Paragraph 2-40
below to the lower headquarters. Conversely, failure to designate subordinate
AOs maximizes centralized execution and limits the subordinates’ tactical
options. The latter choice should be made only when mandated by the factors
of METT-TC. For example, a brigade commander responsible for blocking an
enemy advance along a single avenue of approach may assign his subordinate
battalions battle positions to support a brigade engagement area (EA) instead
of subdividing his AO and the avenue of approach into battalion AOs.
2-38. A higher headquarters designates an AO using boundaries. It normally
assigns an AO to a maneuver unit, but it may also assign one to CS or CSS
units. Having an AO assigned both restricts and facilitates the movement of
units and use of fires. It restricts units not assigned responsibility for the AO
from moving through the AO. It also restricts outside units from firing into or
allowing the effects of its fires to affect the AO. Both of these restrictions can
be relaxed through coordination with the owning unit. It facilitates the move-
ment and fires of the unit assigned responsibility for, or owning, the AO. The
assigned AO must encompass enough terrain for the commander to accom-
plish his mission and protect his forces.
2-12
Common Tactical Concepts and Graphic Control Measures
Terrain Management
2-41. The commander assigned an AO is responsible for terrain management
within its boundaries. A higher headquarters may dictate that another unit
position itself within a subordinate unit’s AO, but the commander assigned
the AO retains final approval authority for the exact placement. This ensures
the unit commander controlling the AO knows what units are in his AO and
where they are located so that he can deconflict operations, control move-
ment, and prevent fratricide. Only the owning commander assigns subordi-
nate unit boundaries within the AO.
Movement Control
2-42. Units may not move across boundaries into another unit’s AO without
receiving clearance from the unit owning the AO. Once assigned an AO, the
owning unit controls movement throughout the AO. The designation, mainte-
nance, route security, and control of movement along routes within an AO are
the responsibility of the owning unit unless the higher echelon’s coordinating
instructions direct otherwise. The commander may designate movement
routes as open, supervised, dispatch, reserved, or prohibited. Each route’s
designation varies based on the factors of METT-TC. FM 4-01.30 discusses
movement planning and control measures.
2-13
FM 3-90
Fires
2-43. Within its AO, the owning unit may employ any direct or indirect fire
system without receiving further clearance from superior headquarters.
There are three exceptions: The first and most common is that a unit may not
use munitions within its own AO without receiving appropriate clearance if
the effects of those munitions extend beyond its AO. For example, if a unit
wants to use smoke, its effects cannot cross boundaries into another AO
unless cleared with the adjacent owning unit. Second, higher headquarters
may explicitly restrict the use of certain munitions within an AO or parts of
an AO, such as long-duration scatterable mines. Third, higher headquarters
may impose a restrictive fire support coordinating measure (FSCM) within an
AO to protect some asset or facility, such as a no-fire area around a camp
housing dislocated civilians. These FSCM tend to be linear in nature in a con-
tiguous AO while they are more likely areas in a noncontiguous AO.
2-44. The commander may not employ indirect fires across boundaries with-
out receiving clearance from the unit into whose AO the fires will impact. He
may employ direct fires across boundaries without clearance at specific point
targets that are clearly and positively identified as enemy.
Security
2-45. The security of all units operating within the AO is the responsibility of
the owning commander. This fact does not require that commander to con-
duct area security operations throughout his AO. (See Chapter 12 for a dis-
cussion of area security responsibilities.) He must prevent surprise and pro-
vide the amount of time necessary for all units located within the AO to
effectively respond to enemy actions by employing security forces around
those units. If the commander cannot or chooses not to provide security
throughout his AO, he must clearly inform all concerned individuals of when,
where, and under what conditions he is not going to exercise this function.
The commander generally depicts these locations using permissive FSCM.
Each unit commander remains responsible for his unit’s local security.
2-14
Common Tactical Concepts and Graphic Control Measures
that liaison capability with the airspace control authority (ACA). (See
FM 3-52 and JP 3-52 for additional information regarding airspace control
doctrine.)
2-48. The vertical dimension, or airspace, of the AO is inherently permissive
because all branches and services require the use of airspace. There are pro-
cedural and positive airspace control measures (ACM) available to synchro-
nize military operations in the airspace above the AO. Among the procedural
ACM is the coordinating altitude, which separates fixed- and rotary-wing air-
craft by determining an altitude below which fixed-wing aircraft will norm-
ally not fly and above which rotary-wing aircraft will normally not fly. It al-
lows the ground commander to use the airspace above his AO for his organic
aviation assets to complement ground maneuver forces, but it is not a bound-
ary for which he has responsibility. The ACA, normally the joint force air
component commander, must establish the coordinating altitude, promulgate
it through the airspace control plan, address it in the airspace control order,
and include a buffer zone for small altitude deviations. Coordinating altitudes
are permissive ACM.
Boundaries
2-49. A boundary is a line that delineates surface areas for the purpose of
facilitating coordination and deconfliction of operations between adjacent
units, formations, or areas (JP 0-2). The commander uses graphic control
measures to define the limits of an AO and, as such, establish ground forces’
responsibilities. He uses ACM to control the vertical dimension. The com-
mander bases his subordinates’ boundaries on clearly defined terrain fea-
tures. This requirement is less important if all units in the AO have precision
navigation capabilities. Boundaries should not split roads, rivers, or railways.
Responsibility for an avenue of approach and key terrain should belong to
only one unit. The commander adjusts his boundaries as necessary in re-
sponse to the evolving tactical situation. Any areas not delegated to a subord-
inate remain the responsibility of the commander.
2-15
FM 3-90
BRIGADE
FORWARD XX XX
BOUNDARIES DIVISION DEEP DIVISION DEEP BRIGADE
AREA AREA SECURITY
X AREAS
X X X X
X X
X
FEBA
DIVISION BRIGADE
FEBA
CLOSE LATERAL
CORPS
XXX
DIVISION
X LATERAL X
xx
XXX
AREA X BOUNDARY
BOUNDARIES CLOSE
X X AREA
X X X X
II DIVISION DIVISION
RESERVE REAR
DIVISION REAR AREA AREA BRIGADE
REAR
xx xx BOUNDARIES
CORPS
DIVISION REAR BOUNDARIES
REAR BOUNDARY
CORPS REAR AREA
XXX
2-52. The commander bases his decision to establish contiguous AOs on his
analysis of the factors of METT-TC. Units with contiguous AOs are normally
within supporting distance of one another and may be within supporting
range. Other reasons why a commander establishes contiguous AOs include—
· Limited size of the AO in relation to the number of friendly forces.
· Decisive points in close physical proximity to each other.
· Political boundaries or enemy force concentrations require establishing
contiguous AOs.
· Reduced risk of being defeated in detail because of an incomplete op-
erational picture or when the friendly force is significantly outnum-
bered.
· Greater concentration of combat power along a single avenue of
approach or movement corridor.
2-16
Common Tactical Concepts and Graphic Control Measures
2-53. A noncontiguous AO does not have distinctive forward, rear, and lateral
boundaries. It is established by a boundary that encloses the entire area.
Subordinate boundaries will be continuous, 360-degree arcs that closely ap-
proximate the subordinate unit’s area of influence. For example, the com-
mander would normally place a noncontiguous brigade boundary at the limit
of observed fires for its security forces. Because noncontiguous boundaries
must provide all-around security, they generally allow for less concentration
of combat power along a single axis. A brigade, division, or corps commander
who establishes noncontiguous AOs for his subordinates still designates an
echelon rear area. Battle positions are not AOs since a unit is not restricted
from operating outside its battle position. A commander who deploys his sub-
ordinates into battle positions is not conducting noncontiguous operations.
Chapter 8 defines a battle position.
2-54. Operations directed against enemy forces and systems outside a non-
contiguous AO are the responsibility of the organization that owns that loca-
tion. For example, in Figure 2-6 the middle enemy division is the corps’ re-
sponsibility since it is not within either of the corps’ two divisions’ AOs.
SPT
SPT
SPT DAG
III
DAG III
III
X DAG III III
III
X III
X
II III
X
II
II III II
X
II X
X
XX
II
X
X
X X
X
X
X
SPF II
X
SPF
XXX
SPF
DIVISION X DSA
AO DIVISION
ROUTE C
AO
CORPS
SPF
JSOA X
{
AO
{
BLACK XX
X X
X X
LARK
2-17
FM 3-90
ASSEMBLY AREAS
2-57. An assembly area (AA) is an area a unit occupies to prepare for
an operation. Ideally, an assembly area provides—
· Concealment from air and ground observation.
· Cover from direct fire.
· Space for dispersion; separate each AA by enough distance from other
AAs to preclude mutual interference.
· Adequate entrances, exits, and internal routes.
· Good drainage and soil conditions that can sustain the movement of the
unit’s vehicles and individual soldiers.
· Terrain masking of electromagnetic signatures.
· Terrain allowing observation of ground and air avenues into the AA.
· Sanctuary from enemy medium-range artillery fires because of its
location outside the enemy’s range.
2-18
Common Tactical Concepts and Graphic Control Measures
2-58. The commander assigns each unit its own AA. In Figure 2-7, the ex-
ample of multiple units occupying one AA is a graphical shortcut taken when
the map scale would make depiction of multiple assembly areas unreadable.
In reality, the commander would subdivide AA Thomas into two smaller AAs,
one for each unit. A unit AA is normally within the AO of another unit. An
AA area is usually treated as a noncontiguous AO. This means that a unit has
the same responsibilities within its assigned AA as it has for any other AO.
AA MEADE II
II 3 68 AA ORD
3 68
OCCUPIED OCCUPIED
{
II
3 68 AA HANCOCK
AA THOMAS
II 3 68
2 13
2-59. The proper location of AAs contributes significantly to both security and
flexibility. It should facilitate future operations so movement to subsequent
positions can take place smoothly and quickly by concealed routes. Because of
their smaller signature, light units can use AAs closer to the enemy than
heavy units without excessive risk of enemy detection. The tactical mobility of
heavy units allows them to occupy AAs at a greater distance from the line of
departure (LD) than light units.
CHECKPOINT
2-60. A checkpoint is a predetermined
CP 13
point on the ground used to control move-
ment, tactical maneuver, and orientation.
Units can also use a checkpoint as a fire control
measure in lieu of the preferred control meas-
ure, a target reference point. Checkpoints are
useful for orientation. Units may use check-
points to supplement or as substitutes for phase
lines (PLs). They are also used in the conduct of
CSS. Figure 2-8 depicts Checkpoint 13. Figure 2-8. Checkpoint 13
2-19
FM 3-90
CONTACT POINT
2-61. A contact point is an easily identi-
fiable point on the terrain where two or
more ground units are required to make
physical contact. A commander establishes a
contact point where a PL crosses a lateral
071830Z
FEB02 8
boundary or on other identifiable terrain as a
technique to ensure coordination between two
units. He provides a date-time group to
indicate when to make that physical contact. Figure 2-9. Contact Point 8
Figure 2-9 depicts Contact Point 8.
2-62. The mutual higher commander of two moving units normally desig-
nates the location of contact points and times of contact. When one unit is sta-
tionary, its commander normally designates the location of the contact point
and the meeting time, and transmits this information to the commander of
the moving unit.
2-20
Common Tactical Concepts and Graphic Control Measures
Engagement Area
2-65. An engagement area (EA) is an area where the commander in-
tends to contain and destroy an enemy force with the massed effects
of all available weapons and supporting systems. This includes organic
direct fire systems and supporting systems, such as close air support. Fig-
ure 2-10 depicts several EAs used within the context of a battalion defense.
The commander determines the size and shape of the EA by the relatively un-
obstructed intervisibility from the weapon systems in their firing positions
and the maximum range of those weapons. The commander designates EAs
to cover each enemy avenue of approach into his position. He also can use
them to designate known or suspected enemy locations. Once the commander
selects his EA, he arrays his forces in positions to concentrate overwhelming
effects into these areas. He routinely subdivides his EA into smaller EAs for
his subordinates using one or more target reference points or by prominent
terrain features. The commander assigns sectors of fires to subordinates to
prevent fratricide, but responsibility for an avenue of approach or key terrain
is never split. These sectors normally do not affect friendly maneuver. Com-
manders of units up to battalion task force size normally use this control
measure.
PL JOANN
DISENGAGEMENT
LINE EA
EA ALPHA OMEGA
+ +
NZ1542
I
NZ1540
+
I
TRIGGER
+
TRIGGER NZ1539 NZ1541
LINE/ LINE/
PL JAN PL PEGGY
I I
+
NZ1545
EA + NZ1543
TRIGGER LINE/
PL DICK
PHI
+ NZ1544
I
Engagement Criteria
2-66. Engagement criteria are protocols that specify those circum-
stances for initiating engagement with an enemy force. They may be
restrictive or permissive. For example, a company commander could tell his
1st Platoon to wait until three enemy tanks reach a target reference point
2-21
FM 3-90
Engagement Priority
2-67. Engagement priority specifies the order in which the unit en-
gages enemy systems or functions. The commander assigns engagement
priorities based on the type or level of threat at different ranges to match
organic weapon systems capabilities against enemy vulnerabilities. Engage-
ment priorities are situationally dependent. The commander uses engage-
ment priorities to distribute fires rapidly and effectively. Subordinate ele-
ments can have different engagement priorities. For example, the commander
establishes his engagement priorities so that his M2 Bradley fighting vehicles
engage enemy infantry fighting vehicles or armored personnel carriers while
his M1 Abrams tanks engage enemy tanks. Normally, units engage the most
dangerous targets first, followed by targets in depth.
Sector of Fire
2-68. A sector of fire is that
area assigned to a unit, a
crew-served weapon, or an ENCLOSED PRIMARY
2-22
Common Tactical Concepts and Graphic Control Measures
Trigger Line
2-70. A trigger line is a
DIRECT-FIRE FIRE SUPPORT
phase line used to initiate TRIGGER TRIGGER
and mass fires into an LINE LINE
engagement area or an
objective at a predeter- ENY
2-23
FM 3-90
likely to traverse in the time it takes from when fires are requested to when
artillery rounds impact. (See Figure 2-13.) This gives time for the fire support
systems to respond to the initial call for fire. For example, in a desert envi-
ronment—a battalion task force commander’s fire support trigger line is ap-
proximately four kilometers beyond the point where he wants to engage the
enemy with indirect fires when he has M109A6 howitzers in direct support. It
is approximately six kilometers when he has M109A3 howitzers in direct sup-
port. The shorter distance reflects the more rapid response capabilities of the
M109A6 compared to the M109A3, all other factors being equal.
2-72. The commander can establish another trigger line for his most accurate
long-range weapon system in the vicinity of the area where the fire support
impacts to capitalize on the asymmetric attack. However, dust and debris
resulting from the artillery fire may prevent his direct-fire systems from
engaging the enemy. He establishes other trigger lines and TRPs for shorter-
range systems. He may give guidance to extremely proficient crews to engage
the enemy at longer than normal ranges or give them different engagement
priorities than the rest of the force, such as giving priority to engaging air de-
fense or engineer-breaching systems. This could result in losing the effect
that the sudden application of massed fires has on an enemy.
2-73. When the enemy reaches these closer trigger lines, the commander es-
tablishes a decision point to help him determine if he wants his longer-range
systems to continue to fire in depth or to concentrate his fires on a single
point. Many factors impact his decision, most of which concern the enemy and
how he maneuvers and the effects of the defending force’s fires.
Deep Area
2-75. When designated, the deep area is an area forward of the close area
that commanders use to shape enemy forces before they are encountered or
engaged in the close area (FM 3-0). It extends from the subordinate’s forward
boundary to the forward boundary of the controlling echelon. Thus, the deep
area relates to the close area not only in terms of geography but also in terms
of purpose and time. The extent of the deep area depends on how far out the
force can acquire information and strike targets. Commanders may place
forces or employ effects in the deep area to conduct shaping operations. Some
of these operations may involve close combat. However, most ground maneu-
ver forces stay in the close area.
2-76. New weapon systems and advanced information technology continue to
increase the capability of Army forces to engage enemy forces in depth. In the
past, deep attacks aimed to slow and disrupt the advance of enemy forces.
2-24
Common Tactical Concepts and Graphic Control Measures
Today, Army forces may engage enemy formations with precision fires at
substantial distances from the close area. This capability allows the
commander to employ greater depth and simultaneity of action than ever
before when conducting operations.
BRIGADE
FORWARD XX XX
BOUNDARIES DIVISION DEEP DIVISION DEEP BRIGADE
AREA AREA SECURITY
X AREAS
X X X X
X X
X
FEBA
DIVISION BRIGADE
FEBA
CLOSE LATERAL
CORPS
XXX
DIVISION
X LATERAL X
xx
XXX
AREA X BOUNDARY
BOUNDARIES CLOSE
X X AREA
X X X X
II DIVISION DIVISION
RESERVE REAR
DIVISION REAR AREA AREA BRIGADE
REAR
xx xx BOUNDARIES
CORPS
DIVISION REAR BOUNDARIES
REAR BOUNDARY
CORPS REAR AREA
XXX
Close Area
2-77. When designated, the close area is where forces are in immediate con-
tact with the enemy and the fighting between the committed forces and
readily available tactical reserves of both combatants is occurring, or where
commanders envision close combat taking place. Typically, the close area
assigned to a maneuver force extends from its subordinates’ rear boundaries
to its own forward boundary (FM 3-0). Typically, the close area is where the
majority of close combat occurs. It also includes the activities of forces directly
supporting the fighting elements, such as direct support field artillery and
logistics elements. The close area is historically the only location where the
commander could conduct his decisive operation. One unit may conduct the
decisive operation, while another conducts shaping operations within a close
area. Division commanders whose AOs constitute the corps close area have
the option of designating their own deep, close, and rear areas. Figure 2-14
illustrates this option.
Rear Area
2-78. Unlike close and deep areas, a rear area can be designated by the
commander regardless of the organization of his AO into contiguous or
2-25
FM 3-90
2-26
Common Tactical Concepts and Graphic Control Measures
Permissive FSCM
2-82. The primary purpose of permissive measures is to facilitate the attack
of targets. Once they are established, further coordination is not required to
engage targets affected by the measures. Permissive FSCM include a
coordinated fire line, fire support coordination line, and free-fire area.
2-83. Coordinated Fire Line. A
coordinated fire line (CFL) is a
line beyond which conventional,
direct, and indirect surface fire CFL (1ST BDE)
support means may fire at any 080003Z
time within the boundaries of the FLOT FLOT
establishing headquarters without
additional coordination. The pur- 3X1 1X 2
pose of the CFL is to expedite the
surface-to-surface attack of tar-
gets beyond the CFL without co-
ordination with the ground com-
Figure 2-15. Coordinated Fire Line
mander in whose area the targets
are located (JP 3-09). Brigades or divisions usually establish a CFL, although
a maneuver battalion may establish one. It is located as close as possible to
the establishing unit without interfering with maneuver forces to open up the
area beyond to fire support. A higher echelon may consolidate subordinate
unit CFLs. If this occurs, any changes to the subordinate CFLs are co-
ordinated with the subordinate headquarters. (See Figure 2-15.)
2-84. Fire Support Coordination
Line. The fire support coordination line PL III CORPS FSCL
(FSCL) is a FSCM that is established and
IRON EFF 202100Z-270800 SEP
adjusted by appropriate land or
amphibious force commanders within
III (US)
2-27
FM 3-90
of targets beyond the FSCL. However, failure to do so may increase the risk
of fratricide and could waste limited resources (JP 3-09).
2-85. The commander designating a FSCL remains responsible for estab-
lishing the priority, effects, and timing of fires impacting beyond the FSCL.
Coordination for attacks beyond the FSCL is through the air tasking order.
The appropriate land or amphibious commander controls attacks short of the
FSCL. That commander uses the tactical air control system or the Army air-
ground system to control the execution of close air support (CAS).
2-86. Free-Fire Area. A free-fire area (FFA)
is a specific area into which any weapon
system may fire without additional coordina-
tion with the establishing headquarters
(JP 3-09). Normally, division or higher head- FFA
quarters establish a FFA on identifiable ter- 080800-082000ZJUL
rain. (See Figure 2-17.) 1CD
Restrictive FSCM
2-87. A restrictive FSCM prevents fires into
Figure 2-17. Free-Fire Area
or beyond the control measure without
detailed coordination. The primary purpose of restrictive measures is to
provide safeguards for friendly forces. Restrictive FSCM include an airspace
coordination area, no-fire area, restrictive fire area, and restrictive fire line.
Establishing a restrictive measure imposes certain requirements for specific
coordination before the engagement of those targets affected by the measure.
2-88. Airspace Coordination Area. The airspace coordination area (ACA)
is a three-dimensional block of airspace in a target area, established by the
appropriate ground commander, in which friendly aircraft are reasonably
safe from friendly surface fires. The airspace coordination area may be formal
or informal (JP 3-09.3). Time, space, or altitude separates aircraft and indi-
rect fire. The purpose of the ACA is to allow the simultaneous attack of tar-
gets near each other by fixed-wing aircraft and other fire support means.
Several techniques may be used in this role. The technique selected depends
on the time available, tactical situation, unit SOPs, and state of training.
(FM 3-52 defines ACM.)
2-89. The airspace control authority establishes formal ACAs at the request
of the appropriate ground commander. This is normally a separate brigade or
higher-echelon commander. Formal ACAs require detailed planning. The de-
sign of the ACA’s vertical and lateral limits allows freedom of action for air
and surface fire support for the greatest number of foreseeable targets.
2-90. The echelon fire support cell coordinates the location and extent of the
ACM with the A2C2) element and the fire direction center. It is located above
the target area as recommended by the air liaison element to the fire support
cell. The type of aircraft and the ordnance dictate the size of the area. Vital
information defining the formal ACA includes minimum and maximum
altitudes, a baseline designated by grid coordinates at each end, the width of
the ACA from either side of the baseline, and effective times. (See Fig-
ure 2-18.)
2-28
Common Tactical Concepts and Graphic Control Measures
III
U
XX S
ED ACA 2A
LLI D
A X 2AD
II XX US MIN ALT: 400
III MAX ALT: 2700
EFF 080600-080630Z
2A
91 XX D D
7
CS 2A X
G X D
4M
2-91. The maneuver commander may establish informal ACAs. He may sep-
arate aircraft and surface fires by distance (lateral, altitude, or a combina-
tion) or by time. Lateral separation is effective for coordinating fires against
targets that are adequately separated by at least one kilometer from flight
routes to ensure aircraft protection from the effects of friendly fires. An ex-
ample of a lateral separation technique is: “Aircraft stay west of grid line 62.”
Altitude separation is effective for coordinating fires when aircraft remain
above indirect fire trajectories and their effects. This technique is effective
when aircrews and firing units engage the same or nearby targets. An ex-
ample of altitude separation is: “Aircraft remain above 3000 feet mean sea
level in quadrant northwest of grid PK7325.”
2-92. A combination of lateral and altitude separation is the most restrictive
technique for aircraft and may be required when aircraft must cross the gun
target line of a firing unit. Time separation requires the most detailed
coordination and may be required when aircraft must fly near indirect-fire
trajectories or ordnance effects. The commander must coordinate the timing
of surface fires with aircraft routing. This ensures that even though aircraft
and surface fires may occupy the same space, they do not do so at the same
time. Surface and air-to-ground fires should be synchronized. All timing for
surface fires will be based on a specific aircraft event time. Fire support
personnel and tactical air controllers should select the separation technique
that requires the least coordination without adversely affecting timely fires or
the aircrew’s ability to safely complete the mission.
2-29
FM 3-90
2-30
______________________________________ Common Tactical Concepts and Graphic Control Measures
A1B
AG1712 AG1712 AG1706
AG1709
AG1717
POINT
TARGET GROUP OF CIRCULAR
TARGETS TARGET
A1B
AG1711
AG1723
AG1717 AG1201
AG7005 AG1744
2-97. Doctrine classifies each fire support target as either a planned target or
a target of opportunity. Targets of opportunity are not planned in advance
and are engaged as they present themselves in accordance with established
engagement criteria and rules of engagement. Planned targets are ones on
which fires are prearranged, although the degree of this prearrangement may
vary.
2-98. Individually planned fire support targets may be further subdivided
into scheduled and on-call fires. Scheduled targets are planned targets on
2-31
FM 3-90__________________________________________________________________________________
which field artillery and other fire support assets deliver their fires in accord-
ance with a pre-established time schedule and sequence. On-call targets are
planned targets engaged in response to a request for fires rather than in ac-
cordance with an established time schedule. An on-call target requires less
reaction time than a target of opportunity. The degree of prearrangement for
the on-call target influences the reaction time from request to execution–the
greater the prearrangement, the faster the reaction time. Priority targets are
an example of on-call targets that have short reaction times since each prio-
rity target has a fire unit placed on it when it is not engaged in other fire mis-
sions. The final protective fires (FPF) of A Battery, 1st Battalion 16th Field
Artillery in Figure 2-22 is an example of a priority target. (See FM 3-09 for
additional information regarding fire support.)
2-32
______________________________________ Common Tactical Concepts and Graphic Control Measures
Obstacle Zones
2-33
FM 3-90__________________________________________________________________________________
are allowed to employ tactical obstacles (JP 1-02). Corps and division
commanders use them to grant obstacle-emplacement authority to brigades
(including armored cavalry regiments and other major subordinate units).
Obstacle zones are permissive, allowing brigades to place reinforcing obsta-
cles to support their scheme of maneuver without interfering with future op-
erations.
EM P LAC EM ENT
O BS TA C LE AU TH OR ITY
C O N T RO L G RA P H IC E XA M PL E
M EA SUR E FR O M TO
CORPS D IV Le tter A
De sign ation 2
ZONE
D IV BDE Effect G ra ph ic
O ption al
3
CORPS BDE 1 1
Nu m b er
De sign ation
B EL T D IV BDE 1
BDE TF
Effect Gra ph ic
No rm a l
1
CO E ffect Sy m bol is
TF TR P the G raphic
A B
O BST ACL E
RE STR ICTE D 52 ID
AR EA ANY 12 0900-
16 2400SepXX
(O R A )
G raphic
E ffects
Sym bols D isrupt Fix Turn Block
2-34
______________________________________ Common Tactical Concepts and Graphic Control Measures
2-105. If the obstacle zone encompasses the entire brigade AO, another
graphic is unnecessary. Commanders may designate the entire AO as an ob-
stacle zone, with the unit boundaries defining the geographical limits of the
zone. Obstacle zones do not cross brigade boundaries. Commanders assign ob-
stacle zones to a single subordinate unit to ensure unity of effort, just as they
would when assigning defensive AOs or battle positions. This keeps tactical
obstacle responsibility along the same lines as control of direct and indirect
fires. This does not normally create vulnerabilities on the boundary between
units since the commander bases his assignment of both subordinate AOs and
obstacle zones on defined avenues of approach.
2-106. A commander does not normally assign an obstacle effect (block, fix,
turn, or disrupt) to an obstacle zone. This allows his subordinate commanders
flexibility in using obstacles. The commander should establish construction
and resourcing priorities between different obstacle zones.
Obstacle Belts
2-107. An obstacle belt is a brigade-level command and control measure,
normally given graphically, to show where within an obstacle zone the
ground tactical commander plans to limit friendly obstacle employment and
focus the defense (JP 1-02). It assigns an intent to the obstacle plan and
provides the necessary guidance on the overall effect of obstacles within a
belt. They plan obstacle belts within assigned obstacle zones to grant
obstacle-emplacement authority to their major subordinate units. Obstacle
belts also focus obstacles to support the brigade scheme of maneuver and
ensure that obstacles do not interfere with the maneuver of any higher
headquarters.
2-108. Obstacle belts are restrictive, but also direct a subordinate unit to con-
struct one or more obstacles to achieve an effect in the area. They do not spe-
cify the type or number of obstacles. Obstacle belts do not cross unit bound-
aries for the same reasons as discussed in obstacle zones. A single unit is re-
sponsible for a belt; however, a commander may assign more than one belt to
a unit.
2-109. A brigade commander normally assigns an obstacle effect and priority
to each obstacle belt. As with the obstacle zone, the target and relative loca-
tion are apparent. Adding a specific obstacle effect gives purpose and direc-
tion to battalion task force obstacle planning. When brigade commanders
assign an obstacle effect, they ensure that obstacles within the belt comple-
ment the brigade fire plan.
2-110. A corps, division, or brigade commander may authorize emplacement
authority for certain types of protective obstacles outside of obstacle zones or
belts. Normally, the commander authorizes company team and base com-
manders to emplace protective obstacles within 500 meters of their positions,
depending on the factors of METT-TC. The commander usually limits the
types of obstacles a unit may use for protective obstacles that are outside of
obstacle-control measures. For example, he may allow only wire- and
command-detonated mines outside of control measures for protective obsta-
cles. Furthermore, he may require that minefields be fenced on all sides to
2-35
FM 3-90__________________________________________________________________________________
Obstacle Groups
2-111. Obstacle groups are one or more individual obstacles grouped
to provide a specific obstacle effect. Task forces use obstacle groups to
ensure that company teams emplace individual obstacles supporting the task
force’s scheme of maneuver. In rare cases, brigades, divisions, or even corps
may use obstacle groups for specific tactical obstacles. Also, units integrate
obstacle groups with their direct- and indirect-fire plans. Brigade and task
force commanders can plan their placement anywhere in the obstacle zones
or belts, respectively.
2-112. Unlike obstacle zones or belts, obstacle groups are not areas but rela-
tive locations for actual obstacles. Commanders normally show obstacle
groups using the obstacle-effect graphics. When detailed planning is possible
(to include detailed on-the-ground reconnaissance), commanders may show
obstacle groups using individual obstacle graphics.
2-113. The company team commander and the engineer can adjust obstacles
in the group if the intent and link to the fire plan remain intact. Company
team commanders make minor changes to obstacles and fire-control meas-
ures based on terrain realities. For example, a commander may move a fixing
obstacle group and direct-fire TRPs a hundred meters to avoid having them
masked by rolling terrain. A major change to the obstacle group location re-
quires the approval of the commander who ordered the obstacle group em-
placement.
Individual Obstacles
2-114. Each type of individual obstacle, such as abatis, antitank ditch, booby
traps, mines and minefields, roadblocks, craters, and wire obstacles has its
associated graphic. Once a unit constructs an individual obstacle, the ob-
stacle’s location is recorded and reported through the chain of command.
Commanders must report individual obstacles in sufficient detail so any unit
moving through the area can bypass or reduce the obstacle without excessive
risk. Each headquarters is responsible to ensure exact obstacle locations are
disseminated throughout its organization. Individual obstacle graphics are
rarely shown on maps above the battalion echelon and are not depicted in
this manual. (FM 3-34.1 defines individual obstacles and establishes the
graphics for them.)
Obstacle Restrictions
2-115. Commanders may use obstacle restrictions to provide additional obsta-
cle control and to limit the specific types of obstacles used, such as no buried
mines. These restrictions ensure that subordinates do not use obstacles with
characteristics that impair future operations. It also allows commanders to
focus the use of limited resources for the decisive operation by restricting
their use elsewhere. An obstacle restricted area (ORA) is a command and
control measure used to limit the type or number of obstacles within an area
(JP 1-02). The commander with emplacement authority uses ORAs to restrict
2-36
______________________________________ Common Tactical Concepts and Graphic Control Measures
obstacle placement. The ORA graphic depicts the area effected, the unit
imposing the restriction, and the restrictions in effect.
PHASE LINE
2-116. A phase line (PL) is a line utilized for control and coordination of mili-
tary operations, usually a terrain feature extending across the operational
area [JP 1-02 uses zone of action] (JP 1-02). (See Figure 2-27.) A commander
establishes PLs to control the maneuver of his units. Phase lines are not
boundaries unless designated as such and do not establish any specific
responsibilities between units, unless the operations order so specifies. When
possible, the commander places them along easily recognizable terrain
features—such as roads, railroad tracks, rivers, and ridgelines—to ensure
easy identification. As with boundaries, this is less important if all units are
equipped with precision navigation devices. Some PLs have additional
designations for specific purposes, such as a LD or a probable line of
deployment (PLD). Chapter 5 discusses these specific purposes.
PL ROBERT
PL RON
X
PL JOHN
PL BASIL
LD/LC
OBJ OBJ
ATTACK ZEKE PAT
PSN OBJ
KAI
(LIMIT OF ADVANCE)
GOLD
TF 2-58
II
TF 3-67
ATTACK
PSN
ASLT
BLUE AXIS PSN
PL JOHN
PL BASIL
PL ROBERT
JAN
LD/LC
PEGGY
PL RON
2-37
FM 3-90__________________________________________________________________________________
ROUTE
2-120. A route is the pre- 071800ZJUL00 19 RP 3
scribed course to be traveled
from a specific point of TCP 8
origin to a specific destina-
tion (JP 1-02). (See Route 50 80
40 50
Iron in Figure 2-29.) Routes 071600ZJUL00 13 A2
A2
20m
RU
IR 52
ed as adjectives to specify E 23
U
T
XX
RO
U AD MD
20 23 O
different types of routes. Ex- R
XX
ID AD
amples of such routes in- SP 7
LL 23
clude passing route and XX
JTF
main supply route (MSR). AA RAMONA
2-38
______________________________________ Common Tactical Concepts and Graphic Control Measures
2-39
PART TWO
Offensive Operations
Chapter 3
CONTENTS
Characteristics of Offensive Operations.... 3-1 Rally Point................................................ 3-10
Historical Example........................................ 3-1 Support-by-Fire Position........................ 3-10
Types of Offensive Operations ................... 3-3 Time of Attack ......................................... 3-11
Movement to Contact ............................... 3-3 Forms of Maneuver..................................... 3-11
Attack ......................................................... 3-3 Envelopment ........................................... 3-12
Exploitation ............................................... 3-4 Turning Movement.................................. 3-15
Pursuit........................................................ 3-4 Infiltration ................................................ 3-19
Common Offensive Control Measures ....... 3-4 Penetration .............................................. 3-25
Assault Position........................................ 3-4 Frontal Attack .......................................... 3-30
Assault Time.............................................. 3-4 Common Offensive Planning
Attack-by-Fire Position............................. 3-5 Considerations........................................ 3-33
Attack Position.......................................... 3-5 Intelligence .............................................. 3-33
Axis of Advance ........................................ 3-5 Maneuver ................................................. 3-35
Direction of Attack .................................... 3-6 Fire Support............................................. 3-41
Final Coordination Line............................ 3-6 Air Defense .............................................. 3-43
Limit of Advance ....................................... 3-7 Mobility/Countermobility/Survivability . 3-43
Line of Departure ...................................... 3-8 Combat Service Support ........................ 3-46
Objective.................................................... 3-9 Command and Control ........................... 3-48
Point of Departure .................................... 3-9 Transition..................................................... 3-50
Probable Line of Deployment .................. 3-9
3-0
The Basics of the Offense
3-1. The commander seizes, retains, and exploits the initiative when conduct-
ing offensive operations. Even in the defense, wresting the initiative from the
enemy requires offensive operations.
3-2. Offensive operations are either force- or terrain-oriented. Force-oriented
operations focus on the enemy. Terrain-oriented operations focus on seizing
and retaining control of terrain and facilities.
HISTORICAL EXAMPLE
3-4. The following vignette discusses the offensive operations of the 101st
Airborne Division (Air Assault) during OPERATION DESERT STORM. The
actions of the 101st Airborne Division between 24 and 28 February 1991 were
a shaping operation for the XVIII Airborne Corps.
The operation was scheduled to begin at 0400 on 24 February. The 1st Brigade’s
ground column departed the TAA at 0700. However, weather delayed the air
assault into FOB Cobra, approximately 150 kilometers north of the TAA, until
3-1
FM 3-90
0730. The assault elements of the brigade cleared the area within the FOB of
Iraqi soldiers by 1030, making it secure enough for AH-64 operations. Attack
helicopter operations from FOB Cobra into AO Eagle began by 1330 with patrols
along Highway 8. The CG, MG J.H. Binford Peay III, decided to bring in 2nd
Brigade to FOB Cobra that day while the weather permitted. However, he delayed
3rd Brigade’s assault into AO Eagle until 25 February.
HIGHW
AN NASIRIYAH
vehicles to use HIGHWAY 8 LZ
from LZ Sand, in SAND
AY 6
AO Eagle, to High-
way 8. The first air
BASRAH
assault on 25 Feb- FOB
ruary landed three COBRA FOB
VIPER
antiarmor compa- 6th
XX
XX
24th
nies, two infantry FR
RK EW
Mech
ET
MA R N
companies, and an
MS
artillery battalion
into the LZ, but
these units were
TAA CAMPBELL
unable to link up
with their parent
battalions until the
next day. The 3rd Figure 3-1. Initial Objectives
Brigade’s main
body cut Highway 8 at 1508 and secured the area by 1848. This later air assault
covered 156 miles and cut Highway 8 only 145 miles from Baghdad. Meanwhile,
the buildup of FOB Cobra continued, with 3rd Brigade’s second lift spending the
night there due to weather. The 101st also established contact with 24th Infantry
Division (ID) to its east. Farther north in AO Eagle, 3rd Brigade made sporadic
contact with Iraqi forces along Highway 8 during the night. With this, the 101st
Airborne achieved all of its initial objectives and began planning for subsequent
missions. It had pressed the fight, never let the enemy recover from the initial
blow, and exploited success at FOB Cobra and AO Eagle. (See Figure 3-1.)
3-2
The Basics of the Offense
The 101st launched its third major air assault at 0830, 27 February. The 2nd
Brigade assaulted into FOB Viper with an infantry battalion and a reinforced
artillery battalion augmented by engineers and air defense forces. By 1400, four
attack helicopter battalions began operations against EA Thomas. The 2nd
Brigade continued to close into FOB Viper. The division’s attack helicopters cut
the last escape route north out of Kuwait and destroyed 14 APCs, eight BM-21
MRLs, four MI-6 helicopters, and two SA-6 units. The Iraqi forces, unable to
escape north, lay in the paths of VII Corps and 24th ID. The 1st Brigade had
orders to air assault into EA Thomas on 28 February, but the cease-fire
precluded this operation. Although the actions of the 101st during these 100
hours were a shaping operation, they illustrate the tactical application of all of the
characteristics of offensive operations.
MOVEMENT TO CONTACT
3-6. Movement to contact is a type of offensive operation designed to develop
the situation and establish or regain contact (FM 3-0). The commander con-
ducts a movement to contact (MTC) when the enemy situation is vague or not
specific enough to conduct an attack. A search and attack is a specialized
technique of conducting a movement to contact in an environment of noncon-
tiguous AOs. Chapter 4 discusses MTC.
ATTACK
3-7. An attack is an offensive operation that
destroys or defeats enemy forces, seizes and
Forms of the Attack
secures terrain, or both (FM 3-0). Movement, · Ambush
supported by fires, characterizes the conduct of · Spoiling attack
an attack. However, based on his analysis of · Counterattack
the factors of METT-TC, the commander may · Raid
decide to conduct an attack using only fires. An · Feint
attack differs from a MTC because enemy main · Demonstration
body dispositions are at least partially known,
3-3
FM 3-90
EXPLOITATION
3-9. Exploitation is a type of offensive operation that rapidly follows a suc-
cessful attack and is designed to disorganize the enemy in depth (FM 3-0).
The objective of an exploitation is to complete the enemy’s disintegration.
Chapter 6 discusses exploitation.
PURSUIT
3-10. A pursuit is an offensive operation designed to catch or cut off a hostile
force attempting to escape, with the aim of destroying it (JP 1-02). A pursuit
normally follows a successful exploitation. However, if it is apparent that en-
emy resistance has broken down entirely and the enemy is fleeing the battle-
field, any other type or subordinate form of offensive operation can transition
into a pursuit. Chapter 7 discusses the pursuit.
ASSAULT POSITION
3-12. An assault position is a covered and concealed position short of
the objective from which final preparations are made to assault the
objective. Ideally, it offers both cover and concealment. These final prepara-
tions can involve tactical considerations, such as a short halt to coordinate
the final assault, reorganize to adjust to combat losses, or make necessary ad-
justments in the attacking force’s dispositions. These preparations can also
involve technical items, such as engineers conducting their final prepare-to-
fire checks on obstacle clearing systems and the crews of plow- and roller-
equipped tanks removing their locking pins. It may be located near to either a
final coordination line (FCL) or a probable line of deployment (PLD). (Para-
graphs 3-18 and 3-23 define a FCL and a PLD respectively.)
ASSAULT TIME
3-13. The assault time establishes the moment to attack the initial ob-
jectives throughout the geographical scope of the operation. It is im-
posed by the higher headquarters in operations to achieve simultaneous
3-4
The Basics of the Offense
results by several different units. It synchronizes the moment the enemy feels
the effects of friendly combat power. It is similar to the time-on-target control
method for fire mission processing used by the field artillery. A commander
uses it instead of a time of attack (defined in paragraph 3-26) because of the
different distances that elements of his force must traverse, known obstacles,
and differences in each unit’s tactical mobility.
ATTACK-BY-FIRE POSITION
3-14. An attack-by-fire position des-
ignates the general position from
which a unit conducts the tactical
task of attack by fire. (Appendix B
defines the tactical mission task of at-
tack by fire.) The purpose of these posi-
tions is to mass the effects of direct fire
systems for one or multiple locations
toward the enemy. An attack-by-fire BRANDON
position does not indicate the specific
site. Attack-by-fire positions are rarely
applicable to units larger than com- Figure 3-2. Attack-by-Fire
pany size. Figure 3-2 depicts attack-by- Position BRANDON
fire position BRANDON.
ATTACK POSITION
3-15. The attack position is the last position an attacking force occu-
pies or passes through before crossing the line of departure. An at-
tack position facilitates the deployment and last-minute coordination of the
attacking force before it crosses the LD. It is located on the friendly side of
the LD and offers cover and concealment for the attacking force. It is used
primarily at battalion level and below. Whenever possible, units move
through the attack position without stopping. An attacking unit occupies an
attack position for a variety of reasons; for example, when the unit is waiting
for specific results from preparatory fires or when it is necessary to conduct
additional coordination, such as a forward passage of lines. If the attacking
unit occupies the attack position, it stays there for the shortest amount of
time possible to avoid offering the enemy a lucrative target. (Figure 3-3 on
page 3-6 shows attack positions BLUE and GOLD used in conjunction with
other common offensive control measures.)
AXIS OF ADVANCE
3-16. An axis of advance designates the general area through which
the bulk of a unit’s combat power must move. There are three primary
reasons why a commander uses an axis of advance. First, to direct the bypass
of locations that could delay the progress of the advancing force, such as
known contaminated areas. Second, to indicate that he does not require the
force to clear the AO as it advances. His force will be required to clear the
axis in accordance with specified bypass criteria. The third primary reason is
to indicate to a unit involved in offensive encirclement, exploitation, or
3-5
FM 3-90
II
PL ROBERT
PL JOHN
PL DICK
PL BASIL
TF 3-67
RP 2
LD/LC
3
(LOA)
(PLD)
N
N JOA
T IO
ATTACK 11 C CK
RE TA OBJ
PSN PD 7 I
D AT
PL RON
ZEKE
GOLD OF
PAT
OBJ
A/2-58
OBJ
I KAI
C/3-67 X
ASLT
ATTACK
PSN
PSN AXIS JAN PEGGY
BLUE
PL BASIL
PL ROBERT
(LOA)
LD/LC
PL JOHN
(PLD)
PL DICK
PL RON
TF 3-67
II
Figure 3-3. Attack Positions Used with Other Common Offensive Control Measures
pursuit operations the need to move rapidly toward an objective. Figure 3-4
depicts axis of advance DEBRA.
DIRECTION OF ATTACK
3-17. The direction of attack is a
specific direction or assigned route a
force uses and does not deviate from
when attacking. It is a restrictive con- AXIS DEBRA
trol measure. The commander’s use of a
direction of attack maximizes his control
over the movement of his unit, and he of- Figure 3-4. Axis of Advance
ten uses it during night attacks, infil-
trations, and when attacking through smoke. The commander establishes a
direction of attack through a variety of means, such as target reference
points, checkpoints, global positioning system (GPS) way points, using ground
surveillance radar to track the attack force, and the impact of artillery shells.
Target reference points placed on recognizable terrain provide the com-
mander with the capability to rapidly shift fires and reorient his maneuver
forces. When using a direction of attack, the commander designates a point of
departure (PD). (Figure 3-5 depicts direction of attack JOAN and PD 6.)
3-6
The Basics of the Offense
K
E
AN AC
gade.) PD 6 R
DI
JO TT
A
OF
LIMIT OF ADVANCE
3-19. The limit of advance (LOA) is
a phase line used to control for-
Figure 3-5. Direction of Attack JOAN
ward progress of the attack. The
attacking unit does not advance
any of its elements or assets beyond the LOA, but the attacking unit
can push its security forces to that limit. A commander usually selects a
linear terrain feature, perpendicular to the direction of attack, on the far side
of the objective as the LOA because such a terrain feature is easily identifi-
able. The commander employs a LOA to prevent overextending the attacking
force and reduce the possibility of fratricide by fires supporting the attack.
The commander positions a LOA far enough beyond the objective to allow the
unit to defend the objective. An LOA prevents units from exploiting success
and launching a pursuit; therefore, a commander should only use it if he does
not want the unit to conduct an exploitation or pursuit. A forward boundary
is always a LOA, but a LOA is not necessarily a forward boundary. In fact, a
X
PL JOHN
4 RP 2
LD/LC
3
(FCL)
PL ROBERT
N AN
O JO
TI
C CK
ATTACK
PSN PD 7 I R E TA OBJ
D AT ZEKE
GOLD F
O
PAT
OBJ
11 TF 2-58
OBJ
II KAI
TF 3-67 X
ASLT
ATTACK
PSN
PSN AXIS JAN PEGGY
BLUE
PL ROBERT
LD/LC
PL JOHN
(FCL)
2AD
XX
3-7
FM 3-90
LOA and the unit’s forward boundary should rarely coincide because of the
resulting limitations that a forward boundary places on supporting fires be-
yond the forward boundary. Figure 3-7 shows PL BASIL used as 4th Bri-
gade’s LOA.
PL ROBERT
(FCL)
PL JOHN
PL BASIL
(LOA)
LD/LC
4
ATTACK
OBJ
PSN
ZEKE
GOLD
PAT
OBJ
TF 2-58
OBJ
II KAI
TF 3-67 X
ASLT
ATTACK PSN
PSN PEGGY
BLUE
PL ROBERT
PL BASIL
(LOA)
LD/LC
PL JOHN
(FCL)
2AD
XX
Figure 3-7. Limit of Advance Used with Other Common Control Measures
LINE OF DEPARTURE
3-20. The line of departure is a
phase line crossed at a prescribed
time by troops initiating an offen-
sive operation. The purpose of the
LD is to coordinate the advance of the X X
attacking force so that its elements
strike the enemy in the order and at PL DON PL DON
the time desired. The LD also marks (LD) (LD)
where the unit transitions from move-
ment to maneuver. The commander
can also use it to facilitate the coordi- Figure 3-8. PL DON as a LD
nation of fires. Generally, it should be
perpendicular to the direction the attacking force will take on its way to the
objective. Friendly forces should control the LD. The commander analyzes the
terrain before designating his LD. Different units have different movement
rates on leaving their assembly areas (AAs) based on their inherent mobility
characteristics and the terrain being crossed. The commander considers these
different characteristics when establishing the LD to prevent these dif-
ferences from affecting the synchronization of the operation. When possible,
the commander selects the LD so that the terrain the attack unit traverses
before crossing the LD provides sufficient cover for the attacking unit’s final
3-8
The Basics of the Offense
deployment into a combat formation before crossing the LD. In many cases
the LD is also the line of contact because the unit in contact is conducting the
attack from its current positions. Figure 3-8 depicts PL DON as the LD.
(Chapter 2 contains a definition for a line of contact.)
OBJECTIVE
3-21. An objective is a location on the
ground used to orient operations, phase
operations, facilitate changes of direc- OBJECTIVE
tion, and provide for unity of effort. An STEVE
objective can be either terrain- or force-
oriented. Terrain objectives should be easily
identifiable on the ground to facilitate their OBJ OBJ
recognition. The commander determines his JOHN HARRY
force-oriented objectives based on known ene-
my positions. The commander normally as-
signs his subordinate commanders only their
final objectives, but can assign intermediate
Figure 3-9. Objective STEVE
objectives as necessary. Figure 3-9 depicts ob-
jective STEVE. Objective STEVE is further broken down into two subordinate
objectives, objective JOHN and objective HARRY.
POINT OF DEPARTURE
3-22. The point of departure is the point
where the unit crosses the LD and
7
begins moving along a direction of
attack. Units conducting reconnaissance and
security patrols and other operations in a
low-visibility environment commonly use a
PD
PD as a control measure. Like a LD, it marks
the point where the unit transitions from
movement to maneuver under conditions of
limited visibility. Figure 3-10 depicts PD 7. Figure 3-10. Point
of Departure 7
PROBABLE LINE OF DEPLOYMENT
3-23. A probable line of deployment is a phase line that a commander
designates as the location where he intends to completely deploy his
unit into assault formation before beginning the assault. The PLD is
used primarily at battalion level and below when the unit does not cross the
LD in its assault formation. It is usually a linear terrain feature perpendi-
cular to the direction of attack and recognizable under conditions of limited
visibility. The PLD should be located outside the range where the enemy can
place the attacking force under effective direct fire. It has no use except as it
relates to the enemy. In Figure 3-11, page 3-10, PL ROBERT is also the PLD.
3-9
FM 3-90
PL JOHN
PL ROBERT
4
LD/LC
(PLD)
ATTACK
OBJ
PSN
ZEKE
G O LD
PAT
OBJ
T F 2-58
OBJ
II KAI
T F 3-6 7 X
ASLT
ATTACK
PSN
PSN
PEG G Y
BLUE
PL ROBERT
LD/LC
PL JOHN
(PLD)
2A D
XX
Figure 3-11. Probable Line of Deployment ROBERT Used with Other Control Measures
RALLY POINT
3-24. A rally point is an easily identifiable
point on the ground at which units can
RLY 14
reassemble and reorganize if they become
dispersed. Alternatively it is an easily identi-
fiable point on the ground at which aircrews
and passengers can assemble and reorganize
following an incident requiring a forced
landing. Forces conducting a patrol or an infiltra-
tion commonly use this control measure. The
objective rally point (ORP) is a rally point Figure 3-12.
established on an easily identifiable point on Rally Point 14
the ground where all elements of the infil-
trating unit assemble and prepare to attack the objective. It is typi-
cally near the infiltrating unit’s objective; however, there is no standard dis-
tance from the objective to the ORP. It should be far enough away from the
objective so that the enemy will not detect the infiltrating unit’s attack prepa-
rations. Figure 3-12 depicts Rally Point 14.
SUPPORT-BY-FIRE POSITION
3-25. A support-by-fire position designates the general position from
which a unit conducts the tactical mission task of support by fire.
(Appendix B defines the tactical mission task of support by fire.) The purpose
of these positions is to increase the supported force’s freedom of maneuver by
placing direct fires on an objective that is going to be assaulted by a friendly
force. Support-by-fire positions are located within the maximum friendly
direct-fire range of the enemy positions. The commander selects them so that
the moving assault force does not mask its supporting fires. For this reason,
3-10
The Basics of the Offense
FORMS OF MANEUVER
3-28. The forms of maneuver are envelopment,
turning movement, frontal attack, penetration, Forms of Maneuver
and infiltration. Combined arms organizations · Envelopment
seeking to accomplish their assigned mission · Turning movement
synchronize the contributions of all battlefield · Frontal attack
operating systems (BOS) to execute these forms · Penetration
of maneuver. The commander generally chooses · Infiltration
one form on which he builds a course of action
(COA). The higher commander rarely specifies the specific form of offensive
maneuver. However, his guidance and intent, along with the mission that in-
cludes implied tasks, may impose constraints such as time, security, and di-
rection of attack that narrow the forms of offensive maneuver to one alterna-
tive. Additionally, the AO’s characteristics and the enemy’s dispositions also
help determine the form of offensive maneuver selected. A single operation
may contain several forms of offensive maneuver, such as a frontal attack to
clear a security area followed by a penetration to create a gap in enemy
defenses. An envelopment would follow to destroy the enemy’s first line of
defense.
3-11
FM 3-90
ENVELOPMENT
3-29. An envelopment is a form of maneuver in which an attacking force
seeks to avoid the principal enemy defenses by seizing objectives to the en-
emy rear to destroy the enemy in his current positions. At the tactical level,
envelopments focus on seizing terrain, destroying specific enemy forces, and
interdicting enemy withdrawal routes (FM 3-0). Also, at the tactical level, air-
borne and air assault operations are vertical envelopments. (See Appendix C.)
The commander’s decisive operation focuses on attacking an assailable flank.
It avoids the enemy’s strength—his front—where the effects of his fires and
obstacles are the greatest. Generally, a commander prefers to conduct an en-
velopment instead of a penetration or a frontal attack because the attacking
force tends to suffer fewer casualties while having the most opportunities to
destroy the enemy. An envelopment also produces great psychological shock
on the enemy. If no assailable flank is available, the attacking force creates
one. The four varieties of envelopment are single envelopment, double
envelopment, encirclement, and vertical envelopment. (See Figures 3-14
and 3-15.) For a discussion of the use of vertical envelopments, see Appen-
dix C. For a discussion of encirclement operations, see Appendix D.
S S
ENY ENY
ENVELOPING V
FORCE
FIXING FORCES
RESERVE
3-30. Single and double envelopments force the enemy to fight in two or more
directions simultaneously to meet the converging efforts of the attack. A
double envelopment generally requires a preponderance of force and can be
difficult to control. A force seeking to execute a double envelopment must also
have a substantial mobility advantage over the defender. A unit performs a
double envelopment by conducting a frontal attack as a shaping operation in
the center to fix the enemy in place while enveloping both hostile flanks. Be-
cause of the forces required, normally only divisions and larger organizations
have the resources to execute a double envelopment.
3-12
The Basics of the Offense
S S
OBJ
OBJ
KRISTA
GINA
EN Y EN Y
ENVELOPING V
FO RCE
FIX IN G FORCE
E NVELOPIN G
FOR CE
R ESERVE
Control Measures
3-32. The commander, at a minimum, designates AOs for each unit partici-
pating in the envelopment by using boundaries. He also designates PLs,
support-by-fire and attack-by-fire positions, contact points, and appropriate
fire coordination measures, such as a restricted fire line or boundary between
converging forces, and any other control measures he feels are necessary to
control the envelopment. Figure 3-16 on page 3-14 is an example of control
measures used when conducting a single envelopment.
Planning an Envelopment
3-33. Successful planning for an envelopment depends on knowing and un-
derstanding the enemy and his capabilities. The commander wants to maneu-
ver his enveloping force around or over the enemy’s main defenses to secure
objectives on the enemy’s flank or rear. From those objectives the enveloping
force can use its positional advantage to employ superior combat power
3-13
FM 3-90
XXX
PL FELIX
PL
(LOA)
BI
LL
Y
XX
PL FELIX
22
(LOA)
S OBJ
D JOHN
XXX
XXX
AR
W
ED
PL
BI
LL
OBJ
S
Y
A XI
PHIL
PL LYNN PL LYNN
(LD/LC) (LD/LC)
17
XX
XX XX
AA RESERVE
XXX
Figure 3-16. Control Measures for Conducting an Envelopment
3-34. The commander plans for the force conducting the envelopment to re-
main within supporting distance of the fixing force. (If the enveloping force is
going outside of supporting distance, it is probably conducting a turning
movement, not an envelopment.)
3-35. Sustaining the enveloping force requires deliberate planning because
only intermittent ground lines of communication (LOCs) between the rear
area and the enveloping force may exist. A line of communication is a route,
either land, water, and/or air that connects an operating military force with a
base of operations and along which supplies and military forces move
(JP 1-02).
3-36. The commander plans how he will exploit the success of his envelop-
ment as he encircles the enemy or transitions to a pursuit to complete the de-
struction of the enemy force. These plans are developed as branches and se-
quels to the envelopment operation.
Executing an Envelopment
3-37. A successful envelopment depends largely on the degree of surprise the
commander achieves against his opponent or the presence of overwhelming
combat power. The envelopment’s probability of success also increases when
the commander’s forces have superior tactical mobility, possess air and
3-14
The Basics of the Offense
information superiority, and his shaping operations fix the bulk of the
enemy’s forces in their current positions. The commander uses his intelli-
gence, surveillance, and reconnaissance (ISR) systems to provide continuous
intelligence and combat information to identify changes in enemy COAs
throughout the execution of the envelopment.
3-38. Normally, a unit orients the majority of its combat power toward where
it expects to engage enemy forces, while placing less combat power on its own
flanks. Thus the flanks of most units are more vulnerable to attack. The com-
mander creates an assailable flank using whatever means necessary. The en-
veloping force then moves rapidly to exploit the situation before the enemy
strengthens an assailable flank by preparing positions in depth and by
holding mobile forces in reserve. When faced with the threat of envelopment,
the enemy commander might move his reserves to meet the enveloping force.
Thus, rapid movement around the enemy’s flank is essential to prevent him
from occupying previously prepared positions. Vigorous shaping operations
conducted by ground and air assets aim to prevent him from reconstituting
reserves from other portions of his front.
3-39. The enemy may attempt to cut off the enveloping force and extend his
flank beyond the area that the enveloping force is attempting to attack
through. If the encircling force attempts to outflank such hostile extension, it
may become overextended by moving outside of supporting distance from the
fixing force. Therefore, it is usually better for the encircling force to take ad-
vantage of the enemy’s extension and subsequent weakness by penetrating a
thinly held area of the enemy’s front rather than overextending itself in an
attempt to completely outflank the enemy’s position.
3-40. The enemy may attempt a frontal counterattack in response to an at-
tempted envelopment. In this case, the fixing force defends itself or conducts
a delay while the enveloping force continues the envelopment.
3-41. After the initial envelopment of one flank—which places the enemy at a
disadvantage—the commander has many options. He may choose to establish
favorable conditions for passing to a double envelopment by using reserves or
exploit success by generating additional combat power along the same axis.
Alternatively, he can destroy or defeat the enveloped enemy force in place, or
transition to another type of operation, such as exploitation or pursuit.
TURNING MOVEMENT
3-42. A turning movement is a form of maneuver in which the attacking force
seeks to avoid the enemy’s principle defensive positions by seizing objectives
to the enemy rear and causing the enemy to move out of his current positions
or divert major forces to meet the threat (FM 3-0). However, a commander
can employ a vertical envelopment using airborne or air assault forces to
effect a turning movement. (Appendix C discusses airborne and air assault
operations.) A commander uses this form of offensive maneuver to seize vital
areas in the enemy’s rear before the main enemy force can withdraw or
receive support or reinforcements. See Figure 3-17 on page 3-16 for a graphic
depiction of a turning movement. This form of offensive maneuver frequently
transitions from the attack into an exploitation or pursuit. A turning move-
ment differs from an envelopment because the force conducting a turning
3-15
FM 3-90
movement seeks to make the enemy displace from his current locations,
whereas an enveloping force seeks to engage the enemy in his current loca-
tion from an unexpected direction.
OBJ DAVOUT
V
ENY
ENY
OBJ KARL
TURNING
FORCE
ENY
ENY
SHAPING
OPERATION
MAIN BODY RESERVE
3-16
The Basics of the Offense
3-45. The commander task organizes his main body to ensure the success of
the turning force. The main body conducts operations, such as attacks
designed to divert the enemy’s attention away from the area where the
turning force conducts its operations. The operations of the main body can be
either the echelon’s decisive or shaping operations. The commander organizes
his reserve to exploit success by either the turning force or the main body.
The reserve also provides the commander insurance against unexpected
enemy actions.
Control Measures
3-46. The commander designates the AOs for each unit participating in the
turning movement by establishing boundaries. He also designates additional
control measures as necessary to synchronize the operations of his subordi-
nates. These additional control measures include: phase lines (PLs), contact
points, objectives, LOA, and appropriate fire coordination measures. Fig-
ure 3-18 depicts these control measures used to synchronize a turning move-
ment that employs an airborne division as the turning force. (Appendix C dis-
cusses control measures associated with airborne and air assault operations.)
PL JOELLE PL JOELLE
(I CORPS CFL) ( I CORPS CFL)
PL GAVIN
(AIRHEAD LINE)
XX
OBJ
GOOD
PL ROBBIN
(LOA)
PL MONICA XX PL MONICA
XX
CK
LU
J
B
O
3-17
FM 3-90
3-18
The Basics of the Offense
INFILTRATION
3-56. An infiltration is a form of maneuver in which an attacking force con-
ducts undetected movement through or into an area occupied by enemy forces
to occupy a position of advantage in the enemy rear while exposing only small
elements to enemy defensive fires (FM 3-0). Infiltration is also a march
technique used within friendly territory to move forces in small groups at ex-
tended or irregular intervals. (See Chapter 14 for a discussion of infiltration
as a movement technique.)
3-57. Infiltration occurs by land, water, air, or a combination of means. Mov-
ing and assembling forces covertly through enemy positions takes a consider-
able amount of time. To successfully infiltrate, the force must avoid detection
and engagement. Since this requirement limits the size and strength of the
infiltrating force—and infiltrated forces alone can rarely defeat an enemy
force—infiltration is normally used in conjunction with and in support of the
other forms of offensive maneuver. Historically, the scope of the mission for
the infiltrating force has been limited.
3-58. The commander orders an infiltration to move all or a portion of a unit
through gaps in the enemy’s defenses to—
3-19
FM 3-90
Organization of Forces
3-60. Normally, to be successful, the infiltrating force must avoid detection at
least until it reaches its ORP. Thus, the infiltrating force’s size, strength, and
composition is usually limited. The infiltrating unit commander organizes his
main body into one or more infiltrating elements. The largest size element
possible, compatible with the requirement for stealth and ease of movement,
conducts the infiltration. This increases the commander’s control, speeds the
execution of the infiltration, and provides responsive combat power. The
exact size and number of infiltrating elements are situationally dependent.
3-61. The commander considers the following factors when determining how
to organize his forces. Smaller infiltrating elements are not as easy to detect
and can get through smaller defensive gaps. Even the detection of one or two
small elements by the enemy will not prevent the unit from accomplishing its
mission in most cases. Larger infiltrating elements are easier to detect and
their discovery is more apt to endanger the success of the mission. Also, they
require larger gaps to move through. A unit with many smaller infiltrating
elements requires more time to complete the infiltration and needs more link-
up points than a similar size unit with only a few infiltrating elements. Many
infiltrating elements are also harder to control than fewer, larger elements.
3-62. The commander resources a security force that moves ahead of, to the
flanks of, and to the rear of each infiltrating element’s main body. These se-
curity forces can be given either a screen or a guard mission. (Chapter 12 dis-
cusses screen and guard missions.) The sizes and orientations of security ele-
ments are also situationally dependent. Each infiltrating element is respon-
sible for its own reconnaissance effort.
3-63. Sustainment of an infiltrating force normally depends on the force’s
basic load of supplies and those medical and maintenance assets
accompanying the infiltrating force. After completing the mission, the
commander reopens LOCs to conduct normal sustaining operations.
3-20
The Basics of the Offense
Control Measures
3-64. Control measures for an infiltration include, as a minimum—
· An AO for the infiltrating unit.
· One or more infiltration lanes.
· A LD or point of departure.
· Movement routes with their associated start and release points, or a di-
rection or axis of attack.
· Linkup or rally points, including ORPs.
· Assault positions.
· One or more objectives.
· A LOA.
The commander can impose other measures to control the infiltration includ-
ing checkpoints, PLs, and assault positions on the flank or rear of enemy posi-
tions. If it is not necessary for the entire infiltrating unit to reassemble to ac-
complish its mission, the objective may be broken into smaller objectives.
Each infiltrating element would then move directly to its objective to conduct
operations. (Most of these control measures have been previously described.)
The following paragraphs describe using an infiltration lane and a linkup
point.
3-65. An infiltration lane is a control measure that
coordinates forward and lateral movement of
infiltrating units and fixes fire planning responsi-
bilities. The commander selects infiltration lanes that
avoid the enemy, provide cover and concealment, and fa-
cilitate navigation. Figure 3-19 depicts the graphic for an
infiltration lane. Each unit assigned an infiltration lane
picks its own routes within the lane and switches routes
as necessary. The left and right limits of the infiltration Figure 3-19.
lane act as lateral boundaries for the unit conducting the Infiltration Lane
infiltration. Attacks by rotary- or fixed-wing aircraft,
indirect fires, or munitions effects that impact the lane must be coordinated
with the infiltrating unit. Units leaving their assigned lane run the risk of
being hit by friendly fires. Company-size units are normally assigned a single
infiltration lane, although they can use more than one lane. Larger organiza-
tions, battalion and above, are always assigned more than one infiltration
lane.
3-66. A linkup point is where two infiltrating ele-
ments in the same or different infiltration lanes
are scheduled to meet to consolidate before pro-
ceeding on with their missions. Figure 3-20 depicts
Linkup Point 8. A linkup point is normally positioned
LU 8
in the enemy’s rear or along one of his flanks. It should
be large enough for all infiltrating elements to
assemble and should offer cover and concealment for
these elements. It should be an easily identifiable point
on the ground. The commander should position his Figure 3-20. Linkup
linkup points on defensible terrain located away from Point 8
normal enemy troop movement routes.
3-21
FM 3-90
Planning an Infiltration
3-67. The activities and functions associated with the process of planning an
infiltration are the same as with any other combat operation. That planning
takes advantage of that unit’s stealth capabilities to surprise the enemy. The
planning process synchronizes the BOS that support the infiltrating unit, es-
pecially precise, high-resolution intelligence. Without precise, detailed intelli-
gence, infiltration maneuvers become high-risk probing operations, that can
be costly and time-consuming. Careful planning, full ISR integration, detailed
analysis, and aggressive operations security can permit an infiltrating force
to avoid an enemy force, minimize direct contact, and maximize surprise ac-
cording to the commander’s intent.
3-68. After identifying gaps or weaknesses in the enemy’s defensive positions,
the commander assigns infiltration lanes, contact points, and objectives to
subordinate units. These objectives afford the infiltrating force positions of
greatest advantage over the enemy and are not required to be to the geo-
graphic rear of the targeted enemy force. Each subordinate unit commander
picks one or more routes within his assigned lane and establishes additional
contact points, rally points, assault points, and other control measures as re-
quired. The commander wants each of the routes within an infiltration lane
to be far enough apart to prevent an infiltrating element on one route from
seeing other infiltrating elements, but close enough so that an infiltrating ele-
ment could switch quickly to another route if required by the situation. The
commander wants each route to provide his infiltrating elements cover and
concealment while avoiding known enemy and civilian locations and move-
ment routes to the maximum extent possible. If possible, the subordinate unit
commander selects his exact routes during the preparation phase after recon-
noitering each infiltration lane. He decides whether his unit will infiltrate as
a unit, in smaller elements, or even as two-man buddy teams, depending on
the density and strength of the enemy.
3-69. The commander may use single or multiple infiltration lanes depending
on the infiltrating force’s size, the amount of detailed information on enemy
dispositions and terrain accessible, time allowed, and number of lanes avail-
able. A single infiltration lane—
· Facilitates navigation, control, and reassembly.
· Requires the existence or creation of only one gap in the enemy’s posi-
tion.
· Reduces the area for which detailed intelligence is required.
3-70. Multiple infiltration lanes—
· Require the existence or creation of more gaps in the enemy’s security
area.
· Reduce the possibility of compromising the entire force.
· Increase difficulty with maintaining control.
3-71. The sizes and numbers of infiltrating elements are major considerations
for the commander when he is deciding whether to use a single lane or
multiple infiltration lanes. If the infiltration takes place using multiple
elements, contingency plans must address the following situations:
3-22
The Basics of the Offense
· A lead element, possibly the advance guard, makes contact, but the
trail elements have not started infiltrating.
· A lead element infiltrates successfully, but compromises one or more
trailing elements.
· A compromised linkup point.
3-72. The commander uses available technology to assist in planning the in-
filtration and avoiding unintended enemy and civilian contact during the
infiltration. This can be as simple as all units using the same infiltrating lane
being on the same frequency to facilitate the avoidance of enemy contact. An
accurate depiction of enemy systems and locations, tied to rapid terrain anal-
ysis, can graphically depict dead spots in the enemy’s battlefield surveillance.
The commander can then plan how to expand those existing dead spots into
infiltration lanes through a precision attack of selected enemy elements and
systems.
3-73. The plan also addresses the following considerations:
· Availability of supporting fires, including rotary- and fixed-wing air-
craft and offensive information operations—especially electronic attack,
throughout the operation, during infiltration and the attack on the ob-
jective.
· Linkup or extraction of the infiltrating unit after mission completion.
· Sustainment of the infiltrating force during the operation, to include
casualty evacuation.
· Deception operations, such as actions by other units designed to divert
enemy attention from the area selected for the infiltration.
· Linkup of the various infiltrating elements.
· Command and control (C2), to include recognition signals.
· Positioning of combat vehicles to support the infiltrating elements.
· Using limited visibility and rough terrain to mask movement and re-
duce the chance of detection.
· Infiltration of the largest elements possible to maintain control.
· Rehearsals.
· Specially required preparations, such as modifying the unit’s SOP re-
garding the soldier’s combat load for the mission. When infiltrating on
foot, units carry only required equipment. For example, in close terrain
and in the absence of an armor threat, heavy antiarmor missile sys-
tems may be a liability.
· Abort criteria.
· Critical friendly zones.
3-74. Planned recognition signals and linkup procedures for the infiltration
should be simple and quick. If there has not been any firing or any other
noises, signals should not violate noise and light discipline. However, if there
have already been assaults, artillery, and small-arms fire, signals, such as
whistles and flares, can be used as linkup aids. A lack of time and the short
distance involved in many infiltration operations may make conducting for-
mal linkup procedures unnecessary.
3-23
FM 3-90
Preparing an Infiltration
3-75. Once the commander selects the objective, infiltration lanes, and linkup
or rally points, he directs ISR operations to update and confirm the details on
which he bases his plan. He identifies enemy sensors and surveillance
systems. He then revises the plan to reflect current conditions within the AO.
Executing an Infiltration
3-76. Moving undetected during an infiltration requires a considerable
amount of time. The infiltrating unit moves from its AA or current position
through the start point and then continues moving along the infiltration
route to a release point. If buddy teams or small elements are conducting the
infiltration, the unit uses a series of linkup points to reassemble into a coher-
ent unit. Units can use a variety of navigation aids, such as GPS, to remain
within the planned infiltration lane, which minimizes their chances of detec-
tion by the enemy. At the same time, they report their progress and status
using communication systems that provide this information automatically to
all command nodes which require this information.
3-77. If the complete unit is conducting the infiltration, the forward security
force begins its movement first, followed by the main body. The distance be-
tween the forward security force and the main body depends on the factors of
METT-TC. The advance guard must be far enough ahead of the main body so
that it can either deploy or move to another route if the forward security force
discovers the enemy. The forward security force in an infiltration must have
enough time to move in a stealthy and secure manner. Enemy units should
not be able to move undetected in the gap between the forward security force
and the main body.
3-78. As the infiltrating unit moves, the advance guard reports to the com-
mander regarding the cover and concealment of each route, enemy activity,
location of danger areas and linkup points, enemy activity on the objective,
and other combat information. The unit attempts to avoid enemy and civilian
contact; however, contact does not always mean the mission is compromised.
The infiltrating unit engages targets first with indirect fires to avoid reveal-
ing its presence and exact location. These fires include the conduct of offen-
sive information operations designed to blind enemy ISR assets and prevent
the enemy from coordinating an effective response to the infiltration.
3-79. If necessary, the forward security force conducts actions on contact
while the main body moves to another route, reconstitutes a forward security
force, and continues the mission. If the main body makes contact unexpec-
tedly, it either overruns the enemy force, if the enemy has little combat
power, or bypasses him and continues the mission. During the infiltration,
the unit ignores ineffective enemy fire and continues to move. The command-
er may use suppressive fires against the enemy to cover the sounds of the in-
filtration or to divert the enemy’s attention to areas other than where the
infiltration lanes are located.
3-80. The infiltrating unit’s elements move to an AA or an ORP to consolidate
its combat power, refine the plan, and conduct any last-minute coordination
prior to continuing the mission. The unit then conducts those tasks needed to
3-24
The Basics of the Offense
accomplish its assigned mission, which could be an attack, raid, ambush, seiz-
ing key terrain, capturing prisoners, or collecting specific combat information.
3-81. A commander may need to abort an infiltration operation if the factors
of METT-TC change so drastically during the infiltration that the infiltrating
force is no longer capable of accomplishing its mission. Examples of changes
that might trigger such an action include—
· Significant portions of the infiltrating force’s combat power are lost
through navigation errors, enemy action, accidents, or maintenance
failures.
· Movement or significant reinforcement of a force-oriented objective.
· Detection of the infiltration by the enemy.
· Changes in the tactical situation that make the mission no longer ap-
propriate, such as the initiation of an enemy attack.
The criteria for aborting the operation are developed in the planning process.
The decision to abort the infiltration is transmitted to all appropriate head-
quarters for their action and information.
PENETRATION
3-82. A penetration a form of maneuver in which an attacking force seeks to
rupture enemy defenses on a narrow front to disrupt the defensive system
(FM 3-0). Destroying the continuity of that defense allows the enemy’s
subsequent isolation and defeat in detail by exploiting friendly forces. The
penetration extends from the enemy’s security area through his main defen-
sive positions into his rear area. A commander employs a penetration when
there is no assailable flank, enemy defenses are overextended and weak spots
are detected in the enemy’s positions, or time pressures do not permit an
envelopment.
Organization of Forces
3-83. Penetrating a well-organized position requires overwhelming combat
power in the area of penetration and combat superiority to continue the mo-
mentum of the attack. (See Figure 3-21, page 3-26.) The commander desig-
nates a breach, support, and assault force. He can designate these elements
for each defensive position that he is required to penetrate. He should not
withhold combat power from the initial penetration to conduct additional
penetration unless he has so much combat power that the success of the ini-
tial penetration is assured.
3-84. The commander resources a reserve to deal with expected or unexpec-
ted contingencies, such as an enemy counterattack, to avoid diverting the as-
sault element from attacking the final objective of the penetration. He desig-
nates additional units follow-and-support or follow-and-assume missions to
ensure rapid exploitation of initial success. He designates forces to fix enemy
reserves in their current locations and isolate enemy forces within the area
selected for penetration.
3-25
FM 3-90
XXX
DIVISION
SHAPING
OPERATIONS 3:1
DIVISION DECISIVE X
OPERATIONS 9:1
(LEAD BATTALION 18:1)
XX
XXX
Figure 3-21. Penetration: Relative Combat Power
Control Measures
3-85. A commander assigns, as a minimum, an AO to every maneuver unit, a
LD or LC; time of the attack or time of assault; phase lines; objective; and a
LOA to control and synchronize the attack. (A commander can use a battle
handover line instead of a LOA if he knows where he would like to commit a
follow-and-assume force.) The lateral boundaries of the unit making the deci-
sive operation are narrowly drawn to help establish the overwhelming com-
bat power necessary at the area of penetration. The commander locates the
LOA beyond the enemy’s main defensive position to ensure completing the
breach. If the operation results in opportunities to exploit success and pursue
a beaten enemy, the commander adjusts existing boundaries to accommodate
the new situation. (See Figure 3-22.)
3-86. A commander uses the graphics associated with a breach site, such as
gaps and lanes, on the small-scale maps used to control the maneuver of his
forces at each point where he penetrates the enemy’s defenses. FM 3-34.2 de-
fines the graphics.
3-87. Other control measures available to the commander include check-
points, support-by-fire and attack-by-fire positions, probable line of deploy-
ment, fire support coordinating measures, attack position, assault position,
and time of assault. Within the unit’s AO, a commander can use either an
axis of advance or a direction of attack to further control maneuver.
Planning a Penetration
3-88. The success of the penetration depends primarily on a coordinated and
synchronized plan—violently executed at a high tempo to achieve surprise—
3-26
The Basics of the Offense
against comparatively weak enemy defenses. However, the terrain behind the
area selected to penetrate must allow the penetration to proceed from the
breach to a decisive objective.
XXX
X Corps
OBJ
)
SUSAN
/O
X Co
XX
(O
XX rps
23
AD XX
)
/O
X Corps
(O
X Corps
XX XX
52MD 103AA
PL CONNEL PL CONNEL
(LOA) (LOA)
OBJ OBJ OBJ
X Corps
X Corps
STRIFE
XXX
XXX
SLICK TREY
PL IAN PL IAN
103AA
23AD
52MD
52MD
XX
XX
PL SEAN PL SEAN
(LD/LC) (LD/LC)
23AD 52MD 103AA
XX XX XX
X Corps X Corps X Corps
RESERVE
AA
X Corps
XXX
Figure 3-22. Penetration Graphic Control Measures
3-89. The depth of the enemy position and the relative strength of attacking
echelons determine the width of the penetration. The availability of artillery,
air support, and other combat multipliers for the attacking force helps the
commander determine relative combat power. A wider gap allows friendly
forces to drive deeper, making it more difficult for the enemy to close the gap.
The deeper the penetration, the easier it is for a unit to seize its objective and
roll up the enemy’s flanks exposed by the breach and the less likely it is that
the enemy will be in a position to restore his front by falling back.
3-90. Plans for penetrating a defensive position include isolating, suppress-
ing, and destroying by fire—to include offensive information operations—
enemy forces in the area selected for the penetration. These plans should also
address how to isolate the area of penetration from support or reinforcement
by enemy forces located outside the area. This consideration includes how to
fix enemy reserves and long-range weapons in their current locations. Posi-
tioning friendly assets so that the commander can mass the effects of their
combat power to accomplish these results without giving away the location of
the penetration is also a critical part of the plan.
3-91. The commander plans to place the majority of his forces and assets in
positions where the effects of their combat power can be felt in the area
3-27
FM 3-90
selected for penetration. The commander’s plan for the penetration normally
has three phases:
· Breaching the enemy’s main defensive positions.
· Widening the gap created to secure the flanks by enveloping one or
both of the newly exposed flanks.
· Seizing the objective with its associated subsequent exploitation.
3-92. Planning the sequence of these phases depends on the specific situa-
tion. In some situations, if there are weaknesses or gaps in the enemy’s front,
it is possible for heavy forces to breach the enemy’s defenses and proceed
straight to the objective. Simultaneously, light units could conduct local en-
velopment and exploitation operations. In other situations, the commander
uses his light forces to create the breach, holding his heavy forces initially in
reserve to exploit gaps in the enemy’s defenses created by light forces.
3-93. The commander plans shaping operations outside the area of penetra-
tion to contain the enemy on the flanks of the penetration and fix his reserves
in their current locations. Synchronizing the effects of rotary- and fixed-wing
aircraft, artillery fires, and obscuration smoke to delay or disrupt reposi-
tioning forces is an example of such shaping operations. These shaping opera-
tions will involve the maintenance of operations security and the conduct of
deception operations. The commander usually attempts to penetrate the ene-
my’s defensive positions along unit boundaries because defenses tend to be
less effective along a boundary.
3-94. The commander plans for the penetration to break through the enemy’s
defenses so he is unable to reestablish his defense on more rearward posi-
tions. Until this event takes place, the commander does not want to divert the
strength of his attacking units to widening the gap to secure the flanks of the
penetration. However, he must develop plans that address contingencies,
such as hostile counterattacks against the flanks of the penetration. The plan
should provide assistance to attacking elements as they close with the enemy
and support the attack until the enemy’s power of resistance is broken.
Executing a Penetration
3-95. After the initial breach of the enemy’s main line of resistance, the
sequence of the remaining two phases is determined by the factors of
METT-TC. If the enemy is in a weak defensive position, it may be possible for
the lead attacking force to seize the penetration’s final objective while simul-
taneously widening the initial breach. In other situations, the commander
must wait to seize the final objective until the breach is wide enough for other
forces, such as reserves and follow-and-assume forces, to be committed. Com-
manders at all levels must take advantage of success within the commander’s
intent throughout the penetration.
3-96. Breaching the Enemy’s Main Defensive Positions. The command-
er launches the actual penetration on a relatively narrow front. (See Fig-
ure 3-23.) He narrows the AO of the unit or units conducting his decisive
operation—the penetration—by adjusting unit lateral boundaries to the exact
point or points where he wants to penetrate the enemy’s defenses. This allows
the force conducting the penetration to focus overwhelming combat power.
The commander assigns his assault force a close-in objective. His support
3-28
The Basics of the Offense
force locates where it can support by fire both the breach and the assault
forces. Local reserves are held in readiness to conduct a forward passage
through or around units whose attacks have slowed or stopped.
OBJ
SUSAN
OBJ
OBJ STRIFE OBJ
SLICK TREY
ENY ENY
SHAPING
SHAPING
PENETRATION OPERATION
OPERATION
(FEINT)
(TO FIX)
V BOUNDARIES OF
THE UNIT CONDUCTING
THE PENETRATION
RESERVE
Figure 3-23. Penetration: The Breach
3-97. Shaping operations on the remainder of the hostile front fix the enemy
in his current positions and prevent him from disengaging to reinforce enemy
units opposing the decisive operation. The commander tracks the battle’s
progress to ensure that his forces penetrate entirely through the enemy’s
main defensive positions and not just the enemy’s security area.
3-98. The enemy normally tries to slow down or stop the breach to gain time
to react to the changing situation. Therefore, the attacking commander rap-
idly exploits and reinforces success. He piles on resources and additional
units as necessary to ensure completing the penetration through the enemy’s
defensive positions. He also conducts offensive information operations to de-
synchronize the enemy’s reaction.
3-99. Widening the Breach to Secure the Flanks. Once the attacking
force penetrates the main defenses, it begins to widen the penetration of the
enemy’s defensive positions by conducting a series of shallow envelopments to
roll back its shoulders. (See Figure 3-24, page 3-30.) The task of widening the
initial gap of the penetration is normally assigned to a follow-and-support
force. That task can also be assigned to the reserve as a contingency mission.
If the commander commits his reserve to accomplish that task, he must re-
constitute his reserve from another part of his force. Alternatively, he may as-
sume the risk of not having a reserve for the time necessary to accomplish
this task. The commander makes plans to meet enemy counterattacks by
shifting fires or committing his reserves or follow-and-assume forces. Units
3-29
FM 3-90
OBJ
SUSAN
OBJ
OBJ
s
SLICK
TREY
ENY ENY
ENY
ENY
V
SHAPING
OPERATION ENY ENY
RESERVE SHAPING
OPERATION
FRONTAL ATTACK
3-102. A frontal attack is a form of maneuver in which an attacking force
seeks to destroy a weaker enemy force or fix a larger enemy force in place
over a broad front (FM 3-0). At the tactical level, an attacking force can use a
3-30
The Basics of the Offense
ENY ENY
S S
Organization of Forces
3-104. There is no unique organization of forces associated with this form of
maneuver. A commander conducting a frontal attack organizes his unit into
an element to conduct reconnaissance and security operations, a main body,
and a reserve. The factors of METT-TC dictate the specific task organization
of the unit.
Control Measures
3-105. A commander conducting a frontal attack may not require any addi-
tional control measures beyond those established to control the overall
3-31
FM 3-90
3-32
The Basics of the Offense
INTELLIGENCE
3-115. A commander uses the products of the intelligence preparation of the
battlefield (IPB) process to identify any aspect within his AO or area of inter-
est that will affect how he accomplishes his mission. An area of interest is
3-33
FM 3-90
that area of concern to the commander, including the area of influence, areas
adjacent thereto, and extending into enemy territory to the objectives of cur-
rent or planned operations. This area also includes areas occupied by enemy
forces who could jeopardize the accomplishment of the mission (JP 2-03).
3-116. The entire staff, led by the echelon intelligence staff, uses the IPB pro-
cess to identify any aspects of the area of operations or area of interest that
will affect enemy, friendly, and third party operations. The IPB process is col-
laborative in nature and requires information from all staff elements and
some subordinate units. All staff and subordinate elements use the results
and products of the IPB process for planning. FM 2-01.3 describes the IPB
process.
3-117. The commander uses his ISR assets to study the terrain and confirm
or deny the enemy’s strengths, dispositions, and likely intentions, especially
where and in what strength the enemy will defend. These assets also gather
information concerning the civilian population within the AO to confirm or
deny their numbers, locations, and likely intentions, especially with regard to
staying put in shelters or fleeing from combat operations.
3-118. By studying the terrain, the commander tries to determine the princi-
pal heavy and light avenues of approach to his objective. He also tries to de-
termine the most advantageous area for the enemy’s main defense to occupy,
routes that the enemy may use to conduct counterattacks, and other factors,
such as observation and fields of fire, avenues of approach, key terrain, obsta-
cles, and cover and concealment (OAKOC). (See FM 6-0 for a discussion of the
components of OAKOC.) It is unlikely that the commander has complete
knowledge of the enemy’s intentions; therefore, he must conduct ISR collec-
tion continuously during the battle.
3-119. The echelon intelligence and operations officers, in coordination with
the rest of the staff, develop an integrated ISR plan that satisfies the com-
mander’s maneuver, targeting, and information requirements. A command-
er’s information requirements are dictated by the factors of METT-TC, but
commonly include—
· Locations, composition, equipment, strengths, and weaknesses of the
defending enemy force, to include high-priority targets and enemy ISR
capabilities.
· Locations of possible enemy assembly areas.
· Location of enemy indirect-fire weapon systems and units.
· Location of gaps and assailable flanks.
· Location of areas for friendly and enemy air assaults.
· Location of enemy air defense gun and missile units.
· Location of enemy electronic warfare units.
· Effects of weather and terrain on current and projected operations.
· Numbers, routes, and direction of movement of dislocated civilians.
· Withdrawal routes for enemy forces.
· Anticipated timetable schedules for the enemy’s most likely COA and
other probable COAs.
· Locations of enemy C2 and ISR systems and the frequencies used by
the information systems linking these systems.
3-34
The Basics of the Offense
MANEUVER
3-120. The commander conducts maneuver to avoid enemy strengths and to
create opportunities to increase the effects his fires. He secures surprise by
making unexpected maneuvers, rapidly changing the tempo of ongoing
operations, avoiding observation, and using deceptive techniques and
procedures. He seeks to overwhelm the enemy with one or more unexpected
blows before the enemy has time to react in an organized fashion. This occurs
when he is able to engage the defending enemy force from positions that place
the attacking force in a position of advantage with respect to the defending
enemy force, such as engaging the enemy from a flanking position. His secur-
ity forces prevent the enemy from discovering friendly dispositions, capabili-
ties, and intentions, or interfering with the preparations for the attack.
Finally, he maneuvers to close with and destroy the enemy by close combat
and shock effect. Close combat is combat carried out with direct fire weapons,
supported by indirect fire, air-delivered fires, and nonlethal engagement
means. Close combat defeats or destroys enemy forces, or seizes and retains
ground (FM 3-0). Close combat encompasses all actions that place friendly
forces in immediate contact with the enemy where the commander uses direct
fire and movement in combination to defeat or destroy enemy forces or seize
and retain ground.
3-121. A commander can overwhelm an enemy by the early seizing and re-
taining of key and decisive terrain that provides dominating observation,
cover and concealment, and better fields of fire to facilitate the maneuver of
his forces. If decisive terrain is present, the commander designates it to com-
municate its importance in his concept of operations, first to his staff and
later to subordinate commanders. The friendly force must control decisive ter-
rain to successfully accomplish its mission.
Combat Formations
3-122. A combat formation is an ordered arrangement of forces for a
specific purpose and describes the general configuration of a unit on
the ground. A commander can use seven different combat formations de-
pending on the factors of METT-TC:
· Column.
· Line.
· Echelon (left or right).
· Box.
· Diamond.
· Wedge.
· Vee.
Terrain characteristics and visibility determine the actual arrangement and
location of the unit’s personnel and vehicles within a given formation.
3-35
FM 3-90
3-36
The Basics of the Offense
3-37
FM 3-90
3-38
The Basics of the Offense
3-39
FM 3-90
3-40
The Basics of the Offense
his soldiers have the necessary skills to accomplish the mission. Any problem
areas require resolution before beginning the operation.
3-140. Night operations degrade the capabilities of soldiers and units. Cogni-
tive abilities degrade more rapidly than physical strength and endurance.
Night-vision devices degrade the user’s depth perception. This degradation in
performance occurs after as little as 18 hours of sustained work. (Additional
information concerning the impact of extended operations on soldiers and
unit can be found in FM 6-22.5.) The plan should allow time for both soldiers
and units to recuperate after conducting a night attack before being commit-
ted to other operations. The weight that soldiers must carry also directly af-
fects their endurance. The commander carefully determines the fighting load
of his soldiers, taking into account the factors of METT-TC and limits the
fighting load of his soldiers conducting night operations. The equipment car-
ried by a soldier for an extended period should never exceed one-third of his
body weight.
FIRE SUPPORT
3-141. Fire superiority must be gained and maintained throughout all offen-
sive operations. Fire support uses a variety of methods and assets that attrit,
delay, and disrupt enemy forces and enable friendly maneuver. Using prepa-
ratory, counterfire, suppression, and nonlethal fires provides the commander
with numerous options for gaining and maintaining fire superiority. The com-
mander uses his long-range artillery systems and air support to engage the
enemy throughout the depth of his positions.
3-142. Along with the reserve, attacks by indirect-fire systems and close air
support are some of the commander’s principal means for influencing ongoing
actions. Such support helps establish the conditions required for successful
mission accomplishment and is key to the commander’s ability to react to un-
expected situations. Decentralized execution characterizes the employment of
fires when conducting offensive operations. Subordinates must have direct ac-
cess to sufficient firepower to adequately support their maneuvering ele-
ments. Simultaneously, the commander retains control over sufficient fire
support assets to enable him to mass their effects at critical times and places
to support his decisive operation or to respond to the enemy’s counteraction.
3-143. Fire support planning is the continuing process of analyzing, allo-
cating, and scheduling fires. It determines how fires are used, what types of
targets to attack, what collection assets are used to acquire and track those
targets, what assets are used to attack the target, and what assets verify ef-
fects on the target. This planning does not stop at the objective or LOA. The
commander gives attention to flanks and potential enemy hide positions. Co-
ordination among echelon fire support elements (FSEs) and the proper use of
fire support coordinating measures are critical to prevent fratricide.
3-144. The fire support coordinator (FSCOORD) integrates fire support into
the unit’s maneuver scheme for the commander. The FSCOORD supports the
unit’s maneuver by planning preparatory fires, harassing fires, interdiction
fires, suppressive fires, and deception fires. These fires can be time- or event-
driven. The FSCOORD plans fires on known and likely enemy positions,
which may include templated enemy positions. Successful massing of indirect
3-41
FM 3-90
fires and fixed-wing attacks requires a FSE that is proficient in the tracking
of all battery positions and movements and knows the maximum ordinate re-
quirements. It also requires a tactical air control party proficient in the
timely execution of close air support. Fire planning reconciles top-down plan-
ning and bottom-up refinement.
3-145. As the attacking force moves forward, preparatory fires sequentially
neutralize, suppress, or destroy enemy positions. The commander must weigh
its probable effects against achieving a greater degree of surprise against the
enemy, especially under conditions of limited visibility, in determining
whether to fire an artillery preparation. He may decide to employ smart or
brilliant munitions to destroy select high-payoff targets or use these muni-
tions in mass against part of the enemy defense to facilitate a breach and ne-
gate the requirement for long-duration preparation fires using conventional
munitions.
3-146. The commander may choose to make his initial assault without using
preparatory fires to achieve tactical surprise. However, fires are always
planned to support each unit’s operations so that they are available if needed.
Preparatory fires are normally high-volume fires delivered over a short per-
iod of time to maximize surprise and shock effect. These preparatory fires
also include the conduct of offensive information operations. They can con-
tinue while ground combat elements are maneuvering. This consideration ap-
plies to all types and forms of offensive operations.
3-147. Artillery and mortars must occupy positions that are well forward and
still within supporting range of the flanks or maneuver forces to provide res-
ponsive indirect fires. The commander considers the effect that movement by
echelon or battery has on the amount of fire support provided. The command-
er should support his unit’s decisive operation with priority of fires. His main
effort prior to the initiation of the decisive operation will have priority of fires
if the operation contains phases. He places coordinated fire lines (CFLs) as
close as possible to friendly maneuver forces and plans on-order CFLs on
phase lines so that they can be quickly shifted as the force moves. This allows
the expeditious engagement of targets beyond the CFL by the maximum
number of available systems.
3-148. The effective assignment of forward observers and target acquisition
assets to quick-fire or exclusive nets also provides responsive fires. Quick-fire
nets allow the lead observers to associate directly with specific field artillery
or mortar fire units. These kinds of communication arrangements enhance
fire support responsiveness through streamlined net structures and focused
priorities. Communications planning should also include the need for commu-
nication nets for the clearing of targets for rotary- and fixed-wing attacks.
3-149. Offensive information operations perform several functions to support
the offense. As the friendly force moves through the enemy’s security area
and closes into his main defensive positions, jamming resources concentrate
on neutralizing enemy fire control, target acquisition, and intelligence-gath-
ering systems. The commander uses deception to prevent the enemy from
determining the location and objective of his decisive operation. In addition,
electronic warfare resources continue to provide intelligence and guidance to
both friendly jammers and lethal indirect fire weapon systems so attacking
3-42
The Basics of the Offense
units can destroy enemy C2, ISR, fire support, and other high-value targets.
The commander synchronizes the timing and conduct of his offensive opera-
tions so they achieve maximum effectiveness.
AIR DEFENSE
3-150. Air defense operations are performed by all members of the combined
arms team; however, ground-based air defense artillery units execute the
bulk of the Army’s air defense tasks. Allocation of air defense artillery assets
within a unit depends on the factors of METT-TC. The commander at each
echelon establishes his air defense priorities based on his concept of opera-
tions, scheme of maneuver, air situation, and the air defense priorities estab-
lished by higher headquarters. He generally will weight his air defense cover-
age toward his decisive operation and establish a protective corridor over the
terrain traversed by the unit conducting that decisive operation. The com-
mander has the option of retaining all assets under his direct control or allo-
cating assets to subordinate units. Command and control of all air defense
assets requires complete and timely communications to ensure proper
weapon status for the protection of friendly air support assets.
3-151. Passive air defense measures are an essential part of air and missile
defense planning at all levels. All units conduct passive actions in conjunction
with their assigned missions. Passive actions reduce the effectiveness of the
enemy air threat.
3-152. Targets selected to support echelon tactical air defense efforts include
the following—
· Unmanned aerial vehicles with their launchers and control nodes.
· Rotary- and fixed-wing aircraft.
· Facilities supporting enemy air operations, such as airfields, launch
sites, logistics support facilities, technical support facilities, forward
arming and refueling points, navigation aids, and C2 sites.
These facilities are normally engaged by maneuver and fire support elements
and not air defense artillery units. (See FM 3-01 for additional information on
using active and passive air defense measures in the offense.)
MOBILITY/COUNTERMOBILITY/SURVIVABILITY
3-153. This BOS has three basic purposes. It preserves the freedom of
maneuver of friendly forces. It obstructs the maneuver of the enemy in areas
where fire and movement can destroy him. Finally, it enhances the surviva-
bility of friendly forces. Time, equipment, and materials may restrict the
amount of work accomplished before, during, and after conducting an offen-
sive operation. The commander’s plan must realistically reflect these limita-
tions. The plan must provide the desired balance among these three basic
purposes and assign support priorities among subordinate units. Normally,
priority of support should be concentrated on the unit or units conducting the
decisive operation rather than distributed evenly throughout the force. That
support will focus on maintaining the mobility of the force conducting the de-
cisive operation while ensuring the survivability of the C2 system.
3-43
FM 3-90
Mobility
3-154. Mobility is key to successful offensive operations. Its major focus is to
enable friendly forces to maneuver freely on the battlefield. The commander
wants the capability to move, exploit, and pursue the enemy across a wide
front. When attacking, he wants to concentrate the effects of combat power at
selected locations. This may require him to improve or construct combat trails
through areas where routes do not exist. The surprise achieved by attacking
through an area believed to be impassable may justify the effort expended in
constructing these trails. The force bypasses existing obstacles and minefields
identified before starting the offensive operation instead of breaching them
whenever possible. Units mark bypassed minefields whenever the factors of
METT-TC allow.
3-155. Maintaining the momentum of an offensive operation requires the
force to quickly pass through obstacles as it encounters them. This translates
to a deliberate effort to capture bridges and other enemy reserved obstacles
intact. Using air assault and airborne forces is an effective technique to ac-
complish this goal. The preferred method of fighting through a defended
obstacle is employing an in-stride breach, because it avoids the loss of time
and momentum associated with conducting a deliberate breach. The com-
mander plans how and where his forces conduct breaching operations. He
plans his breaching operations using a reverse planning sequence from the
objective back to the assembly area. FM 3-34.2 addresses breaching opera-
tions in more detail.
3-156. Rivers remain major obstacles despite advances in high-mobility wea-
pon systems and extensive aviation support. River crossings are among the
most critical, complex, and vulnerable combined arms operations. Rivers are
crossed in-stride as a continuation of the attack whenever possible. The size
of the river, as well as the enemy and friendly situations, will dictate the spe-
cific tactics, techniques, and procedures used in conducting the crossing.
Corps engineer brigades contain the majority of tactical bridging assets. (See
FM 3-97.13 for additional information on conducting hasty and deliberate
river crossings.)
Countermobility
3-157. Countermobility operations are vital to help isolate the battlefield and
protect the attacking force from enemy counterattack, even though force mo-
bility in offensive operations normally has first priority. Obstacles provide se-
curity for friendly forces as the fight progresses into the depth of the enemy’s
defenses. They provide flank protection and deny the enemy counterattack
routes. They assist friendly forces in defeating the enemy in detail and can be
vital in reducing the amount of forces required to secure a given area. Fur-
ther, they can permit the concentration of forces for offensive operations in
the first place by allowing a relatively small force to defend a large AO. The
commander ensures the use of obstacles is fully synchronized with his con-
cept of operations and does not hinder the mobility of the attacking force.
3-158. During visualization, the commander identifies avenues of approach
that offer natural flank protection to an attacking force, such as rivers or
ridgelines. Staff estimates support this process. Flanks are protected by
3-44
The Basics of the Offense
Survivability
3-161. Denying the enemy a chance to plan, prepare, and execute an effective
response to friendly offensive operations through maintaining a high opera-
tional tempo is a key means a commander employs to ensure the survivability
of his force. Using multiple routes, dispersion, highly mobile forces, piecemeal
destruction of isolated enemy forces, scheduled rotation and relief of forces
before they culminate, and wise use of terrain are techniques for maintaining
a high tempo of offensive operations. The exact techniques employed in a spe-
cific situation must reflect the factors of METT-TC.
3-162. The commander protects his force to deny the enemy the capability to
interfere with ongoing operations. That protection also meets his legal and
moral obligations to his soldiers. To protect his force, the commander—
· Maintains a high tempo of operations.
· Conducts area security operations.
· Employs operations security (OPSEC) procedures.
· Executes deception operations.
· Conducts defensive information operations.
· Employs camouflage, cover, and concealment.
· Constructs survivability positions for nondisplacing systems and sup-
plies.
· Conducts operations to defend against enemy use of nuclear, biological,
and chemical weapons.
Although this list is not all-inclusive, it typifies the measures a commander
takes to secure his force during offensive operations.
3-45
FM 3-90
3-163. The echelon’s OPSEC program and any deception or survivability ef-
forts should conceal from the enemy or mislead him regarding the location of
the friendly objective, decisive operation, the disposition of forces, and the
timing of the offensive operation. This tends to prevent the enemy from
launching effective spoiling attacks. (See FM 3-13 for additional information
on OPSEC, deception, and defensive information operations.)
3-164. The commander normally considers the impact of directing the con-
struction of protective emplacements for artillery, air defense units, and logis-
tics concentrations as part of his planning process. This occurs although units
do not employ protective positions in the offense as extensively as they do in
the defense. The commander may require the hardening of key C2 facilities,
especially those with detectable electronic signatures. Maneuver units
construct as many fighting positions as possible whenever they halt or pause
during offensive operations. They improve existing terrain by cutting reverse-
slope firing shelves or slots when possible. (See FM 3-34.112 for more infor-
mation on constructing protective positions.) Forces conducting offensive
operations will continue to use camouflage, cover, and concealment. (See
FM 3-24.3 for additional information on those topics.)
3-165. The IPB process contributes to survivability by developing products
that help the commander protect his forces, including intervisibility overlays
and situation templates. Intervisibility overlays help protect the force. If an
enemy cannot observe the friendly force, he cannot engage the friendly force
with direct-fire weapons. Situation templates also help protect the force. If a
commander knows how fast an enemy force can respond to his offensive op-
erations, he can sequence his operations at times and places where the enemy
can respond least effectively. This occurs through determining enemy artil-
lery range fans, movement times between enemy reserve assembly area loca-
tions and advancing friendly forces, and other related intelligence items.
3-166. The commander integrates NBC defensive considerations into his of-
fensive plans. Implementing many NBC defensive measures slows the tempo,
degrades combat power, and may also increase logistics requirements. NBC
reconnaissance consumes resources, especially time. Personnel in protective
gear find it more difficult to work or fight. The key fundamental of all NBC
defense activities is to avoid NBC attacks and their effect whenever possible.
Avoidance includes passive and active avoidance measures. The other
fundamentals of NBC defense are protection and decontamination. Avoidance
and protection are closely linked. (See FM 3-11 for additional information on
NBC defensive considerations.)
3-46
The Basics of the Offense
commanders must act, rather than react, to support requirements. The exist-
ence of habitual support relationships facilitates the ability to anticipate.
3-168. Combat service support maintains momentum of the attack by deliver-
ing supplies as far forward as possible. The commander can use throughput
distribution and preplanned and preconfigured packages of essential items to
help maintain his momentum and tempo. The commander examines his
unit’s basic load to determine its adequacy to support the operation. He deter-
mines his combat load, the supplies carried by his individual soldiers and
combat vehicles. His sustainment load consists of what remains of his basic
load once his combat load is subtracted. His tactical vehicles carry the sus-
tainment load. The commander also determines the supplies required for
likely contingencies. He determines the amount of cross-loading of supplies
required by the situation to prevent all of one type of supply from being de-
stroyed by the loss of a single system.
3-169. CSS units and material remain close to the maneuver force to ensure
short turnaround time for supplies and services. This includes uploading as
much critical materiel—such as POL and ammunition—as possible and co-
ordinating to preclude attempted occupation of a piece of terrain by more
than one unit. The commander makes a decision regarding the possibility
that CSS preparation for the attack will be detected by enemy forces and give
away his tactical plans.
3-170. The availability of adequate supplies and transportation to sustain the
operation becomes more critical as it progresses. Supply LOCs are strained,
and requirements for repair and replacement of weapon systems mount.
Requirements for POL increase because of the distance the combat vehicles of
the maneuver force are likely to travel. CSS units in direct support of
maneuver units must be as mobile as the forces they support. One way to
provide continuous support is to task organize elements of CSS units or
complete CSS units with their supported maneuver formations as required by
the factors of METT-TC.
3-171. The variety and complexity of offensive operations requires the Army
to establish a flexible and tailorable transportation system. There may be a
wide dispersion of forces and lengthening of LOCs. Required capabilities in-
clude movement control, in-transit visibility of supplies being carried, termi-
nal operations, and mode operations.
3-172. Maintenance assets move as far forward as consistent with the tactical
situation to repair inoperable and damaged equipment and to return it to bat-
tle as quickly as possible. Crews continue to perform their preventive mainte-
nance checks and services as modified for the climate and terrain in which
they find themselves. Battle damage assessment and repair (BDAR) may be
critical to sustaining offensive operations. Crews as well as maintenance and
recovery teams conduct BDAR to rapidly return disabled equipment for
battlefield service by expediently fixing, bypassing, or jury-rigging compo-
nents. It restores the minimum essential combat capabilities necessary to
support a specific combat mission or to enable the equipment to self-recover.
3-173. The burden on medical resources increases due to the intensity of op-
erations and the increased distances over which support is required as the
force advances. The commander reallocates medical resources as the tactical
3-47
FM 3-90
3-48
The Basics of the Offense
· Risk.
· Options for accomplishing the mission.
The commander and his staff translate the unit’s assigned mission into speci-
fic objectives for all subordinates, to include the reserve. These objectives can
involve any type or form of operations. If the type of operation assigned has
associated forms, the commander may specify which form to use, but should
minimize restrictions on his subordinates’ freedom of action. FM 5-0 address-
es the military decision making process and the format for plans and orders.
3-178. Prior planning and preparations that result in synchronizing the
seven BOS increase a unit’s effectiveness when executing operations. How-
ever, the fluid nature of combat requires the commander to guide the actions
of his subordinates during the execution phase. The commander locates him-
self where he can best sense the flow of the operation and influence its critical
points by redirecting the effects of committed forces or employing his reserve.
This normally means that he is well forward in the combat formation, usually
with the force designated to conduct the decisive operation. Once he makes
contact with the enemy, he quickly moves to the area of contact, assesses the
situation, and takes appropriate aggressive actions to direct the continuation
of the offensive operation.
3-179. In addition to assigning objectives, commanders at all echelons con-
sider how to exploit advantages that arise during operations and the seizure
of intermediate and final objectives. The commander exploits success by ag-
gressively executing the plan, taking advantage of junior leader initiative,
and employing trained units capable of rapidly executing standard drills. His
reserve also provides a flexible capability to exploit unforeseen advantages.
3-180. The commander always seeks to surprise his opponent throughout the
operation. Information operations, such as deception, and the choice of an
unexpected direction or time for conducting an offensive operation can result
in the enemy being surprised. Surprise delays enemy reactions, overloads and
confuses enemy C2, induces psychological shock, and reduces the coherence of
his defenses. Tactical surprise is more difficult to achieve once hostilities
begin, but it is still possible. The commander achieves tactical surprise by
attacking in bad weather and over seemingly impassible terrain, conducting
feints and demonstrations, making rapid changes in tempo, and employing
sound OPSEC measures.
3-181. The commander should anticipate any requirements to shift his main
effort during the offensive to press the fight and keep the enemy off balance.
The commander develops decision points to support these changes using both
human and technical means to validate his decision points.
3-182. The commander retains the capability to rapidly concentrate force ef-
fects, such as fires, throughout the extent of his AO during offensive
operations. This capability is also critical to the commander when his force
crosses linear obstacles. Lanes and gaps resulting from combined arms
breaching operations or occurring naturally typically are choke points. There
is a tendency for each subordinate element to move out independently as it
completes its passage through the choke point. This independent movement
detracts from the ability of the whole force to rapidly generate combat power
on the far side of an obstacle.
3-49
FM 3-90
3-183. The commander briefs his plan and the plans of adjacent units and
higher echelons to his unit’s leaders and soldiers. This helps units and sold-
iers moving into unexpected locations to direct their efforts toward accom-
plishing the mission. This exchange of information occurs in all operations.
3-184. The free flow of information between all force elements must be main-
tained throughout the offensive operation. This requires the commander to
maintain communications with all elements of his unit. He plans how to posi-
tion and reposition his information systems to maintain his common
operational picture throughout the operation. The commander plans how to
expand his communications coverage to accommodate increased distances as
his force advances. Accordingly, he provides for redundant communication
means—including wire, radio, visible and ultraviolet light, heat, smoke,
audible sound, messengers, and event-oriented communications, such as the
casualty-producing device that initiates an ambush.
3-185. A unit with advanced information systems and automated decision
aids enjoys reduced engagement times and an enhanced planning process.
This assists the unit commander’s ability to control the operational tempo of
the battle and stay within the enemy’s decision making cycle. Greatly
improved knowledge of the enemy and friendly situations facilitates the
tactical employment of precision fires and decisive maneuver at extended
ranges. These digital systems also enhance the commander’s freedom to move
to those battlefield locations where he can best influence the battle at the
critical time and place.
TRANSITION
3-186. A transition occurs when the commander makes the assessment that
he must change his focus from one type of military operation to another. The
following paragraphs explain why a commander primarily conducting offen-
sive operations would transition to the defense and describe techniques that a
commander can use to ease the transition.
3-187. A commander halts an offensive operation only when it results in com-
plete victory and the end of hostilities, reaches a culminating point, or the
commander receives a change in mission from his higher commander. This
change in mission may be a result of the interrelationship of the other ele-
ments of national power, such as a political decision.
3-188. All offensive operations that do not achieve complete victory reach a
culminating point when the balance of strength shifts from the attacking
force to its opponent. Usually, offensive operations lose momentum when
friendly forces encounter heavily defended areas that cannot be bypassed.
They also reach a culminating point when the resupply of fuel, ammunition,
and other supplies fails to keep up with expenditures, soldiers become physi-
cally exhausted, casualties and equipment losses mount, and repairs and re-
placements do not keep pace. Because of enemy surprise movements, offen-
sive operations also stall when reserves are not available to continue the ad-
vance, the defender receives reinforcements, or he counterattacks with fresh
troops. Several of these causes may combine to halt an offense. In some cases,
the unit can regain its momentum, but this only happens after difficult
fighting or after an operational pause.
3-50
The Basics of the Offense
3-189. If the attacker cannot anticipate securing decisive objectives before his
force reaches its culminating point, he plans a pause to replenish his combat
power and phases his operation accordingly. Simultaneously, he prevents the
enemy from knowing when the friendly forces become overextended.
3-190. Once offensive operations begin, the attacking commander tries to
sense when he reaches, or is about to reach, his culminating point. Before
reaching this point, he must transition to some other type of military opera-
tion. The commander has more freedom to choose where and when he wants
to halt the attack if he can sense that his forces are approaching culmination.
He can plan his future activities to aid the defense, minimize vulnerability to
attack, and facilitate renewal of the offense as he transitions to branches or
sequels of the operation. For example, to prevent overburdening the extended
LOCs resulting from the advances away from his sustaining base, some of the
commander’s subordinate units may move into assembly areas before he ter-
minates the offense to start preparing for the ensuing defensive operation.
3-191. A lull in combat operations often accompanies transition. Civilians
may present themselves to friendly forces during this period. The commander
must consider how he will minimize the interference of these civilians with
his military operations while protecting the civilians from future hostile ac-
tions. He must also consider the threat they pose to his force and its opera-
tions if enemy intelligence agents or saboteurs constitute a portion of the ci-
vilian population encountered.
3-192. A commander anticipating the termination of his offensive operation
prepares orders that include the time or circumstances under which the of-
fense transitions to another type of military operation, such as the defense,
the missions and locations of subordinate units, and C2 measures. As he tran-
sitions from the offense to the defense, a commander takes the following ac-
tions:
· Maintains contact and surveillance of the enemy, using a combination
of reconnaissance units and surveillance assets to develop the informa-
tion required to plan future actions.
· Establishes a security area and local security measures.
· Redeploys fire support assets to ensure the support of security forces.
· Redeploys forces based on probable future employment.
· Maintains or regains contact with adjacent units in a contiguous AO
and ensures that his units remain capable of mutual support in a non-
contiguous AO.
· Transitions the engineer effort by shifting the emphasis from mobility
to countermobility and survivability.
· Consolidates and reorganizes.
· Explains the rationale for transitioning from the offense to his soldiers.
3-193. The commander redeploys his air defense assets to cover the force’s de-
fensive position. A transition to the defense may require the commander to
change his air defense priorities. For example, his top priority may have been
coverage of maneuver units in the offense. This may shift to coverage of his
long-range sensors and weapons in the defense.
3-51
FM 3-90
3-52
Chapter 4
Movement to Contact
When armies approach each other, it makes all the difference which
owns only the ground on which it stands or sleeps and which one owns
all the rest.
Winston Churchill: Their Finest Hour, 1949
4-1
FM 3-90
HISTORICAL EXAMPLE
4-4. The following vignette discusses the Soviet Manchurian Campaign in the
closing days of World War II and illustrates the idea that tacticians can profit
from the lessons learned by other armies in other times. It demonstrates the
conduct of an MTC at the operational level.
4-2
Movement to Contact
The Soviets conducted their movement to contact operation at the last possible
moment. This reinforced strategic surprise and yielded tactical surprise as well.
Units deployed for attack from assembly areas 20 to 80 kilometers behind the
border and entered from the march, attacking along every possible axis using
small, task-organized assault groups with heavy engineer and firepower support.
Conduct of operations under adverse weather conditions and at night went con-
trary to Japanese expectations. The Soviet tendency to bypass fortified positions
confused Japanese commanders.
XX
2RBA
XX
XXXX
XXX
15
X
TRANS-BAIKAL FRONT 5
XXXX
XXXX
36 X
XX 35
XX
XXXX
1RBA
XXXX XXX
39 XXXX 10
XXXX
5
53 XXXX
XXXX
6GD
MONGOLIA 25
1ST
SOVIET-MONGOLIAN
CAV-MECH
XXXX MANCHURIA FAR
GROUP 17
XXX
EASTERN
FRONT
SEA OF
JAPAN
KOREA
Figure 4-1. Soviet Moves
The Soviets carefully timed the application of their offensive power by first at-
tacking with forward detachments and advance guards in the first echelon, and
then with the main force. See Figure 4-1. This perpetuated the momentum of ini-
tial assaults and created a momentum that was imparted to army and front-level
operations. Often enemy resistance was eliminated before the main columns had
to deploy. Forces massed at the critical point on each axis and maneuvered over
what was considered to be impassable terrain. All this resulted in a loss of de-
fense coherence that the defending Japanese Kwantung Army was never able to
regain. In seven days Soviet forces penetrated between 500 and 950 kilometers
into Manchuria from their starting points, securing all the objectives necessary for
a complete victory over the Japanese.
ORGANIZATION OF FORCES
4-5. A movement to contact is organized with an offensive covering force or
an advance guard as a forward security element and a main body as a
4-3
FM 3-90
COVERING FORCE
C (+) C
G G G G G G
G G
SPT
4-6. A movement to contact mission requires the commander not to have con-
tact with the enemy main body. However, the commander may still know the
location of at least some enemy reserve and follow-on forces. If the corps or
division commander has enough intelligence information to target enemy un-
committed forces, reserves, or sustaining operations activities, he normally
designates forces, such as long-range artillery systems and attack helicopters,
to engage known enemy elements regardless of their geographical location
within his AO. At all times the forward security element and the main body
perform reconnaissance.
SECURITY FORCES
4-7. A corps or division commander conducting an MTC typically organizes
his security element into a covering force to protect the movement of the
main body and to develop the situation before committing the main body. A
covering force is task-organized to accomplish specific tasks independent of
the main body in accordance with the factors of METT-TC, such as conduct
mobility and breach operations. This covering force reports directly to the es-
tablishing commander.
4-4
Movement to Contact
4-5
FM 3-90
operations see FM 3-55. See Chapter 12 for more detailed information con-
cerning security operations.)
MAIN BODY
4-12. The main body consists of forces not detailed to security duties. The
combat elements of the main body prepare to respond to enemy contact with
the unit's security forces. Attack helicopter units normally remain under divi-
sion and corps control until contact is made. If the situation allows, the com-
mander can assign a follow and support mission to one of his subordinate
units. This allows that subordinate unit to relieve his security forces from
such tasks as observing bypassed enemy forces, handling displaced civilians,
and clearing routes. This prevents his security forces from being diverted
from their primary mission.
4-13. The commander designates a portion of the main body for use as his re-
serve. The size of the reserve is based upon the factors of METT-TC and the
amount of uncertainty concerning the enemy. The more vague the enemy sit-
uation, the larger the size of the reserve. The reserve typically constitutes ap-
proximately one-fourth to one-third of the force. On contact with the enemy,
the reserve provides the commander flexibility to react to unforeseen circum-
stances and allows the unit to quickly resume its movement.
4-14. The commander tailors his sustainment assets to the mission. He de-
centralizes the execution of the sustainment support, but that support must
be continuously available to the main body. This includes using preplanned
logistics packages (LOGPACs). A logistics package is a grouping of mul-
tiple classes of supply and supply vehicles under the control of a
single convoy commander. Daily LOGPACs contain a standardized alloca-
tion of supplies. Special LOGPACs can also be dispatched as needed.
4-15. The commander frequently finds that his main supply routes become
extended as the operation proceeds. Aerial resupply may also be necessary to
support large-scale MTCs or to maintain the momentum of the main body.
Combat trains containing fuel, ammunition, medical, and maintenance assets
move with their parent battalion or company team. Fuel and ammunition
stocks remain loaded on tactical vehicles in the combat trains so they can in-
stantly move when necessary. Battalion field trains move in more depth, with
the forward support battalion in the main body of each brigade. Aviation
units use forward arming and refuel points (FARPs) to reduce aircraft turn-
around time.
CONTROL MEASURES
4-16. A commander uses the minimal number and type of control measures
possible in an MTC because of the uncertain enemy situation. These meas-
ures include designation of an AO with left, right, front, and rear boundaries,
or a separate AO bounded by a continuous boundary (noncontiguous opera-
tions). The commander further divides the AO into subordinate unit AOs to
facilitate subordinate unit actions.
4-17. The operation usually starts from a line of departure (LD) at the time
specified in the operations order (OPORD). The commander controls the MTC
by using phase lines, contact points, and checkpoints as required. (See
4-6
Movement to Contact
Figure 4-3.) He controls the depth of the movement to contact by using a limit
of advance (LOA) or a forward boundary. Figure 4-3 shows an LOA and not a
forward boundary. The commander could designate one or more objectives to
limit the extent of the MTC and orient the force. However, these are often
terrain-oriented and used only to guide movement. Although an MTC may re-
sult in taking a terrain objective, the primary focus should be on the enemy
force. If the commander has enough information to locate significant enemy
forces, then he should plan some other type of offensive action.
PL TAL PL TAL
(LOA) (LOA)
OBJ
011500Z MITLA
176
JAN01 + NC 1701
CP 7
PL SHARON
PL SHARON 011230ZJAN01
II
II
PL YOFFE PL YOFFE
LD/LC 010730ZJAN01 LD/LC
4-7
FM 3-90
4-8
Movement to Contact
4-26. The echelon intelligence officer (G2 or S2), assisted by the engineer and
air defense staff representatives, must carefully analyze the terrain to in-
clude air avenues of approach. He identifies the enemy's most dangerous
COA in the war gaming portion of the military decision making process. Be-
cause of the force’s vulnerability, the G2 must not underestimate the enemy
during a movement to contact. A thorough intelligence preparation of the bat-
tlefield (IPB)—by developing the modified combined obstacle overlay to in-
clude intervisibility overlays and other products, such as the event tem-
plates—enhances the force's security by indicating danger areas where the
force is most likely to make contact with the enemy. It also helps to deter-
mine movement times between phase lines and other locations. Potential
danger areas are likely enemy defensive locations, engagement areas, obser-
vation posts (OPs), and obstacles. The fire support system targets these areas
and they become on-order priority targets placed into effect and cancelled as
the lead element can confirm or deny enemy presence. The reconnaissance
and surveillance plan supporting the movement to contact must provide cov-
erage of these danger areas. If reconnaissance and surveillance forces cannot
clear these areas, more deliberate movement techniques are required.
4-27. The commander develops decision points to support changes in the
force's movement formation or change from an approach march to a combat
formation. Uses both human and technical means to validate his decision
points, the commander must determine the degree of risk he is willing to ac-
cept based on his mission. The commander's confidence in the products of the
IPB process and the risk he is willing to accept determine his combat forma-
tion and maneuver scheme. In a high-risk environment, it is usually better to
increase the distance between forward elements and the main body than to
slow the speed of advance.
4-28. Corps and divisions can execute shaping operations as part of a move-
ment to contact although, by definition, a force conducts a movement to con-
tact when the enemy situation is vague or totally unknown. This occurs when
the necessary information regarding enemy reserves and follow-on forces is
available, but information regarding those enemy forces in close proximity to
the friendly force is not available. As in any other type of operation, the com-
mander plans to focus his operations on finding the enemy and then delaying,
disrupting, and destroying each enemy force element as much as possible be-
fore it arrives onto the direct-fire battlefield. This allows close combat forces
to prepare to engage enemy units on their arrival.
4-29. In a movement to contact, the commander can opt not to designate his
decisive operation until his forces make contact with the enemy, unless there
is a specific reason to designate it. In this case, he retains resources under his
direct control to reinforce his decisive operation. He may designate his deci-
sive operation during the initial stages of a movement to contact because of
the presence of a key piece of terrain or avenue of approach.
4-9
FM 3-90
maintains contact with the covering force. The lead elements of the main
body maintain contact with the advance guard. The rear guard and flank se-
curity elements maintain contact with and orient on the main body's move-
ment. These security forces prevent unnecessary delay of the main body and
defer the deployment of the main body as long as possible. Reconnaissance
elements operate to the front and flanks of each column's advance guard and
maintain contact with the covering force. The commander may instruct each
column's advance guard to eliminate small pockets of resistance bypassed by
forward security force. (See Figure 4-4.)
COVERING FORCE
C (+) C
G G G G
MAIN BODY
G G
SPT
Figure 4-4. A Column Advance Guard Attacking to Destroy a Contained Enemy Force
4-10
Movement to Contact
with the level of command, the terrain, and the availability of information
about the enemy. The main body may execute an approach march for all or
part of the movement to contact to efficiently use the available road network
or reduce the time needed to move from one location to another. Command
posts and trains travel along high-mobility routes within the AO and occupy
hasty positions as necessary.
4-33. Behind these forward security elements, the main body advances over
multiple parallel routes with numerous lateral branches to remain flexible
and reduce the time needed to initiate maneuver. (While it is preferred for a
battalion to use multiple routes, battalions and smaller units can move on
just one route.) In a movement to contact, the main body's march dispositions
must allow maximum flexibility for maneuvering during movement and when
establishing contact with the enemy force.
4-34. The commander’s fire support systems tend to focus on suppression
missions to disrupt enemy forces as they are encountered and smoke missions
to obscure or screen exposed friendly forces when conducting a movement to
contact. The commander schedules the movements of fire support systems in
synchronization with the movement of the rest of the force. Fire support sys-
tems that cannot match the cross-country mobility of the combat units cause
them to slow their rate of advance. If these units do not slow down, they run
the risk of outrunning their fire support. The commander synchronizes the
employment of close air support to prevent the enemy from regaining his bal-
ance while his ground fire support assets are repositioning. The main body
updates its priority target list during a movement to contact operation.
4-35. The same considerations apply to air defense when the enemy pos-
sesses aerial capabilities. The commander ensures that his force stays within
the air defense umbrella provided by corps and division assets.
4-36. The enemy has a difficult time detecting and targeting the main body
when executing a movement to contact until contact is made because of its
tempo, momentum, and dispersal; and the attention the commander pays to
electromagnetic emission control. Once the force makes contact and concen-
trates its effects against detected enemy forces, it becomes vulnerable to
strikes by enemy conventional weapons and weapons of mass destruction. It
must concentrate its combat effects rapidly and disperse again as soon as it
overcomes resistance to avoid enemy counteractions.
4-37. Movement should be as rapid as the terrain, the mobility of the force,
and the enemy situation permit. Open terrain provides maneuver space on
either side of the line of march and facilitates high-speed movement. It also
allows for greater dispersal and usually permits more separation between for-
ward security elements and the main body than restricted terrain allows. The
commander should never commit his main body to canalizing terrain before
these forward security elements have advanced far enough to ensure that the
main body will not become fixed within that terrain. The enemy may have
also established fire support control measures that allow him to employ
nonobserved harassing and interdiction fires to interdict friendly forces tra-
versing these choke points. As the enemy situation becomes known, the com-
mander may shorten the distance between elements of the force to decrease
reaction time or he may deploy to prepare for contact.
4-11
FM 3-90
4-38. At the battalion and company levels, a moving force should move along
covered or concealed routes from one covered or concealed position to another,
using terrain to minimize its vulnerability to enemy weapons. Further, an
overwatching force should cover the moving force. (Chapter 14 describes
movement techniques, such as traveling overwatch.) Regardless of the speci-
fic movement technique employed, both forces need to provide mutual sup-
port and be knowledgeable about their counterpart’s sectors of fire.
4-39. The force must attempt to cross any obstacles it encounters without loss
of momentum by conducting in-stride breaches. The commander uses his for-
ward security forces in an attempt to seize intact bridges whenever possible.
Lead security elements bypass or breach obstacles as quickly as possible to
maintain the momentum of the movement. If these lead elements cannot
overcome obstacles, the commander directs subsequent elements of the main
body to bypass the obstacle site and take the lead. Following forces can also
reduce obstacles that hinder the unit’s sustainment flow.
4-40. The commander locates himself well forward in the movement forma-
tion. Once the formation makes contact with the enemy, he can move quickly
to the area of contact, analyze the situation, and direct aggressively. The com-
mander's security elements conduct actions on contact to develop the situa-
tion once they find the enemy. Once they make contact with the enemy, a
number of actions occur that have been divided into the following sequence.
(Units equipped with a full set of digital command and control systems may
be able to combine or skip one or more of the steps in that sequence. Those
units will conduct maneuver and remain within supporting distance of each
other with a significantly larger AOs than units equipped with analog sys-
tems.)
4-12
Movement to Contact
4-13
FM 3-90
by fire, the unit can either seek a bypass or create the required number of
lanes to support its maneuver or the maneuver of a supported unit. Once ene-
my contact is made, these COAs are normally to conduct an attack, bypass,
defend, delay, or withdrawal. For obstacles covered by fire, the unit can eith-
er seek a bypass or conduct breaching operations as part of a hasty attack.
4-14
Movement to Contact
MANEUVER
4-56. If the security force cannot overrun the enemy with a frontal attack, the
commander quickly maneuvers his main body to conduct a penetration or an
envelopment. (See Chapter 5 for a discussion of attack.) He does this to over-
whelm the enemy force before it can react effectively or reinforce. The com-
mander attempts to defeat the enemy in detail while still maintaining the
momentum of his advance. After a successful attack, the main body com-
mander resumes the movement to contact. If he did not defeat the enemy he
has three main options: bypass, transition to a more deliberate attack, or con-
duct some type of defense. In all cases, he makes every effort to retain the ini-
tiative and prevent the enemy from stabilizing the situation by conducting
violent and resolute attacks. Simultaneously he must maintain his mo-
mentum by synchronizing the actions of his combat, combat support, and
combat service support elements.
4-57. Main body elements deploy rapidly to the vicinity of the contact if the
commander initiates a frontal attack. Commanders of maneuvering units co-
ordinate forward passage through friendly forces in contact as required. The
4-15
FM 3-90
intent is to deliver the assault before the enemy can deploy or reinforce his
engaged forces. The commander may order an attack from a march column
for one of the main body's columns, while the rest of the main body deploys.
The commander can also wait to attack until he can bring the bulk of the
main body forward. He avoids piecemeal commitment except when rapidity of
action is essential and combat superiority at the vital point is present and can
be maintained throughout the attack, or when compartmentalized terrain
forces such a COA.
4-58. When trying to conduct an envelopment, the commander focuses on at-
tacking the enemy's flanks and rear before he can prepare to counter these
actions. The commander uses the security force to fix the enemy while the
main body maneuvers to look for an assailable flank or he uses the main body
to fix the enemy while the security force finds the assailable flank.
FOLLOW THROUGH
4-59. If the enemy is defeated, the unit transitions back into an MTC and
continues to advance. The movement to contact terminates when the unit
reaches the final objective or limit of advance, or it must transition to a more
deliberate attack, a defense, or retrograde. (For more discussion of these
types of operations, see the respective chapters in this manual.)
ORGANIZATION OF FORCES
4-61. The commander task organizes his unit into reconnaissance, fixing, and
finishing forces, each with a specific purpose and task. The size of the recon-
naissance force is based on the available intelligence about the size of enemy
forces in the AO. The less known about the situation, the larger the recon-
naissance force. The reconnaissance force typically consists of scout, infantry,
aviation, and electronic warfare assets. The fixing force must have enough
combat power to isolate the enemy once the reconnaissance force finds him.
The finishing force must have enough combat power to defeat those enemy
forces expected to be located within the AO. The commander can direct each
subordinate unit to retain a finishing force, or he can retain the finishing
force at his echelon. The commander may rotate his subordinate elements
through the reconnaissance, fixing, and finishing roles. However, rotating
roles may require a change in task organization and additional time for
training and rehearsal.
4-16
Movement to Contact
CONTROL MEASURES
4-62. The commander establishes control measures that allow for decentra-
lized actions and small-unit initiative to the greatest extent possible. The
minimum control measures for a search and attack are an AO, target refer-
ence points (TRPs), objectives, checkpoints, and contact points. (See Fig-
ure 4-5.) The use of TRPs facilitates responsive fire support once the recon-
naissance force makes contact with the enemy. The commander uses objec-
tives and checkpoints to guide the movement of subordinate elements. Coord-
ination points indicate a specific location for coordinating fires and movement
between adjacent units. The commander uses other control measures, such as
phase lines, as necessary. (See Chapters 2 and 3 for definitions of available
control measures.)
? II
NC 1701
CP 3
+ OBJ
B C
1-87
I
ABLE
I
NC 2000
I
+ CP 13
HHC 1-87
I
B 1-87
A 1-87
1-87
1-87
II
II
I
C 1-87
I
CP 11
7
C 1-352
B/1-8
/1
5
C
-8
I C/1-3
/1
7
I
-3
CP 5 52
+NC 1711
CP 7
4-17
FM 3-90
4-64. The products of the IPB process are critical to conducting a search and
attack. They focus the force's reconnaissance efforts on likely enemy loca-
tions.
4-65. The search and attack plan places the finishing force, as the decisive
operation, where it can best maneuver to destroy enemy forces or essential fa-
cilities once located by reconnaissance assets. Typically, the finishing force oc-
cupies a central location in the AO. However, the factors of METT-TC may al-
low the commander to position the finishing force outside the search and at-
tack area. The commander weights this decisive operation by using priority of
fires and assigning priorities of support to his other available combat multi-
pliers, such as engineer elements and helicopter lift support. The commander
establishes control measures as necessary to consolidate units and concen-
trate the combat power of the force before the attack. Once the reconnais-
sance force locates the enemy, the fixing and finishing forces can fix and de-
stroy him. The commander also develops a contingency plan in the event that
the reconnaissance force is compromised.
4-66. Fire support plans must provide for flexible and rapidly delivered fires
to achieve the commander’s desired effects throughout the AO. The com-
mander positions his fire support assets so they can support subordinate ele-
ments throughout the AO. The commander must establish procedures for
rapidly clearing fires. To clear fires rapidly, command posts and small-unit
commanders must track and report the locations of all subordinate elements.
Because of the uncertain enemy situation, the commander is careful to assign
clear fire-support relationships.
4-18
Movement to Contact
4-19
Chapter 5
Attack
I approve of all methods of attacking provided they are directed at the
point where the enemy’s army is weakest and where the terrain favors
them the least.
Frederick the Great
5-1. Attacks take place along a continuum defined at one end by fragmentary
orders that direct the execution of rapidly executed battle drills by forces im-
mediately available. Published, detailed orders with multiple branches and
sequels; detailed knowledge of all aspects of enemy dispositions; a force that
has been task organized specifically for the operation; and the conduct of ex-
tensive rehearsals define the other end of the continuum. Most attacks fall
between the ends of the continuum as opposed to either extreme. (Chapter 1
discusses this continuum between hasty and deliberate operations.)
ORGANIZATION OF FORCES
5-2. Once a commander determines his scheme of maneuver, he task organ-
izes his force to give each unit enough combat power to accomplish its
CONTENTS
Organization of Forces................................. 5-0 Executing an Attack....................................5-14
Security Forces ......................................... 5-1 Gain and Maintain Enemy Contact........5-15
Main Body.................................................. 5-1 Disrupt the Enemy ..................................5-16
Reserve ...................................................... 5-2 Fix the Enemy..........................................5-17
Sustainment Organization ....................... 5-2 Maneuver .................................................5-18
Control Measures.......................................... 5-3 Follow Through .......................................5-27
Planning an Attack........................................ 5-4 Special Purpose Attacks ............................5-29
Intelligence ................................................ 5-4 Ambush ....................................................5-29
Maneuver ................................................... 5-6 Counterattack ..........................................5-35
Fire Support............................................... 5-9 Demonstrations and Feints....................5-38
Command and Control ........................... 5-11 Raid...........................................................5-38
Preparing an Attack .................................... 5-11 Spoiling Attack ........................................5-39
5-0
Attack
SECURITY FORCES
5-3. Under normal circumstances, a commander resources dedicated security
forces during an attack only if the attack uncovers one or more flanks or the
rear of the attacking force as it advances. In this case, the commander desig-
nates a flank or rear security force and assigns it a guard or screen mission,
depending on the factors of METT-TC. Normally an attacking unit does not
need extensive forward security forces; most attacks are launched from posi-
tions in contact with the enemy, which reduces the usefulness of a separate
forward security force. The exception occurs when the attacking unit is tran-
sitioning from the defense to an attack and had previously established a se-
curity area as part of the defense.
MAIN BODY
5-4. The commander organizes his main body into combined arms formations
to conduct his decisive operation and necessary shaping operations. The com-
mander aims his decisive operation toward the immediate and decisive de-
struction of the enemy force, its will to resist, seizure of a terrain objective, or
the defeat of the enemy’s plan. His maneuver scheme identifies the focus of
the decisive operation. All of the force’s available resources operate in concert
to assure the success of the decisive operation. The subordinate unit or units
designated to conduct the decisive operation can change during the course of
the attack. The commander designates an assault, breach, and support force
if he expects to conduct a breach operation during his attack.
5-5. If it is impractical to determine initially when or where the echelon’s de-
cisive operation will be, such as during a hasty attack, the commander re-
tains flexibility by arranging his forces in depth, holding out strong reserves,
and maintaining centralized control of his long-range fire support systems.
As soon as the tactical situation clarifies enough to allow the commander to
designate his decisive operation, he focuses his resources to support that deci-
sive operation’s achievement of its objective. Enemy actions, minor changes
in the situation, or the lack of success by other elements cannot be allowed to
divert either forces or their effects from the decisive operation.
5-6. The commander may need to designate a unit or units to conduct shap-
ing operations to create windows of opportunity for executing his decisive op-
eration. He allocates the unit or units assigned to conduct shaping operations
the minimal combat power necessary to accomplish the missions since he can-
not employ overwhelming combat power everywhere. Units conducting shap-
ing operations usually have a wider area of operations (AO) than those con-
ducting a decisive operation. If the commander has sufficient forces as part of
his shaping operations, he can assign the tasks of follow and assume or follow
and support to subordinate units. (Appendix B defines these two tactical mis-
sion tasks.)
5-1
FM 3-90
RESERVE
5-7. The commander uses his reserve to exploit success, defeat enemy coun-
terattacks, or restore momentum to a stalled attack. Once committed, the re-
serve’s actions normally become or reinforce the echelon’s decisive operation,
and the commander makes every effort to reconstitute another reserve from
units made available by the revised situation. Often a commander’s most dif-
ficult and important decision concerns the time, place, and circumstances for
committing the reserve. The reserve is not a committed force, it is not used as
a follow and support force or a follow and assume force.
5-8. In the attack, the combat power allocated to the reserve depends primar-
ily on the level of uncertainty about the enemy, especially the strength of any
expected enemy counterattacks. The commander only needs to resource a
small reserve to respond to unanticipated enemy reactions when he has de-
tailed information about the enemy. When the situation is relatively clear
and enemy capabilities are limited, the reserve may consist of a small frac-
tion of the command. When the situation is vague, the reserve may initially
contain the majority of the commander’s combat power.
5-9. In addition, the strength and composition of the reserve vary with the
reserve’s contemplated missions, the forces available, the form of offensive
maneuver selected, the terrain, and acceptable risk. For example, in a hasty
attack the reserve can contain up to one-third of the force’s combat power. Al-
ternatively, in a deliberate attack the reserve is normally sized to defeat the
enemy’s counterattack forces. The commander should not constitute his re-
serve by weakening his decisive operation. A reserve must have mobility
equal to or greater than the most dangerous enemy ground threat, and be
able to fight that threat.
5-10. In an attack the commander generally locates his reserve to the rear of
the unit making his decisive operation in a location that provides maximum
protection from hostile observation and fire. However, it must be able to move
quickly to areas where it is needed in different contingencies. This is most
likely to occur if the enemy has strong counterattack forces. For heavy re-
serve forces, the key factor is cross-country mobility or road networks. For
light forces, the key factor is the road network if trucks are available, or the
availability of pickup zones (PZs) for air assault forces. The commander prior-
itizes the positioning of his reserve to reinforce the success of the decisive op-
eration first, then to counter the worst-case enemy counterattack.
SUSTAINMENT ORGANIZATION
5-11. The commander resources his sustaining operations to support the at-
tacking force. A battalion commander organizes his combat service support
and other logistics assets into combat and field trains. Higher echelon com-
manders appoint someone to control sustaining operations within their eche-
lon rear areas. In an attack, the commander tries to position his CSS units
well forward. From these forward locations they can sustain the attacking
force, providing priority of support to the units conducting the decisive
operation. As the attacking force advances, CSS units displace forward as re-
quired to shorten the supply lines, using different displacement techniques to
ensure uninterrupted support to maneuver units. The size of the force a
5-2
Attack
CONTROL MEASURES
5-12. Units conducting offensive operations are assigned an AO within which
to operate. Within the AO the commander normally designates the following
control measures regardless of whether he operates in a contiguous or non-
contiguous environment:
· Areas of operations for subordinate units of battalion size or larger.
· Phase line as the line of departure (LD), which may also be the line of
contact (LC).
· Time to initiate the operation.
· Objective.
If necessary, a commander can use either an axis of advance or a direction of
attack to further control his maneuver forces. (Figure 5-1 depicts the mini-
mum control measures for an attack.)
PL CAT
II PL CAT
OBJ
LINK
II
II
PL DOG PL DOG
LD/LC 120630ZJUL01 LD/LC
5-13. A commander can use any other control measures necessary to control
his attack. Short of the LD/LC, the commander may designate assembly
areas and attack positions where the unit prepares for offensive operations or
waits for the establishment of the required conditions to initiate the attack.
Beyond the LD/LC he may designate checkpoints, phase lines (PLs), probable
line of deployment (PLD), assault positions, and direct and indirect fire
support coordinating measures. Between the PLD and the objective he can
use a final coordination line (FCL), assault positions, support-by-fire and
attack-by-fire positions, and time of assault to further control the final stage
of the attack. Beyond the objective he can impose a limit of advance (LOA) if
he does not want the unit to conduct an exploitation or a pursuit. (Chapters 2
5-3
FM 3-90
and 3 discuss these control measures. They describe how a commander can
use attack positions, axis of advance, combat formations, direction of attack,
limit of advance, a LD, objectives, PLD, and a time of attack to help control
the operation. Chapter 3 describes the use of AOs, assembly areas, line of
contact, phase lines, and common direct and indirect fire coordinating
measures.)
5-14. In an attack during limited-visibility conditions, the commander wants
positive control over the movement of all attacking elements. He typically im-
poses additional control measures beyond those he would use in a daylight at-
tack. These additional measures may include using a point of departure (PD)
and a direction of attack.
PLANNING AN ATTACK
5-15. In an attack, friendly forces seek to place the enemy in a position where
he can easily be defeated or destroyed. The commander seeks to keep the ene-
my off-balance while continually reducing the enemy’s options. In an attack
the commander focuses the maneuver effects, supported by the other battle-
field operating systems (BOS), on those enemy forces that prevent him from
accomplishing his mission and seizing his objective. Planning helps a com-
mander synchronize the effects of his combat power through the military de-
cision making process outlined in FM 5-0 and troop leading procedures out-
lined in FM 6-0.
5-16. This section addresses those considerations unique to an attack by
BOS. There are no unique air defense, mobility/countermobility/survivability,
or CSS BOS planning considerations that apply only to the attack. Those
BOS planning considerations discussed in Chapter 3 continue to apply.
5-17. Fire superiority is that degree of dominance in the fires of one
force over another that permits that force to conduct maneuver at a
given time and place without prohibitive interference by the enemy.
The commander plans to focus the effects of friendly systems to achieve fire
superiority and allow friendly maneuver forces to breach the enemy’s defen-
sive network. The force must gain and maintain fire superiority at critical
points during the attack. Having fire superiority allows the commander to
maneuver his forces without prohibitive losses. The commander gains fire su-
periority by using a variety of tactics, techniques, and procedures. This in-
cludes using counterfires and precision fires, suppressing enemy positions,
and destroying key facilities and assets. Achieving fire superiority requires
the commander to take advantage of—
· The range and lethality of available weapon systems.
· Offensive information operations to prevent the enemy commander
from synchronizing the effects of his available combat power.
· Movement to place the enemy in a position of disadvantage where his
weapons can be destroyed, one or more at a time, with little risk to
friendly weapon systems.
INTELLIGENCE
5-18. To employ the proper capabilities and tactics, the commander must
have detailed knowledge of the enemy’s organization, equipment, and tactics.
5-4
Attack
5-5
FM 3-90
contact with the enemy, they develop the situation within their capabilities.
If the objective is an enemy force, the reconnaissance element orients on it to
maintain contact and determine as much as possible about its dispositions.
5-23. The commander ensures that reconnaissance and surveillance of the
enemy’s defensive positions and any terrain critical to the scheme of maneu-
ver continue throughout the attack. If the enemy attempts to modify his de-
fenses, those actions will be detected. In turn, this allows the commander to
adjust his scheme of maneuver as the enemy situation becomes clearer. The
commander can use human and technological means, acting separately or in
combination, to provide the required degree of reconnaissance and surveil-
lance.
5-24. A commander’s organic capability to gain information about the enemy
and the AO’s environment varies by echelon. At the corps echelon these as-
sets include a military intelligence (MI) brigade, an armored cavalry regi-
ment (ACR), and parts of almost every major subordinate command within
the corps. Even a company conducts reconnaissance patrols. (For more infor-
mation on reconnaissance operations, see FM 3-55.)
MANEUVER
5-25. In his plan of attack, the commander seeks to surprise his enemy by
choosing an unexpected direction, time, type, or strength for the attack and
by exploiting the success of military deception operations. Surprise delays
enemy reactions, overloads and confuses enemy C2, induces psychological
shock in the enemy, and reduces the coherence of the enemy defense. The
commander achieves tactical surprise by attacking in bad weather and over
seemingly impassible terrain, conducting feints and demonstrations, main-
taining a high tempo, destroying enemy forces, and employing sound opera-
tions security (OPSEC). He may plan different attack times for his decisive
and shaping operations to mislead the enemy and allow the shifting of sup-
porting fires to successive attacking echelons. However, simultaneous attacks
provide a means to maximize the effects of mass in the initial assault. They
also prevent the enemy from concentrating his fires against successive at-
tacks.
5-26. In planning the commander and subordinate leaders focus on the
routes, formations, and navigational aids they will use to traverse the ground
from the LD or PD to the objective. Some terrain locations may require the
attacking unit to change its combat formation, direction of movement, or
movement technique when it reaches those locations. The unit can post
guides at these critical locations to ensure maintaining control over the move-
ment.
5-27. The commander attacks targets throughout the depth of the enemy’s
defense to keep him off balance and limit his freedom of action. However, at
the point of the decisive operation, the commander wants to concentrate the
effects of overwhelming combat power against the enemy to shatter the
cohesion of his defense. The commander accomplishes this by applying com-
bat power against the enemy at a level of violence and in a manner that he
cannot match. For example, the commander could concentrate a tank-heavy
battalion task force’s shock action and firepower against one enemy rifle
5-6
Attack
Daylight Attacks
5-29. Daylight attacks allow friendly forces to effectively use their equipment
while facilitating command and control (C2). They are the least stressful
psychologically and physically on the attacking units. One major disadvan-
tage is that the enemy can effectively use his systems to oppose the attack.
Another disadvantage is that it does not take advantage of the Army’s super-
ior thermal viewer capabilities.
Limited-Visibility Attacks
5-30. The factors of METT-TC normally require an attack conducted during
limited visibility to be more deliberate in nature, except when it occurs as
part of the follow-up to a daylight attack or as part of an exploitation or pur-
suit operation. The commander planning a night attack considers how limited
visibility complicates controlling units, soldiers, and fires; identifying and en-
gaging targets; navigating and moving without detection; locating, treating,
and evacuating casualties; and locating and bypassing or breaching obstacles.
5-31. Commanders attack in limited-visibility conditions to take advantage of
American night-vision and navigational superiority against most potential
enemy ground forces. Intensively trained forces equipped for such combat
have significant advantages over an enemy who is unprepared for limited-
visibility combat. When the friendly force’s limited-visibility operations capa-
bilities are significantly greater than the enemy’s, limited-visibility attacks
may be the norm. Table 5-1 on page 5-8 outlines the advantages and disad-
vantages of conducting limited-visibility attacks.
5-32. Highly trained units equipped with modern night-vision devices con-
duct limited-visibility attacks in a manner similar to the way they conduct
daylight attacks. Units without extensive night-vision devices can use the
darkness to their advantage to conceal their movement, allowing them to get
as close to the enemy positions as possible if the enemy also does not have ex-
tensive night-vision capabilities. Troops that are well trained for limited-
visibility operations and take full advantage of the superiority of their night-
vision equipment gain significant tactical and psychological advantages when
attacking the enemy at night or in other conditions of reduced visibility. The
commander should understand the different night-vision capabilities of all
elements participating in the attack, to include the enemy’s night-vision
capabilities, and make any adjustments necessary to his plan based on these
differences. The commander should take advantage of his superior night-
fighting capabilities whenever possible.
5-7
FM 3-90
ADVANTAGES OF DISADVANTAGES OF
LIMITED-VISIBILITY ATTACKS LIMITED-VISIBILITY ATTACKS
· Defenses are more susceptible to infil- · Command and control is more difficult.
tration. · The defender can react easier to
· Darkness can conceal the movement of changing situations.
large forces. · The attacker has difficulty determining
· Physical and psychological factors favor the limits of obstacle systems.
the attacker, as shock, disorientation, · Restrictive terrain is more difficult to
and isolation are easier to achieve. traverse.
· Air assets can operate more safely be- · Light, smoke, noise, and fires can de-
cause air defenders with only optical ceive the attacker.
sights have greater difficulty acquiring · The attacker loses momentum because
targets at night. he attacks at a reduced speed to main-
· The element of surprise may increase tain the coherence of his unit.
because defenders are more susceptible · Land navigation, without GPS, is more
to deception techniques, such as dummy difficult at night; units may become
lights, noise, smoke, and fires. separated, cohesion can be lost, and
· The defender cannot employ his re- support elements can move to the wrong
serves as quickly at night as he can positions.
during daylight conditions. · The enemy can reposition or emplace
obstacles during darkness without being
detected by friendly reconnaissance,
surveillance, and intelligence assets.
· Attacking units are easier to ambush at
night.
· Adjusting indirect fire is difficult, even
with night-vision devices or illumination.
· Units require significantly larger quanti-
ties of signal ammunition such as
smoke, tracers, flares, and illumination
rounds.
· The task of locating and evacuating
casualties is more difficult to execute.
· The risk of fratricide may increase.
5-8
Attack
make contact with the enemy. At that point, he can illuminate the objective.
The enemy can also choose to employ illumination to increase the effective-
ness of his defensive efforts. Units generally conduct nonilluminated attacks
although they always plan for illumination. All leaders within the attacking
unit must understand the time, conditions, and authority required to employ
illumination.
5-35. Illuminated, supported attacks are almost like daylight attacks. They
are most effective when speed is essential, time for reconnaissance is limited,
or the enemy is weak and disorganized. If the commander employs illumina-
tion, it should continue until the force secures the objective. The commander
should place the illumination beyond the objective to silhouette objects on the
objective. This helps the assaulting force see and fire at withdrawing or
counterattacking enemy forces. The commander may also employ illumina-
tion in several locations to confuse the enemy about the exact place of attack.
5-36. The commander plans for limited-visibility operations in the same man-
ner that he does for daylight operations, with emphasis on—
· Keeping the plan simple.
· Taking additional time for reconnaissance.
· Taking advantage of easily identifiable terrain features, such as roads
and railroad tracks, when establishing control measures.
· Using intermediate objectives as necessary to control and maintain the
correct movement direction during the attack.
· Concealing preparations.
· Scheduling initial rehearsals during daylight, with the final rehearsal
at night.
5-37. To simplify control problems, the commander may weight his support
element over the assault force to reduce the number of friendly soldiers movi-
ng on the objective in the darkness. Developing a plan that does not require
the unit to change its movement azimuth after it crosses the LD/PD helps to
simplify the plan execution.
5-38. The commander must assume that the enemy possesses, in at least lim-
ited quantities, the same limited-visibility observation capabilities as his own
forces—absent positive information to the contrary—when conducting a
limited-visibility attack. Using terrain to mask movement and deployment
remains critical because limited visibility may create a false sense of protec-
tion from enemy observation. During movement, leaders reduce the distances
between vehicles or individual soldiers as necessary to allow one system or
soldier to observe the other. This decreases the time necessary to react to ene-
my contact. The attacking force wants to maintain its momentum; therefore,
it does not preserve the alignment of units within the selected combat
formation at the expense of additional time. However, it must adhere more
closely to the plan of attack than under daylight conditions.
FIRE SUPPORT
5-39. The planning process synchronizes the unit’s maneuver with the provi-
sion of fire support. It must identify critical times and places where the com-
mander needs the maximum effects from his fire-support assets. The
5-9
FM 3-90
5-10
Attack
PREPARING AN ATTACK
5-45. Even in fluid situations, attacks are best organized and coordinated in
assembly areas. If the commander decides that rapid action is essential to re-
tain a tactical advantage, he may opt not to use an assembly area. Detailed
advance planning—combined with digital communications, SOP, and battle
drills—may reduce negative impacts of such a decision.
5-46. Unless already in an assembly area, the attacking unit moves into one
during the preparation phase. The unit moves with as much secrecy as pos-
sible, normally at night and along routes that prevent or degrade the enemy’s
capabilities to visually observe or otherwise detect the movement. It avoids
congesting its assembly area and occupies it for the minimum possible time.
While in the assembly area, each unit provides its own local ground security
and air defense.
5-47. Units moving to assembly areas send out their quartering parties and
link up with their guides at the designated locations. While subordinate units
move to and occupy assembly areas, the commander completes the process of
planning and coordinating the attack.
5-48. The attacking unit should continue its troop leading procedures and
priorities of work to the extent the situation and mission allow prior to
moving to attack positions. These preparations include but are not neces-
sarily limited to—
· Protecting the force.
· Conducting task organization.
· Performing reconnaissance.
· Refining the plan.
· Briefing the troops.
· Conducting rehearsals, to include test firing of weapons.
5-11
FM 3-90
5-12
Attack
PL SPADA/
LD
and the order in which the
commander wants his sub-
SP 31
POSITION
RP 7
ATTACK
ordinate units to arrive at
176
their attack positions govern AA
SHIRLEY ROUTE MARY
the march formation. Using an
LD facilitates the simul-
taneous initiation of the attack
at the prescribed time by all RP 2
POSITION
SP 74
ATTACK
attacking units.
173
AA
ARTHUR ROUTE KIM
PL SPADA/
5-53. Light infantry units
should move by tactical vehi-
cles to the maximum extent
LD
possible to avoid prematurely
Figure 5-2. Movement from AA to LD
exhausting their soldiers. How-
ever, light infantry forces should not travel too far forward in tactical
vehicles. The enemy can detect the noise and other battlefield signatures
associated with using tactical vehicles at a greater distance than he can
detect dismounted infantry soldiers, and will probably respond to the
presence of tactical vehicles with direct- and indirect-fire systems. The
commander must weigh the need for security against the time required to
conduct a foot march and its resulting effects on soldiers.
5-54. Units move rapidly through their attack positions and across the LD,
which should be controlled by friendly forces. A unit uses its designated at-
tack position only by exception, such as when it must refuel prior to crossing
the LD to ensure sufficient fuel to reach the objective or the conditions re-
quired to ensure the success of the planned maneuver are not yet established.
A unit does not occupy its attack positions for more than 10 to 15 minutes
without initiating actions to protect itself and increase its survivability, such
as deploying local security and camouflage nets and starting the construction
of fighting and survivability positions. If necessary, a unit can use guides to
assist in occupying the attack position. These guides may come from organic
resources or from another unit.
5-55. For units attacking on foot using infiltration and stealth, a commander
may designate a point of departure for the attacking units instead of an LD.
Armor and mechanized infantry units normally use gaps or lanes through the
friendly positions to allow them to deploy into combat formations before they
cross the LD.
5-56. Preliminary operations for an attack may include using preparatory
fires and the relief of units in contact by executing a relief in place or a
forward passage of lines. The relief of units may be desirable to continue the
momentum of the attack with fresh troops, change the direction of the attack,
exploit a weakness in the enemy position with reserve forces, or initiate an
offensive on a stabilized front. (Chapter 14 details a relief in place. Chap-
ter 15 details a forward passage of lines.)
5-57. The commander uses available artillery, mortar, CAS, and offensive in-
formation operations to conduct preparatory fires. Preparatory fires are de-
veloped from the top down, with bottom-up refinement. The subordinate
5-13
FM 3-90
EXECUTING AN ATTACK
5-60. A series of advances and assaults by attacking units until they secure
the final objective characterizes the attack. Commanders at all levels must
use their initiative to rapidly shift their main effort between units as neces-
sary to take advantage of opportunities and momentum to ensure the ene-
my’s rapid destruction. Attacking units move as quickly as possible, following
reconnaissance elements or successful probes through gaps in the enemy’s de-
fenses. They shift their strength to reinforce success and carry the battle deep
into the enemy’s rear. A commander does not delay his attack to preserve the
alignment of subordinate units or to adhere closely to the preconceived plan
of attack. This manual discusses executing the attack in a five-step sequence:
· Gain and maintain enemy contact.
· Disrupt the enemy.
· Fix the enemy.
· Maneuver.
· Follow through.
This sequence is for discussion purposes only and is not the only way of con-
ducting an attack. The reader should understand that these sequences over-
lap during the conduct of an attack.
5-61. The commander must avoid becoming so committed to the initial plan
that he neglects opportunities. He is prepared to abandon failed attacks and
to exploit any unanticipated successes or enemy errors by designating
another unit to conduct his decisive operation in response to the changing sit-
uation.
5-62. When maneuvering his force, the commander strives to retain freedom
of action while protecting his force. Although he may have a detailed plan to
5-14
Attack
defeat the enemy, the commander continually seeks any opportunity to at-
tack to defeat, destroy, or reduce the enemy’s combat power or shatter his co-
hesion and will to fight. The commander avoids dogged adherence to a plan
no longer appropriate to current battlefield conditions. The difference be-
tween success and failure in combat often depends on the commander’s abil-
ity to make the plan fit existing circumstances rather than trying to make
circumstances fit the plan.
5-15
FM 3-90
5-16
Attack
will on the enemy; set the terms, and select the place for battle. That disrup-
tion also allows the commander to exploit enemy vulnerabilities and react to
changing situations and unexpected developments more rapidly than the ene-
my. This disruption effort usually occurs at division level and above because
lower echelons lack the necessary reconnaissance, target acquisition, intelli-
gence analysis, and target attack assets to engage forces not committed to
close combat.
5-70. The commander plans his shaping operations to occur at the place and
time necessary to establish the conditions for his decisive operation. Targets
of a shaping operation may include: enemy C2 facilities, ISR assets, fire-sup-
port systems, reserves, and logistics support. If a commander executes a
shaping operation too early, the enemy has time to recover and respond be-
fore friendly forces conducting the decisive operation can complete their ma-
neuver.
5-71. The commander plans to use harassment, suppressive, or interdiction
fires against positions likely to contain high-payoff targets to disrupt enemy
reactions to the attacking unit’s advance. These fires deny the enemy unre-
stricted use of the terrain and can prevent his reserves from entering the
fight before the unit seizes the objective. Additional benefits may result from
these fires over time, including increased psychological pressure on enemy
forces and a reduction in their mental and physical capabilities by disrupting
their sleep and rest patterns.
5-72. Surprise denies the enemy the opportunity to focus and synchronize his
combat power against the attacking force. It prevents the enemy from mass-
ing his forces or fires at a critical, possibly decisive, place and time. In place
of cohesive resistance, surprise can produce confusion, fear, and piecemeal re-
sistance. Factors that contribute to surprise include: the tempo and intensity
in executing the attack plan and employing unexpected factors, such as selec-
ting a less than optimal COA, varying operational tactics and methods, con-
ducting deception operations, and ensuring OPSEC.
5-17
FM 3-90
MANEUVER
5-79. The commander maneuvers his forces to gain positional advantage so
he can seize, retain, and exploit the initiative. He avoids the enemy’s defen-
sive strength. He employs tactics that defeat the enemy by attacking through
a point of relative weakness, such as a flank or the rear.
5-80. Offensive maneuver seeks to achieve a decisive massing of effects at the
decisive point, or at several decisive points if adequate combat power is avail-
able. The commander exploits maneuver by—
· Taking maximum advantage of dead space and covered and concealed
routes to close with the enemy.
· Using his advantages in the effective ranges of weapon systems.
· Repositioning friendly forces rapidly.
· Navigating accurately cross-country.
· Obtaining situational understanding of friendly and enemy locations.
· Taking effective security measures.
5-18
Attack
5-81. The key to success is to strike hard and fast, overwhelm a portion of the
enemy force, and then quickly transition to the next objective or phase, thus
maintaining the momentum of the attack without reducing the pressure. The
commander must retain freedom of maneuver with multiple COAs
throughout the operation and responsive CSS. Additionally, he must make
every effort to locate and track enemy reserve and follow-on forces, which
prevents friendly forces from being attacked unexpectedly by significant ene-
my forces. This allows the commander time to delay, disrupt, or destroy these
enemy forces before they can interfere with the attack.
5-82. Depending on the conditions of METT-TC, artillery and mortars may
advance with the attacking formation or move forward by bounds. The eche-
lon fire support coordinators (FSCOORDs) position direct support and rein-
forcing artillery in coordination with their maneuver commanders. The force
field artillery headquarters, normally a division or corps artillery headquar-
ters, coordinates position areas for general support and general support-rein-
forcing artillery units through the fire support officers at corps, division, and
brigade. The commander considers the maneuver of fire support assets along
with maneuver forces to ensure that proper fire support is available at all
times.
5-83. The maneuver process normally follows this sequence:
· Movement from the LD to the PLD.
· Actions at the PLD, assault position, or FCL.
· Breaching operations (discussed in FM 3-34.2).
· Actions on the objective.
The movement from the assembly area to the LD that precedes many attacks
is troop movement and is discussed in Chapter 13.
5-19
FM 3-90
5-20
Attack
reference points (TRPs) to control the direct fires from these supporting posi-
tions. He employs restricted fire lines between converging forces.
5-90. The PLD can be co-
PL PALMER/
PLD
LD
PL SPADA/
located with the assault po-
sition. (See Figure 5-3.) The ASSAULT
commander ensures that the POSITION
CAROLE
final preparations of his
breach force in an assault
position do not delay its ma- OBJ
neuver to the point of breach CHANT
as soon as the conditions are
set. Whenever possible, the
PL PALMER/
assault force rapidly passes
PL SPADA/
through the assault position.
It may have to halt in the as-
PLD
LD
sault position while fires are
lifted and shifted. In this Figure 5-3. PLD and Assault Positions
case, if the enemy antici-
pates the assault, the assault force deploys into covered positions, screens its
positions with smoke, and waits for the order to assault. As long as the as-
sault force remains in the assault position, support forces continue their sup-
pressive fires on the objective.
5-91. Once the support force sets the conditions, the breach force reduces,
proofs, and marks the required number of lanes through the enemy’s tactical
obstacles to support the maneuver of the assault force. The commander must
clearly identify the conditions that allow the breach force to proceed to avoid
confusion. From the PLD, the assault force maneuvers against or around the
enemy to take advantage of the support force’s efforts to suppress the tar-
geted enemy positions. The support force employs direct and indirect fires
against the selected enemy positions to destroy, suppress, obscure, or neutra-
lize enemy weapons and cover the assault force’s movement. The assault
force must closely follow these supporting fires to gain ground that offers po-
sitional advantage. This COA normally results in the fewest casualties.
5-92. The key to forward movement when the assault force is under enemy
direct fire is to return effective fire, which prevents the enemy from firing ef-
fectively at the moving assault force. Destructive or suppressive fires are
most effective when fired by the stationary support force. These fires prevent
the enemy from firing effectively at the moving assault force. Once the
support force is in position and the assault force is prepared to move, the sup-
port force places a heavy volume of fires on the enemy to destroy, neutralize,
or suppress him. The ability of the support force to move to advantageous ter-
rain is critical to accomplishing its purpose of ensuring the assault force’s
success. Once it suppresses the enemy position, it reduces its rate of fire to
sustainable levels to conserve ammunition as the assault force closes on the
objective to ensure that it has enough to support the assault. When the as-
sault force nears its objective, the support force increases its rate of fire to en-
sure the continued suppression of the enemy. This allows the assault force to
assault the position before the enemy can react. Either on signal or when the
5-21
FM 3-90
assault begins, the support force ceases fire, shifts its fire to another target
area, or walks its fire across the objective in front of the assault force.
5-93. The commander uses smoke to help conceal units and individual wea-
pons. It degrades enemy laser designators, range finders, and directed energy
weapons. When planning to employ smoke, the commander remembers that
smoke can have the same effects on friendly and enemy forces. If possible
during the assault, the commander uses obscuration to blind the enemy and
screen friendly movement onto the objective. Obscuration is placed in front of
enemy positions, on the far side of obstacles, and in areas that restrict ma-
neuver. The commander may use a smoke haze over rear areas to limit ene-
my observation. The defeat of enemy thermal viewers requires the use of
multispectral smoke.
5-22
Attack
attacking unit’s leaders must understand the flow of combat and retain the
capability to engage these enemy forces before they can alter the outcome of
the assault. The commander can commit his reserve to maintain the attack
momentum and keep relentless pressure on the enemy. This action also
hinders enemy attempts to stabilize the situation.
5-98. Against a well-prepared, integrated enemy defense, the commander
must isolate and destroy portions of the enemy defense in sequence. (See Fig-
ures 5-4 and 5-5, page 5-24.) His forces must isolate, suppress, obscure, and
bypass selected enemy positions. For example, smoke delivered by field artil-
lery and mortars in front of the objective—between the force and the enemy—
screens friendly movement and obscures the enemy’s weapon systems. Fires
placed on and beyond the flanks of the objective serve to isolate the enemy’s
position. These fires include: smoke, high explosives, improved conventional
munitions, and precision-guided munitions delivered by a mix of field artil-
lery, fixed-wing aviation assets, and attack helicopters. In addition, the com-
mander may employ short-duration scatterable mines in accordance with the
rules of engagement in conjunction with terminally guided munitions to help
isolate and impair the enemy’s ability to counterattack. (Their use must not
impede the commander’s conduct of exploitation and pursuit operations.)
Jamming can be used to cut C2 links between the enemy’s maneuver force
and its supporting artillery. The commander can also use any available CAS
to accomplish the desired effects.
5-99. The commander generates overwhelming combat power in sequence
against isolated centers of resistance. The assault element can task organize
itself to assault one portion of the objective at a time. For example, within the
assault company of a task force attack, two platoons may suppress while one
platoon seizes a portion of the company objective. This initial platoon, having
seized a foothold, then suppresses to allow a second platoon to continue the
assault. The third platoon may have a third portion of the objective assigned
to it to seize in turn. The enemy may attempt to reinforce its defending forces
or counterattack during the friendly force’s attack. Once the attacking force
reaches the far side of the objective, selected elements clear remaining pock-
ets of resistance while the bulk of the assault force prepares for a possible
enemy counterattack. After the assault force reaches the objective, the sup-
port force leaves its support-by-fire position and rejoins the assault force or
moves to a blocking position to counter possible enemy counterattacks.
5-100. Mounted Assault. In determining whether to conduct a mounted or
dismounted attack, the commander considers the primary factors of the ter-
rain, obstacles, and the strength of enemy antiarmor defenses. Mounted
assaults accelerate the execution of the operation by allowing the greatest
speed and shock action and providing the best protection against small arms
and indirect fires while conserving the strength of the infantry soldiers con-
ducting the assault.
5-101. When facing weak, hastily prepared, disorganized resistance, or when
attacking with overwhelming combat power in relation to enemy forces on the
objective, a heavy force commander can conduct a mounted assault. The com-
mander conducting a mounted assault concentrates all of his supporting fires
to destroy and neutralize the enemy and fix local reserves. Tanks and
infantry fighting vehicles use cannon and machineguns to engage targets for
5-23
FM 3-90
OBJECTIVE + AB0107
SMOKE
CHRIS
+ AB0101
AC0301
+
AC0304
AB0110
+
AB0109
+ +
AB0112
AB0108
X
X
X
X X X BREACH SITE X
X X X
X X X
BREACH
SUPPORT
ASSAULT
RESERVE
+
AB0107 SMOKE
OBJECTIVE
CHRIS
+ AB0101
AC0301
+
AB0110
+
AB0109
+
AB0112 ASSAULT
X
X
X
X X X
BREACH X
X X X
X X X
SUPPORT RESERVE
5-24
Attack
5-102. The assault force attacks using shock action aided by the firepower of
organic systems to rapidly overrun the enemy position as soon as the com-
mander shifts his supporting fires beyond the objective. Mechanized infantry
elements move as close as possible to the objective while remaining mounted
in their infantry fighting vehicles. When the danger to the mounted infantry
elements exceeds the protection offered by their combat vehicle, the com-
mander gives the order for his infantry elements to dismount from their car-
riers.
5-103. The following technique applies to a heavy force assigned the mission
of rapidly clearing an objective against an enemy that does not have a robust
antiarmor capability. The heavy force overruns the objective. The accompa-
nying mechanized infantry soldiers dismount from their vehicles on the far
side of the objective and sweep the objective from the far side back to the near
side to clear any remaining pockets of resistance. The ability of heavy forces
to closely follow friendly mortar and artillery fires as they shift across the ob-
jective is a major advantage. Any delay in launching the assault after the
commander shifts the supporting fires allows the enemy time to move from
his protective positions to his firing positions.
5-104. Dismounted Assault. A heavy force commander usually conducts a
dismounted assault when any of the following conditions apply:
· Terrain favors dismounted operations.
· The enemy is in prepared positions.
· The enemy has a strong antiarmor capability.
· Tanks are not available to lead the assault even though the factors of
METT-TC favor their employment.
· Obstacles prevent maneuver across the objective.
· Stealth is required to close on the objective.
· A mounted assault stalls on or short of the objective.
Based on his analysis of the factors of METT-TC and the degree of risk he is
willing to accept, the commander determines if, when, and where any
mechanized infantry forces in the assault force will dismount from their in-
fantry fighting vehicles.
5-105. Consolidation. Consolidation is the process of organizing and
strengthening a newly captured position so that it can be defended.
Normally, the attacking unit tries to exploit its success regardless of the type
of the assault. In some situations, however, the unit may have to consolidate
its gains. Consolidation may vary from a rapid repositioning of forces and se-
curity elements on the objective, to a reorganization of the attacking force, to
the organization and detailed improvement of the position for defense. Ac-
tions taken to consolidate gains include—
· Conducting reconnaissance.
· Establishing security.
· Eliminating enemy pockets of resistance.
· Positioning forces to enable them to conduct a hasty defense by block-
ing possible enemy counterattacks.
· Adjusting the fire planning.
· Preparing for potential additional missions.
5-25
FM 3-90
5-106. Immediately after the assault, the commander must maintain contact
with those enemy forces that have abandoned the objective. If he has de-
stroyed all enemy forces on the objective, he takes those actions necessary to
regain contact with the enemy. The commander sends out patrols in any di-
rection required to maintain or regain contact with the enemy within his AO.
Higher echelons reposition their ISR collection assets and adjust their as-
signed missions as necessary to maintain that contact.
5-107. The commander also dispatches patrols to ensure contact with any ad-
jacent friendly units. A unit is normally responsible for establishing contact
with the units to its front and right as defined by the direction to the enemy.
Unless a commander knows that units to his left and rear are preparing to
make contact, he takes actions to initiate that contact. Otherwise, a danger-
ous gap could occur, which the enemy could exploit during a counterattack.
5-108. The task of establishing security is accomplished as soon as the force
occupies the objective. Each subordinate element establishes observation
posts (OPs) that monitor likely enemy avenues of approach and conduct other
security operations. Units must remain aware that the enemy will have de-
fensive fires planned on his former positions, including headquarters bunkers
and supply caches.
5-109. Once subordinate units seize the objective, they clear it of enemy
forces. They then occupy firing positions to prepare for an enemy counter-
attack. Normally, an attacking unit does not occupy vacated enemy positions
because the enemy is familiar with and normally targets them. Therefore, the
attacking unit should position itself away from established enemy positions
usually on the next defensible piece of terrain. This positioning is also impor-
tant because the unit needs to orient on different avenues of approach and in
a different direction. The commander positions his armored and antitank sys-
tems to cover likely enemy mounted avenues of approach. Mechanized infan-
try forces normally dismount and orient along likely dismounted and moun-
ted infantry avenues of approach. Overwatching forces, such as antitank sys-
tems, orient along likely mounted avenues of approach. Mortars, command
posts, and CSS assets move forward to assist in the consolidation.
5-110. The commander should preplan the location and future missions of
each element. Artillery and other fire support systems mass fires on enemy
assembly areas and troops forming for counterattacks. The commander may
alert his reserve to protect the flanks of the attacking units, hold ground
seized by them, or counter an enemy counterattack. The commander may use
antitank minefields or other obstacles to cover likely enemy avenues of ap-
proach. As the unit has time and resources, it improves these obstacles and
defensive positions.
5-111. The commander normally designates TRPs, final protective fires, en-
gagement areas, and other direct- and indirect-fire control measures as part
of the consolidation process. Once in position, subordinate elements modify
preplanned measures and improve the its defensive capabilities as required.
As local security is being established, the commander directs subordinate ele-
ments to conduct mounted or dismounted patrols along likely enemy avenues
of approach. The echelon scout or cavalry unit deploys beyond these local
security patrols to conduct its assigned reconnaissance or security mission.
5-26
Attack
FOLLOW THROUGH
5-113. After seizing the objective, the commander has two alternatives: ex-
ploit success and continue the attack or terminate the offensive operation. At
brigade echelon and below, the unit maintains contact and attempts to ex-
ploit its success. Normally, a division or corps commander makes the decision
regarding whether to initiate a general—as opposed to local—exploitation or
pursuit or terminate offensive actions.
5-114. After seizing an objective, the most likely on-order mission is to con-
tinue the attack. During consolidation, the commander and his staff continue
troop leading procedures in preparation for any on-order missions assigned
by a higher headquarters. They use available combat information and intelli-
gence products to adjust contingency plans. The commander redirects his ISR
collection effort to support his next mission.
5-115. Fire support assets move quickly to take advantage of the natural re-
duction in support requirements that occur when a position is taken and
when the enemy can organize a counterattack to provide depth to a defense.
Field artillery units reposition to where they can support a renewed attack
when ammunition supply and enemy action permit. Attacks by rotary- and
fixed-wing aircraft can provide support while artillery systems reposition.
Road conditions, such as destroyed bridges or dislocated civilians, and the
unit’s existing cross-country mobility abilities given the current environment
conditions will also impact on the exact time of the decision to reposition.
5-27
FM 3-90
5-116. The commander attempts to exploit the deterioration of the enemy po-
sition by administering quick and powerful blows before the enemy can recon-
stitute his defense. Using mass quantities of precision-guided munitions,
combined with the action of large, heavy formations and air support, may
prove decisive.
5-117. Ordinarily, the enemy attempts to hold his position until nightfall and
complete his withdrawal under cover of darkness. The attacking unit main-
tains relentless pressure, continuing the attack at night. Through these at-
tacks, the unit maintains contact with the enemy, keeps him off balance, and
makes his withdrawal from action extremely difficult. If the enemy tries to
delay, the unit continues its attack, concentrating its efforts on enveloping or
encircling the retrograding enemy force if the enemy is too strong to overrun.
An attack aggressively pushed through the hostile front may isolate major
elements and force the enemy to evacuate the entire defensive position before
he can construct a viable fall-back position.
5-118. When conducting a successful penetration, attacking units penetrate
deeper into the hostile position to attack enemy reserves, artillery, C2 cen-
ters, and lines of communication. Either the assault or a support unit attacks
the enemy’s newly exposed flanks to widen the gap. The commander sends
forces through the gap that have a high degree of tactical mobility to exploit
the advantages gained, attack the enemy from the rear, and prevent his es-
cape. At this time, the commander’s force multipliers—such as fixed-wing
aviation—concentrate on supporting the ground force exploiting the penetra-
tion.
5-119. As part of the follow through to the attack, the commander plans logi-
cal sequels to his attack. Attacking forces plan for exploitation. Exploiting
forces plan for the pursuit of a defeated enemy. Furthermore, the commander
must use his force without overextending its logistics capabilities. The com-
mander must plan to have fresh units pass around or through forward units
to sustain the momentum of the attack. He may assign these fresh units the
task of follow and support or follow and assume in an effort to maintain the
tempo of the attack. (Appendix B discusses both tactical mission tasks in
greater detail.) A commander conducting either type of offensive operation
envisions how, under what conditions, where, and when he will need to tran-
sition to the defense based on possible enemy countermoves and other events.
5-120. If the attacking unit is transitioning to a pursuit or exploitation, it
may have to bypass enemy units to maintain the operational tempo. Units
bypass enemy forces according to the previously established bypass criteria.
As a minimum, the bypassed force is left under observation or fixed in place
by other units.
5-121. If the enemy succeeds in withdrawing his major forces from action, the
commander intensifies reconnaissance to obtain the information necessary to
decide on a COA. Aggressive action may prevent the enemy from reconstitu-
ting his defense in a rearward position. The commander may have to delay
the renewal of his attack until completing additional reconnaissance so he
can formulate a tactically sound plan if the enemy succeeds in occupying new
defensive positions.
5-28
Attack
AMBUSH
5-123. An ambush is a form of attack by fire or other destructive means from
concealed positions on a moving or temporarily halted enemy (FM 3-0). It
may include an assault to close with and destroy the engaged enemy force. In
an ambush, ground objectives do not have to be seized and held.
5-124. The two types of ambush are point ambush and area ambush. In a
point ambush, a unit deploys to attack a single kill zone. In an area ambush,
a unit deploys into two or more related point ambushes. A unit smaller than
a platoon does not normally conduct an area ambush.
5-125. Ambushes are cate-
gorized as either hasty or
deliberate but take place
along a continuum. A hasty
ambush is an immediate
reaction to an unexpected
opportunity conducted using
SOPs and battle drill. A de-
liberate ambush is planned
as a specific action against a
specific target. Detailed
information about the tar-
get, such as size, organiza- THE ARROW SHAFT’S BASE IS THE CENTER OF MASS
tion, and weapons and OF THE AMBUSH UNIT’S POSITION. THE ARROW POINTS
IN THE DIRECTION OF FIRE FROM THE AMBUSH UNIT.
equipment carried; route
and direction of movement; Figure 5-6. Ambush Tactical Mission Graphic
and times the target will
reach or pass certain points on its route may be available. Heavy or light
forces may conduct an ambush. (Figure 5-6 shows the tactical mission
graphic for an ambush.) Doctrine categorizes ambushes as near or far
ambushes, based on the proximity of the friendly force to the enemy.
5-29
FM 3-90
5-126. The typical goal of the ambush force is the death or capture of all ene-
my personnel located within the kill zone. Another goal could be to destroy
certain designated vehicles, such as all missile transporter-erector launchers.
Ideally, the ambush force can destroy the ambushed enemy so quickly that he
is unable to report the engagement while the ambush force accomplishes its
mission.
Organization of Forces
5-127. A typical ambush is organized into three elements: assault, support,
and security. The assault element fires into the kill zone. Its goal is to destroy
the enemy force. When used, the assault force attacks into and clears the kill
zone and may be assigned additional tasks, to include searching for items of
intelligence value, capturing prisoners, and completing the destruction of
enemy equipment to preclude its immediate reuse. The support element sup-
ports the assault element by firing into and around the kill zone, and it pro-
vides the ambush’s primary killing power. The support element attempts to
destroy the majority of enemy combat power before the assault element
moves into the objective or kill zone. The security element isolates the kill
zone, provides early warning of the arrival of any enemy relief force, and pro-
vides security for the remaining ambush force. It secures the objective rally
point and blocks enemy avenues of approach into and out of the ambush site,
which prevents the enemy from entering or leaving.
Planning an Ambush
5-128. Planning considerations for an ambush include—
· A “no-later-than” time to establish the ambush.
· A tentative ambush formation or, for an area ambush, element loca-
tions.
· Insertion and exit routes.
· A forward passage of lines and movement to the ambush site in tactical
formation.
· Location of a rally point where the ambush force can reassemble and
reorganize if required.
· Actions if the ambush is prematurely detected.
· A scheme of maneuver that maximizes engagement of the enemy’s
flank or rear, provides early warning of target approach, includes as-
sault element actions in the kill zone, and details how the ambush ele-
ment displaces from the ambush site.
· Actions at the objective,
· Obstacles to augment the effects of the friendly fire.
· A fire support plan that integrates the direct fire and obstacle plans,
which results in the enemy’s isolation, inflicts maximum damage, and
also supports forces in the rally point.
· The criteria for initiating the ambush; for example, only engage enemy
formations of the same or smaller size and withhold fire until the tar-
get moves into the kill zone.
· Any required changes to the ambushing unit’s fire distribution SOP,
based on the factors of METT-TC.
5-30
Attack
5-31
FM 3-90
xxxxxx
FLANK RESTRICTED BY TERRAIN
AND EMPLACED OBSTACLES
x xxx
KILL ZONE
xx
xx
xxxx xxxxxx xxxx xxxx xxxx x
xxxxxxxxx
SUPPORT
ELEMENT
RLY 2
ASSAULT
SECURITY ELEMENT
TEAMS SECURITY
TEAM
5-133. An area ambush is most effective when enemy movement is largely re-
stricted to trails or roads. The area should offer several suitable point
ambush sites. The commander selects a central ambush site around which he
can organize outlying ambushes. Once he selects his site, he must determine
the enemy’s possible avenues of approach and escape routes. He assigns
outlying point ambush sites to his subordinates to cover these avenues. Once
they occupy these sites, they report all enemy traffic going toward or away
from the central ambush site to the commander. These outlying ambushes
allow the enemy to pass through their kill zone until the commander initiates
the central ambush. Once the central ambush begins, the outlying ambushes
prevent enemy troops from escaping or entering the area. (See Figure 5-9.)
5-134. The ambush unit commander normally specifies the signals required
to control the ambush. He changes the meaning of audible and visual signals
frequently to avoid setting patterns that the enemy can recognize. Otherwise,
the enemy might recognize a signal and react in time to avoid the full effects
of the ambush. For example, if a white star cluster is always used to signal
withdrawal in a night ambush, an alert enemy might fire one and cause the
ambush force to withdraw prematurely. The subordinate elements of the
ambush unit must receive communications—in the form of signals—that re-
lay the following information:
· Target approaching, normally given by a member of the security team
to warn the ambush commander and the ambush elements of the tar-
get’s progress.
· Initiate the ambush, given by the ambush unit commander. (This sig-
nal should be a mass casualty-producing signal, such as a main gun
round from a tank, machine gun fire, the detonation of mines or explo-
sives, or other direct fire crew-served weapons.)
5-32
Attack
· Lift or shift fire, given when the target is to be assaulted; all fires must
stop or be shifted at once so that the assault element can attack before
the target can react.
· Assault, given when the assault force is to move into the kill zone and
complete its activities.
· Cease fire, given to cease all fires.
· Withdraw from the kill zone or ambush site, given when the ambush is
completed or an enemy relief force is approaching.
OUTLYING
AMBUSH
CENTRAL AMBUSH
5-33
FM 3-90
ambush site. Control is most critical when the ambush unit is approaching
the target. Leaders enforce camouflage, noise, and light discipline.
5-138. The ambush unit’s security element remains at full alert and uses all
available observation devices to detect the enemy’s approach to the ambush
site. Each soldier’s duties within each element are rotated as necessary to
maintain alertness.
5-139. All elements of the ambush force reconnoiter their routes of with-
drawal to the selected rally point. When possible, soldiers or crews reconnoit-
er the route they will use.
5-140. The commander positions all his weapons, including mines and demo-
litions authorized by his rules of engagement, to obtain the maximum effec-
tiveness against the target in the kill zone. He coordinates all fires, including
those of supporting artillery and mortars. The goals of the support element
are to isolate the kill zone, prevent the target’s escape or reinforcement, and
deliver a large volume of highly concentrated surprise fire into the kill zone.
This fire must inflict maximum damage so the assault element can quickly
assault and destroy the target.
Execution of an Ambush
5-141. Fire discipline is a key part of any ambush. Fire must be withheld un-
til the ambush commander gives the signal to initiate the ambush. That
signal should be fire from the most deadly weapon in the ambush. Once ini-
tiated, the ambush unit delivers its fires at the maximum rate possible given
the need for accuracy. Otherwise, the assault could be delayed, giving the tar-
get time to react and increasing the possibility of fratricide. Accurate fires
help achieve surprise as well as destroy the target. When it is necessary to
assault the target, the lifting or shifting of fires must be precise. The assault
element does not conduct its assault until enemy fires or resistance has been
negated or eliminated.
5-142. If the ambush fails and the enemy pursues the ambush force, it may
have to withdraw by bounds. It should use smoke to help conceal its with-
drawal. Activating limited-duration minefields along the withdrawal routes
after the passage of the withdrawing ambush force can help stop or delay
enemy pursuit. The commander positions the support element to assist in the
withdrawal of the assault element.
5-143. On the commander’s order, the ambush force withdraws to the rally
point, reorganizes, and starts its return march. At a previously established
location, it halts and disseminates any combat information obtained as a re-
sult of the ambush to all elements of the ambush force. However, future in-
formation systems should be able to disseminate this information without the
need to halt a heavy force.
5-144. The commander or his representative debriefs the ambush force to
help identify enemy patterns of response, activities, and procedures, both in-
side and outside the ambush area once the force returns from conducting the
ambush. Patterns should be analyzed and reported to all appropriate
organizations through intelligence channels. The commander adjusts his
tactics, techniques, and procedures to account for these patterns.
5-34
Attack
COUNTERATTACK
5-145. A counterattack is a form of attack by part or all of a defending force
against an enemy attacking force, with the general objective of denying the
enemy his goal in attacking (FM 3-0). The commander directs a counter-
attack—normally conducted from a defensive posture—to defeat or destroy
enemy forces, exploit an enemy weakness, such as an exposed flank, or to re-
gain control of terrain and facilities after an enemy success. A unit conducts a
counterattack to seize the initiative from the enemy through offensive action.
A counterattacking force maneuvers to isolate and destroy a designated
enemy force. It can attack by fire into an engagement area to defeat or de-
stroy an enemy force, restore the original position, or block an enemy pene-
tration. Once launched, the counterattack normally becomes a decisive opera-
tion for the commander conducting the counterattack.
5-146. The commander plans and conducts a counterattack to attack the ene-
my when and where he is most vulnerable, while he is attempting to over-
come friendly defensive positions. Normally, the commander attempts to re-
tain his reserve or striking force to conduct a decisive counterattack once the
enemy commits his main force to the attack. The commander assigns objec-
tives to counterattacking forces when he intends for them to assault the ene-
my. He normally assigns attack-by-fire positions when he intends to counter-
attack using primarily direct and indirect fires.
5-147. The two
levels of counter-
CAT K
terattacks. In both
cases, waiting for
the enemy to act
first may reveal
1
an assailable flank
to exploit. A de- #2
TK
fending unit con- CA
RESERVE
ducts a major
counterattack to
seize the initiative
from the enemy Figure 5-10. Major Counterattack
through offensive
action after an enemy launches his attack. A commander also conducts major
counterattacks to defeat or block an enemy penetration that endangers the
integrity of the entire defense, or to attrit the enemy by the defeat or destruc-
tion of an isolated portion of the attacking enemy. (See Figure 5-10.)
Organization of Forces
5-148. The commander of a major counterattack force typically organizes his
combined arms assets into security, reconnaissance, main body, and reserve
forces. He uses those defending forces already in contact with the enemy to
fix or contain those same enemy forces. The commander may use a force
5-35
FM 3-90
Planning a Counterattack
5-151. The commander plans the counterattack to strike the enemy when the
enemy force is vulnerable. As the enemy force advances, the defense may
create gaps between enemy units, exposing the flanks and rear of elements of
the attacking force. Immediately after an enemy force occupies a defended po-
sition, it is often disorganized and ill prepared to meet a sudden counter-
attack. Opportunity for effective counterattacks are usually brief; the com-
mander must assess the situation rapidly, and the force must execute the
counterattack swiftly. The commander assigns objectives or attack-by-fire po-
sitions to counterattacking forces, depending on whether he intends for the
counterattacking force to close with and assault the enemy.
5-152. Major counterattack plans are normally developed as a branch or se-
quel to the main defensive plan. A major counterattack may achieve surprise
when it strikes the enemy from an unanticipated direction. For that reason
the force directed to conduct a major counterattack, such as the strike force in
a mobile defense, should be involved in developing those plans as well as any
plans to exploit potential success. Local counterattacks may or may not be
the result of previous deliberate planning.
Preparing a Counterattack
5-153. Surprise, coordinated fires, and control are the keys to a successful
counterattack. Surprise allows the counterattacking force to seize control of
the situation. If total surprise is not possible, it must be so nearly complete
that the targeted enemy force does not expect the attack until it is too late to
react effectively. Thorough planning and preparation help achieve surprise.
The commander adjusts the positioning of his ISR assets and the taskings he
gives those assets so he can determine the location and targets for his coun-
terattack.
5-36
Attack
Executing a Counterattack
5-156. A commander should not counterattack unless he has a reasonable
chance of success. The commander attempts to retain his reserve for his
decisive operation, conducted after the enemy reveals his main effort by com-
mitting the majority of his combat power. If the commander orders his re-
serve to conduct a planned counterattack, the reserve becomes a committed
force and the commander should take measures to designate or reconstitute a
new reserve.
5-157. The commander conducts the counterattack in the same manner in
which he conducts any other attack. He shifts support and priorities of fire,
designates targets to be engaged by offensive information operations. The
counterattack force also performs those activities discussed in para-
graphs 5-61 to 5-122.
5-158. Subordinate commanders initiate local counterattack with the forces
on hand when it fits within the higher commander’s intent. The conduct of a
local counterattack should be swift and violent. It should exploit any disor-
ganization on the part of the enemy, such as the confusion that temporarily
exists in an attacking force after it seizes a defended position. A rapidly
mounted local counterattack may yield better results than a more deliberate
counterattack executed by a higher echelon because of the speed at which it
can be launched.
5-159. In the face of a strong enemy penetration, a commander may conduct
local counterattacks to retain or seize positions on the shoulders of the ene-
my’s penetration. This prevents the enemy from widening the penetration
while forces from other defending units engage the penetrating enemy forces.
Holding the shoulders can also prevent the sacrifice of positional depth be-
cause the limited gap in the defensive position prevents an attacking enemy
from fully exploiting his success.
5-37
FM 3-90
RAID
5-162. A raid is a form of attack, usually small scale, involving a swift entry
into hostile territory to secure information, confuse the enemy, or destroy in-
stallations. It ends with a planned withdrawal from the objective area on
mission completion (FM 3-0). A raid can also be used to support operations
designed to rescue and recover individuals and equipment in danger of cap-
ture.
5-163. A simplified chain of command is an essential organizational require-
ment. A raid usually requires a force carefully tailored to neutralize specific
enemy forces operating in the vicinity of the objective and to perform what-
ever additional functions are required to accomplish the objective of the raid.
These additional functions can consist of the demolition of bridges over major
water obstacles or the recovery of an attack helicopter pilot shot down
forward of the forward line of own troops (FLOT). The commander
incorporates any necessary support specialists during the initial planning
stage of the operation.
5-164. When a commander and his staff plan a raid, they develop COAs that
meet ethical, legal, political, and technical feasibility criteria. Planners re-
quire precise, time-sensitive, all-source intelligence. The planning process de-
termines how C2, sustainment, target acquisition and target servicing will
occur during the raid. Techniques and procedures for conducting operations
across the FLOT, given the specific factors of METT-TC expected to exist dur-
ing the conduct of the raid, are also developed. The commander and his staff
develop as many alternative COAs as time and the situation permit. They
carefully weigh each alternative. In addition to those planning considerations
5-38
Attack
associated with other offensive operations, they must determine the risks
associated with conducting the mission and possible repercussions.
5-165. Time permitting, all elements involved in a raid should be fully re-
hearsed in their functions. The key elements in determining the level of de-
tail and the opportunities for rehearsal prior to mission execution are time,
OPSEC, and deception requirements.
SPOILING ATTACK
5-166. A spoiling attack is a form of attack that preempts or seriously im-
pairs an enemy attack while the enemy is in the process of planning or pre-
paring to attack (FM 3-0). The objective of a spoiling attack is to disrupt the
enemy’s offensive capabilities and timelines while destroying his personnel
and equipment, not to secure terrain and other physical objectives. (See
Figure 5-11, page 3-40.) A commander conducts a spoiling attack whenever
possible during friendly defensive operations to strike the enemy while he is
in assembly areas or attack positions preparing for his own offensive
operation or is temporarily stopped. It usually employs heavy, attack
helicopter, or fire support elements to attack enemy assembly positions in
front of the friendly commander’s main line of resistance or battle positions.
5-167. The commander’s reasons for conducting a spoiling attack include—
· Disrupt the enemy’s offensive preparations.
· Destroy key assets that the enemy requires to attack, such as his fire
support systems, fuel and ammunition stocks, and bridging equipment.
· Gain additional time for the defending force to prepare its positions.
· Reduce the enemy’s current advantage in the correlation of forces.
5-39
FM 3-90
The commander synchronizes the conduct of the spoiling attack with his
other defensive operations.
5-168. The commander can employ his reserves in a spoiling attack to throw
the enemy’s offensive preparations off stride. He assumes the risk of not
having a reserve or designates another force as his reserve in this case. The
following basic considerations affect the spoiling attack:
· The commander may want to limit the size of the force used in execut-
ing the spoiling attack.
· Spoiling attacks are not conducted if the loss or destruction of the
friendly attacking force would jeopardize the commander’s ability to ac-
complish his defensive mission.
· The mobility of the force available for the spoiling attack should be
equal to or greater than that of the targeted enemy force.
· Operations by artillery or aviation systems to prevent enemy elements
not in contact from interfering with the spoiling attack are necessary to
ensure the success of the operation.
AO ROTTEN
OBJ
F
FALEN
F
ENY
ENY
5-169. There are two conditions that must be met to conduct a successful and
survivable spoiling attack:
· The spoiling attack’s objective must be obtainable prior to the enemy
being able to respond to the attack in a synchronized and coordinated
manner.
· The commander must prevent the force conducting the spoiling attack
from becoming overextended.
If the spoiling attack fails to meet both conditions, it will likely fail, with
grave consequences to the defense.
5-40
Chapter 6
Exploitation
The most important goal of our action is the destruction of the enemy
to the last limit of possibility
Field Marshal Prince Mikhail I. Kutuzov
6-1
FM 3-90
ORGANIZATION OF FORCES
6-5. The forces conducting an attack are also the forces that initially exploit
that attack’s success. Typically, the commander does not assign a subordinate
unit the mission of exploitation before starting a movement to contact (MTC)
or an attack. The commander reorganizes his unit internally to reflect the
existing factors of METT-TC when the opportunity to exploit success occurs.
He uses fragmentary orders (FRAGOs) to conduct actions on contact. (See
Chapter 4 for a discussion of actions on contact.) If a commander needs addi-
tional resources to support the exploitation, he requests them from the appro-
priate headquarters. The additional resources may include intelligence, sur-
veillance, and reconnaissance (ISR) assets to help identify targets for attack,
as well as attack helicopters and controlled munitions, such as the Army tac-
tical missile system, to attack identified targets. Each exploitation force
should be large enough to protect itself from those enemy forces it expects to
encounter. It should also be a reasonably self-sufficient combined arms force
capable of operations beyond the supporting range of the main body.
6-6. The units that create an opportunity to exploit should not be expected to
perform the exploitation to an extended depth. If the commander plans to
exploit with a specific subordinate unit, he must specify the degree of damage
or risk to that force he is willing to accept in the course of the current
operation. If the initially attacking units incur significant losses of combat
power, the commander should replace them as soon as possible. When the
exploiting force’s combat power weakens because of fatigue, disorganization,
or attrition, or when it must hold ground or resupply, the commander should
continue the exploitation with a fresh force. In both cases, the replacement
force should have a high degree of tactical mobility so it can conduct the ex-
ploitation.
6-2
Exploitation
6-7. The exploitation may be more effective if the commander can commit ad-
ditional forces and assign them the task of either follow and support or follow
and assume. The commander assigns follow and support missions to units
designated to assist exploiting forces by relieving them of tasks that would
slow their advances. The lead unit and any follow and assume or follow and
support units exchange liaison teams to facilitate the transfer of responsibili-
ties. Units designated to follow and assume conduct a forward passage of
lines and replace the initial exploiting forces when they approach their culmi-
nating point. Normally, the next higher commander retains control of the
forces performing the tasks of follow and support or follow and assume. (Ap-
pendix B expands the discussion of these tasks.) When possible, units as-
signed these tasks should possess mobility equal to that of the exploiting unit
or receive additional engineers and transportation assets to provide the nec-
essary mobility. Once organized, they are committed forces and should re-
ceive habitually associated artillery, air defense, engineer, and other combat
support (CS) and combat service support (CSS) forces in accordance with the
factors of METT-TC. In an exploitation operation projected to cross signifi-
cant distances, the commander may attach elements of a follow and support
unit to the exploiting force to ensure unity of command and effort.
6-8. Since an exploitation operation typically covers a wider front than an at-
tacking force, fire support assets may find their supported elements operating
outside normal supporting ranges. They must displace forward to ensure the
continued provision of fires on and beyond enemy formations, which may
cause some difficulty in supporting the exploiting force’s flank elements. To
provide the required support, these fire support units, as well as independ-
ently operating assets, can be attached to subordinate elements of the exploit-
ing force. Otherwise, the commander can move additional reinforcing fire
support units and systems forward to fill the void.
6-9. Responsive air defense coverage provides rapid transition to an exploita-
tion without the loss of momentum. The commander plans on repositioning
his air defense artillery assets to ensure this responsiveness. Adequate mo-
bile air defense units should accompany exploiting forces. Air defense ar-
rangements for the initial attack are likely to remain effective throughout the
exploitation. However, when the commander extends his formations and as-
sets to cover more area, the air defense coverage becomes less effective. The
commander needs to consider the risks associated with moving out from
under his air defense artillery umbrella. Alternatively, he can request adjust-
ments in the air defense coverage of higher echelons. Counterair operations
by the other services (USAF, USN, and USMC) may provide the desired de-
gree of air defense protection. The commander can use available air interdic-
tion and close air support by fixed-wing aircraft to augment or replace Army
fire support assets during an exploitation.
6-10. The exploitation mission demands a force with a significant mobility
advantage over the enemy. Attack helicopters and air assault assets may con-
stitute a portion of the exploiting force’s combat power. They are extremely
useful in seizing defiles, crossing obstacles, and otherwise capitalizing on
their mobility to attack and cut off disorganized enemy elements. They can
also seize or control key terrain such as important river-crossing sites or vital
enemy transportation nodes along the exploiting force’s route of advance into
6-3
FM 3-90
and through the enemy’s rear area. The commander integrates combat engi-
neers into the exploiting force to help breach obstacles; keep ground forces
maneuvering, and provide countermobility protection to the flanks. Typical,
problems that degrade an exploiting force’s mobility are minefields and other
obstacles. The commander also uses engineers to keep his supply routes open.
6-11. The commander retains only those reserves necessary to ensure his
flexibility of operation, continued momentum in the advance, and likely ene-
my responses to the exploitation. (Chapter 5 discusses employment considera-
tions for the reserve.)
6-4
Exploitation
be limited more by vehicle mechanical failures and the need for fuel than by
combat losses or a lack of ammunition. Therefore, direct support maintenance
support teams accompany the exploiting force to assess the problem and re-
pair disabled vehicles within a limited time period or evacuate them to main-
tenance collection points for repair by general support maintenance units.
The commander should consider using his utility and cargo helicopters to
move critical supplies forward during the exploitation.
CONTROL MEASURES
6-16. An exploitation uses fewer control measures than many other opera-
tions because of the uncertain enemy situation and the need to provide
subordinate commanders with the maximum possible flexibility to take ad-
vantage of fleeting opportunities. (See Figure 6-1.) Planners develop graphic
control measures as part of the planning process. The commander issues
these control measures as part of the attack order to facilitate C2 when the
force transitions to an exploitation.
PL KATELIN
X X
PL KATELIN
OBJ
OBJ
STETSON
BUCK
XX
XX
PL KEVIN PL KEVIN
021230ZJAN01
6-5
FM 3-90
PLANNING AN EXPLOITATION
6-19. The commander’s ability to deny the enemy options by proactive use of
his battlefield operating systems is critical to a successful exploitation. He
does this by arranging his battlefield operating systems within his opponent’s
time and space relationship in accordance with the factors of METT-TC.
6-20. The commander must plan for the decentralized execution of an exploi-
tation. His commander’s intent is especially important because subordinates
must be able to exercise initiative in a rapidly changing, fluid situation. The
commander must state the purpose of the exploitation, which may be to force
the retrograde of enemy forces from an area, encircle enemy forces so they
cannot withdraw, or destroy enemy artillery and other fire support systems.
The intent must describe the desired end state. That intent will also deter-
mine his decisive and shaping operations and guide the designation of his
main effort at any given point.
6-21. A clear commander’s intent provides subordinates with guidance on
how to integrate their operations into the overall operations of the higher
headquarters. Only subordinates who can act quickly can seize all opportuni-
ties to damage the enemy or accelerate the tempo of operations. A command-
er should place minimal restrictions on his subordinates. These may include
clear instructions regarding the seizure of key terrain and the size of enemy
forces that may be bypassed. Reliable, secure communications between the
exploiting force, the follow and support force, and the commander facilitate
coordination that can maximize the impact of the exploitation. However, all
subordinates should have a clear picture of the desired end state to conduct
operations that support it, even if communications are lost.
6-22. Planning for an exploitation begins during the preparation phase of all
offensive operations. To avoid losing critical time during the transition from
an MTC or an attack to an exploitation, the commander tentatively identifies
forces, objectives, and AOs for subordinate units before the offensive opera-
tion begins. When the opportunity to exploit occurs, brigade and higher-
echelon commanders should initiate the exploitation, either as a branch of or
a sequel to the existing operation. The commander’s plan should attempt to
avoid driving the enemy back in the direction of his own sustaining base.
6-23. During exploitation planning and execution, the commander balances
the exploiting force’s need for speed and momentum against its need for se-
curity as it begins to move beyond supporting range of the rest of the force.
6-6
Exploitation
The commander must be careful not to allow an exploiting force to move out-
side of his main body’s supporting distance. Determining the supporting dis-
tance requires some knowledge of the enemy’s remaining capabilities. Gener-
ally, the commander should approach exploitation planning with a sense of
guarded optimism. It is an excellent opportunity to shatter enemy cohesion
and gain a position of advantage over the enemy. However, the commander
cannot allow the exploiting force to fall into an enemy trap where it could be
drawn into a salient and destroyed in detail.
6-24. The exploitation may take the form of an MTC with a series of hasty at-
tacks. The commander usually issues a series of FRAGOs that designate—
· Movement formation.
· The position of each major element of the exploiting force within that
formation.
· Any required modifications to task organization.
· Bypass criteria.
· Revised or new control measures that assist with the maneuver, such
as objectives, boundary changes, a limit of advance (LOA), and FSCM.
X X
II
X
II XX
XX
ENY I I I
ENY
ENY I I I II
ENY
ENY ENY
II
X
II
6-7
FM 3-90
ENY
XX
XXX
ENY XXX
XX
XX
X X X
6-27. A vee formation with two or more elements abreast and a reserve al-
lows the unit to advance on a reasonably wide front with the bulk of the unit’s
direct firepower oriented forward. This configuration helps when creating
gaps in the enemy’s defenses. While the bulk of the unit is committed, the re-
serve is available to exploit the success of the attacking elements, assume the
mission of the attacking elements, or counter enemy threats as they develop.
(See Figure 6-4.)
6-28. Because of the need to rapidly transition from an attack to an exploita-
tion, fire support planning for the exploitation must take place as part of the
planning for the attack. The commander establishes links between his mili-
tary intelligence, reconnaissance, attack aviation, field artillery, offensive in-
formation operations, and supporting fixed-wing assets to expedite the detec-
tion and delivery of effects against situationally dependant high-priority tar-
gets. He selects those targets regardless of their location within the enemy’s
defensive area to support the exploitation. During the exploitation, there is
little time to revise target lists. Target considerations are similar in nature to
those of an MTC. In addition, the exploitation requires a flexible, responsive,
and redundant fire control net that must be planned in advance. Coordina-
tion with the echelon intelligence officer is critical as the situation develops
6-8
Exploitation
into exploitation. The exploiting force templates known enemy locations with-
in its AO as danger areas and targets them.
X X
II
XX
XX
ENY II
III II
ENY
ENY I I I
ENY
II
ENY ENY
X
II
6-29. The fire support plan includes allocating support for meeting engage-
ments or hasty attacks that occur during the exploitation. The fire support co-
ordinator plans targets beyond the projected locations of the exploiting ma-
neuver force to shield the force from enemy counterattacks. He then
addresses how to provide fire support to the force in its movement to the LOA
and targets locations beyond the LOA to interdict the enemy’s lines of com-
munication (LOCs).
6-30. The commander plans for artillery displacement as an integral part of
the exploitation. Artillery assets must displace at a pace that exceeds normal
offensive operations, while maintaining the capability to provide accurate and
lethal fires. The commander can normally plan on his forces using less am-
munition during an exploitation than in an attack because fleeing enemy
forces are normally not in prepared positions, and thus more vulnerable. The
commander should also consider using close air support in the exploitation,
especially to support those units moving beyond supporting range of the main
body. Airborne forward air controllers can help identify and track high-payoff
targets forward of the exploiting force.
6-31. The commander plans situational obstacles for each phase of the opera-
tion. For example, he plans in accordance with his rules of engagement to em-
place scatterable minefields in those areas that could be used by an enemy
counterattack force as his forces move forward.
6-32. The enemy may be willing to commit his aircraft against a friendly ex-
ploitation that endangers the viability of his defense, buying him time to
prepare a defense while weakening the friendly force. The commander plans
to move his air defense assets with priority of protection to the decisive opera-
tion. He also uses them to protect his lines of communication from enemy air
6-9
FM 3-90
attack, thereby allowing his CS and CSS elements to keep pace with the oper-
ation. Planning must address how to rapidly resupply air defense missiles as
they are used. It must also allow for adjustments in the priority of protection
assigned to different elements during the exploitation.
6-33. The commander must anticipate the exploitation and ensure that his
logistics plan supports the force all the way to the LOA. Planning for CSS in
the exploitation includes designating future MSRs, logistics release points,
unit maintenance collection points, casualty collection points, medical treat-
ment facilities, ambulance exchange points , and the depositing of enemy
prisoners of war. In sustaining the exploitation, petroleum, oil, and lubricants
(POL) consumption and vehicle maintenance are primary concerns of CSS
planners. A significant factor is that an exploiting force tends to travel on a
broad front, which may necessitate designating one or more lateral MSRs to
handle the dispersion. Logistics operations must be prepared to bound their
CSS assets farther forward and move them more often than in an attack.
6-34. Selecting a flexible MSR is critical because it must be able to respond to
changes in the direction of the exploitation. Maintaining the MSR is a respon-
sibility of the force engineer. During planning, the commander must specifi-
cally address the control of logistics units and convoys. He calls them forward
and redirects them as needed. He may have to plan for guides to assist their
movement around bypassed enemy positions and obstacles. He may assign
some combat elements from the reserve an “on-order” mission to conduct rear
area security to help protect CSS elements or secure the MSR. The command-
er must also ensure adequate plans exist for controlling displaced civilians on
the battlefield so that they do not interfere with follow-on maneuver, CS, and
CSS assets. This is a critical function of civil-military operations.
EXECUTING AN EXPLOITATION
6-35. Exploitation requires physical and mental aggressiveness to combat the
friction of limited visibility, fatigue, bad weather, dangers of fratricide, and
extended operations. It requires bold and aggressive reconnaissance, prompt
use of firepower, and rapid employment of previously uncommitted units. Ex-
ploiting forces maneuver swiftly toward their objectives, sever escape routes,
and strike at enemy command posts, communications nodes, reserves,
artillery, and CS units to prevent the enemy from reorganizing an effective
defense. Well supported by tactical air support, air cavalry, and attack heli-
copters, exploiting forces should be able to change direction on short notice.
6-36. To maintain sufficient forces to conduct an exploitation, the commander
must ensure that his subordinates focus on his intent. They should not dissi-
pate his combat power by seeking minor tactical successes or reducing incon-
sequential enemy forces. His aim is to reach the final objective with the
maximum possible strength as rapidly as possible. The commander must
provide his exploiting forces with mobile support, including air resupply, to
move emergency lifts of POL and ammunition.
6-37. The transition from attack to exploitation may be so gradual that it is
hardly distinguishable; it may also be abrupt. The abrupt transition may oc-
cur when a force uses massed quantities of precision munitions, achieves sur-
prise, or overwhelms a much weaker enemy force. Normally, exploitation
6-10
Exploitation
occurs after the force secures its objective. With adequate support, the com-
mander can launch the exploitation with his initial assault or at any time
after that, depending on the effects of the fires and his desires.
6-38. Since the exploitation takes advantage of previous success, forces
previously allocated toward attacking enemy forces normally continue their
ongoing activities. These activities include—
· Attrition or defeat of enemy reserves prior to their commitment.
· Destruction of enemy countermobility assets prior to their employment
on a friendly avenue of advance for the exploiting force.
· Disruption of enemy units attempting to reestablish a coherent de-
fense.
· Disruption of enemy sustaining operations.
This assumes the commander has accurate intelligence data to target these
enemy actions.
6-39. Generally, as one part of the attacking force finishes clearing an objec-
tive, the commander orders the remaining elements to exploit that success.
To accomplish this with minimal confusion, the commander must know where
each of his elements is and what combat formation each has adopted. If the
commander has previously trained and rehearsed his force to change rapidly
from one combat formation to another, to change missions, and to change the
direction of advance, he can time the execution of such changes to maintain
the initiative over an enemy.
6-40. The commander can also initiate an exploitation when he realizes that
the enemy force is having difficulty maintaining its position or cohesion. Up-
dated intelligence is crucial to the commander since it is difficult to accu-
rately predict the exact conditions required to transition from an attack to an
exploitation. Therefore, the commander and his subordinates watch the
enemy’s defenses for indications of disintegration that may signal the oppor-
tunity to transition to exploitation. Such indicators include—
· The threat or use of weapons of mass destruction by enemy forces, de-
spite the probable US retaliation, may signal impending enemy col-
lapse.
· Enemy reconnaissance intensifies.
· Rearward movement increases, especially by fire support and reserves.
· The enemy prepares to demolish or destroy his facilities, installations,
equipment, and supply stockpiles.
· Various units intermix their vehicles and personnel in combat forma-
tions or march columns.
· Number of prisoners captured increases significantly.
· Enemy fire decreases in intensity and effectiveness.
· Fires increase in one or more individual sectors of the front that do not
appear to be synchronized with the developing situation and at a time
when the amount of defensive fires appears to be decreasing.
· Enemy resistance decreases considerably, or the enemy lacks any type
of organized defense.
· Amount of abandoned enemy war materiel encountered increases sig-
nificantly.
6-11
FM 3-90
6-12
Exploitation
MANEUVER
6-46. During an exploitation, the exploiting force maneuvers to maintain
pressure on the enemy. The commander can use any heavy and mobile light
forces, such as airborne and air assault elements, to secure terrain objectives
or choke points critical to the advance and to cut enemy lines of escape. The
commander takes advantage of available vertical envelopment capabilities.
The exploiting force clears only enough of its AO to permit its advance. It cuts
through enemy logistics units and LOCs to seize objectives vital to the
enemy’s defense. It attacks from the march to overrun weak enemy forma-
tions. In accordance with the bypass criteria, the exploiting force can contain
and bypass those enemy pockets of resistance too small to jeopardize the
mission while its commander reports these enemy forces to adjacent units,
following units, and higher headquarters.
6-47. If an enemy unit is too strong for the leading elements of the exploiting
force to overrun and destroy, succeeding elements of the force conduct a hasty
attack based on the combat information provided by its leading elements.
Such enemy forces are rarely attacked frontally. In almost all cases, the com-
mander uses another form of maneuver to produce faster and better results
with fewer casualties. While the exploiting force is seeking one or more as-
sailable flanks, available fire support systems continue to engage the enemy
to divert attention from the attempted envelopment and destroy as much ene-
my combat power as possible.
6-48. The exploiting force may face prepared belts of defensive positions in
depth when it is exploiting the initial success of the attack. Therefore, the ex-
ploiting force must move rapidly to attack and destroy the enemy before he
6-13
FM 3-90
can settle into his subsequent or supplemental positions. The more rapidly
this can be done, the less likely it is that succeeding defensive lines will be
fully prepared and the less effort it will take to penetrate each successive de-
fensive position. The exploiting force repeats this process as many times as
necessary until it breaks completely through the enemy’s defenses.
6-49. The commander’s primary concern when initiating an exploitation re-
sulting from a successful attack is to shift his force into the appropriate com-
bat formation and task-organize it with additional capabilities and resources
to take advantage of a short window of opportunity. Assuming that the force
accomplishes this with relative ease, he must control the formation as it
moves and prevent its overextension. The commander must anticipate the
enemy’s reaction to his actions. The real danger to the exploiting force is not
the immediate enemy but the enemy not yet engaged. Overextension is a risk
inherent in exploitation. While the commander must be concerned with this,
he must also guard against being overcautious.
6-50. Surrender appeals and ultimatums are particularly effective when di-
rected against enemy units that have been surrounded, isolated, or bypassed.
JP 3-53 and FM 3-05.30 detail the techniques for communicating with the
enemy.
6-51. While the exploiting force is conducting its operations, the follow and
support force, if available—
· Widens or secures the shoulders of a penetration.
· Destroys bypassed enemy units.
· Relieves supported units that have halted to contain enemy forces.
· Blocks the movement of enemy reinforcements.
· Opens and secures lines of communications.
· Guards prisoners, key areas, installations, and lines of communication.
· Controls dislocated civilians.
FOLLOW THROUGH
6-52. Once the exploitation begins, forces move to attack enemy forces with-
out any operational pauses. Exploitation continues around the clock so the
enemy cannot escape the relentless offensive pressure. The exploiting force
retains terrain only as necessary to accomplish its mission. The commander
must be careful not to dissipate combat power to achieve minor tactical suc-
cesses or to reduce small enemy forces. Once he reaches the LOA, the com-
mander quickly shifts his attention to survivability and countermobility be-
cause of the possibility of an enemy counterattack.
6-53. At some point a unit conducting an exploitation reaches a culminating
point or transitions to a pursuit. Culmination can occur for the variety of
reasons, such as friendly losses or the enemy’s commitment of his reserve.
The commander, when he makes an assessment that his force is approaching
culmination, should transition to another type of operation. On the other
hand, a pursuit enables the commander to complete his destruction of the
enemy.
6-14
Chapter 7
Pursuit
In pursuit you must always stretch possibilities to the limit. Troops
having beaten the enemy will want to rest. They must be given as ob-
jectives, not those that you think they will reach, but the farthest they
could possibly reach.
Field Marshal Viscount Allenby of Meggido, Order to XXI Corps, 1917
7-1
FM 3-90
Therefore, the friendly force must always consider the enemy’s actions when-
ever it sees an opportunity to conduct a pursuit.
7-2. Division is the lowest echelon equipped with the intelligence assets to
determine if the enemy is conducting a retrograde under Army of Excellence
tables of organization and equipment. When faced with enemy attempts to
break contact, lower echelons act to maintain contact until a division or corps
commander directs them to initiate a pursuit operation.
7-3. Unlike an exploitation, which may focus on seizing key or decisive ter-
rain instead of the enemy force, the pursuit always focuses on destroying the
fleeing enemy force. This is seldom accomplished by directly pushing back the
hostile forces on their lines of communication (LOCs). The commander in a
pursuit tries to combine direct pressure against the retreating forces with an
enveloping or encircling maneuver to place friendly troops across the enemy’s
lines of retreat. This fixes the enemy in positions where he can be defeated in
detail. If it becomes apparent that enemy resistance has broken down entirely
and the enemy is fleeing the battlefield, any type of offensive operation can
transition to a pursuit.
7-4. Conducting a pursuit is a calculated risk. Once the pursuit begins, the
commander maintains contact with the enemy and pursues retreating enemy
forces without further orders. The commander maintains the pursuit as long
as the enemy appears disorganized and friendly forces continue to advance.
Like exploitation, pursuit tests the audacity and endurance of soldiers and
leaders. In both operations, the attacker risks becoming disorganized. Extra-
ordinary physical and mental effort is necessary to sustain the pursuit, tran-
sition to other operations, and translate tactical success into operational or
strategic victory.
7-5. The commander must be aware of any approaching culmination point.
The enemy is usually falling back on his supply base, and potentially on fresh
units, while friendly forces become less effective as they expend resources
faster than they can be replaced. Reasons to discontinue the pursuit include
the presence of fresh enemy forces, greatly increased resistance, fatigue,
dwindling supplies, diversion of friendly units to security missions, and the
need to contain bypassed enemy units.
7-6. Those plan, prepare, and execute concepts introduced previously con-
tinue to apply during a pursuit. Assessment concepts described in FM 6-0 and
FM 6-22 also apply. The commander modifies them as necessary to account
for the specific existing factors of METT-TC.
ORGANIZATION OF FORCES
7-7. Normally, the commander does not organize specifically for a pursuit
ahead of time, although he may plan for a pursuit as a branch or sequel to his
offensive operation. Therefore, he must be flexible to react when the situation
presents itself. The commander’s maneuver and sustainment forces continue
their ongoing activities while he readjusts their priorities to better support
the pursuit. He acquires additional support from his higher headquarters in
accordance with the factors of METT-TC. For most pursuits, the commander
organizes his forces into security, direct-pressure, encircling, follow and
7-2
Pursuit
support, and reserve forces. The commander can employ available airborne
and air assault units as part of his encircling force because of their ability to
conduct vertical envelopments. Given sufficient resources, there can be more
than one encircling force. The follow and support force polices the battlefield
to prevent the dissipation of the direct-pressure force’s combat power. Appen-
dix B addresses the duties of a follow and support force. The reserve allows
the commander to take advantage of unforeseen opportunities or respond to
enemy counterattacks.
7-8. There are two basic organizational options in conducting a pursuit; each
involves a direct-pressure force. The first is a frontal pursuit that employs
only a direct-pressure force. The second is a combination that uses a direct-
pressure force and an encircling force. The combination pursuit is generally
more effective. Either the direct-pressure force or the encircling force can
conduct the decisive operation in a combination pursuit.
FRONTAL
7-9. In a frontal pursuit, the commander employs only a direct-pressure force
to conduct operations along the same retrograde routes used by the enemy.
(See Figure 7-1.) The commander chooses this option in two situations. The
first is when he cannot create an encircling force with enough mobility to get
behind the enemy force. The second is when he cannot create an encircling
force capable of sustaining itself until it links up with the direct-pressure
force. Either situation can occur because of restrictive terrain or because an
enemy withdraws in a disciplined, cohesive formation and still has significant
available combat power.
ENY
RESERVE
ENY
7-3
FM 3-90
COMBINATION
7-10. In the pursuit, the most decisive effects result from combining the fron-
tal pursuit with encirclement. (See Figure 7-2.) In the combination pursuit,
the direct-pressure force initiates a frontal pursuit immediately on discover-
ing the enemy’s initiation of a retrograde operation. This slows the tempo of
the enemy’s withdrawal (or fixes him in his current position if possible), and
may destroy his rear security force. The direct-pressure force’s actions help to
set the conditions necessary for the success of the encircling force’s operation
by maintaining constant pressure. The encircling force conducts an envelop-
ment or a turning movement to position itself where it can block the enemy’s
escape and trap him between the two forces, which leads to complete annihi-
lation.
ENCIRCLING FORCES
ENY
7-4
Pursuit
CONTROL MEASURES
7-14. The commander uses control measures to retain his tactical options to
converge on the most important axis or to redirect his pursuit effort on a new
axis. These control measures should be flexible and capable of rapid adjust-
ments to reflect changing conditions. This flexibility is also necessary when
engaging advancing enemy reserves or counterattack forces.
7-15. Centralized planning and decentralized execution characterize the pur-
suit. The commander balances the need to prevent fratricide with the need to
allow subordinates to take advantage of fleeting opportunities in a pursuit
with rapidly moving forces and a rapidly changing situation. The commander
designates an area of operations (AO) for each maneuver unit involved in the
pursuit. He establishes few control measures for the direct-pressure force
other than phase lines and checkpoints because of the pursuit’s nature. He
uses these phase lines to designate a forward and rearward boundary for the
direct-pressure force. The forward boundary relieves the direct-pressure force
7-5
FM 3-90
of any responsibility beyond the forward boundary. It also gives the higher
headquarters flexibility to deal with the encircling force and enemy elements
located beyond that forward boundary. The rear boundary becomes the
boundary between the direct-pressure force and the follow and support force.
7-16. If the encircling force is a ground element, the control measures are
almost identical to those of an envelopment. The commander must designate
a route, an axis of advance, or an AO adjacent to that of the direct-pressure
force to allow the encircling force to move parallel to and eventually get
ahead of the fleeing enemy force. He designates a terrain objective as a guide
for the encircling force. (See Objective HAWKE in Figure 7-3.) However, he
may change this objective rapidly and frequently, based on the progress of
the encircling force and the enemy. The objective should be a piece of ground
that provides the encircling force good, defensible terrain that the enemy can-
not easily bypass. The commander often selects choke points, such as defiles
and bridges, as objectives for his encircling force.
PL MONTCALM
PL MONTCALM
XX
PL GORDON PL GORDON
o/o 2AD CFL o/o 2AD CFL
X
OBJ
030730Z
4 HAWKE
JAN01
X
X
AXIS HOOD
PL WELLINGTON (LOA)
XX
o/o RFL 2AD 8ID
X
XX
7-6
Pursuit
PLANNING A PURSUIT
7-18. The commander anticipates an enemy retrograde operation as either a
branch or a sequel to the plan. The plan should identify possible direct-pres-
sure, encircling, follow and support, and reserve forces and issue on-order or
be-prepared missions to these forces. The commander should employ the
maximum number of available combat troops in the pursuit. He bases the de-
tails of his plan on the enemy’s anticipated actions, the combat formation of
the attacking troops, and the amount of planning time available. The com-
mander also considers—
· Possible routes the enemy might use to conduct his retrograde opera-
tions.
· Availability of his intelligence, surveillance, and reconnaissance assets
to detect enemy forces and acquire targets in depth.
· Scheme of maneuver.
· Availability and condition of pursuit routes.
· Availability of forces to keep the pressure on the enemy until his de-
struction is complete.
· Critical terrain features.
· Use of reconnaissance and security forces.
· Allocation of precision-guided munitions and aviation support.
· Availability of CS and CSS resources.
Pursuit planning must address the possibility of defending temporarily
during operational pauses while making preparations to continue the pursuit
or to consolidate gains. However, the use of an operational pause generally
results in the abandonment of the pursuit because the enemy is able to use
that time to organize a coherent defense.
7-19. The commander must specifically address how to detect the enemy
retrograde operations; otherwise, the enemy may succeed in breaking contact.
The commander relies on active reconnaissance, an understanding of enemy
tactics, and knowledge of the current tactical situation. He must watch for
signs that indicate the enemy is preparing to conduct a retrograde, such as
when the enemy—
· Lacks the capability to maintain his position or cohesion.
· Conducts limited local counterattacks.
· Intensifies his reconnaissance and intelligence efforts.
· Increases the amount of rearward movements and changes the type of
elements conducting them, especially by fire support and reserves.
· Prepares his facilities, installations, equipment, and supply stock-piles
for demolition and destruction.
· Decreases fire in intensity and effectiveness through the AO.
· Increases his fires in one or more individual sectors of the front, which
does not appear to be in accordance with the developing situation, and
at a time when the amount of defensive fires seems to be decreasing.
The presence or absence of any of the above signs may not necessarily indi-
cate the start of a retrograde operation. The enemy could be attempting to
draw friendly forces into an ambush or setting up a counterattack as part of
his defense. The decision of when to start a pursuit is part of the art of tactics.
7-7
FM 3-90
7-20. When the commander initiates a pursuit, he often creates the encircling
force from uncommitted or reserve elements. Normally, these forces do not
have fire support assets allocated to them. The commander must plan how to
redistribute his fire support assets to properly support the encircling force.
Attack helicopters and close air support are well suited to support the encir-
cling force.
7-21. Engineer mobility and countermobility assets are instrumental in sus-
taining the rate of advance and hindering the enemy’s withdrawal. Engineers
prepare the route of advance and support the lateral dispersion of units tran-
sitioning to the pursuit and the movement of the reserve. During the pursuit,
the commander must plan for his engineers to provide assault bridging and
emergency road repairs to sustain the tempo of the pursuit. The commander
also plans to use his engineer assets to block any bypassed enemy’s with-
drawal routes by using antitank and command-operated mines, demolitions,
and obstacles.
7-22. Logistics units should plan for increases in the demand for fuel and
maintenance as the tempo of operations increases. In the pursuit, priority of
logistics normally goes to units having the greatest success. Logistics plan-
ners need to anticipate success since the depth of the pursuit depends on the
capability of logistics assets to support the operation. The logistics elements
supporting the pursuing force should be as mobile as possible. Logistics plan-
ners are particularly concerned with supporting the encircling force, such as
casualty evacuation over possibly unsecured LOCs. The commander may
need aerial resupply or heavily guarded convoys to support this force. Secur-
ity for logistics convoys and LOCs are major planning considerations.
7-23. The commander uses all available logistics assets to provide essential
support to the force pursuing the enemy. His pursuit plan must result in a
force prepared to conduct wide-ranging operations using all available maneu-
ver assets throughout his AO to complete the destruction and morale collapse
of the enemy force.
EXECUTING A PURSUIT
7-24. The decisive operation in a pursuit destroys the withdrawing enemy.
This generally occurs as a result of encircling the enemy between the direct-
pressure and the encircling forces or a major geographic barrier—such as an
unfordable river—and his defeat in detail. The timely and correct decision to
initiate a pursuit is critical to its success. If the enemy begins a retrograde
undetected, he avoids the constant pressure that results in disrupting that
operation. The commander expects the enemy forces to conduct retrograde
operations at times advantageous to them—usually at night or during bad
weather.
7-25. A pursuit is often conducted as a series of encirclements in which suc-
cessive portions of the fleeing enemy are intercepted, cut off from outside sup-
port, and captured or destroyed. (Appendix D discusses encirclement opera-
tions.) The direct-pressure force conducts a series of hasty attacks to destroy
the enemy’s rear security force, maintain constant pressure on the enemy’s
main body, and slow the enemy’s withdrawal. At every opportunity, the
direct-pressure force fixes, slows down, and destroys enemy elements,
7-8
Pursuit
7-9
FM 3-90
MANEUVER
7-33. To execute the pursuit, the commander normally combines a frontal
pursuit with an encirclement. The direct-pressure force conducting the fron-
tal pursuit advances in a column formation as quickly as possible. After a
penetration, existing gaps between the different units of the direct-pressure
force are likely to increase in size. Aware of the vulnerability of his open
flanks in this situation, the commander must deploy his reserves where they
can respond to dangers on his flanks. He does not expect a uniform rate of ad-
vance on all axes. Some columns may move rapidly while others are still en-
gaged in penetrating the enemy’s rear guard defensive positions or meeting
enemy counterattacks.
7-10
Pursuit
7-34. The actions of the direct-pressure force should facilitate the commit-
ment of an encircling force that moves parallel to the rearward-moving ene-
my. The depth of the pursuit depends on the size of the forces involved. It
takes a division-level or higher commander to make the decision to initiate a
pursuit because of the resources necessary to conduct a pursuit. The com-
mander directing the initiation of a pursuit informs his higher commander of
his intentions. This allows even greater resources to be devoted to the pursuit
and avoids desynchronizing the higher headquarters’ major operation or cam-
paign.
7-35. The direct-pressure force normally employs an advance guard to pre-
vent the enemy from ambushing the main body of the direct-pressure force
and to overrun or bypass small enemy forces. The security element moves on
multiple avenues of advance. If it encounters enemy units beyond its capacity
to defeat, it conducts actions on contact to develop the situation. The com-
mander uses combat information provided by these actions on contact to
guide the main body of the direct-pressure force to destroy withdrawing ene-
my forces. These actions of the direct-pressure force may or may not be in
conjunction with the actions of any encircling force.
7-36. The commander does everything possible to place his encircling force
behind the withdrawing enemy and trap the bulk of that enemy force be-
tween the encircling force and the direct-pressure force. The direct-pressure
force maintains enough pressure on the withdrawing enemy force so the en-
circling force can envelop it. To perform this task, the direct-pressure force
must be strong enough to overcome any enemy rear guard before the enemy’s
main body can make a successful withdrawal. Once in position, the encircling
force defends or attacks as necessary, responding to the enemy’s actions and
those of the direct-pressure force to complete the enemy’s encirclement.
7-37. The pursuing force must not give the enemy time to reorganize for an
all-around defense after it is encircled. If the enemy forms a perimeter, the
pursuing commander must repeatedly split it into smaller elements until he
destroys the encircled enemy force. If time is not critical, the commander can
keep the encirclement closed, defeat enemy breakout attempts, and weaken
the enemy by fires alone. He can greatly accelerate the collapse of a large, en-
circled enemy force by using psychological operations, precision-guided wea-
pons, and improved conventional munitions in mass. (Appendix D addresses
the reduction of an encircled enemy force.) If the resulting encirclement does
not destroy the withdrawing enemy force, the commander conducts additional
pursuit operations until the enemy is destroyed.
FOLLOW THROUGH
7-38. Once the commander initiates a pursuit, he continues pursuing the ene-
my until a higher commander terminates the pursuit. Conditions under
which a higher commander may terminate a pursuit include the following—
· The pursuing force annihilates or captures the enemy and resistance
ceases.
· The pursuing force fixes the enemy for follow-on forces.
· The high commander makes an assessment that the pursuing force is
about to reach a culminating point.
7-11
FM 3-90
7-39. A pursuit often transitions into other types of offensive and defensive
operations. If the enemy attempts to reorganize, forces conducting a pursuit
execute hasty attacks. They conduct an exploitation to capitalize on the suc-
cess of these attacks and then move back into pursuit. Forces conducting a
pursuit may also transition into a defensive operation if the pursuing force
reaches a culminating point. This usually occurs when the enemy introduces
strong reinforcements to prepare for a counteroffensive.
7-12
PART THREE
Defensive Operations
Chapter 8
CONTENTS
Historical Example ........................................8-2 Maneuver .................................................8-14
Types of Defensive Operations ...................8-4 Fire Support.............................................8-18
Area Defense ..............................................8-4 Air Defense ..............................................8-20
Mobile Defense ..........................................8-4 Mobility/Countermobility/Survivability .8-23
Retrograde..................................................8-5 Combat Service Support ........................8-27
Common Defensive Control Measures .......8-5 Command and Control ...........................8-29
Battle Handover Line.................................8-5 Common Defensive Scenarios ..................8-30
Main Battle Area.........................................8-5 Defense Against Airborne and Air
Forward Edge of the Battle Area ..............8-6 Assault Attacks .......................................8-30
Battle Positions..........................................8-7 Defense of a Linear Obstacle ................8-31
Fire Support Coordinating Measures ....8-10 Perimeter Defense ..................................8-32
Direct Fire Control Measures..................8-11 Reverse Slope Defense ..........................8-38
Disengagement Lines..............................8-11 Transition .....................................................8-42
Common Defensive Planning Transition to the Offense ........................8-42
Considerations.........................................8-12 Transition to the Retrograde ..................8-45
Intelligence ..............................................8-13
8-1
FM 3-90
8-1. While the offense is the most decisive type of combat operation, the de-
fense is the stronger type. The inherent strengths of the defense include the
defender’s ability to occupy his positions before the attack and use the avail-
able time to prepare his defenses. Preparations end only when the defender
retrogrades or begins to fight. The defender can study the ground and select
defensive positions that mass the effects of his fires on likely approaches. He
combines natural and manmade obstacles to canalize the attacking force into
his engagement areas (EAs). He can coordinate and rehearse his defensive
plan while gaining intimate familiarity with the terrain. The defender does
not wait passively to be attacked. He aggressively seeks ways of attriting and
weakening attacking enemy forces before the initiation of close combat. He
maneuvers to place the enemy in a position of disadvantage and attacks him
at every opportunity, using his direct and indirect fires. The fires include the
effects of offensive information operations and joint assets, such as close air
support. The static and mobile elements of his defense combine to deprive the
enemy of the initiative. He contains the enemy while seeking every oppor-
tunity to transition to the offense.
HISTORICAL EXAMPLE
8-2. The following historical example illustrates how conducting a defense
can attrit and fix an enemy as a prelude to offensive actions.
8-2
Basics of Defensive Operations
XI I
X I
XXX
XLVII
X LI
XLVII
XX
XX
XL
I
XXX
XLVI
4
XX XX
XX XX 216
XX 10 XX
2 9 XX
12
18 78
XX XX XX XX XX
15 X
XX XX 31 86
XX 9
20 6 292
258 7
2
XX
XX 81
13(29TH RC)
15 MALOARKHANGELSK
XXXX
XX
70
PONYRI 4Gd
(o/o 5
XX
JULY
XXXX XX 307
XXX
43
2 3Gd
OLKHOVATKA 3
XXX
17Gd
29
During a week of intense defensive combat, the 29th RC conducted an area de-
fense, making the Germans pay so dearly for every gain that they reached their
culminating point short of Kursk. See Figure 8-1. Tested by nine German divi-
sions, the 29th RC was able to keep German forces from breaking through its
area of operations (AO), despite having its initial three divisions rendered
combat-ineffective. In the course of the defense, the 29th RC inflicted 10,700
German casualties and destroyed an estimated 220 tanks and 71 guns. Key to
the defense was the construction of those mutually supporting antitank positions,
organized for all-around defense, with extensive engineer works to enhance the
terrain. The 29th RC employed its attached forces aggressively, creating com-
bined arms teams to hold terrain or maneuver against German forces within the
defensive belt. It employed counterattacks to retake key terrain or gain time to
develop defenses.
8-3
FM 3-90
AREA DEFENSE
8-5. The area defense a type of defensive operation that concentrates on
denying enemy forces access to designated terrain for a specific time rather
than destroying the enemy outright (FM 3-0). The focus of the area defense is
on retaining terrain where the bulk of the defending force positions itself in
mutually supporting, prepared positions. Units maintain their positions and
control the terrain between these positions. The decisive operation focuses on
fires into EAs possibly supplemented by a counterattack. The reserve may or
may not take part in the decisive operation. The commander can use his re-
serve to reinforce fires; add depth, block, or restore the position by counter-
attack; seize the initiative; and destroy enemy forces. Units at all echelons
can conduct an area defense. (Chapter 9 discusses the area defense.)
MOBILE DEFENSE
8-6. The mobile defense is a type of defensive operation that concentrates on
the destruction or defeat of the enemy through a decisive attack by a striking
force (FM 3-0). The mobile defense focuses on defeating or destroying the ene-
my by allowing him to advance to a point where he is exposed to a decisive
counterattack by the striking force. The decisive operation is a counterattack
conducted by the striking force. The striking force is a dedicated counterat-
tack force constituting the bulk of available combat power. A fixing force sup-
plements the striking force. The commander uses his fixing force to hold at-
tacking enemy forces in position, to help channel attacking enemy forces into
ambush areas, and to retain areas from which to launch the striking force.
8-7. A mobile defense requires an AO of considerable depth. The commander
must be able to shape the battlefield, causing the enemy to overextend his
lines of communication (LOCs), expose his flanks, and dissipate his combat
power. Likewise, the commander must be able to move around and behind
the enemy force he intends to cut off and destroy. Divisions and larger forma-
tions normally execute mobile defenses. However, subordinate echelons may
participate as part of the fixing force or the striking force. (Chapter 10 dis-
cusses the mobile defense.)
8-4
Basics of Defensive Operations
RETROGRADE
8-8. The retrograde is a type of defensive operation that involves organized
movement away from the enemy (FM 3-0). The enemy may force these opera-
tions, or a commander may execute them voluntarily. The higher commander
of the force executing the retrograde must approve the retrograde operation
before its initiation in either case. The retrograde is a transitional operation;
it is not conducted in isolation. It is part of a larger scheme of maneuver de-
signed to regain the initiative and defeat the enemy. (Chapter 11 further dis-
cusses the retrograde.)
8-5
FM 3-90
ENY ENY
PL DANIEL/ PL DANIEL/
PP 14 PP 91
BHL PP 62 PP 34 BHL
PL FULTON PL FULTON
I I I 2
X I
II
II
ATK ATK I
1 4
5 I ATK ATK
PL COLLEEN RP 7 PL COLLEEN
II II
RP 17
ROUTE BLUE
ROUTE
GOLD
SP 45 SP 11
PL JONES PL JONES
X
Figure 8-2. Use of a BHL in a Rearward Passage of Lines
8-12. The MBA extends from the FEBA to the unit’s rear boundary. The com-
mander locates his subordinate unit boundaries along identifiable terrain fea-
tures and extends them out beyond the FLOT by establishing forward bound-
aries. Unit boundaries should not split avenues of approach or key terrain.
The commander selects the MBA based on the products of the intelligence
preparation of the battlefield (IPB) process and his own analysis using the
factors of METT-TC. The IPB process indicates how the enemy will most
likely use the available avenues of approach.
8-6
Basics of Defensive Operations
support and to maneuver his forces. A phase line designating the forward-
most point of the MBA indicates the FEBA. The FEBA shows the senior com-
mander’s planned limit for the effects of direct fires by defending forces. De-
fending units must address this area in their scheme of maneuver and
exchange information regarding tactical plans at the coordinating points.
(Figure 8-3 graphically depicts the current FEBA and a proposed FEBA.)
21 25
FEBA FEBA
(PL ENGLISH) [CURRENT FEBA]
(PL ENGLISH)
192245Z DEC 192245Z DEC
XX
25AD 52MD
1 2
X
FEBA
FEBA
(PL TEST)
200830Z DEC [PROPOSED FEBA] (PL TEST)
200830Z DEC
BATTLE POSITIONS
8-14. A battle position is a defensive location oriented on a likely ene-
my avenue of approach. The battle position is an intent graphic that de-
picts the location and general orientation of the majority of the defending
forces. A commander’s use of a battle position does not direct the position of
the subordinate’s entire force within its bounds since it is not an AO. (See
Figure 8-4, page 8-8.) Units as large as battalion task forces and as small as
squads or sections use battle positions. They may occupy the topographical
crest of a hill, a forward slope, a reverse slope, or a combination of these
areas. The commander selects his positions based on terrain, enemy capabili-
ties, and friendly capabilities. A commander can assign all or some of his sub-
ordinates battle positions within his AO. (See Figure 8-5, page 8-8.)
8-15. The commander may assign his subordinates battle positions in situa-
tions when he needs to retain a greater degree of control over the maneuver
of his subordinate units than what he has with only an AO, as he controls
maneuver outside the general location of the battle position. He may assign
multiple battle positions to a single unit, which allows that unit to maneuver
between battle positions. The commander specifies mission and engagement
criteria to the unit assigned to a battle position. Security, combat support
(CS), and combat service support (CSS) forces may operate outside a unit’s
battle position.
8-7
FM 3-90
8-16. Battle positions are not normally held at all costs. The commander as-
signing a unit to a battle position should specify when and under what
conditions the unit displaces from the position. If a unit is ordered to defend a
battle position, its commander has the option of moving off the battle posi-
tion. If that unit is directed to retain a battle position, its commander needs
to know the specific conditions that must exist before his unit can displace.
S S
I I
I I EA BP I
3 I
EAGLE I (-)
I
I BP
I
(-) 68
II
MORT
CBT
II
MORT
13
II
X
EA BP
X
BP BP 12
16
II
ZOO II
II
15
BP 17
II X
8-8
Basics of Defensive Operations
PRIMARY
BATTLE POSITIONS SUPPLEMENTARY
BATTLE
POSITION
BP
BP EA EA 8
7 DOVE HEN
BP
BP
I
BP 18 21
I 17
STRONG POINT
ALTERNATE
BATTLE POSITIONS
SUBSEQUENT
BATTLE POSITION
BP 23
I
Figure 8-6. Five Kinds of Battle Positions
8-18. The primary position is the position that covers the enemy’s
most likely avenue of approach into the AO. It is the best position from
which to accomplish the assigned mission, such as cover an EA.
8-19. An alternate position is a defensive position that the command-
er assigns to a unit or weapon for occupation when the primary posi-
tion becomes untenable or unsuitable for carrying out the assigned
task. It covers the same area as the primary position. He locates alternate
positions so the occupant can continue to fulfill his original task, such as cov-
ering the same avenue of approach (AA) or EA as the primary position. These
positions increase the defender’s survivability by allowing him to engage the
enemy from multiple positions. For example, a unit moves to its alternate
positions when the enemy brings suppressive fires on the primary position.
8-20. A supplementary position is a defensive position located within
a unit’s assigned AO that provides the best sectors of fire and defen-
sive terrain along an avenue of approach that is not the primary ave-
nue where the enemy is expected to attack. For example, an AA into a
unit’s AO from one of its flanks normally requires establishing supplement-
ary positions to allow a unit or weapon system to engage enemy forces travel-
ing along that avenue.
8-21. A subsequent position is a position that a unit expects to move
to during the course of battle. A defending unit may have a series of
subsequent positions. Subsequent positions can also have primary, alternate,
and supplementary positions associated with them.
8-9
FM 3-90
ENEMY
AVENUE OF
R
VE
APPROACH
RI
LE
AB
RD
FO
UN
II
RANGE FAN
OF STRONGPOINT
ANTIARMOR WEAPONS
8-23. Before assigning a strong point mission, the commander must ensure
that the strong point force has sufficient time and resources to construct the
position, which requires significant engineer support. A minimally effective
strong point typically requires a one-day effort from an engineer unit the
same size as the unit defending the strong point. Normally, companies and
battalions occupy strong points, although brigades may construct them. The
commander does not normally establish strong points for units smaller than
company size. This is because a platoon or squad cannot secure a perimeter
large enough to encompass all required assets and supplies.
8-10
Basics of Defensive Operations
PL JOANN
DISENGAGEMENT
LINE EA
EA ALPHA OMEGA
+ +
NZ1542
I
NZ1540
+
I
TRIGGER
+
TRIGGER NZ1539 NZ1541
LINE/ LINE/
PL JAN PL PEGGY
I I
+
NZ1545
EA + NZ1543
TRIGGER LINE/
PL DICK
PHI
+ NZ1544
I
DISENGAGEMENT LINE
8-27. A disengagement line is a phase line located on identifiable ter-
rain that, when crossed by the enemy, signals to defending elements
that it is time to displace to their next positions. Phase Line JOANN is
a disengagement line in Figure 8-9. The commander uses these lines in the
8-11
FM 3-90
delay and the defense when he does not intend for the defending unit to be-
come decisively engaged. He establishes criteria for the disengagement, such
as number of enemy vehicles by type, friendly losses, or enemy movement to
flanking locations. Multiple disengagement lines, one for each system in the
defense, may exist.
8-12
Basics of Defensive Operations
INTELLIGENCE
8-32. During the planning process, the commander uses intelligence products
to identify probable enemy objectives and various approaches. He studies pat-
terns of enemy operations and the enemy’s vulnerability to counterattack, in-
terdiction, electronic warfare, air attacks, and canalization by obstacles. The
commander must also examine the enemy’s capability to conduct air attacks
against his force, insert forces behind friendly units, and employ nuclear, bio-
logical, and chemical weapons. He must determine how soon follow-on forces
can join the fight against an enemy attacking in echelons.
8-33. The commander uses his intelligence, surveillance, and reconnaissance
(ISR), and engineer assets to study the terrain. By studying the terrain, the
commander tries to determine the principal enemy and friendly heavy, light,
and air avenues of approach. He wants to determine the most advantageous
area for the enemy’s main attack, as well as other factors of observation and
fields of fire, avenues of approach, key terrain, obstacles, and cover and con-
cealment (OAKOC). (See FM 6-0 for a detailed discussion of OAKOC.)
8-34. The commander approves an integrated ISR plan that provides early
identification of as many of the following requirements as possible:
· Locations, composition, equipment, strengths, and weaknesses of the
advancing enemy force.
· Enemy reconnaissance objectives or goals.
· Locations of possible enemy assembly areas.
· Location of enemy indirect fire weapon systems and units.
· Location of gaps, assailable flanks, and other enemy weaknesses.
· Location of areas for enemy helicopter and parachute assaults.
· Location of artillery and air defense gun and missile units.
· Location of enemy electronic warfare units.
· Location, numbers, and intentions of civilian populations.
· Effects of weather and terrain on current and projected operations.
8-13
FM 3-90
MANEUVER
8-36. The commander’s intent is to defeat the enemy force’s attack by over-
whelming it with repeated, unexpected blows before it conducts its final as-
sault on friendly defensive positions. As the enemy attack fails, the enemy
must attempt to withdraw or transition to a defense in the face of friendly
counterattacks. If the enemy succeeds in overrunning a key defensive posi-
tion, the defending force counterattacks to overwhelm the enemy before he
can either organize that position for defense or exploit his success.
8-14
Basics of Defensive Operations
force ratios—or the degree of risk he must take is clear—he allocates his
available forces and begins planning his EAs.
8-40. On each enemy AA, the commander determines where he wants to de-
stroy the enemy. He arrays forces allocated to that AA around this point to
establish an EA. He uses obstacles and fires to canalize enemy forces into this
EA. The commander takes actions to increase the kill probabilities of his var-
ious weapon systems at different ranges. This includes establishing range
markers for direct fire weapons, confirming the zero on his weapons, or
clearing obstacles that might snag the cables over which the commands of his
wire-guided munitions, like the TOW missile, travel.
8-41. Generally, defending forces have the advantage of preparing the terrain
by reinforcing natural obstacles, fortifying positions, and rehearsing opera-
tions. First, they prepare the ground to force the piecemeal commitment of
enemy forces and their subsequent defeat in detail. Second, they prepare the
ground to force the enemy to fight where he does not want to fight, such as in
open areas dominated by terrain that offers adequate cover and concealment
for the occupying friendly forces. The defending force tries to guide or entice
the enemy into prepared EAs. Units employ and continuously strengthen ob-
stacles and fortifications to improve the natural defensive strength of the po-
sition, which has a direct bearing on the distribution of forces, frontages, and
depth of the defense.
8-42. Terrain features that favor defensive operations include—
· A series of parallel ridges across the line of hostile advance.
· Unfordable streams, swamps, lakes, and other obstacles on the front
and flanks.
· High ground with good observation and long-range fields of fire.
· Concealed movement routes immediately behind defensive positions.
· Limited road network in front of the line of contact to confine the
enemy to predictable avenues of approach.
· Good road network behind the line of contact that allows the command-
er to reposition his forces as the battle progresses.
The opposite of the terrain conditions listed above degrades a force’s ability to
conduct defensive operations. For example, terrain with a limited road net
that canalizes the defending force allows the enemy to predict its movement
and take steps to interdict that movement.
Maintain Security
8-43. Security operations seek to confuse the enemy about the location of the
commander’s main battle positions, prevent enemy observation of prepara-
tions and positions, and keep the enemy from delivering observed fire on the
positions. They also try to force the attacking enemy to deploy prematurely.
They can offset the attacker’s inherent advantage of initiative regarding the
time, place, plan, direction, strength, and composition of his attack by forcing
him to attack blind into prepared defenses. The commander must not permit
enemy reconnaissance and surveillance assets to determine the precise loca-
tion and strength of defensive positions, obstacles, EAs, and reserves. First,
the defending force conducts reconnaissance to gain and maintain contact
with the enemy. Second, each echelon normally establishes a security area
8-15
FM 3-90
forward of its MBA. All units conduct aggressive security operations within
their AO, including the rear area, to seek out and repel or kill enemy recon-
naissance and other forces. Units implement operations security (OPSEC)
measures and other defensive information operations to deny the enemy in-
formation about friendly dispositions. (See Chapter 12 for more information
on security operations.)
Heavy Forces
8-47. When the majority of a defending force consists of mechanized or ar-
mored units, the commander can conduct a defense designed to take advan-
tage of the tactical mobility and protection offered by organic combat vehicles.
Heavy forces can maneuver to delay the advance of a strong enemy force and
then immediately change from a mobile to a static form of defense or
8-16
Basics of Defensive Operations
counterattack. Such forces are well suited for use as security and MBA forces.
They are more suited for operations within an NBC contaminated environ-
ment than light forces because of their built-in protection.
Light Forces
8-48. When facing enemy light forces, the commander deploys and uses de-
fending light forces in the same manner as heavy forces are used against
other heavy forces. Light forces facing a heavy enemy are primarily used in
static roles within the MBA or in security roles within the rear area. When
facing heavy enemy forces, light infantry forces are most effective when fight-
ing from prepared defenses or in close terrain, such as swamps, woods, hilly
and mountainous areas, and urban areas where they can take advantage of
their foot mobility and short-range infantry and anti-armor weapons.
8-49. The commander uses an air assault unit in the same manner as other
light forces once it deploys into its landing zones (LZs). (See Appendix C for a
discussion of air assault operations.) However, there may be more problems
in extracting such a force, particularly if it is in direct contact with the ene-
my. Because of its mobility and potential reaction speed, an air assault force
is often well-suited for a reserve role during defensive operations. Its tasks
might include—
· Rapid reinforcement of a threatened position.
· Occupation of a blocking position, possibly in conjunction with existing
defensive positions.
· Rear area security operations, such as containment of an enemy air-
borne or helicopter assault.
· Reinforcement of encircled friendly forces.
· Flank protection.
8-17
FM 3-90
FIRE SUPPORT
8-51. In the defense, the commander uses his fire support systems to neutra-
lize, suppress, or destroy enemy forces; to delay or disrupt the enemy’s ability
to execute a given COA; and to enhance the effects of massed direct fires.
Thus fire support systems support both the commander’s decisive and
shaping operations.
8-52. The defending force is more effective if it can locate and attack enemy
forces while the enemy is stationary and concentrated in assembly areas or
advancing along LOCs, as opposed to when he is deployed in combat forma-
tions within the MBA. To accomplish this, the defending force must employ
its fire support system throughout its AO. It must be closely linked to target
acquisition means, including ISR assets.
8-53. As the commander develops his defensive plans, he must visualize how
to synchronize, coordinate, and distribute the effects of indirect and direct fire
at the decisive time and place. He places permissive FSCM as close as pos-
sible to friendly positions to facilitate the rapid engagement of attacking ene-
my forces. Prior coordination facilitates the massing of the effects of fires
before enemy targets concentrated at obstacles and other choke points can
disperse. Proper distribution of fire effects ensures the massing of over-
whelming combat power at the decisive point. Proper fire distribution also en-
sures that high-payoff targets are destroyed without wasting assets through
repetitive engagement by multiple friendly systems.
8-54. Indirect fires have the greatest impact on the enemy when they are
synchronized with direct fires and the use of obstacles, defensive positions,
and counterattack plans. The commander must integrate the defensive fire
and obstacle plans from the beginning. Indirect fires complement the effects
of obstacles and can disrupt enemy attempts to breach or bypass these obsta-
cles. For the plans to work, all elements in the fire support chain—from for-
ward observers in fire support teams to the fire support coordinator including
the supporting tactical air control party—must understand the commander’s
intent, the scheme of maneuver, and the obstacle plan.
8-55. There are various fire support considerations for each phase of the
fight. As part of his shaping operations during defense preparations, a com-
mander tries to disrupt the enemy’s attack preparations by—
· Conducting harassing fires on choke points and likely enemy assembly
areas.
· Employing air support on known, suspected, and likely enemy loca-
tions.
· Attritting his resources by continuously engaging high-payoff targets.
· Conducting offensive information operations to degrade the enemy’s
ability to command and control his forces.
· Employing counterfires to engage and destroy enemy artillery and mor-
tar systems attempting to deliver suppressive fires.
8-18
Basics of Defensive Operations
8-19
FM 3-90
AIR DEFENSE
8-60. Freedom of movement is essential to successful defensive operations. In
a hostile air environment, the defending force must establish air defense in
depth around critical points, areas, units, and activities. The dedicated air de-
fense artillery resources probably cannot provide adequate cover completely
throughout the AO against all possible threats; therefore, the commander
must establish priorities for coverage and assume risk.
8-20
Basics of Defensive Operations
8-21
FM 3-90
8-22
Basics of Defensive Operations
MOBILITY/COUNTERMOBILITY/SURVIVABILITY
8-73. An attacking enemy has the initiative in terms of where and when he
will attack. A defending commander must take a wide range of actions to pro-
tect the mobility of his force while degrading the mobility of the enemy. He
takes those steps simultaneously to protect his force from losses due to enemy
actions.
Mobility
8-74. During the defense, mobility tasks include maintaining routes, coordi-
nating gaps in existing obstacles, and supporting counterattacks. Engineers
also open helicopter LZs and tactical landing strips for fixed-wing aircraft.
Maintaining and improving routes and creating bypass or alternate routes at
critical points are major engineering tasks because movement routes are sub-
jected to fires from enemy artillery and air support systems. These enemy
fires may necessitate deploying engineer equipment, such as assault bridging
and bulldozers, forward. The commander can also evacuate dislocated civil-
ians or restrict their movements to routes not required by his forces to en-
hance his mobility. He can do this provided he coordinates the action with the
host nation or the appropriate civil military operations agency and fulfills his
responsibilities to displaced civilians under international law.
8-75. Priority of mobility support is first to routes used by counterattacking
forces, then to routes used by main body forces displacing to subsequent posi-
tions. This mainly involves breaching obstacles and improving combat roads
and trails to allow tactical support vehicles to accompany moving combat ve-
hicles. Careful coordination ensures leaving required lanes or gaps in obsta-
cles for repositioning main body units and committing the counterattack force
during the defense. Chemical reconnaissance systems also contribute to the
force’s mobility in a contaminated environment.
Countermobility
8-76. In the defense, the commander normally concentrates his engineer ef-
forts on countering the enemy’s mobility. A defending force typically requires
8-23
FM 3-90
8-24
Basics of Defensive Operations
through obstacles and crossing sites—to keep open for the unit’s use, as well
as the firing and self-destruct times of scatterable mines to prevent delays in
movement. The commander must be specific and clear in his orders for firing
demolitions, emplacing obstacles, and closing lanes. As each lane closes, the
closing unit reports the lane’s closure to the higher, subordinate, and adjacent
headquarters to preclude displacing units from moving into areas with
unmarked or abandoned obstacles.
8-83. Tactical and protective obstacles are constructed primarily at company
level and below. Small unit commanders ensure that observation and fires
cover all obstacles to hinder breaching. Deliberate protective obstacles are
common around fixed sites. Protective obstacles are a key component of sur-
vivability operations. They are tied in with FPFs and provide the friendly
force with close-in protection. Commanders at all echelons track defensive
preparations, such as establishing Class IV and V supply points and start or
completion times of obstacle belts and groups. The commander plans how he
will restore obstacles the enemy has breached. He uses artillery, air, or
ground systems to reseed minefields.
8-84. FM 3-34.1 provides additional information about obstacles and obstacle
integration, such as planning factors relating to emplacing obstacles and ob-
stacle function versus lethality. It also describes the methods and essential
principles for planning protective obstacles.
Survivability
8-85. Since the attacking enemy force usually has the initiative in terms of
where and when it will attack, a defending commander must take a wide
range of actions to protect his force from losses due to enemy actions. These
steps include ensuring all-around defense, NBC defense, and using smoke.
8-86. The survivability effort for the defense must enable units to concentrate
firepower from fixed positions. To avoid detection and destruction by the ene-
my, units move frequently and establish survivability positions quickly. To
provide flexibility, units may need primary, alternate, and supplementary po-
sitions. This is particularly true of units defending key or decisive terrain.
Units enhance their survivability through concealment, deception, dispersion,
and field fortifications.
8-87. Survivability tasks include using engineer equipment to assist in pre-
paring and constructing trenches, command post shelters, and artillery firing,
radar, and combat vehicle fighting positions. The commander provides guid-
ance on the level of protection—such as hull defilade or overhead cover, sys-
tem priorities, and early use of specialized engineer systems that can con-
struct survivability positions. He should protect supply stocks against blast,
shrapnel, incendiaries, and NBC contamination. Supplies loaded on tactical
vehicles can be protected against almost anything but a direct hit by con-
structing berms large enough to accommodate the vehicles and deep enough
to keep supplies below ground level. The force’s engineer officer can advise
CSS logistics operators about storage area site selection that reduces the re-
quirements for engineer survivability support without reducing the degree of
protection provided. FMs 3-34.1 and 3-34.112 provide additional information
concerning the construction and maintenance of survivability positions.
8-25
FM 3-90
8-26
Basics of Defensive Operations
friendly capabilities. Improper use can create an advantage for the enemy.
The effectiveness of smoke depends on weather conditions and the quantity of
smoke employed. The commander coordinates the use of smoke generators,
artillery/mortar smoke, and smoke pot employment. The capabilities of each
of these smoke-producing systems are complementary and most effective
when used together to achieve synergistic effects. Using smoke can also en-
hance the effects of deception operations and cover friendly movement to in-
clude a river crossing. (FM 3-11.50 provides details on planning, preparing,
and executing smoke operations.)
8-27
FM 3-90
it takes to complete the process. Resupply should take place during daylight
hours if the commander expects the enemy to conduct a limited visibility at-
tack. The commander may be required to infiltrate resupply vehicles to re-
duce detection chances when the enemy possesses a significant air, satellite,
or unmanned aerial vehicle capability. The commander may also use smoke
to help conceal his logistics operations.
8-99. The CSS commander remains responsible for the defense of his unit.
Concealment is an important factor in reducing the risk factors of these units.
The commander must plan for the reconstitution of CSS capability lost to ene-
my activities.
8-100. Terrain management is a critical consideration in the rear area. The
commander seeks to position each CSS unit where it can best fulfill its sup-
port tasks while using minimal resources to maintain security in conjunction
with other units located in the rear area. In contiguous operations, the com-
mander positions his CSS facilities farther to the rear in a defense than in the
offense to avoid interfering with the movement of units between battle posi-
tions or the forward movement of counterattack forces. It also should be loca-
ted far enough behind friendly lines that likely enemy advances will not com-
pel the relocation of critical CSS at inopportune times. At the same time CSS
must be close enough to provide responsive support. In noncontiguous opera-
tions, the commander positions his CSS facilities within the perimeters of his
combat units to provide security and avoid interrupting support services. The
commander distributes his similar functional CSS units throughout his de-
fensive area in both environments. This distribution allows him to designate
one support unit to pick up the workload of a displacing second support unit
until that unit is operational.
8-101. The defending commander provides maintenance support as far for-
ward as possible to reduce the need to evacuate equipment. The thrust of the
maintenance effort is to fix as far forward as possible those systems that can
be quickly returned to the unit in combat-ready condition. He must ensure
that multifunctional forward logistics elements contain the maximum variety
of DS personnel with appropriate equipment, such as repair sets, kits, and
outfits to ensure rapid repair of weapon systems.
8-102. The commander must plan to augment his available ambulances if a
mass-casualty situation develops. Units should always plan for mass casual-
ties and have an evacuation plan, including air evacuation, that specifies the
use of nonstandard air and ground platforms.
8-103. The conduct of troop movements and resupply convoys is critical to a
successful defense. Staffs balance terrain management, movement planning,
and traffic-circulation control priorities. They plan multiple routes
throughout the AO and closely control their use. The commander may allo-
cate mobility resources to maintain MSRs in a functional condition to support
units and supplies moving forward and to evacuate personnel and equipment
to the rear. Military police ease these movements, prevent congestion, and re-
spond to maneuver plan changes. Civil affairs and host nation agencies are
involved as necessary to minimize the impact of displaced civilians on unit
and convoy movements. The commander coordinates air and ground move-
ments supporting the commander’s maneuver scheme with any other affected
8-28
Basics of Defensive Operations
services. Commanders also coordinate such movements with any affected or-
ganic and external Army aviation, fire support, air defense units, and ground
maneuver units.
8-104. During the preparatory phase of the defense, logistics operators nor-
mally pre-position supply stocks, particularly ammunition and barrier mater-
ials, in the battle positions of defending forces. They also establish mainte-
nance and medical collection points. Logistics operators must address these
and other logistics preparations in the planning process to avoid compro-
mising the operation. These logistics preparations can also be included in
military deception plans.
8-29
FM 3-90
8-30
Basics of Defensive Operations
commander takes steps to counter the threat before they launch, during their
movement to the DZ, or at the LZ. After prioritizing the risk of each potential
DZ or LZ to his operation, the commander establishes systematic surveillance
of these areas to alert him if the enemy attempts to insert his forces. Units
also sight their weapons to cover the most probable DZs and LZs. The fire
support plan includes these zones in its target list for conventional munitions
and scatterable mines and reflects current rules of engagement and host
nation restrictions. Units and engineers emplace obstacles in these locations
and block avenues of approach from such areas to critical friendly installa-
tions and activities as part of their countermobility and rear area surviva-
bility efforts.
8-113. Once enemy forces succeed in landing, the key to a successful defense
is speed in containing and counterattacking the inserted enemy force before it
becomes organized and reinforced. Field artillery and attack helicopters must
commit rapidly to take advantage of the concentration of targets in the inser-
tion area. Affected base and base cluster defense forces and available re-
sponse forces keep the enemy force under observation at all times, calling in
and designating targets for available fire support systems. The commander
rapidly musters and commits available heavy units and combat systems to
take advantage of enemy light forces’ vulnerabilities to attack by armored ve-
hicles while they remain concentrated in the insertion area. If more enemy
troops land and succeed in consolidating, local base and base cluster defense
forces and the response force try to fix the enemy force in a chosen location to
allow a tactical combat force (TCF) to counterattack. If the enemy force is too
large for the TCF to reduce, the commander may need to commit his reserve.
8-31
FM 3-90
PERIMETER DEFENSE
8-118. The commander can employ the perimeter defense as an option when
conducting an area or mobile defense. The commander uses it in many other
circumstances, such as when his unit is bypassed by the enemy or in base and
base cluster defense in the rear area.
8-119. A perimeter defense is oriented in all directions. Aggressive patrolling
and security operations outside the perimeter are prerequisites for a success-
ful perimeter defense. These activities can be undertaken by the unit within
the perimeter or by another force, such as the territorial defense forces of a
host nation. The unit can organize a perimeter defense to accomplish a speci-
fic mission, such as protecting a fire base, or providing immediate self-protec-
tion, such as during resupply operations when all-around security is required.
The commander establishes a perimeter when the unit must hold critical ter-
rain, such as a strong point, or when it must defend itself in areas where the
defense is not tied in with adjacent units. This occurs when the unit is opera-
ting behind enemy lines or when it is securing an isolated objective, such as a
bridge, mountain pass, or airfield. A unit may also form a perimeter when it
has been bypassed and isolated by the enemy and it must defend in place, or
it is located in the friendly rear area within the confines of a base or base
cluster. (See Figure 8-10.) However, divisions and corps can also organize a
perimeter defense when necessary.
8-120. A major characteristic of a perimeter defense is a secure inner area
with most of the combat power located on the perimeter. Another characteris-
tic is the ease of access for resupply operations. The commander coordinates
direct and indirect fire plans to prevent accidentally engaging neighboring
friendly units and noncombatants. Normally, the reserve centrally locates to
react to a penetration of the perimeter at any point.
8-32
Basics of Defensive Operations
SPT
RESERVE
Organization of Forces
8-122. The commander may
employ all of his forces forward
along the perimeter or establish I I I
a defense in depth within the
II
II
8-33
FM 3-90
I
places two companies in
I
each battalion task force
I
along the outer perimeter
I
and one company in reserve I
II
along the inner perimeter.
(See Figure 8-12.) This con- I
figuration gives depth to the
battalion task force’s posi-
tions and facilitates control.
It also gives one company Figure 8-12. Three Battalion TFs on
from each battalion task Perimeter, Co/Teams Positioned in Depth
force the mission to support
frontline platoons. It enables
the company commander to
I
II
I
locate any indirect fire sys-
tems, such as mortars, near
I
I
Alternatively, the command-
I
er could elect to assign two
battalion task forces to the I I
outer perimeter and a third
battalion to an inner peri- I
meter, retaining a larger,
II
8-34
Basics of Defensive Operations
mounted avenues of approach leading to it, the commander may elect to hold
his combat vehicles in hide positions until the enemy approaches. Units pre-
pare routes, firing positions, and range cards in advance for all positions.
Small-unit leaders must ensure that vehicles do not destroy communication
wires when they displace from one position to another.
8-127. The need to hold or protect features—such as bridges, airfields, or
LZs—from enemy observation and fires may restrict the positioning of units
within a perimeter. These factors, as well as the inability to achieve depth,
make a perimeter defense vulnerable to penetration by heavy enemy forces.
The commander reduces these vulnerabilities by—
· Developing reconnaissance and surveillance plans that provide early
warning.
· Positioning antiarmor weapon systems on armor-restrictive terrain to
concentrate fires on armor approaches.
· Providing as much depth as the diameter of the perimeter to allow the
proper placement of security elements and the reserve and the designa-
tion of secondary sectors of fire for antiarmor weapons.
· Constructing obstacles to fix or block enemy forces, so that friendly
units can effectively engaged them.
· Using smoke and deception.
8-128. If isolation from other friendly units drives the commander to form a
perimeter, such as during rear operations, CS and CSS elements from other
units may seek the perimeter’s protection. These elements are given defen-
sive missions based on their capabilities. The commander coordinates and in-
tegrates any fire support provided from outside the perimeter into the overall
defensive plan. This extra fire support conserves the ammunition of units
within the perimeter.
8-129. The commander normally employs any reconnaissance assets, such as
a scout platoon, outside the perimeter to provide early warning. He may aug-
ment security with squad-size or smaller observation posts that are provided
and controlled by units on the perimeter. He positions these security ele-
ments to observe avenues of approach. Patrols cover areas that cannot be ob-
served by stationary elements. Any security forces operating outside the peri-
meter must coordinate their passage of lines into and out of the perimeter
with the appropriate perimeter units.
8-130. The reserve may be a designated unit or a provisional force organized
from available personnel and equipment. The reserve forms a second line of
defense behind the perimeter forces. Ideally, the reserve is mobile to react to
enemy action along any part of the perimeter. The commander positions the
reserve to block the most dangerous AA and assigns on-order positions on
other critical avenues. The commander may task available combat vehicles
initially occupying firing positions on the perimeter with the mission of rein-
forcing the reserve.
Control Measures
8-131. The commander in a perimeter defense designates the trace of the
perimeter, battle positions, coordinating points, and lateral and forward
8-35
FM 3-90
boundaries. He can use EAs, target reference points, final protective fires,
and principal direction of fire as fire control measures. The commander desig-
nates checkpoints, contact points, passage points, and passage routes for use
by local reconnaissance, surveillance, and security elements operating outside
the boundary of the perimeter. (See Figure 8-14.)
+
AG7005
260630Z 3
OCT04
SP 13
+ AG7003
I
EA
RP 7 WEASEL
16
I
I
+ AG7001
RP 8
I
AG FPF OR
2-
50
12
2M
01
260830Z
11
OCT04
+
AG7002
17 SP 5
T
EA SKUNK
8-36
Basics of Defensive Operations
8-37
FM 3-90
8-38
Basics of Defensive Operations
TOPOGRAPHICAL
CREST
FORWARD REVERSE
SLOPE SLOPE
ENEMY
MOVEMENT
CONCAVE SLOPE
FORWARD REVERSE
MILITARY MILITARY
CREST CREST
8-39
FM 3-90
Organization of Forces
8-147. The commander places his overwatching elements forward of the topo-
graphic crest and on the flanks of the position in a valley or depression.
Another variation available to the commander is to organize a system of re-
verse slope defenses firing to the oblique defilade, each covering the other. A
commander uses an oblique defilade to protect his defending systems from
enemy frontal and flanking fires and from fires coming from above. For ex-
ample, in Figure 8-16, the two units defending on the reverse slope cannot en-
gage half of the hill to their direct front because of line of sight restrictions
caused by small forests, but they can cover each other using oblique defilade.
8-148. The defending force positions its reconnaissance and security elements
where it can observe the forward slope, the terrain forward of it, and other
approaches to the defending position. Security elements destroy enemy recon-
naissance assets, delay the enemy, disorganize his attack, and deceive him re-
garding the exact location of the main defense. The commander should
position his reconnaissance and surveillance assets in observation posts (OPs)
located near or forward of the topographical crest to provide long-range obser-
vation of both the enemy’s flanks and front. Forces manning these OPs, which
can be provided by the commander’s reserve, may vary in size from a two-
man buddy team to a rifle squad or a multiple combat vehicle section in each
position. The commander should employ sufficient forces to provide
observation and a security screen for the MBA on ground that should be re-
tained. During darkness and periods of reduced visibility, he should
strengthen these detachments in size and numbers to provide security
against infiltration or surprise attack. Aggressive night combat patrols and
ambushes are an essential part of the security process.
8-149. In order to achieve surprise and limit the enemy’s ability to maneuver,
the commander organizes the main defensive positions to mass the effects of
his concentrated fires on the enemy as he crosses the topographical crest. In a
reverse slope defense, the key position denies enemy penetration and sup-
ports forward elements by fire. The defending force maintains observation
8-40
Basics of Defensive Operations
and fires over the entire forward slope as long as possible to destroy enemy
forces, thus preventing the enemy from massing for a final assault. From de-
fensive positions on the reverse slope, the close-in battle builds in intensity.
The defending force does not fire its direct fire weapons, which are located
throughout the MBA (adjacent slope positions, counterslope positions, or re-
verse slope positions), until suitable targets appear. At the same time, the
force shifts the effects of its indirect fires to those areas forward of the crest
and forward military slope.
8-150. When possible other units on complementary terrain should support
units in reverse slope positions. This is especially desirable when those sup-
porting units can observe and place fires on the crest and forward slope. In a
defense on a counterslope (reverse forward slope), fires must cover the area
immediately in front of the reverse slope positions to the topographical crest.
The commander organizes defensive positions to permit fires on enemy ap-
proaches around and over the crest and on the forward slopes of adjacent ter-
rain features if applicable. The key factors that affect the organization of
these areas are mutually supporting covered and concealed positions, numer-
ous existing and reinforcing obstacles, the ability to bring devastating fires
from all available weapons onto the crest, and a counterattack force. Depend-
ing on the terrain, the most desirable location for the reserve may be on the
counterslope or the reverse military crest of the counterslope.
Control Measures
8-151. Defensive control measures introduced in previous chapters apply
equally to the reverse slope defense. The commander places his EAs and ob-
stacles on the reverse slope. The topographical crest normally marks the far
edge of the EA. He must dominate it by fires to prevent the enemy from suc-
cessfully engaging the defending force.
8-41
FM 3-90
8-154. The reverse slope defense pursues offensive opportunities through sur-
prise and deceptive actions. It is uniquely suited to infantry forces in moun-
tainous terrain. When conducting a reverse slope defense, surprise results
from defending in a manner for which the enemy is unprepared. Once this de-
fense is employed successfully to halt an enemy attack, it may have limited
further value because the effect of surprise will be difficult to attain. (For ad-
ditional information on the use of a reverse slope defense, see FM 3-21.30 and
other brigade- and lower-echelon field manuals.)
TRANSITION
8-155. If a defense is successful, the commander anticipates and seeks the op-
portunity to transition to the offense. If the defense is unsuccessful, the com-
mander needs to transition from a defensive posture into retrograde opera-
tions. Transition from one type of operation to another requires mental as
well as physical agility on the part of the commanders, staffs, and units in-
volved as well as accurate situational assessment capabilities.
8-156. Deliberate contingency planning for either event greatly assists the
transition process and allows the commander to set the conditions necessary
for a successful transition. Such planning addresses the need to control the
tempo of operations, maintain contact with both enemy and friendly forces,
and keep the enemy off balance. It establishes the procedures and priorities
by which a unit reconstitutes itself for the next mission. In accordance with
the factors of METT-TC, it establishes the required organization of forces and
control measures necessary for success.
8-157. Such contingency planning decreases the time needed to adjust the
tempo of combat operations when a unit transitions from defensive to offen-
sive operations. It does this by allowing subordinate units to simultaneously
plan and prepare for subsequent operations. Preparations typically include
resupplying unit basic loads and repositioning or reallocating supporting sys-
tems. (Chapters 3-7 address the planning, preparation, and execution of all
types of offensive operations.)
8-158. Contingency planning also reduces the amount of time and confusion
inherent when a unit is unsuccessful in its defensive efforts and must transi-
tion to retrograde operations. It does this through designating units to con-
duct denial operations and early evacuation of casualties and inoperative
equipment. The intent of retrograde operations is to preserve the force as a
combat-capable formation until the commander can establish those conditions
necessary for a successful defense. (Chapter 11 discusses retrograde opera-
tions.)
8-42
Basics of Defensive Operations
8-43
FM 3-90
8-44
Basics of Defensive Operations
Speed of execution in this technique results from not having to conduct an ap-
proach or tactical road march from reserve AAs or, in the case of reinforce-
ments, move from other AOs and reception, staging, organization, and inte-
gration (RSO&I) locations. Speed also results from not having to conduct a
forward passage of lines and perform liaison necessary to establish a common
operational picture that includes knowledge of the enemy force’s patterns of
operation. The primary disadvantage of this technique is that the attacking
force generally lacks stamina and must be quickly replaced if friendly
offensive operations are not to culminate quickly.
8-170. If units in contact participate in the attack, the commander must re-
tain sufficient forces in contact to fix the enemy. He concentrates the attack
by reinforcing select subordinate units so they can execute the attack and, if
necessary, maintain the existing defense. He can also adjust the defensive
boundaries of subordinate units so entire units can withdraw and concentrate
for the attack.
8-45
FM 3-90
and their role in accomplishing the mission. Thorough planning, effective con-
trol, and aggressive leadership will minimize risk during the retrograde or
enhance the probability of success.
8-175. The commander’s ISR requirements dramatically increase as his
forces begin their movement to other locations and the combat capabilities of
units in contact are subsequently reduced. It is imperative that an integrated
ISR collection plan be in place to identify and locate enemy attempts to
pursue, outflank, and isolate the defending force as it transitions to the
retrograde.
8-176. As the commander transitions to the retrograde, he makes every effort
to conserve his combat power. He considers the need to—
· Balance the risk of conserving combat power while remaining disposed
to the intent of the defensive mission.
· Disengage and withdraw units with the least tactical mobility and non-
essential elements prior to the retrograde of the main body.
· Use mobile forces to cover the retrograde of less mobile forces.
· Use the minimum essential combat power necessary to provide security
for the retrograde of the main body.
8-46
Chapter 9
9-1. A commander should conduct an area defense when the following con-
ditions occur:
· When directed to defend or retain specified terrain.
· When he cannot resource a striking force.
· The forces available have less mobility than the enemy.
· The terrain affords natural lines of resistance and limits the enemy to a
few well-defined avenues of approach, thereby restricting the enemy’s
maneuver.
· There is enough time to organize the position.
· Terrain constraints and lack of friendly air superiority limit the
striking force’s options in a mobile defense to a few probable employ-
ment options.
CONTENTS
Organization of Forces .................................9-2 Positioning the Reserve .........................9-10
Intelligence, Surveillance, and Spoiling Attacks and Counterattacks....9-12
Reconnaissance Operations ....................9-2 Preparing an Area Defense.........................9-13
Security Operations ..................................9-2 Executing an Area Defense ........................9-16
Main Battle Area Operations ....................9-3 Gain and Maintain Enemy Contact ........9-17
Reserve Operations ..................................9-3 Disrupt the Enemy...................................9-19
Control Measures..........................................9-5 Fix the Enemy ..........................................9-20
Planning an Area Defense ............................9-6 Maneuver..................................................9-20
Position Selection .....................................9-8 Follow Through .......................................9-23
9-1
FM 3-90
9-2. The commander conducting an area defense combines static and mobile
actions to accomplish his assigned mission. Static actions usually consist of
fires from prepared positions. Mobile actions include using the fires provided
by units in prepared positions as a base for counterattacks and repositioning
units between defensive positions. The commander can use his reserve and
uncommitted forces to conduct counterattacks and spoiling attacks to de-
synchronize the enemy or prevent him from massing.
ORGANIZATION OF FORCES
9-3. The commander organizes his force to accomplish reconnaissance, se-
curity, main battle area (MBA), reserve, and sustaining operations. He has
the option of defending forward or defending in depth. When the commander
defends forward within an AO, he organizes his force so that he commits most
of his combat power early in the defensive effort. To accomplish this he may
deploy forces forward or plan counterattacks well forward in the MBA or even
beyond of the MBA. If the commander has the option of conducting a defense
in depth, he uses his security forces and forward MBA element to identify, de-
fine, and control the depth of the enemy’s main effort while holding off secon-
dary thrusts. This allows him to conserve his combat power, strengthen his
reserve, and better resource the counterattack.
SECURITY OPERATIONS
9-6. The commander balances the need to create a strong security force to
shape the battle with the resulting diversion of combat power from his main
body’s decisive operation. The commander usually allocates security forces to
provide early warning and protect those forces, systems, and locations neces-
sary to conduct his decisive operation from unexpected enemy contact. On a
battlefield where forces are contiguous with one another, the location of se-
curity forces is usually in front of the main defensive positions. On a
noncontiguous battlefield they are located on avenues of approach between
the protected force and known or suspected enemy locations.
9-7. Battalion and brigade security forces normally conduct screen or guard
missions. At division level and above, the commander may use a covering
9-2
The Area Defense
force. A division commander may elect to have his security force conduct a
guard mission if a corps covering force exists. Because an area security mis-
sion usually ties in closely with flank units, flank security forces are needed if
there are gaps on the unit’s flanks, which occurs during noncontiguous opera-
tions, or if gaps develop during the operation. A flank screen or guard is criti-
cal if an enemy avenue of approach into the defended area from the flanks
could be uncovered during the defense. A commander does not normally as-
sign a force the mission of conducting rear guard or rear cover during contig-
uous operations since it is unlikely that his force’s rear area will become un-
covered during the defense. He resources rear area security forces, to include
a tactical combat force (TCF) or accepts the risk to his sustainment effort of
not performing this function.
RESERVE OPERATIONS
9-10. The commander’s defensive plan should be able to succeed without
using his reserve. However, the most likely mission of the reserve is to con-
duct a counterattack in accordance with previously prepared plans. A lower-
echelon commander uses his reserve primarily to conduct local counter-
attacks to restore his defense’s integrity or to exploit an opportunity. A senior
commander uses his reserve to seize the initiative from the enemy when the
opportunity presents itself. For example, a corps commander may target the
effects of his reserve against enemy fire support and follow-on forces to
achieve that effect.
9-11. The reserve is not a committed force. The commander can assign it a
wide variety of tasks on its commitment, and it must be prepared to perform
other missions. In certain situations, it may become necessary to commit the
reserve to restore the integrity of the defense by blocking an enemy penetra-
tion or reinforcing fires into an engagement area (EA). These secondary tasks
include—
· Reinforcing the defense of committed forces.
· Blocking or containing enemy forces that penetrate friendly defensive
positions.
· Relieving depleted units and providing for continuous operations.
9-3
FM 3-90
9-4
The Area Defense
CONTROL MEASURES
9-16. The commander organizes an area defense by designating his MBA and
assigning AOs, battle positions (BPs), or both to subordinate units located
within the MBA. He creates a security area in front of the MBA. When pos-
sible, the boundaries of the subordinate elements of the security force coin-
cide with those of the major defending units in the MBA. The security area
should be deep enough to make the enemy displace as much of his supporting
forces as possible, such as cannon artillery, sensors, and air defense artillery
gun systems, before carrying his attack into the MBA. The commander also
designates his rear area. (See Chapter 12 for a discussion of security opera-
tions.)
9-17. Area defense maneuver graphic control measures also include EAs, the
forward edge of the battle area (FEBA), battle handover line (BHL), strong
points, target reference points (TRPs), named areas of interest (NAIs), tar-
geted areas of interest (TAIs), decision points, and various other fire control
and countermobility control measures. (Figure 9-1 depicts the most common
control measures. Chapters 2 and 8, and Appendix B define these defensive
control measures.)
PL TROI PL TROI
X
NAI 7 2
BRIGADE SECURITY AREA
PL PICARD 7 PL PICARD
(BHL) (BHL)
PL RIKER PL RIKER
FEBA FEBA
EA 1 EA 2
I
I
EA 3
I
+ NC 1701
TAI 9 3-41 2-58
II
2X3
X 2
I
MAIN BATTLE AREA
3-41 2-58 PL WORF
PL WORF
II II
9-5
FM 3-90
FLOT FLOT
SECURITY AREA
BHL BHL
FEBA FEBA
RESERVE SPT
REAR AREA
9-6
The Area Defense
SECURITY AREA
MAIN
BATTLE
II
AREA II
REAR
AREA
II
II
9-7
FM 3-90
POSITION SELECTION
9-24. Attempting to defend everything defends nothing. Therefore, the com-
mander carefully designs his defense plan to ensure his defending force can
halt the enemy attack and develop an opportunity to seize the initiative and
undertake offensive operations. The cohesion of the defending force has a sig-
nificant impact on the overall effectiveness of the defense. The commander
must be prepared to adjust the defensive dispositions to meet changes in the
enemy’s dispositions to maintain that cohesion if the defense is to remain
viable.
9-25. The area defense concept requires that defensive positions accomplish
their mission independently or in combination by defeating the enemy by fire,
absorbing the strength of the attack within the position, or destroying the
enemy with a local counterattack. The commander combines the advantages
of fighting from prepared positions, obstacles, planned fires, and local coun-
terattacks to isolate and overwhelm selected enemy formations. He must be
prepared to rapidly shift the nature and location of his main effort through-
out his AO. The commander may have to reposition defending units within
their defensive positions or reposition between terrain features as he masses
overwhelming effects against the attacking enemy. The defensive plan should
designate axes of advance and routes for the commitment or movement of re-
serves, or the forward or rearward passage of one unit through another. It
should identify air axes for aerial maneuver by attack helicopters, air assault
units, or fixed-wing aircraft. This capability to reposition is dependent on the
defending force having superior tactical mobility. Without tactical mobility,
defending forces stay in their prepared positions and accept the possibility of
becoming decisively engaged.
9-26. The commander assigning the defensive mission defines the area to de-
fend. A commander defending on a broad front is forced to accept gaps and
conduct noncontiguous operations. His forward line of own troops (FLOT) will
be discontinuous. Defending shallow areas of operations reduces flexibility
and requires the commander to fight well forward. Narrow frontages and
deep areas of operations increase the elasticity of an area defense by in-
creasing the commander’s maneuver options.
9-27. The ideal area defense is where effective mutual support exists
throughout the width and depth of the defender’s tactical positions. The com-
mander organizes and occupies these positions based on their natural defen-
sive strength; their retention ensures the integrity of his defense whether he
employs a defense in an AO, defends by BP, or employs a combination of both.
He maintains tactical integrity within each defensive area. A unit conducting
an area defense normally addresses the security requirements of each flank
9-8
The Area Defense
Defense in Depth
9-28. A defense in depth is normally the commander’s preferred option.
Forces defending in depth absorb the momentum of the enemy’s attack by
forcing him to attack repeatedly through mutually supporting positions in
depth. Depth gives the commander’s fire support assets time to generate dev-
astating effects and affords him multiple opportunities to concentrate the ef-
fects of overwhelming combat power against the attacking enemy. This also
provides more reaction time for the defending force to counter the attack. The
commander gathers more information about the attacking enemy’s intentions
before the enemy commits to a COA. This reduces the risk of the enemy force
quickly penetrating the main line of defense.
9-29. The commander also employs a defense in depth when the enemy has
the capability to employ large quantities of precision-guided munitions or
weapons of mass destruction. Defense in depth results in friendly units and
facilities being dispersed throughout the defensive AO. The commander takes
area damage-control measures to reduce the effects of weapons of mass de-
struction on the friendly force and denies the enemy lucrative targets. The
degree of dispersal adopted by defending forces is both a function of the ene-
my’s capabilities and the friendly forces’ capability to rapidly concentrate
overwhelming combat power at decisive points.
9-30. The commander positions his units in successive layers of battle posi-
tions along likely enemy avenues of approach when he conducts a defense in
depth. (See Figure 9-4, page 9-10.) The commander usually decides to conduct
a defense in depth when—
· The mission is not restrictive and allows the commander to fight
throughout the depth of the battlefield.
· The terrain does not favor a defense well forward, and there is better
defensible terrain deeper within the AO.
· The AO is deep compared to its width, and there is significant depth
available.
· The cover and concealment on or near the FEBA is limited.
· The enemy has several times the combat power of the defender.
9-31. Divisions and corps employing a defense in depth can conduct an area
defense on a wider frontage than they can if they adopt a forward defense be-
cause a forward defense has no time or space to reposition forces. A defense
in depth allows the commander to use his security and forward MBA forces to
identify the enemy’s decisive operation and control the depth of the enemy’s
penetration into the MBA. By their defensive actions, they provide the com-
mander with time to react to enemy actions and allow him to take offensive
steps that eliminate enemy options, such as conducting a counterattack into
the flank of an enemy force.
9-9
FM 3-90
XX
ENY
ENY
Y
EN
Y
BD
Y
EN
E
EN
SEC
UR
ITY
II AR
EA II ENY
II
II
X1 1X X2
BSA
II
BSA II 2X
II
II
II
X3
BSA 3 X
II DSA
XX
Figure 9-4. Division Conducting a Defense in Depth with Subordinate Brigades Deployed in
Noncontiguous Areas of Operations with Enemy Avenues of Approach Depicted
Forward Defense
9-32. The commander conducts his decisive operation from forward defensive
positions near the FEBA in a forward defense. (See Figure 9-5.) He concen-
trates a significant portion of his available combat power into EAs along the
FEBA. His intent is to prevent significant enemy penetration into the defen-
sive area. The commander conducting a forward defense fights to retain these
positions along the FEBA and violently counterattacks any enemy penetra-
tion. However, if the enemy penetrates the main defensive positions, the de-
fender’s lack of depth may allow the enemy to rapidly exploit success.
9-33. In general, the commander uses a forward defense when a higher com-
mander directs him to retain forward terrain for political, military, economic,
and other reasons. Alternatively, a commander may choose to conduct a for-
ward defense when the terrain in that part of his AO—including natural ob-
stacles—favors the defending force because—
· The best defensive positions are located along the FEBA.
· Strong natural obstacles are located near the FEBA.
· Natural EAs occur near the FEBA.
· Cover and concealment in the rear portion of the AO are limited.
9-10
The Area Defense
X
SECURITY AREA FEBA
FEBA
PL PAULA PL PAULA
MAIN BATTLE AREA
BP 17 BP 42
BP 21
II
PL DIANE
II II
II II
PL DIANE
BSA
X APOD X
REAR AREA
X
Figure 9-5. Brigade Conducting a Forward Defense in a Contiguous Area of Operations
9-35. When deciding where to place his reserve, the commander decides
whether to orient his reserve on its most likely mission or its most important
mission. He expends significant effort during the planning process to ensure
he can effectively use his reserve when needed. He may locate his reserve
within the AO where it can employ the road network to rapidly displace
throughout the AO in response to a number of opportunities or contingencies.
The commander must consider terrain, MSRs of forward units, enemy ave-
nues of approach, and probable enemy penetrations when determining the
exact location for his reserve. He may choose to initially position his reserve
in a forward location to deceive the enemy and obscure subordinate unit
boundaries, especially those of dissimilar units such as armor and light infan-
try.
9-36. In restrictive terrain that lacks routes for movement, the commander
can task organize his reserve into small elements and position them where
they can react quickly to local combat developments. This dispersion im-
proves force protection but reduces the ability of the reserve to mass fires.
Covered lateral and forward high-speed deployment routes should be
available. The reserve must have movement priority along those routes. He
must ensure the maintenance of communication between these dispersed ele-
ments. This may require establishing retransmission nodes for combat net
radios. In open terrain, the commander maintains a centrally located reserve
9-11
FM 3-90
positioned somewhat farther from the FLOT. He considers the enemy’s poten-
tial to employ weapons of mass destruction and conduct air interdiction when
deciding where to position his reserve.
9-37. Whenever possible, the commander positions his reserve beyond the
enemy’s direct fire range. This is easier to achieve at higher echelons than at
lower echelons. The reserve takes defensive measures to prevent being ac-
quired and attacked by enemy indirect fire systems. These include camou-
flage, local security, and control of electronic emissions.
9-38. The commander also plans how to reconstitute his reserve once he com-
mits his original reserve. Forces most easily designated are subordinate unit
reserves. If his higher headquarters has not committed its reserve, he has
more flexibility and can take greater risk in employing his reserve.
9-12
The Area Defense
9-43. Enemy movement into an NAI helps the commander determine the
enemy’s scheme of maneuver and possible objectives. He uses decision points
and NAIs throughout his AO to trigger his counterattack. The commander
identifies TAIs for attack to support his operations.
III
XX
X
III III
X III
ON ORDER
X III
X X
X
X X
X
X III
X X
X III
XX
Figure 9-6. Division Counterattack
9-13
FM 3-90
9-47. The defending unit occupies its defensive positions as soon as practical
after receiving the mission. It conducts reconnaissance of the defensive area
and establishes a forward security area before occupying the positions The
unit may pre-position supplies such as ammunition and barrier materiel once
it establishes security. The unit can accomplish many defensive tasks simul-
taneously; the factors of METT-TC are the deciding consideration in estab-
lishing priorities of work. Those priorities may be—
· Establishing local security and deploying a security force.
· Identifying EAs where the commander wants to engage and destroy the
enemy.
· Planning fire control measures, such as TRPs, trigger lines, and final
protective fires to support the EAs.
· Positioning key weapon systems to engage into the EAs and TRPs and
develop range cards and sector sketches.
· Positioning observers who can see both targets and trigger lines.
· Siting obstacle groups to support weapon systems.
· Designating and clearing fields of fire.
· Preparing primary fighting positions based on the anticipated fighting
conditions, such as the time of day and weather conditions.
· Emplacing obstacles and surveying indirect fire targets to support
these obstacles.
· Providing concealment and camouflage for fighting and survivability
positions as they are constructed.
· Positioning any available critical friendly zones over friendly positions
by establishing sensor coverage and quickfire links between the sensor
and shooter.
· Installing night and limited-visibility aids, such as thermal hot spots
and chemical lights on TRPs during daylight.
· Updating range cards and sector sketches as required.
· Preparing alternate fighting positions.
· Designating and preparing supplementary positions.
· Designating hide positions and rehearsing movements to and from
fighting positions. (Units may place their combat and tactical vehicles
in hide positions at any time while preparing the defensive position.)
· Positioning the reserve.
· Establishing contact points with any adjacent units so that the defen-
sive efforts of both units can be tied together.
· Emplacing wire for communications.
· Improving mobility on counterattack routes.
· Prestocking ammunition in revetments or bunkers where it can survive
the enemy’s preparatory fires.
· Rehearsing movements under daylight and limited-visibility condi-
tions.
· Continuing to improve the defense.
9-48. Survivability positions enhance the strength of a defensive position by
providing soldiers and weapon systems with some degree of cover from enemy
9-14
The Area Defense
9-15
FM 3-90
PL BOBCAT PL BOBCAT
XX
G G
PL BEAR PL BEAR
II II X
II
BP
27
EA TIGER
II
BP
II
26
II II
XX
BP 25
X
BP BP II X
EA
II
42 34 STAR
BP
II
38
BP 32
PL LION II PL LION
X X
X
AA EAGLE AA LIFE
(DSA)
9-56. In an area defense, defending forces fight mainly from prepared, pro-
tected positions to concentrate combat power effects against attempted enemy
breakthroughs and flanking movements. The commander uses mobile forces
to cover gaps between defensive positions, reinforce those positions as neces-
sary, and counterattack to seal penetrations or block enemy attempts at
flanking movements.
9-57. Conducting shaping operations in an area defense is similar to shaping
operations in the offense. The factors of METT-TC determine how closely the
commander synchronizes his shaping operations with his decisive operations.
The commander conducts shaping operations designed to regain the initiative
by limiting the attacker’s options and disrupting the enemy’s plan. He
9-16
The Area Defense
9-17
FM 3-90
XXX
CFL CFL
FLOT FLOT
5 7
11
PP 5 PP 11
3
PP 3 PP 7
PL KARL V PL KARL
(BHL) V (BHL)
LANE 11 V
LANE 7
LANE 5 LANE 3
PL BLUCHER SP 3 PL BLUCHER
V V
FEBA SP 5 V FEBA
SP 11 SP 7
XXX
von HOBE
RODER
ROUTE
XX
ROUTE
WAHLEN-JURGASS
WILLIAM
ROUTE
XXX
ROUTE
RP 3
XX RP 7 XX
RP 11
RP 5 TAA
SEYDLITZ
XXX
Figure 9-8. Battle Handover Line
9-62. The entire security force should not withdraw automatically as soon as
the first enemy units reach the FEBA. The commander can leave in place se-
curity elements located in areas where the enemy has not advanced. The se-
curity force adjusts to the enemy’s advance and continues to conduct security
operations as far forward as possible. It continues to resist the enemy’s
shaping operations, such as the enemy’s reconnaissance effort, thereby upset-
ting his coordination and allowing the MBA commander to fight one engage-
ment or battle at a time. Doing this increases the chances for success even if
the enemy attack penetrates into the MBA in some areas. In some cases, the
security force can attack the enemy force from its rear, engage high-payoff
targets, or drive between echelons to isolate leading enemy units.
9-63. As the enemy force approaches the MBA, the commander may order re-
connaissance and surveillance assets within his security force to displace to
one or both sides of the enemy penetration and continue to maintain surveil-
lance. By observing and providing access to enemy flanks, reconnaissance
and surveillance elements can facilitate the conduct of friendly counter-
attacks. However, to prevent the encirclement of these assets, the commander
may plan to monitor those areas where the enemy has not advanced into the
MBA solely by technical means.
9-64. Battle handover between the security force and MBA forces requires
close coordination and occurs as quickly and efficiently as possible to mini-
mize their vulnerability to enemy fire. The security force commander must
retain freedom to maneuver until he initiates the passage of lines. The com-
mander’s fire support assets help cover the withdrawal of security forces.
9-18
The Area Defense
Combat support and CSS elements of the security force should move to the
rear as early as possible to avoid hampering the movement of combat forces.
Normally, battalion-size units of the security force hand off the battle to the
brigades through which they pass. (See Chapter 16 for a discussion of rear-
ward passage of lines.)
9-65. The commander must consider the security force’s next mission prior to
battle handover between the security force and the MBA force. Factors that
may affect his decision are the status of the security force, its subsequent mis-
sion preparation requirements, and the size and nature of the reserve re-
quired by the situation. He may decide to employ it immediately as his re-
serve, which would release his initial reserve for other tasks. Alternately, the
commander may decide to use the security force to conduct additional secur-
ity operations on the flanks of MBA forces as the battle progresses. However,
it may be some time before the security force is ready for commitment. There-
fore, the commander is more likely to wait until the security force has been
reconstituted and the initial reserve committed before designating the former
security force as his reserve.
9-66. The commander should base the location of his security force’s assem-
bly area on its follow-on mission. The commander wants those assembly areas
located to rapidly support ongoing operations yet keep withdrawn security
units from interfering with ongoing decisive and shaping operations. After
passage, the security force normally moves to these locations to prepare for
subsequent operations. At a minimum he must rearm and refuel the security
force. Additional CSS concerns include casualty evacuation, maintenance re-
quirements, and resupply of the other classes of supply.
9-19
FM 3-90
9-69. Other targets for shaping operations include enemy reconnaissance and
intelligence assets. Destroying these assets allows the commander to repeat-
edly force enemy units to deploy into combat formations on ground of his
choosing, thus contributing to the disruption and desynchronization of the
enemy’s plan. The timing of these shaping operations is important. The ene-
my cannot be allowed to recover from their effects prior to the decisive operat-
ion. The commander may also execute offensive operations to further disrupt
the enemy, such as spoiling attacks, raids, ambushes, feints, or demonstra-
tions.
MANEUVER
9-73. In an area defense, the decisive operation occurs in the MBA. This is
where the effects of shaping operations, coupled with sustaining operations,
combine with the decisive operations of the MBA force to defeat the enemy.
The commander’s goal is to prevent the enemy’s further advance through a
combination of fires from prepared positions, obstacles, and mobile reserves.
9-74. Generating massed effects is especially critical to the commander con-
ducting the defense of a large area against an enemy with a significant ad-
vantage in combat power. The attacker has the ability to select the point and
time of the attack. Therefore, the attacking enemy can mass his forces at a
specific point, thus dramatically influencing the ratio of forces at the point of
attack. An enemy three-to-one advantage in overall combat power can easily
turn into a local six-to-one or higher ratio. The defending commander must
quickly determine the intent of the enemy commander and the effects of ter-
rain. This allows his units and their weapon systems to use agility and
9-20
The Area Defense
flexibility to generate the effects of combat power against the enemy at those
points and restore a more favorable force ratio.
9-75. Forces in the MBA assume responsibility for the battle at the BHL. As
the security force approaches the FEBA, it may be necessary to increase the
intensity of fire support from the MBA to allow the security force to break
contact. Both direct and indirect fire assets from MBA forces provide support
to cover the withdrawal of the security force and to close passage lanes
through obstacle complexes. The commander may also employ smoke to assist
the security force break contact with the enemy. The security force’s with-
drawal through the forward positions of the MBA must be carefully planned
and coordinated. The commander must guard gaps in obstacles left for the
withdrawal of the security force and arrange for closing them after the pas-
sage of the security force.
9-76. After the enemy reaches the MBA, he tries to find weak points and at-
tempts to force a passage, possibly by a series of probing attacks. As the at-
tack develops, defending units engage the enemy’s lead forces. The enemy ad-
vance may slow because of canalization and the increased density of forces
resulting from limited maneuver space, presenting good targets for defensive
fire and air support. The maximum effects of simultaneous and sequential
fires are brought to bear at this stage of the battle.
9-77. The commander’s subordinate elements maneuver using massed direct
and indirect fire and movement to gain positional advantage over the assault-
ing enemy force. The commander also directs the engineer obstacle and sus-
tainment effort by his assignment of priorities. The commander must reposi-
tion his forces to meet the enemy where he is rather than where the com-
mander would like him to be. The commander directs operations and sup-
ports his subordinate elements by providing the necessary CS and CSS. He
controls the commitment of the reserve and, at division echelon and above,
engages enemy follow-on forces. If enemy follow-on forces can be delayed, the
enemy’s attack may be defeated in detail, one echelon at a time. If the defend-
ing unit can force the enemy to commit follow-on forces sooner than planned,
it can disrupt the enemy’s timetable, which can lead to the creation of exploit-
able gaps between the committed and subsequent echelons.
9-78. Gaps between defensive positions may be necessary, but they are not
left where the commander expects the enemy’s probable main effort. They are
kept under surveillance, covered by fire or, where possible, blocked by bar-
riers or repositioned friendly forces. The commander clearly defines the re-
sponsibility for dealing with each enemy penetration. He leverages the use of
choke points and obstacles to prevent enemy penetration. If the enemy suc-
ceeds in penetrating the MBA, the commander blocks the penetration immed-
iately and destroys this enemy force as soon as possible; hence, the need for a
mobile reserve. He may extend his actions within the depth of his AO to coun-
ter enemy penetrations that cannot be stopped farther forward.
9-79. The commander never allows the attacking enemy to consolidate unless
it fits his scheme of maneuver. He conducts a local counterattack with all
available local resources to prevent the enemy from consolidating his gains.
The lowest possible echelon conducts this local counterattack; however, the
commander must be aware of the problem of piecemeal commitment. A unit
9-21
FM 3-90
does not abandon a position unless it fits within the higher commander’s in-
tent or he grants permission to do so. If the defending force is unable to re-
pulse the enemy, it tries to contain the enemy penetration until it can attack
in concert with major counterattacking forces. The commander coordinates
his counterattacks with the efforts of his fire support system.
9-80. Although the commander plans for the counterattack in his defensive
planning, he is aware that his plan may not correspond exactly with the
existing situation when he launches the counterattack. As the situation de-
velops, the commander reassesses his plan based on his revised situational
understanding that results from an updated common operational picture as
new intelligence and combat information becomes available to answer the fol-
lowing basic questions:
· Is a counterattack feasible, or should the commander use the reserve to
contain enemy successes?
· When and where should the defending forces counterattack?
· In the case of enemy penetrations, what should the defending forces
counterattack and what should they block or contain?
· Is there enough time to complete the counterattack before the arrival of
enemy follow-on forces?
· Can he conduct a counterattack using his fire support systems?
9-81. When counterattacking, the commander employs all available resources
necessary to ensure success. The reserve usually becomes the echelon’s deci-
sive operation on its commitment, so he avoids its premature or piecemeal
commitment. One of the commander’s most critical decisions is committing
the reserve. He may reinforce his reserve force before committing it to give it
greater capability to counter enemy action. The commander does not counter-
attack as an automatic reaction to an enemy penetration, nor does he commit
the reserve solely because the enemy has reached a certain phase line or
other location. Fire support assets and local counterattacks by forces already
defending could destroy, disrupt, or attrit enemy penetrations, thus relieving
the commander of the need to commit his reserve. When possible, the com-
mander launches the counterattack when the enemy presents his flank or
rear, overextends himself, or his momentum dissipates. Once the commander
identifies the flanks of the enemy’s main effort, he can target counterattacks
to isolate and destroy enemy forces within the MBA.
9-82. Sometimes the commander may determine that he cannot afford to use
his reserve to counterattack. Therefore, he must use his resources to block,
contain, or delay the enemy to gain time to employ higher-echelon reserves.
In these cases, the commander and his staff must plan how to integrate rein-
forcing companies and battalions into the defensive scheme, adjust bound-
aries, and place BPs. He plans the routes these units will use, and what ad-
justments will be necessary in existing C2 arrangements. He can speed the
process of positioning and moving reinforcements or the reserve by desig-
nating routes and providing traffic-control personnel and guides at contact
points to lead and brief them on the situation. Scouts, military police, and di-
visional cavalry units can provide traffic control.
9-22
The Area Defense
FOLLOW THROUGH
9-83. The purpose of defensive operations is to retain terrain and create con-
ditions for a counteroffensive that regains the initiative. The area defense
does this by causing the enemy to sustain unacceptable losses short of his
decisive objectives. A successful area defense allows the commander
transition to an attack. An area defense could also result in a stalemate with
both forces left in contact with each other. Finally, it could result in the
defender being overcome by the enemy attack and needing to transition to a
retrograde operation. Any decision to withdraw must take into account the
current situation in adjacent defensive areas. Only the commander who
ordered the defense can designate a new FEBA or authorize a retrograde
operation.
9-84. During this follow-through period, time is critical. Unless the com-
mander has a large, uncommitted reserve prepared to quickly exploit or re-
verse the situation, he must reset his defense as well as maintain contact
with the enemy. Time is also critical to the enemy, because he will use it to
reorganize, establish a security area, and fortify his positions.
9-85. There is a difference between local counterattacks designed to restore
the defense and a decisive operation designed to wrest the initiative from the
enemy and then defeat him. To conduct a decisive counterattack, the de-
fending force must bring the enemy attack to or past its culminating point be-
fore it results in an unacceptable level of degradation to the defending force.
To do this, the defending force must disrupt the enemy’s ability to mass, caus-
ing him to disperse his combat power into small groups or attrit his forces to
gain a favorable combat power ratio. The defending force must continue to
disrupt the enemy’s ability to introduce follow-on forces and to destroy his
sustainment system. In the defense, the commander must prepare to quickly
take advantage of fleeting opportunities, seize the initiative, and assume the
offense. Ideally, he already has a counterattack plan appropriate to the
existing situation. He must rapidly reorganize and refit selected units, move
them to attack positions, and attack. Alternatively, he must conduct an at-
tack using those units already in contact with the enemy, which is normally
the least favorable COA.
9-86. It is extremely difficult for the enemy to fight a defensive battle in re-
sponse to a friendly counterattack after he reaches a culminating point for
the following reasons:
· His defensive preparations are hasty.
· His forces are not adequately organized for defense.
· Reorganizing for a defense requires more time than the friendly com-
mander should allow.
· The enemy force is dispersed, extended in depth, and weakened.
· Enemy attacks rarely culminate on ground ideally suited for defense.
· Physical fatigue.
9-87. The shift to defense requires enemy soldiers to make a psychological
adjustment. Soldiers who have become accustomed to advancing, and thus
winning, must now halt deep in the opposing force’s territory and fight defen-
sively, sometimes desperately, on new and often unfavorable terms. If the
9-23
FM 3-90
9-24
Chapter 10
10-1. The factors of METT-TC may dictate that a unit conducts a mobile
defense when defending against an enemy force with greater combat power
but less mobility. A commander may also employ a mobile defense when
defending a large area of operations (AO) without well-defined avenues of
approach, such as flat, open terrain. The mobile defense is preferred in an
environment where the enemy may employ weapons of mass destruction
because this type of defense reduces the vulnerability of the force to attack
and preserves its freedom of action. Future technology associated with
command and control (C2) should improve the ability of the friendly force to
gain and maintain a common operational picture, which reduces the risk
associated with this type of defense. Among these risks are—
CONTENTS
Historical Example......................................10-2 Combat Service Support ........................10-8
Organization of Forces...............................10-3 Preparing a Mobile Defense .......................10-8
Control Measures........................................10-6 Executing a Mobile Defense.......................10-9
Planning a Mobile Defense ........................10-7 Gain and Maintain Enemy Contact ........10-9
Maneuver .................................................10-7 Disrupt the Enemy.................................10-10
Fire Support.............................................10-7 Fix the Enemy ........................................10-10
Air Defense ..............................................10-7 Maneuver................................................10-11
Mobility/Countermobility/Survivability .10-8 Follow Through .....................................10-12
10-1
FM 3-90
· The fixing force may be isolated and defeated in detail because of the
need to resource the striking force to the detriment of the fixing force.
· Operations in noncontiguous AOs associated with conducting a mobile
defense can lead to defeat in detail.
· Enemy operations may impair the ability of the striking force to react
at critical points.
· The enemy may not move into the area intended by the defending com-
mander.
· The attacking enemy retains at least some momentum as he approach-
es the desired engagement areas (EAs).
· The defending force may not gain an accurate picture of the enemy’s lo-
cations and dispositions required by the striking force to launch deci-
sive operations in time to react.
· The decentralized operations required by the mobile defense increase
the potential for fratricide.
HISTORICAL EXAMPLE
10-2. The concept of a mobile defense did not enter into Army doctrine until
it had the chance to review German lessons learned as a result of its World
War II experiences in Russia. The following historical example illustrates
how conducting a mobile defense can result in recapturing the initiative and
accomplishing the mission.
10-2
The Mobile Defense
ORGANIZATION OF FORCES
10-3. Units smaller than a corps do not normally conduct a mobile defense
because of their inability to fight multiple engagements throughout the
width, depth, and height of the AO, while simultaneously resourcing striking,
10-3
FM 3-90
fixing, and reserve forces. Typically, the striking force in a mobile defense
may consist of one-half to two-thirds of the defender’s combat power. (See
Figure 10-2.) Division and smaller units generally conduct an area defense or
a delay as part of the fixing force as the commander shapes the enemy’s pene-
tration or they attack as part of the striking force. Alternatively, they can
constitute a portion of the reserve.
S H A P IN G O P E R A T IO N S
SOF
ENY
ENY
S T R IK IN G
FORCE
F IX IN G
FORCE
SPT
RESERVE
10-4. The commander organizes his main body into two principal groups—
the fixing force and the striking force. In the mobile defense, reconnaissance
and security, reserve, and sustaining forces accomplish the same tasks as in
an area defense. (See Figure 10-3.) The commander completes any required
adjustments in task organization before he commits his units to the fight.
FIXING
FORCE
SECURITY
FORCE
STRIKING
FORCE
RESERVE
10-4
The Mobile Defense
10-5. Organized by the commander with the minimum combat power needed
to accomplish its mission, the fixing force turns, blocks, and delays the at-
tacking enemy force. It tries to shape the enemy penetration or contain his
advance. Typically, it has most of the countermobility assets of the defending
unit. The fixing force may conduct defensive actions over considerable depth
within the main battle area (MBA). However, it must be prepared to stop and
hold terrain on short notice to assist the striking force on its commitment.
The operations of the fixing force establish the conditions for a decisive attack
by the striking force at a favorable tactical location. The fixing force executes
its portion of the battle essentially as a combination of an area defense and a
delaying action. The actions of the fixing force are shaping operations.
10-6. The striking force decisively engages the enemy as he becomes exposed
in his attempts to overcome the fixing force. The term “striking force” is used
rather than reserve because the term “reserve” indicates an uncommitted
force. The striking force is a committed force and has the resources to conduct
a decisive counterattack as part of the mobile defense. It is the commander’s
decisive operation.
10-7. The striking force contains the maximum combat power available to the
commander at the time of its counterattack. The striking force is a combined
arms force that has greater combat power and mobility than the force it seeks
to defeat or destroy. The commander considers the effects of surprise when
determining the relative combat power of the striking force and its targeted
enemy unit. The striking force is normally fully task organized with all com-
bat support (CS) and combat service support (CSS) assets before its actual
commitment. The commander positions engineer mobility-enhancing assets
with the lead elements of the striking force.
10-8. The striking force is the key to a successful mobile defense. All of its
contingencies relate to its attack. If the opportunity does not exist to deci-
sively commit the striking force, the defender repositions his forces to estab-
lish the conditions for success. The striking force must have mobility equal to
or greater than that of its targeted enemy unit. It can obtain this mobility
through proper task organization, countermobility operations to slow and dis-
rupt enemy movements, and mobility operations to facilitate the rapid
shifting of friendly formations. The striking force requires access to multiple
routes because an attacking enemy normally goes to great length to deny the
defending force freedom of action.
10-9. The commander responsible for orchestrating the overall mobile de-
fense should retain control of the striking force unless communication diffi-
culties make this impossible. Normally this is the overall defending force
commander. The commander’s most critical decisions are when, where, and
under what conditions he should commit his striking force. The commander
normally accompanies the striking force.
10-10. Resourcing a reserve in a mobile defense is difficult and requires the
commander to assume risk. He generally uses his reserve to support the
fixing force. However, if the reserve is available to the striking force, it ex-
ploits the success of the striking force. If the reserve is composed largely of
aviation forces and long-range fire support systems, it may have contingen-
cies to support the fixing and striking forces.
10-5
FM 3-90
CONTROL MEASURES
10-11. A commander conducting a mobile defense uses control measures to
synchronize conducting the operation. These control measures include desig-
nating the AOs of the fixing and striking forces with their associated bound-
aries, battle positions, and phase lines. He designates a line of departure or a
line of contact as part of the graphic control measures for the striking force.
He may designate an axis of advance for the striking force. He can designate
attack-by-fire or support-by-fire positions. The commander uses EAs, target
reference points, targeted areas of interest, and final protective fires as neces-
sary. He designates named areas of interest to focus the efforts of his intelli-
gence, surveillance, and reconnaissance (ISR) assets. This allows him to de-
termine the enemy’s course of action (COA). He designates checkpoints, con-
tact points, passage points, passage routes, and passage lanes for use by re-
connaissance and surveillance assets, security units, and the striking force.
(See Figure 10-4.)
XX
NAI 8
2
PL CATBERT V PL CATBERT
FEBA/LOA
X X FEBA/LOA
LANE 2
TAI BLUE
XX
X (o/o)
2 3
X
1 3
X
(o/o)
ALICE
ROUTE
48 2
PL PAULA/LD
)
/o
(o/o)
(o
PL DOGBERT 17 RP PL DOGBERT
X X
AA X X
X
X 48 X
MOZART 2
(ESB)
212
STRIKING FORCE
XX
Figure 10-4. Mobile Defense Control Measures
10-12. The commander must provide the striking force commander with con-
trol measures to focus his force at the decisive time and place and to decon-
flict fires with the fixing force. As a minimum, the striking force commander
needs to know the anticipated objective decision points that could lead to the
commitment of his force, limit of advance, and boundaries of his AO. If the
overall commander imposes either an axis of attack or a direction of attack as
a control measure, he restricts the striking force commander’s freedom of ma-
neuver. However, such restrictions may be necessary to avoid contact with
enemy forces that could distract the striking force from accomplishing its pri-
mary mission. These control measures may have to be drawn “on the fly”
while the commander, his staff, and his subordinates move to take advantage
10-6
The Mobile Defense
MANEUVER
10-14. The commander’s ability to maintain the mobility advantage of his
forces is an important aspect of the mobile defense. This mobility advantage
may result from or be enhanced by countermobility actions directed against
the enemy force. In his mobile defense plan, the commander ensures that his
forces—including reserves and the striking force—can move freely around the
battlefield, while at the same time restricting the enemy’s mobility, slowing
his momentum, and guiding or forcing him into areas that favor the friendly
defensive effort.
FIRE SUPPORT
10-15. The effectiveness of a mobile defense is based on the carefully planned
fires of all weapons. The striking force conducts the commander’s decisive op-
eration in a mobile defense. It requires continuous and concentrated fire sup-
port. The commander weights his decisive operation, in part, by allocating to
it field artillery and other fire support weapon systems. He must rapidly shift
indirect fire support from the fixing force to the striking force. These fire
support systems do not have to move with the striking force if it remains
within supporting range.
10-16. If the striking force’s planned maneuver places it outside the support-
ing range of the defending commander’s fire support systems, he must either
plan the movement of fire support assets to locations where they can support
the striking force or incorporate them into the striking force. Fire support as-
sets can partially compensate for a lack of maneuver forces in the striking
force. The commander takes precautions to prevent fratricide as the striking
force approaches the fixing force’s EAs, while supporting air and artillery as-
sets try to interdict enemy movements.
AIR DEFENSE
10-17. In the mobile defense, air defense is normally initially used to cover—
· Security forces and fixing force units in forward areas.
· C2 facilities.
· Critical assets, including fire support systems, reserves, and the
striking force.
· Sustainment resources.
10-7
FM 3-90
MOBILITY/COUNTERMOBILITY/SURVIVABILITY
10-18. The majority of the commander’s countermobility and survivability as-
sets support the operations of the fixing force. The majority of the command-
er’s mobility assets support the operations of the striking force. Situational
obstacles provide him a tremendous advantage in the mobile defense. These
obstacles are a combat multiplier because they enable the commander to use
economy of force measures. He uses situational obstacles to exploit enemy
vulnerabilities, exploit success, separate enemy follow-on forces, and provide
flank protection.
10-8
The Mobile Defense
10-9
FM 3-90
ENY
ENY
FIXING FORCE
RESERVE
STRIKING
FORCE
10-10
The Mobile Defense
10-29. The fixing force’s extensive use of obstacles supports this shaping ef-
fort and helps to gain an overall mobility advantage over the enemy. The
commander may want to yield ground quickly to make the enemy think he
has been successful or to entice him to a decisive point where the striking
force can attack. Normally, in a mobile defense, the commander retains
ground only to facilitate the commitment of his striking force.
10-30. When conducting a mobile defense, the commander may need to com-
mit his reserve to reinforce the fixing force and help shape the battlefield. He
positions his reserve so it effectively reacts to the most likely contingency and
the enemy’s most dangerous COA. Without a reserve, the commander as-
sumes significant risk in attempting to shape the enemy penetration. Cir-
cumstances may also force the commander to employ elements of the striking
force to assist the fixing force. If that occurs, the commander prefers to use
his available long-range fire support assets and attack helicopters. They are
the best choice because of their ability to rapidly disengage and shift their ef-
fects to support the efforts of the rest of the striking force on its commitment.
MANEUVER
10-31. The commander’s situational understanding is critical in establishing
the conditions that initiate the striking force’s movement and in determining
the general area that serves as a focus for the counterattack. Situational un-
derstanding includes identifying those points in time and space where the
counterattack proves decisive. A force-oriented objective or an EA usually in-
dicates the decisive point. The staff synchronizes the unit’s activities in time
and space to sufficiently mass the effects of the striking force at the right
time and place.
10-32. The actions of the striking force are the echelon’s decisive operation on
its commitment. The commander’s ISR systems focus entirely on tracking the
enemy’s advance. The striking force commander continuously receives intelli-
gence and combat information updates that allow him to adjust his coun-
terattack as necessary to defeat the targeted enemy. Once the enemy starts
his attack, any forward-deployed elements of the striking force withdraw to
AAs or attack positions and prepare for their commitment in counterattack.
10-33. The defending commander launches his striking force in a counter-
attack when its offensive power, relative to that of the targeted attacking
enemy element, is the greatest. (See Figure 10-6.) Piecemeal commitment of
the striking force in support of local objectives jeopardizes the success of the
overall operation. The striking force must execute the counterattack rapidly
and violently, employing all combat power necessary to ensure success. The
striking force may be committed at a time different than anticipated and in
an entirely different area than previous contingency plans envisioned. Thus,
it must be able to respond to unexpected developments rapidly and decisively.
10-34. Because the striking force normally attacks a moving enemy force, it
generally assumes a combat formation with a covering force, an advance
guard, a main body, and either a follow-and-support or a follow-and-assume
force. The striking force attempts to take advantage of obstacles, such as ri-
vers or obstacle zones that block the enemy’s movement. The commander
designates flank responsibilities and may even allocate a designated force
10-11
FM 3-90
ENY
ENY
STRIKING FORCE
10-12
Chapter 11
The Retrograde
The withdrawal should be thought of as an offensive instrument, and
exercises framed to teach how the enemy can be lured into a trap,
closed by a counter-stroke or a devastating circle of fire.
B.H. Liddell Hart, 1944
CONTENTS
Historical Example ......................................11-2 Planning a Withdrawal ..........................11-21
Delay.............................................................11-3 Preparing a Withdrawal ........................11-23
Organization of Forces ...........................11-4 Executing a Withdrawal ........................11-23
Control Measures ....................................11-5 Terminating a Withdrawal.....................11-24
Plan ...........................................................11-7 Retirement..................................................11-24
Prepare ...................................................11-14 Organization of Forces .........................11-25
Execute...................................................11-15 Control Measures ..................................11-26
Termination of a Delay..........................11-18 Combat Service Support ..........................11-26
Withdrawal .................................................11-18 Unique Retrograde Situations..................11-28
Organization of Forces .........................11-19 Denial Operations..................................11-28
Control Measures ..................................11-20 Stay-Behind Operations........................11-30
11-1
FM 3-90
HISTORICAL EXAMPLE
11-4. The following historical example illustrates how conducting a retro-
grade operation can preserve an army for future operations.
11-2
The Retrograde
R.
his flank during a re-
R.
HINDMAN
ic
nt
tla
treat. Faced with these
A
&
XX
rn
prospects, Johnston de-
te
es
W
BATE
cided to withdraw XXX Connasauga River
across the river. A de- N XIV
XX
ceptive Confederate at- CLEBURNE
Ca
tack late on the 15th
pm
convinced Sherman that Cr
ee
k XX
Johnston intended to CHEATAM
stay in his current posi-
tions. The withdrawal XX Resaca
commenced at mid- XXX
LORING Confederate Fort
DELAY
11-5. A delay is a form of retrograde [JP 1-02 uses an operation] in which a
force under pressure trades space for time by slowing down the enemy’s
momentum and inflicting maximum damage on the enemy without, in prin-
ciple, becoming decisively engaged (JP 1-02, see delaying operation). The de-
lay is one of the most demanding of all ground combat operations. A delay
wears down the enemy so that friendly forces can regain the initiative
through offensive action, buy time to establish an effective defense, or
11-3
FM 3-90
ORGANIZATION OF FORCES
11-9. The commander normally organizes the delaying force into a main
body, a security force, and a reserve. The security force usually conducts a
screen forward of the initial delay positions. For a divisional cavalry squadron
or a corps cavalry regiment conducting a delay, the security force executing
the screen mission may consist of scouts or air cavalry. For a brigade or bat-
talion conducting a delay, the security force may consist of the brigade recon-
naissance troop, battalion scouts, or another element tasked to conduct secur-
ity operations.
11-4
The Retrograde
11-10. The main body, which contains the majority of the delaying force’s
combat power, may use alternate or subsequent positions to conduct the de-
lay. The commander usually deploys his main body as a complete unit into a
forward position when conducting a delay from subsequent positions. He di-
vides his main body into two parts, roughly equal in combat power, to occupy
each set of positions when conducting a delay from alternate positions.
11-11. The commander normally retains a reserve to contain enemy penetra-
tions between positions, to reinforce fires into an engagement area (EA), or to
help a unit disengage from the enemy. All of these missions require that the
reserve has the mobility and strength to strike with such force that an enemy
has no option but to face the immediate threat.
11-12. The extended frontages and ranges common to retrograde operations
make the provision of fire support difficult and act to limit the commander’s
ability to mass fires. Therefore, retrograde forces, especially delay forces,
often have more than the normal allocation of fire support assets. The com-
mander’s risk of losing artillery systems and their ammunition also increases
when he is supporting retrograde operations. Therefore, he balances his deci-
sion to commit fire support systems forward against anticipated requirements
in subsequent battle stages. In particular, he protects his towed artillery sys-
tems from being overrun by a mobile enemy. He can use available rotary- and
fixed-wing aircraft to augment or replace his artillery systems.
11-13. Combat support (CS) and combat service support (CSS) assets are
widely dispersed and often attached to the units they support because of the
width of the AOs normally assigned in a delay. Engineer priorities are nor-
mally countermobility first, then mobility. However, restrictive terrain that
impedes friendly movement may require the commander to reverse the prior-
ities. Close coordination is necessary so that engineer obstacles are covered
by fire and do not impede the planned withdrawal routes of delaying forces or
the commitment of a counterattacking reserve force. The delaying force
should have a greater-than-normal allocation of fire support systems.
11-14. The requirement to maintain continuous support during the delay re-
quires CSS organizations to echelon their assets. This echelonment, coupled
with the wide dispersion of combat forces that is inherent in a delay, compli-
cates conducting the delay.
CONTROL MEASURES
11-15. The delay consists of a series of independent small-unit actions that
occur simultaneously across the front. Subordinate commanders must have
freedom of action. The tactical mission graphic for the delay appears in Fig-
ure 11-2. It is not a control measure. The control measures used in the delay
are the same as those introduced in Chapter 8. Common graphics used in a
delay include AOs, PLs, battle positions (BPs), coordination points, check-
points, EAs, trigger lines, target reference points (TRPs), and disengagement
lines. (See Figure 11-3.) The commander designates contact points in front of,
between, and behind units to assist coordination, ensure continuity of the
delay, and draw attention to enemy avenues of approach into unit flanks.
(Chapter 15 addresses passage points with the passage of lines discussion.)
11-5
FM 3-90
7 1
PL HENHOUSE PL HENHOUSE
011100JUL 011100JUL
(DELAY LINE)
PL ELM
PL ELM
D
II
II
9
3
PL FOX
PL FOX
012200JUL
012200JUL
(DELAY LINE)
NZ1541
+
NZ1540
+
NZ1542 EA
+
NZ1539 +
I 2
PL P
BP
1
PL JAN EA E
(T R IG G G Y
BP
(TRIGGER LINE) GE R
L IN E
ALPHA
15
OMEGA )
I
PL JOAN
BP 11 BP PL JOAN
(DISENGAGE-
17 (DISEN-
MENT LINE) I I GAGEMENT
LINE)
NZ1545
PL DICK (2ND TRIGGER LINE)
+ +NZ1543PL DICK (2ND TRIGGER LINE)
EA PHI
NZ1544
BP + 22
II
I 23 BP I
II
PL
M IC
PP 4 4
(BH K EY
L) BP 21
I PL MICKEY
(BHL)
11-6
The Retrograde
PLAN
11-18. Unit commanders and soldiers must understand and exercise the
basics of defensive operations outlined in Chapter 8 to conduct a successful
delay. However, these defensive basics have unique considerations, and the
significance of these considerations varies depending on the factors of
METT-TC. In a delay, units operate on extended frontages at great risk from
advancing enemy forces. The tactical situation constantly changes with ma-
neuver opportunities existing for only extremely short periods. Subordinate
commanders must have the flexibility to take immediate action to retain the
integrity of their forces. This helps retain their freedom of maneuver and in-
flict maximum destruction on the enemy.
11-19. The commander identifies ground and air avenues for enemy attacks
and friendly counterattacks. When avenues of approach diverge or pass from
one AO to another, adjacent units must coordinate with each other. Using the
intelligence preparation of the battlefield process, the commander designates
initial and subsequent delay positions on key terrain that covers likely enemy
avenues of approach throughout the depth of the AO allocated to the delay
mission.
11-20. Maintaining a mobility advantage over the attacker by the delaying
force is key to successfully conducting a delay. Robust engineering and fire
support are critical to this effort. The commander plans to maintain this ad-
vantage by taking full advantage of the mobility inherent in the combat and
tactical systems available to the delaying force. In addition he takes other
steps to enhance friendly mobility and degrade the enemy’s mobility, such as
building combat trails between delay positions and preparing bridges over
major rivers for demolition. The delaying force should be capable of con-
structing large numbers of obstacles and delivering long-range fires. For ex-
ample, while the enemy seeks to travel in movement formations that allow
him to press his attack at the greatest speed, the delaying force’s aim is to en-
gage the enemy as early and often as possible. This forces the enemy out of
those formations through a multiple series of time-consuming deployments
into an assault formation.
11-21. The air defense portion of the plan has three main considerations—the
protection of the force while it is in position, the protection of any forces left
in contact, and the protection of the force as it moves to the rear. Priority of
protection should be toward maintaining the mobility of the force. Air defense
assets remain mobile yet able to engage aerial targets with little advance
11-7
FM 3-90
warning. These assets should work in teams, able to move to the rear in alter-
nating bounds. This ensures that dedicated air defense assets will always be
in position, with the flexibility to keep pace with the operations. These firing
points are not obvious positions that an enemy will probably target as part of
his preparatory or support fires. Early warning of enemy air attack is pro-
vided over combat net radios using the command net at the brigade echelon
and below.
11-22. Flanks and gaps between units are always areas of concern for a com-
mander. In a linear deployment, the enemy can bypass or outflank the de-
laying force if coordination between adjacent friendly units is weak, or if one
unit creates a gap by moving rearward too rapidly. Therefore, the commander
normally designates BPs to guard approaches into his AO. Adjacent units of
different commands must exchange liaison.
11-23. Displacement criteria should specify at what point—either event, or
time-driven—the delaying force should begin its displacement. The com-
mander should calculate enemy closure rates for the terrain and compare
them to friendly displacement rates between positions. By comparing time
and distance factors, he can calculate his movement window of time. By ap-
plying the enemy’s probable rates of advance and formations to the avenues
of approach, the commander can decide what obstacles to use and where to
emplace them (covered by fires). It also helps the commander determine if
and where decisive engagement is likely or required to achieve the delay ob-
jective. Careful consideration of the factors of METT-TC, especially terrain
analysis, is an inherent part of delay planning.
11-8
The Retrograde
11-26. Third, the order must specify whether the delaying force may use the
entire AO or must delay from specific BPs. A delay using the entire AO is pre-
ferable, but a delay from specific positions may be required to coordinate two
or more units in the delay. To enhance command and control and to coordi-
nate the battle across a broad front, the commander assigns units down to
platoon-level specific BPs. However, he may assign them missions to delay
within their AO if that best supports the scheme of maneuver.
II
+ AD0106
4
+
AB0107
5
PL MAGEY PL MAGEY
+
(070600) AD0102 (070600)
EA HIT
+AD0101
I
31
BP
B
7
P
21
PL SUSAN PL SUSAN
(071200) (071200)
2
+ AB0101 BP 32
+
II
ADO110
II
+ AD0107
I
+
AD0103
EA 8
+
3 AD0108
AX
(071600) (071600)
S TR
BP 41
IKE
+ AD0111
AA ANVIL
PL LINDA
II
+ AD0109
PL LINDA
(071800) (071800)
11-9
FM 3-90
the operation. The first force disengages and passes around or through the
second force. It then moves to the next position and prepares to reengage the
enemy while the second force takes up the fight. Alternate positions are nor-
mally used when the delaying force operates on a narrow front. A delay from
alternate positions is particularly useful on the most dangerous avenues of
approach because it offers greater security than a delay from successive posi-
tions. However, it requires more forces and continuous maneuver coordina-
tion. Additionally, the delaying forces risk losing contact with the enemy
between delay positions.
METHOD OF
USE WHEN ADVANTAGES DISADVANTAGES
DELAY
· AO is wide. · Masses fires of all · Limited depth to the
Delay from · Forces available do not available combat delay positions.
Subsequent allow themselves to be elements. · Less available time to
Positions split. prepare each position.
· Less flexibility.
· AO is narrow. · Allows positioning in · Requires continuous
Delay from · Forces are adequate to depth. coordination.
be split between · Allows more time for · Requires passage of
Alternate different positions. equipment and soldier lines.
Positions maintenance. · Engages only part of the
· Increases flexibility. force at one time.
STEP 1: Elements of the delaying STEP 2: Elements from the STEP 3: Elements at the
force disengage and move to the initial position delay back second position pick up the
rear to organize the next position. through the second position delay. The third delay
ENY ENY to the third delay position. position is occupied.
INITIAL II
DELAY A
POSITION II
SECOND II II II
DELAY B
D B B
POSITION
II II II
X
X
X
X
X
THIRD
DELAY II
POSITION II
A A D
II II II
11-10
The Retrograde
11-30. The commander uses a delay from subsequent positions when the
assigned AO is so wide that available forces cannot occupy more than a single
tier of positions. (See Figure 11-6.) In a delay from subsequent positions, all
delaying units are committed to each of the series of BPs or across the AO on
the same PL. Most of the delaying force is located well forward. The mission
dictates the delay from one BP or PL to the next. The commander staggers
the movement of delaying elements so that not all elements are moving at the
same time.
INITIAL II
DELAY (-)
POSITION II II
(-)
I
D
X
X
X
X
X
SECOND I II
DELAY
POSITION
II II II
Effects of Terrain
11-31. The commander always takes advantage of the terrain when planning
how he positions his forces and conducts operations. He wants the terrain to
favor his actions and not be a neutral factor. The terrain dictates where a de-
laying force can orient on a moving enemy force and ambush it. During a
delay, compartmentalized terrain facilitates shorter displacements initiated
at closer range to the enemy. The commander conducting operations in such
terrain looks for locations that restrict the enemy’s movement and prevent
him from fully exploiting his combat superiority. On the other hand, flat or
open terrain requires earlier displacements at greater distances to stay in
front of the advancing enemy. In open terrain, the most important considera-
tion in selecting a position is a good, long-range field of fire. A field of fire is
the area that a weapon or group of weapons may cover effectively
from a given position.
11-32. In restricted terrain, where a light force conducts the primary action,
positions may be close together, except when conducting a delay using air as-
sault techniques. In open terrain, delay positions are often far apart. In
11-11
FM 3-90
Intelligence
11-35. When conducting a delay operation, the commander may not get the
most effective use of his intelligence assets. The commander echelons his or-
ganic and supporting ISR systems rearward to maintain at least partial
coverage of the AO during the delay. This increases his need to ensure the
effective management of collection assets. However, he must rely on a down-
ward flow of intelligence and combat information, such as unmanned aerial
vehicle and joint surveillance target attack radar system data, from higher
echelons to make up for the degradation in collection capabilities that occurs
when systems displace.
11-36. Initially, intelligence assets attempt to determine if the enemy recog-
nizes the delay. Subsequently, the focus is on how the enemy reacts to the de-
lay. Intelligence, surveillance, and reconnaissance systems monitor and pre-
dict enemy attempts to envelop the flanks or strike the rear of the rearward-
moving friendly force. They also focus on actions of any enemy airborne, air
assault, and attack aviation units that may try to interdict the movement of
the friendly force. The delaying commander must detect the enemy’s advance
early to adjust his maneuver scheme and concentrate sufficient combat power
to effectively delay the enemy.
Maneuver
11-37. A delay is one of the most difficult forms of defensive operations to
execute. The primary reason is that the delaying force must engage the ene-
my sufficiently to slow his movement, yet not become decisively engaged.
Also, the delaying unit must maintain continuous coordination with any flank
units as it displaces rearward.
11-12
The Retrograde
11-38. There are many similarities in the tactics and techniques of a mobile
defense and a delay. However, units conducting a delay normally do not be-
come decisively engaged except to prevent the enemy from prematurely
crossing a delay line or to risk a part of the force to prevent the whole de-
laying force from being jeopardized.
11-39. Heavy forces—armor, mechanized infantry, and armored cavalry ele-
ments supported by indirect fires—are highly suitable for delay operations in
most terrain. Their organic firepower allows them to engage the enemy effec-
tively at long ranges, and their mobility allows them to move quickly between
successive positions or to a flank. Their vehicles provide protection that simp-
lifies battlefield movement. These same characteristics also allow heavy re-
serve forces to rapidly launch counterattacks to extract delaying forces from
untenable situations.
11-40. Light forces are especially suited to conduct delays in broken, close,
and built-up terrain. They take advantage of such terrain, reinforced by the
extensive use of situational obstacles, to hinder the mobility of enemy combat
systems and supporting tactical vehicles. They can also participate in stay-be-
hind operations. (See paragraphs 11-118 to 11-122.) This type of terrain offers
cover for the movement of light forces and favors using ambushes against the
enemy. Because of the restrictions on organic motorized transportation assets
and the limited protection available to light infantry units, the commander
must specifically plan for their displacement. While all light forces can move
rapidly by air, a delay offers little opportunity for airborne forces to use their
unique capability.
11-41. The commander may employ air assault forces in a manner similar to
that of other light infantry units in a delay. However, they possess additional
useful capabilities in a delay operation. They can rapidly deploy, redeploy,
and disperse in open terrain if the weather is suitable and the necessary
landing zones and pickup zones exist. The combination of light infantry, at-
tack helicopters, and fire support systems found in air assault units allows
the delaying commander to rapidly concentrate combat power at key locations
to attrit the enemy through repeated ambushes. The combined arms nature
of air assault units also makes them extremely useful for conducting security
and reserve operations over large geographical areas against heavy and light
enemy forces. However, their extraction is a high-risk activity when pres-
sured by a heavy enemy or in the presence of a significant air defense threat.
11-42. The mobility, lethality, and long range of attack aviation firepower
make it invaluable to the force conducting a delay. The commander can also
use them to conduct counterattacks and spoiling attacks as part of his com-
bined arms team. Other uses of Army aviation in a delay include the rapid
rearward movement of CSS assets, the deployment of light forces, and recon-
naissance.
11-13
FM 3-90
MOBILITY/COUNTERMOBILITY/SURVIVABILITY
11-45. Normally, countermobility is the most important engineer task, unless
the delaying force must cross one or more major obstacles, in which case the
major engineer task is mobility, specifically breach operations. The com-
mander must set realistic and specific priorities for the engineer effort. He
monitors its progress to prevent it from dissipating throughout the area. The
commander employs his engineers in depth. This is crucial when the com-
mander conducts noncontiguous operations or when the enemy attacks deep
into the rear area of a force conducting contiguous operations, or when the
enemy has the ability to employ weapons of mass destruction. The maneuver
element provides security for the engineers so that they can concentrate their
efforts on engineer tasks.
11-46. Because of the importance of mobility and countermobility tasks, a
unit conducting a delay probably has few engineer assets to devote to the sur-
vivability function. Units should maximize the use of smoke when and where
weather conditions allow to provide concealment for movement and assembly.
Smoke curtains, blankets, and haze may protect withdrawing columns, criti-
cal points, and routes. The commander takes precautions to ensure that the
smoke does not provide a screen for the enemy’s advance. (See FM 3-11.50.)
PREPARE
11-47. The defensive preparations outlined in Chapter 8 also apply when con-
ducting a delay. As always, resources—including the time available—deter-
mine the extent of preparations. The commander assigns a high priority to re-
connaissance. Additionally, the preparation of subsequent positions receives a
higher priority than it does in either a mobile or an area defense. It is not
always possible to complete all preparations before starting the delay opera-
tion. Consequently, delaying units continue to prepare and adapt plans as the
situation develops.
11-48. In the delay, the commander uses BPs in a manner similar to the de-
fense. However, when organizing his BPs, he places more emphasis on width
than depth, as well as reconnaissance and preparing routes for displacement.
Within each BP, most of the available firepower is oriented toward the ex-
pected enemy avenue of approach. However, the commander must provide
adequate flank and rear security since the delaying unit must furnish its own
security. Each crew and squad should be familiar with the routes from its pri-
mary positions to alternate, supplementary, and sequential positions. In
preparing a BP, the commander conducting a delay places less emphasis on
installing protective obstacles, final protective fires (FPFs), and ammunition
11-14
The Retrograde
EXECUTE
11-49. The complex nature of a delay requires the subordinate elements of a
delaying force to execute different yet complementary actions. In a single de-
laying operation, attacks, area defenses, mobile defenses, and other actions
may occur in any sequence or simultaneously. For example, the commander
may elect to assign one delaying element the task of holding a key road inter-
section for a period of time so a reserve force can strike the enemy’s flank.
Therefore, the enemy must deploy into a hasty defense, which delays his at-
tack.
11-50. The commander deploys his security force well forward of his initial
delay position to give early warning of any enemy approach. When the secur-
ity force detects and reports an approach, the commander reconciles these re-
ports against his decision support and event templates to confirm the enemy’s
probable course of action. Based on his interpretation of how the battle will
unfold, the commander can direct one subordinate element to maneuver in a
manner designed to draw the advancing enemy into a position of disadvan-
tage.
11-51. The security force fixes, defeats, and destroys the enemy’s reconnais-
sance and security elements without risking decisive engagement. It directs
fires at the approaching enemy force as far forward of the delay positions as
possible. Engaging a moving enemy at long ranges tends to inflict far more
casualties on him than he can inflict on the delaying force; it also slows his
tempo of operations. The more a delaying force can blind an enemy and elimi-
nate his reconnaissance assets, the more likely he is to hesitate and move
with caution.
11-52. Once the security force makes contact with the enemy, it maintains
contact. As the enemy approaches, it moves by bounds back to the flanks of
the defending units, keeping the enemy under constant observation. This
helps prevent the enemy from finding gaps between delaying units and at-
tacking the exposed flanks of delaying units. The security force uses covered,
concealed, and coordinated routes to avoid enemy and friendly fires.
11-53. Recovering security assets may be more difficult if the security force
needs to pass through the range fan of friendly tanks and other direct-fire
weapons in their movement. Recovery should be to the flanks of delay posi-
tions and not through EAs and TRPs unless necessary. Security forces should
move so that they do not reveal the locations of other friendly elements.
11-54. The main body uses a variety of tactics to execute the delay. These in-
clude ambushes, counterattacks, spoiling attacks, artillery raids, jamming,
and close air support. The commander of the delay force preserves his free-
dom to maneuver by engaging the enemy with sufficient force to temporarily
stop his advance. The delay force uses obstacles and defensive positions in
depth to slow and canalize the enemy and exploit the mobility of its combat
systems to confuse and defeat the enemy. Once a delay starts, units displace
rapidly between positions. Whenever possible, the commander grasps any
fleeting opportunity to seize the initiative, even if only temporarily. By
11-15
FM 3-90
11-16
The Retrograde
11-58. As the enemy presses his attack and attempts to maneuver against the
delaying force, the commander constantly assesses the action to guide the dis-
placements of the delay force to anticipate possible decisive engagement
while accomplishing the delay mission. When the enemy begins to think he is
successfully maneuvering against a friendly position, he is engaged by indi-
rect fires while the delaying force disappears behind a cloud of smoke, dust,
and exploding munitions. Intense FPFs and fires aimed at and behind recent-
ly evacuated friendly delay positions allow the delaying force to disengage
from an attacking enemy.
11-59. Division and brigade commanders generally decentralize execution of
a delay to battalion and lower levels. Those senior commanders must rely on
their subordinates to execute the mission and request help when needed. The
commander establishes the acceptable risk and displacement criteria. Sub-
ordinates displace once they meet the previously established delay criteria.
This displacement may be a preplanned event or time dependent. The senior
commander monitors the delay and intervenes when the displacement of one
unit threatens the survival of another.
11-60. The delaying force relies heavily on artillery fires and air support to
suppress the enemy so the force can disengage, move, and occupy new posi-
tions. If a subordinate element cannot maintain separation from the enemy,
the commander can shift additional combat multipliers and other resources to
that particular AO to counter the enemy’s unplanned success. As one subordi-
nate element displaces, the delaying commander may order other subordinate
elements to change their orientation to cover the move. Each displacing ele-
ment travels along its designated route, using reserve demolitions as required
and requesting additional fire support if the enemy is able to maintain con-
tact.
11-61. Passing through obstacle lanes during displacement between positions
poses significant risks to the delaying force. The unit passing through a linear
obstacle becomes more vulnerable to enemy attack because of the danger of
the delaying force becoming congested on the far side of the obstacle. Obstacle
lanes also increase the amount of time required for a passing unit to transit
through a given area. The commander must attempt to prevent the enemy
from engaging the passing unit until it can redeploy into a tactical formation.
11-62. The commander retains his reserve for the decisive moment. As with
aviation, the reserve should not be committed early in the delay unless its in-
tegrity is threatened. Typically, the commander commits his reserve to help a
unit disengage and regain its ability to maneuver or to prevent the enemy
from exploiting an advantage. The reserve normally uses a support-by-fire
position for this task. If the reserve is committed early, the commander’s abil-
ity to influence the battle is greatly reduced unless he can reconstitute a new
reserve. It is possible to commit the reserve several times throughout the bat-
tle, but only when it can be extracted, redesignated, or otherwise reconsti-
tuted quickly.
11-63. In the delay, the force’s CSS elements should be located outside of ene-
my artillery range but be able to provide adequate support. Artillery ammu-
nition stocks must be capable of sustaining the quantity of fire support re-
quired in the delay. Maintenance operations focus on evacuating rather than
11-17
FM 3-90
TERMINATION OF A DELAY
11-64. A delay operation terminates when the delaying force conducts a rear-
ward passage of lines through a defending force, the delaying force reaches
defensible terrain and transitions to the defense, the advancing enemy force
reaches a culminating point, or the delaying force goes on the offense after
being reinforced. If the advancing enemy force reaches a culmination point,
the delaying force may maintain contact in current positions, withdraw to
perform another mission, or transition to the offense. In all cases, the senior
commander must plan for the expected outcome of the delay executed by a
subordinate. If he expects a friendly counterattack, he plans for the forward
passage of the counterattack force, husbands resources to ensure relative
combat superiority, and provides for the smooth handoff of appropriate AOs.
WITHDRAWAL
11-65. A withdrawal, a form of retrograde, is a planned operation in which a
force in contact disengages from an enemy force (FM 3-0). The commander
may or may not conduct a withdrawal under enemy pressure. Subordinate
units may withdraw without the entire force withdrawing. A unit conducts a
withdrawal for a variety of reasons, which are listed at the beginning of this
chapter. In addition, a withdrawal may precede a retirement operation.
11-66. Although the commander avoids withdrawing from action under ene-
my pressure, it is not always possible. He may conduct a withdrawal when
the situation requires rapid action to save the command from disaster. This
usually occurs after a tactical reverse or after a unit reaches its culminating
point. When an aggressive enemy becomes aware of a friendly force’s with-
drawal or its intention to withdraw, he attempts to exploit the withdrawal,
using all his capabilities to try to turn the withdrawal into a rout. He may
have ground and air superiority and continuously attempt to pursue, encircle,
and destroy the withdrawing force. He will try to use a combination of direct
pressure and enveloping forces and fires to isolate the withdrawing friendly
force for later destruction.
11-67. Withdrawals are inherently dangerous because they involve moving
units to the rear and away from what is usually a stronger enemy force. The
heavier the previous fighting and the closer the contact with the enemy, the
more difficult the withdrawal. Operations security (OPSEC) is extremely im-
portant. A unit usually confines its rearward movement to times and condi-
tions when the enemy cannot observe the activity, so that he cannot easily de-
tect the operation. To help preserve secrecy and freedom of action, for
example, the commander must consider visibility conditions and times when
enemy reconnaissance satellites can observe friendly movements. Operations
security is especially critical during the initial stages of a delay when the ma-
jority of CS and CSS elements displace.
11-68. A unit withdraws to an assembly area or a new defensive position. Al-
ternatively, it can withdraw indirectly to either area through one or more
11-18
The Retrograde
ORGANIZATION OF FORCES
11-69. The commander typically organizes his withdrawing unit into a secur-
ity force, a main body, and a reserve. He also organizes a detachment left in
contact (DLIC) and stay-behind forces if required by his scheme of maneuver.
He avoids changing task organization unless his subordinates have sufficient
planning time. However, circumstances may dictate rapid task organization
changes immediately before the withdrawal, such as when the unit must con-
duct an immediate withdrawal to prevent encirclement.
11-70. The security force maintains contact with the enemy until ordered to
disengage or until another force takes over. It simulates the continued
presence of the main body, which requires additional allocation of combat
multipliers beyond those normally allocated to a force of its size. The greater
its mobility and range advantages over the enemy, the easier for the security
force to successfully cover the main body’s withdrawal. The commander orga-
nizes the majority of available combat power to the security force as a rear
guard or a rear-covering force; the most probable threat to a withdrawing
force is a pursuing enemy. However, the commander must maintain all-
around security of the withdrawing force. When the enemy can infiltrate or
insert forces ahead of the withdrawing force, the commander may establish
an advance guard to clear the route or AO. He designates a flank guard or
screen, if required.
11-71. When a security zone exists between the two main opposing forces, the
existing security force can transition on order to a rear guard or rear-covering
force. It then conducts delay operations until ordered to disengage and break
contact with the enemy. When the withdrawing force is in close contact with
the enemy, a security zone does not normally exist. Withdrawals under these
conditions require that security forces adopt different techniques. One tech-
nique is to establish a DLIC to provide a way to sequentially break contact
with the enemy.
11-72. A detachment left in contact is an element left in contact as
part of the previously designated (usually rear) security force while
the main body conducts its withdrawal. Its primary purpose is to remain
behind to deceive the enemy into believing the parent unit is still in position
while the majority of the unit withdraws. It simulates—as nearly as pos-
sible—the continued presence of the main body until it is too late for the ene-
my to react by conducting activities, such as electronic transmissions or at-
tacks. The DLIC must have specific instructions about what to do when the
enemy attacks and when and under what circumstances to delay or with-
draw. If the DLIC must disengage from the enemy, it uses the same tech-
niques as in the delay. If required, this detachment receives additional
recovery, evacuation, and transportation assets to use after disengagement to
speed its rearward movement.
11-73. Two methods to resource the DLIC exist. The first is for each major
subordinate element of the withdrawing force to leave a subelement in place.
11-19
FM 3-90
For example, in a brigade withdrawal, each task force leaves a company team
in contact. Typically, these teams fall under a senior DLIC commander desig-
nated by the brigade commander. Alternatively, one major subordinate com-
mand of the withdrawing force can stay behind as the DLIC. For example, a
brigade could leave one battalion task force as the DLIC, which then expands
its security responsibilities to cover the width of the AO. (See Figure 11-7.)
PL ARROW
PL SWORD
PL SPEAR
RP 14 SP 1
ROUTE DAN
SP 3 II
RP 18 ROUTE SKYLER
SP 7
RP 12 II I
ROUTE ALEXIS
II
I
RP 19 SP 2
ROUTE JIM I
RP 21 II
ROUTE KELLY
SP 8
II
RP 33 ROUTE SAMANTHA SP 4
PL ARROW
PL SPEAR
PL SWORD
11-74. Often when a DLIC is used, the commander creates an additional se-
curity force behind the existing main defensive positions to assist in the with-
drawal process. The commander can create an additional force from the with-
drawing unit or from an assisting unit. The DLIC can delay to this additional
security force and join it, or delay back, conduct battle handover, and then
conduct a rearward passage of lines. In either case, the additional security
force becomes the rear guard.
11-75. The main body of the withdrawing force consists of all elements re-
maining after the commander resources his security force and his reserve. He
generally finds it difficult to resource a reserve, but he makes every attempt
to do so. When the complete formation withdraws under pressure, the reserve
may take limited offensive action, such as spoiling attacks, to disorganize,
disrupt, and delay the enemy. It can counter penetrations between positions,
reinforce threatened areas, and protect withdrawal routes. Reserves may also
extricate encircled or heavily engaged forces.
CONTROL MEASURES
11-76. Withdrawing forces must apply combat power to protect themselves
while simultaneously moving combat power away from the enemy. This
11-20
The Retrograde
requires careful coordination among all forces. Throughout the operation, the
commander must tightly control rearward movement and maintain the
ability to generate decisive combat power at key times and places. As shown
in Figure 11-8, the control measures used in the withdrawal are the same as
those in a delay or a defense. The routes used by each unit in the withdrawal
and the block movement times are also withdrawal control measures.
PL NORIE (BHL)
PL GLORIA
PL SUSAN
PL JUDY
X
II
II
I
71 77 73
ENY
ENY
87 G
II
85 81
I
II
II
(+) ENY
G
ENY
93
94
II
II
97
I
B2
PL GLORIA
PL SUSAN
PL NORIE
PL JUDY
X (BHL)
DETACHMENTS
LEFT IN
CONTACT
PLANNING A WITHDRAWAL
11-77. The commander plans and coordinates a withdrawal in the same man-
ner as a delay. Some factors of METT-TC apply differently because of the dif-
ferences between a delay and a withdrawal. A withdrawal always begins
under the threat of enemy interference. Because the force is most vulnerable
if the enemy attacks, the commander always plans for a withdrawal under
pressure. He then develops contingencies for a withdrawal without pressure.
In both cases, the commander’s main considerations are to—
· Plan a deliberate break from the enemy.
· Displace the main body rapidly, free of enemy interference.
· Safeguard the withdrawal routes.
· Retain sufficient combat, CS, and CSS capabilities throughout the op-
eration to support forces in contact with the enemy.
11-78. A withdrawal may be assisted or unassisted. It may or may not take
place under enemy pressure. These two factors combined produces the four
variations shown in Figure 11-9, page 11-22. That figure also depicts the tac-
tical mission graphic for a withdrawal and a withdrawal under enemy pres-
sure. The withdrawal plan considers which variation the force currently fac-
es. Each variation requires a different blend of the three retrograde options.
11-21
FM 3-90
WITHDRAWAL ENY
under pressure UNDER ENEMY
WP
ENY
11-22
The Retrograde
in tactical formations. The commander can plan for stay-behind forces as part
of the operation. (The stay-behind operations starts on page 11-30.)
PREPARING A WITHDRAWAL
11-83. Before withdrawing, the main body dispatches quartering parties to
help it occupy the new position. (Chapter 14 details the responsibilities of a
quartering party.)
11-84. In an unassisted withdrawal, the withdrawing unit establishes its own
security force and reserve. It reconnoiters and secures the routes it will use in
its rearward movement while sustaining itself during the withdrawal. The
withdrawing unit must disengage from the enemy.
11-85. By concealing supplies along movement routes, CSS operators can
simplify support requirements and reduce the enemy’s ability to interfere
with logistics operations. This allows CSS units to withdraw earlier than they
otherwise could. The commander carefully considers whether to place his
supplies in caches. Once cached, supplies are difficult to recover if the opera-
tion does not go as planned. Other than medical items, the unit evacuates or
destroys all supplies to prevent their capture. The commander establishes his
destruction criteria, which is time- or event-driven for each class of supply.
EXECUTING A WITHDRAWAL
11-86. Typically, when under enemy pressure, the less heavily engaged ele-
ments of the withdrawing force withdraw first. The more heavily engaged
units generally withdraw under the cover of a security force using support
provided by available fire support and electronic warfare assets. They take
advantage of obstacles to assist in breaking contact with the enemy. The com-
mander conducts night movements and uses obscuration smoke to screen
friendly movement while reducing both the accuracy of enemy direct-fire
systems and his ability to visually observe friendly movements. The security
force continues to use alternate and successive positions until the entire force
breaks contact with the enemy.
11-87. The security force may remain in position and maintain a deception.
The main body moves rearward to intermediate or final positions as rapidly
as possible. After the main body withdraws a safe distance, the security force
begins its rearward movement. Once the security force begins moving, it as-
sumes the duties of a rear guard. Even if the enemy does not pursue the with-
drawing force, the security force continues to act as the rear guard unless the
commander assigns that mission to another element. However, if not pursued
by the enemy, the security force may remain in a march column. (Chapter 14
provides a definition of a march column.)
11-88. On order, the main body moves rapidly on multiple routes to reconnoi-
tered positions. It may occupy a series of intermediate positions before com-
pleting the withdrawal. Usually CS and CSS units, along with their convoy
escorts, move first and precede combat units in the withdrawal movement
formation. The commander needs to maintain the disciplined use of routes
during a withdrawal. Despite confusion and enemy pressure, subordinate
units must follow specified routes and movement times.
11-23
FM 3-90
11-89. When the main body withdraws, its reserve remains well forward to
assist the security force and other units by fire and counterattack. The re-
serve can launch spoiling attacks to disorganize and delay the enemy and ex-
tricate encircled or heavily engaged forces.
11-90. If the security force and the reserve cannot prevent the enemy from
closing on the main body, the commander must commit some or all of the
main body to prevent the enemy from further interfering with the with-
drawal. The main body delays or defends if the security force fails to slow the
enemy. In this event, the withdrawal resumes at the earliest possible time. If
the enemy blocks movement to the rear, the commander shifts to alternate
routes to bypass the interdicted area. Alternatively, he can attack through
the enemy.
TERMINATING A WITHDRAWAL
11-91. Once the withdrawing force successfully disengages from the enemy, it
has two options. It can rejoin the overall defense under more favorable
conditions or transition into a retirement and continue its movement away
from the enemy and toward its next mission.
RETIREMENT
11-92. A retirement is a form of retrograde in which a force out of contact
with the enemy moves away from the enemy (JP 1-02). Figure 11-10,
page 11-24 shows the tactical mission graphic for a retirement. A retiring
unit organizes for combat but does not anticipate interference by enemy
ground forces. Typically, another unit’s security force covers the movement of
one formation as the unit conducts a retirement. However, mobile enemy
forces, unconventional forces, air strikes, air assaults, or long-range fires may
attempt to interdict the retiring unit. The commander must plan for enemy
actions and organize the unit to fight in self-defense. The commander usually
PL TOM PL TOM
271100Z 271100Z
OCT04 OCT04
PL LYNN
PL LYNN
R
II
II
PL ERIN
PL ERIN
281100Z
OCT04 281100Z
OCT04
11-24
The Retrograde
ORGANIZATION OF FORCES
11-96. The commander normally designates security elements and a main
body in a retirement. (See Figure 11-11.) The formation and number of col-
umns employed during a retirement depend on the number of available
routes and the potential for enemy interference. The commander typically
wants to move his major elements to the rear simultaneously. However, a
A DV A N C E
REAR
G U A RD
}
G U ARD
}
S S
G
E
M A IN B O D Y
G
G
E
S S
11-25
FM 3-90
limited road net or a flank threat may require echelonment of the movement
in terms of time and ground locations.
11-97. The terrain and the enemy threat dictate whether the retiring force
establishes a single rear security force, which is usually a rear guard, or
whether each column forms a separate rear security force. These security
forces protect the rearward moving columns from surprise, harassment, and
attack by any pursuing enemy force. Their size and composition depend on
the strength and imminence of the enemy threat. These security elements
generally remain in march columns unless there is a potential for enemy in-
terference. If the enemy establishes contact, the rear security element con-
ducts a delay.
11-98. The retiring march columns normally require an advance guard aug-
mented by engineers. The commander assigns a flank security element to
prevent potential enemy interference with the retiring force’s extended
columns. The commander may designate flank security responsibilities to
subordinate march units.
11-99. The main body organizes in a manner opposite that of an approach
march. (Chapter 14 explains the approach march.) The movement of CS and
CSS units should precede the movement of combat forces. When necessary,
elements of the main body can reinforce the rear guard or any other security
element. Because fire support elements and attack helicopter elements of the
main body can respond most rapidly, they are usually the first elements
tasked for this mission.
CONTROL MEASURES
11-100. The control measures used in a retirement are the same as those in a
delay and a withdrawal. As in a withdrawal, thorough planning and strict ad-
herence to routes and movement times facilitate an orderly retirement. Typi-
cally, the commander controls movement using movement times, routes, and
checkpoints. (Chapter 14 discusses movement control measures.)
11-26
The Retrograde
11-27
FM 3-90
11-108. Military police elements of the retrograde force are involved pri-
marily in battlefield circulation control to ensure smooth traffic flow. The
commander may augment his military police force to establish traffic control
points and route and convoy security. They also help control dislocated civil-
ians and enemy prisoners of war.
DENIAL OPERATIONS
11-110. Denial operations are actions to hinder or deny the enemy the
use of space, personnel, supplies, or facilities. It may include destroying,
removing, and contaminating those supplies and facilities or erecting
obstacles. It is inevitable that, on occasion, an enemy will be in a position to
capture friendly equipment and supplies. This situation often occurs during
retrograde or defensive operations. As a result, the defending commander
may be required to conduct denial operations. The principles of denial are:
· The commander should deny his enemy the use of military equipment
and supplies.
· Steps taken to deny equipment and supplies to the enemy should, if
possible, not preclude their later use by friendly forces.
· The commander orders the destruction of military equipment and sup-
plies only when friendly forces cannot prevent them from falling into
enemy hands.
· The user is responsible for denying the enemy the use of its military
equipment and supplies by means of its destruction, removal, or con-
tamination.
· Deliberately destroying medical equipment and supplies and making
food and water unfit for consumption is unlawful under the terms of
the Geneva Conventions.
In denial operations, the definition of a unit’s military equipment and sup-
plies could expand to include military installations and any civilian equip-
ment and supplies used by the friendly force. Under the law of war the de-
struction of civilian property is only permitted where required by immediate
military necessity. The determination of whether there is sufficient necessity
to justify destruction is a complex analysis that requires consideration of
moral, political, and legal considerations.
11-111. The commander who orders the denial operation must consider the
potential value of the military equipment and supplies to an enemy when de-
termining the priorities and the extent of the denial operation. Examples of
high priorities for denial include—
· Classified equipment, material, and documents.
· POL.
· Sophisticated weapon systems or electronic equipment.
· Heavy weapons and associated ammunition.
11-28
The Retrograde
· Communications equipment.
· Ferrying and bridging equipment.
· Air, sea, and land transport systems.
Of lesser priority for denial would be any other military supplies, equipment,
or facilities that may be of use to an enemy.
11-112. The commander must issue detailed instructions to deny military
equipment and supplies to prevent the enemy from directly using such assets.
Denial must also prevent an enemy from repairing a system through the can-
nibalization of several systems. The unit must destroy the same parts in each
type of system.
11-113. Denial differs from countermobility operations because the com-
mander designs denial operations to deprive the enemy of some or all of the
short-term benefits of capturing a geographical region. The impact of denial
operations on civilian inhabitants and the environment of the region act as a
moral and a legal restraint on their use and scope by US forces. The
commander should involve his staff judge advocate and civil-military
operations officer in planning denial operations.
11-114. The commander ensures that executing the denial plan does not ad-
versely affect his future operations. This includes carefully considering the
force’s demolition policy in relation to the purpose of the rearward movement
and the contemplated subsequent actions of the force. Widespread demoli-
tions during a retrograde may become a greater hindrance to a friendly force
moving back into the area than to the enemy during the friendly retrograde.
For example, destroying the transportation infrastructure increases friendly
logistics difficulties once the area is recaptured. Removing or destroying
militarily significant supplies and equipment, such as fuel, obstacle mater-
ials, and rail cars, from an area requires the friendly force to bring similar as-
sets with them when they reoccupy the area.
11-115. The commander can expand a denial operation to prevent the enemy
from exploiting resources, such as fuel, minerals, and the indigenous popula-
tion; routes of communication, such as river locks, railroad switching yards,
road interchanges, and bridges; and facilities, such as telephone exchanges,
radio and television stations, and the industrial plants of a region. The de-
fending force can assist civil authorities in evacuating the civilian population.
The defending force either removes the resources, supplies, and facilities from
the geographical area being abandoned to the enemy or destroys them in
place. Such denial operations may be either total or limited in nature.
11-116. Total denial operations can produce long-term political, economic,
military, and environmental effects. Total denial operations have operational-
level, and possibly strategic-level, impact. Total denial operations consume
large quantities of transportation and engineer resources and require consid-
erable time to plan and execute.
11-117. Limited or partial denial operations are particularly suitable if the
defending force expects to regain control of the geographical area within a
short time. The removal or destruction of only a few key components can
reduce a facility to limited utility, yet it allows for the facility’s quick restora-
tion of all functions once it is returned to friendly control. American forces
11-29
FM 3-90
only destroy discrete targets of significant military value. Limited denial op-
erations normally do not affect the advance of properly supported enemy com-
bat formations possessing cross-country mobility. However, they can seriously
impede an enemy’s road-bound and rail-bound logistics support if executed
with skill and imagination according to an overall plan.
STAY-BEHIND OPERATIONS
11-118. A stay-behind operation is an operation in which the com-
mander leaves a unit in position to conduct a specified mission while
the remainder of his forces withdraw or retire from an area. The force
should consist of enough combat, CS, and CSS elements to protect and sus-
tain its fighting capability for the duration of the mission. A stay-behind force
may also result from enemy actions that bypass friendly forces.
11-119. The main purpose of a stay-behind force is to destroy, disrupt, and
deceive the enemy. This force has a high-risk mission because of the danger
that it will be located, encircled, and destroyed by the enemy. Resupply and
casualty evacuation are also extremely difficult. A commander considers
assigning this mission only after a thorough METT-TC analysis. The stay-be-
hind force attacks enemy combat forces and C2, CS, and CSS elements from
unexpected directions. (See Figure 11-12.) These attacks may cause enemy
follow-on forces to be more cautious and to slow down to clear possible attack
and ambush sites. The stay-behind force may be required to conduct a break-
out from encirclement and linkup operations after it completes its mission.
(Appendix D discusses the conduct of a breakout from encirclement.)
FLOT
PL THOR
PL FREDA
ENY
ENY
AA
LOKI
13 PP
7 RP 6 SP
ROUTE BP 8
VALHALLA
PL THOR
PL FREDA
FLOT
11-30
The Retrograde
11-31
PART FOUR
Chapter 12
Security Operations
The officers and men who permit themselves to be surprised deserve to
die, and the commanding general will spare no efforts to secure them
their desserts.
D. H. Hill, 1863
CONTENTS
Fundamentals of Security Operations...... 12-2 Organization of Forces......................... 12-15
Provide Early and Accurate Warning.... 12-2 Screen Control Measures .................... 12-15
Provide Reaction Time and Maneuver Executing a Stationary Screen ............ 12-15
Space ....................................................... 12-2 Executing a Moving Screen ................. 12-17
Orient on the Force or Facility to be Screening Operations During Limited
Secured.................................................... 12-2 Visibility ................................................. 12-19
Perform Continuous Reconnaissance . 12-3 Guard ......................................................... 12-19
Maintain Enemy Contact ........................ 12-3 Organization of a Guard Force ............ 12-20
Historical Example...................................... 12-3 Control Measures ................................. 12-20
General Considerations for Security Advance Guard ..................................... 12-21
Operations............................................... 12-4 Flank Guard ........................................... 12-22
Common Security Control Measures ... 12-4 Rear Guard ............................................ 12-25
Planning Considerations for Security Cover.......................................................... 12-25
Missions .................................................. 12-5 Organization of a Covering Force ....... 12-26
Movement into Security Areas for Offensive Cover .................................... 12-27
Stationary Security Missions............... 12-10 Flank Cover ........................................... 12-29
Movement During Moving Flank Defensive Cover.................................... 12-29
Security Missions ................................. 12-11 Area Security............................................. 12-31
Screen........................................................ 12-13 Local Security ........................................... 12-32
Critical Tasks for a Screen................... 12-14 Combat Outposts...................................... 12-32
12-0
Security Operations
12-1. There are five forms of security operations—screen, guard, cover, area
security, and local security.
· Screen is a form of security operations that primarily provides
early warning to the protected force.
· Guard is a form of security operations whose primary task is to
protect the main body by fighting to gain time while also ob-
serving and reporting information and preventing enemy
ground observation of and direct fire against the main body.
Units conducting a guard mission cannot operate indepen-
dently because they rely upon fires and combat support assets
of the main body.
· Cover is a form of security operations whose primary task is to
protect the main body by fighting to gain time while also ob-
serving and reporting information and preventing enemy
ground observation of and direct fire against the main body.
· Area security is a form of security operations conducted to pro-
tect friendly forces, installations, routes, and actions within a
specific area.
· Local security consists of low-level security operations conduct-
ed near a unit to prevent surprise by the enemy.
The screen, guard, and cover, respectively, contain increasing levels of com-
bat power and provide increasing levels of security for the main body. How-
ever, more combat power in the security force means less for the main body.
Area security preserves the commander’s freedom to move his reserves, posi-
tion fire support means, provide for command and control, and conduct sus-
taining operations. Local security provides immediate protection to his force.
12-2. All maneuver forces are capable of conducting security operations.
Ground and air cavalry units and scout platoons are specially trained, equip-
ped, and organized to conduct security missions; however, there are rarely
enough of them to meet all the security needs of a force. A commander should
ensure that subordinate maneuver units train to perform specific security
missions. This allows subordinate units to add these missions to their
mission-essential task list (METL) and train for them. Habitual relationships
with attachments are required to obtain proficiency in these missions.
12-1
FM 3-90
12-4. All forces, regardless of whether they are combat, combat support (CS),
or combat service support (CSS), have an inherent responsibility to provide
for their own local security. Local security consists of observation posts (OPs),
local security patrols, perimeter security, and other measures to provide
close-in security of a force. This chapter focuses on security operations con-
ducted by one force or a subordinate element of a force that provides security
for the larger force. Echelon-specific manuals discuss local security.
12-2
Security Operations
commander must know the main body’s scheme of maneuver to maneuver his
force to remain between the main body and the enemy. The value of terrain
occupied by the security force hinges on the protection it provides to the main
body commander.
HISTORICAL EXAMPLE
12-11. Military history contains numerous examples of the importance of se-
curity operations. The following historical example illustrates the major role
of security operations in ensuring the success of an operation. This non-US
example illustrates that the study of other armies and other times can con-
tribute toward helping to understand the art and science of tactics.
12-3
FM 3-90
by partisans, kept the Germans so busy conducting area security operations that
they had few resources to devote to ground reconnaissance. The Red Army Air
Force kept German aerial reconnaissance from looking deep into the Red Army’s
rear to operational depths. All the Soviet fronts (army groups) preparing for the
summer offensive established a 25-kilometer-deep security area against German
ground reconnaissance. Frontline divisions conducted numerous and frequent
patrols to counter German reconnaissance efforts and maintain regular physical
contact with adjoining divisions.
The Soviets used all available assets to maintain the security of forces involved in
the operation. Throughout the operation, the Red Army Air Force provided aerial
cover, especially for mobile groups and forward detachments. Because the
marshy nature of much of the terrain prevented using large mechanized forma-
tions, the Soviets used horse cavalry corps, augmented with tanks, to cover
ground unsuitable for heavier forces and maintain contact between separated
elements of their forward mobile forces.
On the flanks of Operation Bagration, the Soviet 1st Guards Tank Corps served
as a covering force against reinforcements or relief efforts from the German
Army Group North. A combined horse-cavalry mechanized group served the
same role in the south for the 1st Byelorussian Front against the German Army
Group North Ukraine.
12-4
Security Operations
control the passing of responsibility for the enemy to the main body. Nor-
mally, the responsibility of the flank security force begins at the trail element
of the advance security force or the lead combat element in the main body. It
ends at the rear of the main body or the lead element of the rear security
force. The main body commander clarifies responsibilities as necessary.
12-16. Either the main body or the security force commander designates ad-
ditional PLs to control the operation. These PLs may serve as subsequent
screen or delay lines. Each element of the security force must report when
crossing or occupying them. Displacement to these subsequent PLs is event-
driven. The approach of an enemy force, relief of a friendly unit, or movement
of the protected force dictates the movement of the security force. The secur-
ity force commander normally assigns additional lateral boundaries within
the security area to delineate the areas of operations (AOs) for subordinate
units.
12-17. The commander uses checkpoints and named areas of interest (NAIs)
to indicate specific areas of interest and to coordinate movement and surveil-
lance. He uses contact points to facilitate coordination with flank units during
front and rear security missions or between elements of a security force with-
in the security area. Units conducting flank security for a moving force physi-
cally contact the main body at contact points. If the security force commander
wants to ensure coverage of a specific NAI or avenue of approach, he estab-
lishes OPs.
X X
AC P UAV ACP
1 270 600Z - 27 0 900Z 2
II
S 3-8 (+) S
D IV IS IO N S EC U RITY A R E A
P L TIG E R
3-8
3-8 X (B H L )
P L T IG E R
X 2
(B H L ) 3 FEB A
S
D IV ISIO N M A IN B AT TLE A R EA I
FEB A 3 X 2 2 X
XX
2 51M D
XX
52M D 25A D S
3 X
X D IV IS IO N
R EAR
A REA
II
II
G 1-87 (-) G
25A D
X X
12-5
FM 3-90
Force to Be Secured
12-19. The main body commander must designate the exact force to secure.
This designation determines the limits of the security force’s responsibilities.
The security force must orient on the force it is securing. If the main body
moves, the security force also moves to maintain its position in relation to the
main body. Table 12-1, page 12-8, shows the typical size of security forces for
a given echelon. The limited capabilities of most maneuver platoons prohibit
them from having a mission separate from their parent company. Scout
platoons are the exception to this rule.
Table 12-1. Typical Size of Security Forces for a Given Mission and Echelon
SECURITY MISSION
ECHELON Screen Advance Guard Flank/Rear Guard Cover
12-6
Security Operations
critical OPs or positions. It also prevents the enemy from penetrating the se-
curity area too easily and prevents gaps from occurring when OPs or units
displace or are lost. The wider the area to secure, the less the security force
can take advantage of the increased depth because it will have fewer forces to
position in depth. A very shallow security area may require a guard to pro-
vide needed reaction time.
12-21. The security force commander conducts a detailed analysis of the ter-
rain in the security area. He establishes his initial dispositions (usually a
screen line) as far forward as possible on terrain to allow good observation of
avenues of approach. Next, he assigns clear responsibility for identified ave-
nues of approach and designated NAIs. For a screen or guard, the initial
screen line must be within supporting range of the main body, yet provide the
desired amount of early warning.
12-7
FM 3-90
Fire Planning
12-29. The main body commander positions his fire support assets to support
his screen and guard forces. He allocates additional artillery to support a
covering force. If the security force is assigned a wide AO, the commander
may have to position his fire support assets to provide effective coverage of
only the most likely enemy avenues of approach. This is particularly impor-
tant for a screen because often the screen force can rely only on indirect fire
12-8
Security Operations
to delay or disrupt the enemy. Providing adequate indirect fire support to the
security force may require the main body to position its artillery well forward
in the formation of the main body.
Reporting
12-32. The security force reports enemy activities to the main body. The main
body headquarters is responsible for disseminating that information to other
affected friendly forces. The main body commander ensures that the security
force has access to all pertinent intelligence and combat information obtained
by the main body. This supplements the security force’s capabilities. By con-
tinuously exchanging information, both the security force commander and the
main body commander have time to choose a suitable COA. Force digitization
greatly assists commanders in maintaining a common operational picture.
12-9
FM 3-90
12-10
Security Operations
requirements, and to provide the necessary level of security for itself. The se-
curity force moves into the security area using one of three basic methods:
tactical road march, movement to contact, or zone reconnaissance.
12-39. The fastest but least secure method of deploying is a tactical road
march from the rear boundary of the security area to the initial positions. The
security force moves to a release point on the rear boundary. From the re-
lease point, subordinate elements deploy to occupy initial positions, moving
by the quickest means possible. This method is appropriate when enemy con-
tact is not expected, time is critical, or an aviation unit is conducting a zone
reconnaissance forward of the ground element and has found no enemy in the
security area.
12-40. In the second method, the security force conducts a movement to con-
tact from a line of departure (usually the rear boundary of the security area)
to the initial positions. This method is slower than a tactical road march but
more secure. It is appropriate when enemy contact is likely, time is limited,
terrain reconnaissance is not needed, or an aviation unit is conducting zone
reconnaissance forward of the ground element and enemy forces have been
detected in the security area.
12-41. The most secure method for moving to the initial positions is for the
security force to conduct a zone reconnaissance from the security area rear
boundary to its initial security line positions or the forward limit of the secur-
ity area. Given adequate time, this method is preferred because it allows the
security force to clear the security area and become familiar with the terrain
that it may have to defend. The security force can reconnoiter potential sub-
sequent positions and fire support system firing positions as it moves to its
initial positions. A zone reconnaissance is appropriate when time is available
and information about the enemy or terrain is unknown. While this technique
provides information of tactical value on the enemy and terrain in the area, it
may also be time consuming. Using air reconnaissance forward of the ground
units increases the speed and security of the movement.
12-11
FM 3-90
to perform the mission. The security force then conducts a tactical road
march, an approach march, or tactical movements parallel to the main body
and drops off OPs or occupies BPs along the flank of the main body. This
technique keeps the two forces from interfering with each other during de-
ployment. It is appropriate when another force penetrates the line of contact,
the main body is not in contact with the enemy and is moving quickly, the LD
is uncontested, and the IPB process indicates that enemy contact is not likely
in the area through which the security force is moving. It is the fastest but
least secure technique.
32
PL
OBJECTIVE
PL TIN RP 8 TIN
LYNN
II
PL STEEL PL STEEL
II
II
PL COPPER PL COPPER
II
SP 12
32
PL
OBJECTIVE
PL TIN TIN
LYNN RP 8
II
PL STEEL PL STEEL
II
II
II
PL COPPER PL COPPER
SP 12
PL IRON (LD) (LD) PL IRON
12-12
Security Operations
12-45. In the second technique, the security force crosses the LD separately
from the main body, and its lead elements conduct a movement to contact.
Follow-on elements occupy positions as they are reached. (See Figure 12-4.)
This technique is appropriate to use when the main body is moving slower
than in the first method, the LD is uncontested, and the IPB process indicates
possible enemy contact. It is slower than the previous technique but provides
better security.
32
PL
OBJECTIVE
PL TIN TIN
LYNN RP 8
II
PL STEEL PL STEEL
II
PL COPPER PL COPPER
II
2
II
SP 12
PL IRON (LD) (LD) PL IRON
12-46. Finally, in the third technique, the security force crosses the LD with
the main body and conducts a zone reconnaissance out to the far limit of the
security area. (See Figure 12-5, page 12-14.) This technique is appropriate
when the LD is also the line of contact, the main body makes its own penetra-
tion of the enemy defenses along the line of contact, the main body is moving
slowly, and the enemy situation is not clearly understood. The security force
may follow the lead element of the main body through the gap and deploy
when the situation permits. This technique provides increased security for
both the security force and the main body; it is also the most time-consuming.
SCREEN
12-47. A unit performing a screen observes, identifies, and reports enemy ac-
tions. Generally, a screening force engages and destroys enemy reconnais-
sance elements within its capabilities—augmented by indirect fires—but
otherwise fights only in self-defense. The screen has the minimum combat
power necessary to provide the desired early warning, which allows the com-
mander to retain the bulk of his combat power for commitment at the decisive
place and time. A screen provides the least amount of protection of any secur-
ity mission; it does not have the combat power to develop the situation.
12-13
FM 3-90
PL REVELATIONS
99
PL NUMBERS
(LOA)
PL GALATIONS
PL NUMBERS
DIVISION OBJECTIVE I
I
5
85
AXIS LUKE
I
PL LEVITICUS
77 PL LEVITICUS
5
I
I
PL EXODUS I S
I
43 PL EXODUS
X I I 2 S
I
XX
PL REVELATIONS
PL GENESIS
PL GALATIONS
X II PL GENESIS
X X
LD/LC LD/LC
12-14
Security Operations
ORGANIZATION OF FORCES
12-51. A screen normally requires the subordinate elements of the security
force to deploy abreast. A screen force normally organizes itself into a number
of OPs determined by the number of avenues of approach into the main force
and any additional NAIs it must cover, as specified by the main force com-
mander. The screening force may retain a small reaction force or reserve to
extract endangered OPs.
12-52. The size of the avenue of approach kept under surveillance varies by
echelon. Normally, a unit maintains observation over avenues of approach
used by operationally significant enemy forces. These are normally avenues
of approach used by enemy forces one echelon smaller than the friendly unit.
For example, a battalion maintains surveillance over enemy company-size
avenues of approach, while the corps maintains surveillance over division-
size avenues of approach. The situation may require the unit to maintain sur-
veillance over mobility corridors that can be used by enemy units two eche-
lons smaller than the friendly force.
12-15
FM 3-90
10
NAI 15 NAI 25
PL PL
RED RED
EA EA
PINK ROSE
A C
I
B A
I
PL PL
WHITE I I WHITE
PL PL
BLUE BLUE
12-16
Security Operations
screening force can move behind the PL that designates the rear boundary of
the security area and hand off the battle to the main body.
12-17
FM 3-90
12-60. The commander considers the factors of METT-TC in his decision re-
garding the movement method employed. Figures 12-8 and 12-9, page 12-18,
illustrate four methods of controlling movement along a screen line:
· Alternate bounds by individual OPs from the rear to the front. (This
method is usually employed at the company/troop level and below.)
· Alternate bounds by subordinate units from the rear to the front.
· Successive bounds by units along the screen line.
· Continuous marching along the route of advance.
PL PL
M
M
A
A PL
I
I
N
N I
I
II
B
PL B
O PL
O
D
D
Y
Y
LD LD
PL
PL
M M
A A
I I
PL N
N PL
S
I
B B
O O
D S
D
Y PL Y PL
LD
LD
12-18
Security Operations
GUARD
12-62. A guard differs from a screen in that a guard force contains sufficient
combat power to defeat, cause the withdrawal of, or fix the lead elements of
an enemy ground force before it can engage the main body with direct fire. A
guard force routinely engages enemy forces with direct and indirect fires. A
screening force, however, primarily uses indirect fires or close air support to
destroy enemy reconnaissance elements and slow the movement of other ene-
my forces. A guard force uses all means at its disposal, including decisive en-
gagement, to prevent the enemy from penetrating to a position were it could
observe and engage the main body. It operates within the range of the main
body’s fire support weapons, deploying over a narrower front than a
comparable-size screening force to permit concentrating combat power.
12-63. The three types of
G
guard operations are advance, G G
G
12-19
FM 3-90
CONTROL MEASURES
12-67. The commander uses graphic control measures to control the opera-
tions of his guard force within the security area. The assigned mission also in-
fluences the size of the AO given to subordinate elements. For example, a
movement to contact normally takes place across a narrower frontage than if
the same unit makes a zone reconnaissance to allow adequate concentration
of combat power.
12-68. The guard force may task its subordinate elements to conduct screen
missions to the front and flanks of the guard force. This provides early warn-
ing of enemy forces and helps maintain contact with flank forces and any
higher-echelon security force. An example of the latter would be a corps
covering force operating in front of a division advance guard. The presence of
a higher-echelon security force also influences how the guard force command-
er organizes his force and conducts operations. It specifically impacts the
areas of fire support and CSS.
12-20
Security Operations
ADVANCE GUARD
12-69. An advance guard for a stationary force is defensive in nature. It de-
fends or delays in accordance with the main body commander’s intent. An ad-
vance guard for a moving force is offensive in nature. (See Figure 12-11.) The
advance guard develops the situation so the main body can use its combat
power to the greatest effect. The main body’s combat power must not be dissi-
pated through piecemeal commitment. The full combat power of the main
body must be available immediately to defeat the main enemy force.
3 71
(LOA) PL CORN
(LOA)
PL CORN 53
OBJ WHEAT
72
I
SC 1-103 S
PL MILO PL MILO
I
I I 1-4
B
A 1-4 A 2-13
6 I
PL BARLEY
PL BARLEY
C 1-5
52
54
54MD
81
23AD
X 3 X 1
II
X S CBT
1-4
PL OATS
PL OATS
1-4
II
S 1 16 74
7
X
PL SOYBEANS
PL SOYBEANS 3 23
12-21
FM 3-90
the handoff of a
detected
force from the
enemy
II II II
} BRIGADE COLUMNS
ADVANCE GUARDS
II II
higher-echelon se- II
FLANK GUARD
12-76. A flank guard protects an exposed flank of the main body. A flank
guard is similar to a flank screen except that the commander plans defensive
positions in addition to OPs.
12-22
Security Operations
12-77. The commander of the main body designates the general location of
the flank guard’s positions. Areas of operation assigned to the flank guard
should be sufficiently deep to provide early warning and reaction time. How-
ever, flank guards must remain within supporting range of the main body. To
determine the guard force’s exact initial positions, the flank guard com-
mander considers the front and rear of the flank of the main body, the axis
taken by the main body, the enemy’s capabilities, and the available avenues
of approach.
12-78. The flank guard moves to its initial positions using one of the move-
ment techniques discussed on pages 12-11 to 12-13. On reaching the initial
positions, the flank guard establishes defensive positions in assigned BPs or
within its assigned AO and establishes a screening element forward of these
positions. (See Figure 12-13.) In situations where knowledge about the enemy
is vague, the flank guard maintains a larger reserve than in situations where
the enemy’s actions are more predictable.
ENY ENY
MAIN
FEBA
PL BLUE
PL CAT
PL EAGLE
PL RED
PL BIRD
ENEMY
THREAT
II
I
ENY
I
I
ED
CT
PE NK
EX FLA EAT
S TH
R
EA ENY
I
I
X 3
I
S
XX
I
I
I
I PL CAT
PL RED
PL BIRD
PL BLUE
XX
(BHL)
PL HAWK
12-79. Once the flank guard makes contact with the enemy, it can attack; de-
fend to defeat or fix enemy ground forces in their current positions before
they can engage the main body; or conduct a delay as required by the situa-
tion.
12-80. When conducting a moving flank guard, a commander must address
additional considerations beyond those applying to conducting a moving flank
screen. Instead of occupying a series of OPs, the security force plans a series
of BPs. The tasks associated with a guard mission apply to a moving flank
guard. However, the number and location of echelon-specific avenues of ap-
proach over which the security force maintains continuous surveillance
change as the main body moves. The security force monitors potential enemy
avenues of approach for as long as they threaten the main body.
12-23
FM 3-90
12-81. The lead element of a moving flank guard must accomplish three
tasks. It must maintain contact with the protected force’s main body, recon-
noiter the area between that main body and the flank guard’s routes of ad-
vance, and reconnoiter the flank guard’s route. It accomplishes these tasks by
conducting a zone reconnaissance. The speed of the main body determines
how thoroughly it can carry out the reconnaissance. The exact size of the AO
for any given unit conducting a guard is METT-TC dependent. For example,
on typical central European terrain, an AO wider than 10 kilometers from the
guard line to the boundary of the main body should not be assigned to a com-
pany or troop. An organization of this size quickly finds itself unable to match
the movement of the main body. When the distance from the guard line to the
main body boundary exceeds 10 kilometers, the commander of the flank se-
curity element should use two or more company-size elements abreast. This
ensures that the element making contact with the main body is not over-
tasked and can match the tempo of the main body. An air cavalry troop may
maintain contact with the main body, or a following ground element may per-
form route reconnaissance along the flank guard’s route of advance. Under
these conditions, the lead security element does not reconnoiter BPs or oc-
cupy them unless required when making contact.
12-82. The rest of the flank guard marches along the route of advance and oc-
cupies BPs as necessary. Criteria for the route are the same as in a moving
flank screen. The commander designates company-size BPs parallel to the
axis of the main body. He places these BPs outside the flank guard’s route of
advance and along avenues of approach into the flank guard. The flank guard
occupies OPs along a screen line forward of these BPs.
12-83. Since the flank guard is moving in one direction and orienting on pro-
viding protection to the secured force in another direction, the flank guard
commander plans control measures to facilitate this dual orientation. These
control measures are normally associated with the moving screen, as well as
PLs that run parallel to the direction of movement of the main body. The
commander uses these PLs to control the delay or defense if the enemy at-
tacks from the flank being protected. (See Figure 12-14.) He may also assign
the flank guard an objective that secures the flank for the main body’s objec-
tive or otherwise serves to orient its security efforts.
12-84. The flank guard regulates its movement along the route of advance by
the pace of the main body, the distance to the objective, and the enemy situa-
tion. The three methods of movement are successive bounds, alternate
bounds, or continuous marching. (See Chapter 14.) If the main body stops, the
flank guard occupies blocking positions. As the speed of the main body
changes, the flank guard changes its movement methods. The guard com-
mander must not allow the force to fall behind the main body or present a lu-
crative target by remaining stationary along the route.
12-85. If the flank guard becomes overextended, the guard commander in-
forms the main body commander and recommends one of the following COAs:
· Reinforce the flank guard.
· Reduce the size of the flank guard’s AO.
· Screen a portion of the area and guard the rest.
12-24
Security Operations
PL STEFFAN (LOA)
PL PINK (BHL)
PL RED
PL WHITE
ENY
OBJECTIVE
ENY
FALLON RP 7
3
PL IVAN
I
I
1
S
PL BORRIS
II
I
I
I S
G
5
G
PL PINK (BHL)
PL YURI
G
TE
PL WHITE
XX
AS
9
I
ROU
TEX
G
PL RED
PL MACHIAL/LD
REAR GUARD
12-86. The rear guard protects the exposed rear of the main body. This occurs
during offensive operations when the main body breaks contact with flanking
forces or during a retrograde. The commander may deploy a rear guard be-
hind both moving and stationary main bodies. The rear guard for a moving
force displaces to successive BPs along PLs or delay lines in depth as the
main body moves. The nature of enemy contact determines the exact move-
ment method or combination of methods used in the displacement (successive
bounds, alternate bounds, and continuous marching).
12-87. During a retrograde, the rear guard normally deploys its ground ma-
neuver elements abreast, behind the main body’s forward maneuver units,
generally across the entire AO. After the main body conducts a rearward pas-
sage of lines, the rear guard accepts battle handover and then defends or de-
lays. Alternatively, the rear guard may conduct a relief in place as part of a
deception plan or to take advantage of the best defensive terrain. In both
cases, the rear guard establishes passage points and assists the rearward
passage of the main body, if necessary. The rear guard accomplishes its de-
fensive mission in the same way as any other guard operation after the main
body clears the security area. As the main body moves, the rear guard moves
to subsequent PLs in depth. Contact with the enemy force may eventually be
lost if it does not follow the retrograding friendly force. Fighting a defense or
a delay is necessary if the enemy detects the movement and attacks. (Chap-
ter 11 discusses retrograde operations.)
COVER
12-88. The covering force’s distance forward of the main body depends on the
intentions and instructions of the main body commander, the terrain, the lo-
cation and strength of the enemy, and the rates of march of both the main
12-25
FM 3-90
body and the covering force. The width of the covering force area is the same
as the AO of the main body.
12-89. A covering force is a self-contained force capable of operating
independently of the main body, unlike a screening or guard force. A
covering force, or portions of it, often becomes decisively engaged with enemy
forces. Therefore, the covering force must have substantial combat power to
engage the enemy and accomplish its mission. A covering force develops the
situation earlier than a screen or a guard force. It fights longer and more
often and defeats larger enemy forces.
12-90. While a covering force provides more security than a screen or guard
force, it also requires more resources. Before assigning a cover mission, the
main body commander must ensure that he has sufficient combat power to
resource a covering force and the decisive operation. When the commander
lacks the resources to support both, he must assign his security force a less
resource-intensive security mission, either a screen or a guard.
12-91. A covering force accomplishes all the tasks of screening and guard
forces. A covering force for a stationary force performs a defensive mission,
while a covering force for a moving force generally conducts offensive actions.
A covering force normally operates forward of the main body in the offense or
defense, or to the rear for a retrograde operation. Unusual circumstances
could dictate a flank covering force, but this is normally a screen or guard
mission.
12-26
Security Operations
OFFENSIVE COVER
12-97. An offensive covering force
S S
seizes the initiative early for the main
body commander, allowing him to att-
ack decisively. Figure 12-15 shows an
attacking main body with an advance
} COVERING
FORCE
12-27
FM 3-90
12-28
Security Operations
around the covering force. If the covering force has accomplished its mission,
the main body commander will attack the enemy’s weak point with pre-
viously uncommitted main body forces at the appropriate time.
FLANK COVER
12-105. When the main body commander perceives a significant threat to one
of his flanks, he normally establishes a flank covering force. That force con-
ducts its mission in much the same way as a flank guard performs its mis-
sion. The main differences between the two missions are the scope of opera-
tions and the distance the covering force operates away from the main body.
12-106. Just as in a flank guard, the flank covering force must clear the area
between its route of advance and the main body. It must also maintain con-
tact with an element of the main body specified by the main body
commander. This element is normally part of the advance guard for the flank
unit of the main body.
DEFENSIVE COVER
12-107. A defensive covering force prevents the enemy from attacking at the
time, place, and combat strength of his choosing. (See Figure 12-16.) Defen-
sive cover gains time for the main body, enabling it to deploy, move, or pre-
pare defenses in the MBA. It accomplishes this by disrupting the enemy’s at-
tack, destroying his initiative, and establishing the conditions for decisive op-
erations. The covering force makes the enemy deploy repeatedly to fight
through the covering force and commit his reserve or follow-on forces to sus-
tain momentum.
I
S S
PL BRIAN
PL BRIAN II
II
II
X
II X
X II
X TAC X
II
PL TOM II PL TOM
X
X
(BHL) PL DANIEL
PL DANIEL (BHL)
MAIN
X X
FEBA
FEBA X
12-29
FM 3-90
12-30
Security Operations
AREA SECURITY
12-113. Area security operations may be offensive or defensive in nature.
They focus on the protected force, installation, route, or area. Forces to pro-
tect range from echelon headquarters through artillery and echelon reserves
to the sustaining base. Protected installations can also be part of the sustain-
ing base or they can constitute part of the area’s infrastructure. Areas to se-
cure range from specific points (bridges and defiles) and terrain features
(ridge lines and hills) to large population centers and their adjacent areas.
12-114. Operations in noncontiguous AOs require commanders to emphasize
area security. During offensive and retrograde operations, the speed at which
the main body moves provides some measure of security. Rapidly moving
units in open terrain can rely on technical assets to provide advance warning
of enemy forces. In restrictive terrain, security forces focus on key terrain
such as potential choke points.
12-115. A commander executes rear area and base security as part of an eche-
lon’s sustaining operations responsibilities or as part of stability operations
and support operations. (Rear area and base security and route and convoy
security operations are the subject of Appendix E.) During conventional op-
erations, area security operations are normally economy-of-force measures
designed to ensure the continued conduct of sustaining operations designed to
support the echelon’s decisive and shaping operations. All area security op-
erations take advantage of the local security measures performed by all units
regardless of their location within the AO.
12-116. Since civilians are normally present within the AO, a unit restrains
its use of force when conducting area security operations. However, the com-
mander always remains responsible for protecting his force and considers this
responsibility when establishing his rules of engagement. Restrictions on con-
ducting operations and using force must be clearly explained and understood
12-31
FM 3-90
LOCAL SECURITY
12-118. Local security includes any local measure taken by units against ene-
my actions. It involves avoiding detection by the enemy or deceiving the ene-
my about friendly positions and intentions. It also includes finding any
enemy forces in the immediate vicinity and knowing as much about their
positions and intentions as possible. Local security prevents a unit from being
surprised and is an important part of maintaining the initiative. The require-
ment for maintaining local security is an inherent part of all operations.
Units perform local security when conducting full spectrum operations,
including tactical enabling operations.
12-119. Units use both active and passive measures to provide local security.
Active measures include—
· Using OPs and patrols.
· Establishing specific levels of alert within the unit. The commander ad-
justs those levels based on the factors of METT-TC.
· Establishing stand-to times. The unit SOP should detail the unit’s ac-
tivities during the conduct of stand-to.
12-120. Passive local security measures include using camouflage, movement
control, noise and light discipline, and proper communications procedures. It
also includes employing available ground sensors, night-vision devices, and
daylight sights to maintain surveillance over the area immediately around
the unit.
COMBAT OUTPOSTS
12-121. A combat outpost is a reinforced OP capable of conducting
limited combat operations. (See Figure 12-17.) Using combat outposts is a
technique for employing security forces in restrictive terrain that precludes
mounted security forces from covering the area. They are also used when
smaller OPs are in danger of being overrun by enemy forces infiltrating into
and through the security area. The commander uses a combat outpost when
he wants to extend the depth of his security area, when he wants his forward
12-32
Security Operations
OPs to remain in place until they can observe the enemy’s main body, or
when he anticipates that his forward OPs will be encircled by enemy forces.
Both mounted and dismounted forces can employ combat outposts.
II
II
II
II
II
II
12-122. While the factors of METT-TC determine the size, location, and num-
ber of combat outposts established by a unit, a reinforced platoon typically oc-
cupies a combat outpost. A combat outpost must have sufficient resources to
accomplish its designated missions, but not so much as to seriously deplete
the strength of the main body. It is usually located far enough in front of the
protected force to preclude enemy ground reconnaissance elements from ob-
serving the actions of the protected force.
12-123. The commander organizes a combat outpost to provide an all-around
defense to withstand a superior enemy force. When the enemy has significant
armored capability, a combat outpost may be given more than a standard al-
location of antitank weapons. Forces manning combat outposts can conduct
aggressive patrolling, engage and destroy enemy reconnaissance elements,
and engage the enemy main body prior to their extraction. The commander
should plan to extract his forces from the outpost before the enemy has the
opportunity to overrun them.
12-33
Chapter 13
Reconnaissance Operations
You can never have too much reconnaissance.
General George S. Patton Jr., War As I Knew It, 1947
CONTENTS
Reconnaissance Objective ........................ 13-1 Forms of Reconnaissance ......................... 13-8
Reconnaissance Fundamentals ................ 13-1 Route Reconnaissance .......................... 13-8
Ensure Continuous Reconnaissance ... 13-1 Zone Reconnaissance .......................... 13-10
Do Not Keep Reconnaissance Assets Area Reconnaissance........................... 13-12
in Reserve................................................ 13-2 Reconnaissance in Force..................... 13-13
Orient on the Reconnaissance Planning a Reconnaissance .................... 13-14
Objective.................................................. 13-2 Intelligence, Surveillance, and
Report Information Rapidly and Reconnaissance Plan ........................... 13-15
Accurately................................................ 13-3 Reconnaissance-Pull Versus
Retain Freedom of Maneuver ................ 13-3 Reconnaissance-Push.......................... 13-15
Gain and Maintain Enemy Contact........ 13-3 Reconnaissance Management ............ 13-16
Develop the Situation Rapidly ............... 13-3 Sustainment .......................................... 13-17
Historical Example...................................... 13-4 Executing a Reconnaissance .................. 13-17
Characteristics of Reconnaissance Recuperation and Reconstitution of
Assets ..................................................... 13-5 Reconnaissance Assets ....................... 13-19
13-0
Reconnaissance Operations
RECONNAISSANCE OBJECTIVE
13-2. The commander orients his reconnaissance assets by identifying a re-
connaissance objective within the area of operation (AO). The reconnais-
sance objective is a terrain feature, geographic area, or an enemy
force about which the commander wants to obtain additional infor-
mation. The reconnaissance objective clarifies the intent of the reconnais-
sance effort by specifying the most important result to obtain from the recon-
naissance effort. Every reconnaissance mission must specify a reconnaissance
objective. The commander assigns a reconnaissance objective based on his
priority information requirements (PIR) resulting from the IPB process and
the reconnaissance asset’s capabilities and limitations. The reconnaissance
objective can be information about a specific geographical location, such as
the cross-country trafficability of a specific area, a specific enemy activity to
be confirmed or denied, or a specific enemy unit to be located and tracked.
When the reconnaissance unit does not have enough time to complete all the
tasks associated with a specific form of reconnaissance, it uses the
reconnaissance objective to guide it in setting priorities.
13-3. A commander may need to provide additional detailed instructions be-
yond the reconnaissance objective, such as the specific tasks he wants accom-
plished or the priority of tasks. He does this by issuing additional guidance to
his reconnaissance unit or by specifying these instructions in his tasks to his
subordinate units in the operation order. For example, if, based on all techni-
cal and human intelligence (HUMINT) sources, a division G2 concludes that
the enemy is not in an area and the terrain appears to be trafficable without
obstacles, the division commander may decide he does not need a detailed re-
connaissance effort forward of his unit. He may direct his cavalry squadron to
conduct a zone reconnaissance mission with guidance to move rapidly and re-
port by exception terrain obstacles that will significantly slow the movement
of his subordinate maneuver brigades. Alternatively, when the objective is to
locate an enemy force, the reconnaissance objective would be that force, and
additional guidance would be to conduct only that terrain reconnaissance nec-
essary to find the enemy and develop the situation.
RECONNAISSANCE FUNDAMENTALS
13-4. The seven fundamentals of successful reconnaissance operations are as
follows:
· Ensure continuous reconnaissance.
· Do not keep reconnaissance assets in reserve.
· Orient on the reconnaissance objective.
· Report information rapidly and accurately.
· Retain freedom of maneuver.
· Gain and maintain enemy contact.
· Develop the situation rapidly.
13-1
FM 3-90
13-2
Reconnaissance Operations
13-3
FM 3-90
HISTORICAL EXAMPLE
13-13. Military history contains numerous examples of the importance of re-
connaissance operations. The following historical example illustrates the
major role of reconnaissance operations in ensuring the success of an opera-
tion. This non-US, medieval example illustrates that the study of other
armies and other times has a great deal to contribute in helping the tactician
understand the art and science of tactics.
13-4
Reconnaissance Operations
force at the stone bridge, drawing Bridge constructed during the attack delays
13-5
FM 3-90
13-6
Reconnaissance Operations
13-7
FM 3-90
FORMS OF RECONNAISSANCE
13-22. The four forms of reconnaissance operations are—
· Route reconnaissance.
· Zone reconnaissance.
· Area reconnaissance.
· Reconnaissance in force (RIF).
Table 13-2 shows what types of dedicated reconnaissance units are typically
assigned the missions of conducting the four forms of reconnaissance opera-
tions.
Zone X X X X X
Area X X X X X
Recon in X X X
Force
ROUTE RECONNAISSANCE
13-23. Route reconnaissance is a form of reconnaissance that focuses
along a specific line of communication, such as a road, railway, or
cross-country mobility corridor. It provides new or updated information
on route conditions, such as obstacles and bridge classifications, and enemy
and civilian activity along the route. A route reconnaissance includes not only
the route itself, but also all terrain along the route from which the enemy
could influence the friendly force’s movement. The commander normally as-
signs this mission when he wants to use a specific route for friendly move-
ment.
Organization of Forces
13-24. The commander may assign a route reconnaissance as a separate mis-
sion or as a specified task for a unit conducting a zone or area reconnaissance.
A scout platoon can conduct a route reconnaissance over only one route at a
time. For larger organizations, the number of scout platoons available di-
rectly influences the number of routes that can be covered at one time. Inte-
grating ground, air, and technical assets assures a faster and more complete
route reconnaissance.
13-25. A ground reconnaissance effort is essential if the mission is to conduct
detailed reconnaissance of the route or the mission requires clearing the ene-
my from an AO that includes the route and the terrain around the route. The
13-8
Reconnaissance Operations
Control Measures
13-26. Control measures for a
RP PL ELK
route reconnaissance create an
(LOA)
AO for the unit conducting the
reconnaissance. (See Fig- PL ELK (LOA)
NAI
ure 13-3.) The commander IRENE
+
places lateral boundaries on NC1701
EER
both sides of the route, far 2 PL D
enough out to allow reconnais-
sance of all terrain from which PL DEER
the enemy could dominate the
route. He places a line of de- 4
parture (LD) perpendicular to A/2-6
I
13-9
FM 3-90
places these control measures on terrain features that are identifiable from
both the ground and the air to assist in air-to-ground coordination.
Tasks
13-27. Unless the commander orders otherwise, the unit conducting a route
reconnaissance performs specific tasks within the limits of its capabilities. If
a unit does not have the time or resources to complete all of these tasks, it
must inform the commander assigning the mission. He must then issue fur-
ther guidance on which tasks the unit must complete or the priority of each
task, which is usually clear from the reconnaissance objective. If, after start-
ing the reconnaissance, the unit determines that it cannot complete an
assigned task, such as clearing the enemy or reducing obstacles to create
lanes as required to support the maneuver of the main body along the route,
it must report and await further instructions.
13-28. Route reconnaissance tasks are as follows:
· Find, report, and clear within capabilities all enemy forces that can in-
fluence movement along the route.
· Determine the trafficability of the route; can it support the friendly
force?
· Reconnoiter all terrain that the enemy can use to dominate movement
along the route, such as choke points, ambush sites, and pickup zones,
landing zones, and drop zones.
· Reconnoiter all built-up areas, contaminated areas, and lateral routes
along the route.
· Evaluate and classify all bridges, defiles, overpasses and underpasses,
and culverts along the route.
· Locate any fords, crossing sites, or bypasses for existing and reinforcing
obstacles (including built-up areas) along the route.
· Locate all obstacles and create lanes as specified in execution orders.
· Report the above route information to the headquarters initiating the
route reconnaissance mission, to include providing a sketch map or a
route overlay.
(See FM 3-34.212 and FM 3-20.95 for additional information concerning route
reconnaissance.)
ZONE RECONNAISSANCE
13-29. Zone reconnaissance is a form of reconnaissance that involves
a directed effort to obtain detailed information on all routes, obsta-
cles, terrain, and enemy forces within a zone defined by boundaries.
Obstacles include both existing and reinforcing, as well as areas with NBC
contamination. The commander assigns a zone reconnaissance mission when
he needs additional information on a zone before committing other forces in
the zone. It is appropriate when the enemy situation is vague, existing know-
ledge of the terrain is limited, or combat operations have altered the terrain.
A zone reconnaissance may include several route or area reconnaissance mis-
sions assigned to subordinate units.
13-10
Reconnaissance Operations
Organization of Forces
13-31. Considerations for organizing a zone reconnaissance are the same as
for organizing a route reconnaissance except that several subordinate units,
rather than just one unit, operate abreast during the zone reconnaissance. If
the commander expects significant enemy forces to be found within the zone,
he should provide the force conducting the zone reconnaissance with a re-
serve. This reserve should have adequate combat power to extract elements of
the reconnaissance force from decisive engagement. In an armored cavalry
squadron of an armored cavalry regiment, the tank company normally per-
forms this task. If a unit conducts a zone reconnaissance out of supporting
range of the main body, the commander ordering the zone reconnaissance
provides the reconnaissance unit with adequate fire support assets that can
move with the reconnaissance unit.
TF 3-68 2-13 1
AOs are not necessarily the CAV 1 3
same size. Phase lines and con-
tact points, located where the PL BUFORD
commander determines that it PL BUFORD
13-11
FM 3-90
Tasks
13-33. Unless the commander orders otherwise, a unit conducting a zone re-
connaissance performs the following tasks within the limits of its capabilities.
If a unit does not have the time or resources to complete all of these tasks, it
must inform the commander assigning the mission. He must then issue fur-
ther guidance on which tasks the unit must complete or the priority of tasks,
which is usually clear from the reconnaissance objective. After starting the
reconnaissance, if the unit determines that it cannot complete an assigned
task, such as clear enemy or reduce obstacles in zone to create lanes as re-
quired to support the main body’s maneuver, it must report and await further
instructions.
13-34. Zone reconnaissance tasks are as follows:
· Find and report all enemy forces within the zone.
· Clear all enemy forces in the designated AO within the capability of the
unit conducting reconnaissance.
· Determine the trafficability of all terrain within the zone, including
built-up areas.
· Locate and determine the extent of all contaminated areas in the zone.
· Evaluate and classify all bridges, defiles, overpasses, underpasses, and
culverts in the zone.
· Locate any fords, crossing sites, or bypasses for existing and reinforcing
obstacles (including built-up areas) in the zone.
· Locate all obstacles and create lanes as specified in execution orders.
· Report the above information to the commander directing the zone
reconnaissance, to include providing a sketch map or overlay.
AREA RECONNAISSANCE
13-35. Area reconnaissance is a form of reconnaissance that focuses
on obtaining detailed information about the terrain or enemy activ-
ity within a prescribed area. This area may include a town, a ridgeline,
woods, an airhead, or any other feature critical to operations. The area may
consist of a single point, such as a bridge or an installation. Areas are nor-
mally smaller than zones and are not usually contiguous to other friendly
areas targeted for reconnaissance. Because the area is smaller, an area recon-
naissance moves faster than a zone reconnaissance.
Organization of Forces
13-36. Considerations for the organization of forces for an area reconnais-
sance are the same as for organizing a zone reconnaissance. (See para-
graphs 13-31 to 13-33.)
13-12
Reconnaissance Operations
Control Measures
13-37. The commander assign- 071800Z
14
ing an area reconnaissance PL SALINA JUN04
PL SALINA
specifies the area for reconnais- (LOA)
(LOA)
sance with a single continuous
+
NC 1701
line to enclose the area to re- 070800Z A
connoiter. Alternatively, he JUN04
may designate the area by
marking lateral boundaries, a PL IOLA
PL IOLA
LD, and a LOA. An area recon-
AO LEAVENWORTH
naissance mission always speci-
I
fies the route to take in moving
+
NC 1703
to the area. The commander of
the unit conducting the area
reconnaissance mission can use PL GYPSUM PL GYPSUM
control measures for a zone re-
connaissance within the AO to
control the operation of his sub-
ordinate elements. (See Fig- PL KIPP (LD)
PL KIPP (LD)
ure 13-5.)
Tasks
13-38. The tasks for an area re-
connaissance are also the same
Figure 13-5. Area Reconnaissance
as for a zone reconnaissance.
Control Measures
(See paragraph 13-34.)
RECONNAISSANCE IN FORCE
13-39. A reconnaissance in force is a deliberate combat operation de-
signed to discover or test the enemy’s strength, dispositions, and re-
actions or to obtain other information. Battalion-size task forces or larg-
er organizations usually conduct a reconnaissance in force (RIF) mission. A
commander assigns a RIF mission when the enemy is known to be operating
within an area and the commander cannot obtain adequate intelligence by
any other means. A unit may also conduct a RIF in restrictive-type terrain
where the enemy is likely to ambush smaller reconnaissance forces. A RIF is
an aggressive reconnaissance, conducted as an offensive operation with clear-
ly stated reconnaissance objectives. The overall goal of a RIF is to determine
enemy weaknesses that can be exploited. It differs from other reconnaissance
operations because it is normally conducted only to gain information about
the enemy and not the terrain.
Organization of Forces
13-40. While specifically trained and equipped units usually conduct the
other forms of reconnaissance operations, any maneuver force can conduct a
RIF. The force conducting a RIF is organized as if it is conducting offensive
operations. However, the lack of enemy information dictates that the force be
large and strong enough to develop the situation, protect the force, cause the
enemy to react, and put the enemy at some risk. The less known about the
13-13
FM 3-90
enemy, the stronger the force conducting the RIF must be. Because of the
lack of information about the enemy, a commander normally conducts a RIF
as a movement to contact or a series of frontal attacks across a broad front-
age.
Control Measures
13-41. The control measures for a RIF are the same as for offensive opera-
tions. The operation is conducted as an movement to contact with limited
objectives. (Chapter 4 discusses the conduct of a movement to contact.)
Tasks
13-42. A unit conducting a RIF performs the following tasks within the limits
of its capabilities. If a unit does not have the time or resources to complete all
of these tasks, it must inform the commander assigning the mission. He must
then issue further guidance on which tasks the unit must complete or the
priority of tasks, which is usually clear from the reconnaissance objective.
After starting the RIF, if the unit determines that it cannot complete an as-
signed task, it must report and await further instructions. Reconnaissance in
force tasks are—
· Penetrating the enemy’s security area and determining its size and
depth.
· Determining the location and disposition of enemy main positions.
· Attacking enemy main positions and attempting to cause the enemy to
react by using local reserves or major counterattack forces, employing
fire support assets, adjusting positions, and employing specific weapon
systems.
· Determining weaknesses in the enemy’s dispositions to exploit.
PLANNING A RECONNAISSANCE
13-43. Reconnaissance contributes significantly to a commander’s battlefield
visualization. It supports the overall integrated ISR plan, which in turn sup-
ports the commander’s decision making process.
13-44. The commander must make judicious yet aggressive use of his recon-
naissance assets. Reconnaissance planning ensures that available reconnais-
sance assets produce the greatest results. Because there are never enough
assets to accomplish all tasks, the commander must set priorities. Generating
many unfocused missions rapidly wears down assets, making them ineffec-
tive. Improperly using assets can also leave an enemy vulnerability undis-
covered.
13-45. The commander ensures the coordination and synchronization of his
reconnaissance effort at all echelons. Since the need for reconnaissance cuts
across all parts of the operational framework and core functions, reconnais-
sance operations demand an integrated approach to planning, preparation,
and execution. The two habitual participants in the reconnaissance planning
process are the echelon operations and intelligence staff officers. The echelon
operations staff officer (G3 or S3) has primary staff responsibility for recon-
naissance planning, allocating, and tasking resources. Normally, he has staff
13-14
Reconnaissance Operations
13-15
FM 3-90
RECONNAISSANCE MANAGEMENT
13-51. No single reconnaissance asset can answer every intelligence require-
ment, and there are rarely enough reconnaissance assets to cover every re-
quirement. The echelon staff uses as mix of reconnaissance management
methods, such as cueing, mixing, redundancy, and task organizing, in an at-
tempt to use limited assets most effectively and collect the most critical
information with the fewest assets as quickly as possible,.
13-52. Cueing is the integration of one or more types of reconnais-
sance or surveillance systems to provide information that directs
follow-on collecting of more detailed information by another system.
Cueing helps to focus limited reconnaissance assets, especially limited ground
reconnaissance assets, which can rarely examine every part of a large area
closely. Electronic, thermal, visual, audio, and other technical assets with
wide-area surveillance capabilities, often working from aerial platforms, can
quickly determine areas of enemy concentration or areas where there is no
enemy presence. These assets may cue ground and air reconnaissance assets
to investigate specific areas to confirm and amplify information developed by
technical assets. For example, joint surveillance target attack radar system
(JSTARS) and Guardrail-equipped aircraft can cover large areas and cue
ground reconnaissance or UAVs once an enemy force is identified. The com-
mander may dispatch ground reconnaissance or UAVs to verify the infor-
mation and track the enemy for targeting purposes. Similarly, a ground re-
connaissance asset could cue surveillance assets. The key point is to use
reconnaissance assets based on their capabilities and use the complementary
capabilities of other assets to verify and expand information available.
13-53. Mixing is using two or more different assets to collect against
the same intelligence requirement. Employing a mix of systems not only
increases the probability of collection, but also tends to provide more com-
plete information. For example, a JSTARS aircraft may detect and locate a
moving enemy tactical force, while the G-2 analysis and control element uses
organic and supporting assets to determine its identity, organizational struc-
ture, and indications of future plans. Employing a mix of systems is always
desirable if the situation and available resources permit. Mixing systems can
also help uncover deception attempts by revealing discrepancies in informa-
tion reported by different collectors.
13-54. Redundancy is using two or more like assets to collect against
the same intelligence requirement. Based on the priority of the informa-
tion requirement, the commander must decide which NAI justifies having
more than one asset covering it. When more than one asset covers the same
NAI, a backup is available in the event that one asset cannot reach the NAI
in time, the first asset suffers mechanical failure, or the enemy detects and
engages the first asset. Redundancy also improves the chances that the re-
quired information will be collected.
13-55. To increase the effectiveness and survivability of a reconnaissance
asset, the commander may task organize it by placing additional assets under
13-16
Reconnaissance Operations
SUSTAINMENT
13-56. Sustaining reconnaissance assets before, during, and after their com-
mitment is a vital part of maintaining the commander’s capability to conduct
reconnaissance. Because the way that a commander deploys his reconnais-
sance assets in a given situation depends on the factors of METT-TC, the
methods he employs to sustain those assets are equally situationally depend-
ent. He must address them as part of the planning process for each reconnais-
sance operation.
13-57. Reconnaissance elements frequently operate in locations distant from
their organic sustaining base. In this event, reconnaissance elements must
either carry a large enough basic load or be task organized with those assets
necessary to ensure their sustainment until they can be relieved. With either
COA, casualty evacuation remains a problem. An alternative solution would
be to plan and coordinate their sustainment from units near their operating
locations.
EXECUTING A RECONNAISSANCE
13-58. Reconnaissance can be characterized as either stealthy or aggressive.
Depending on how they are employed, scout helicopters and other aerial plat-
forms, as well as mounted and dismounted ground reconnaissance, can be
characterized as either stealthy or aggressive.
13-59. A key factor in reconnaissance execution is the time available to con-
duct the reconnaissance mission. The commander must recognize that he ac-
cepts increased risk to both the reconnaissance element and the main body
when he accelerates the pace of reconnaissance. This risk can be somewhat
offset by employing air reconnaissance and technical means to cover open ter-
rain or areas of lower threat.
13-60. Aggressive reconnaissance is characterized by the speed and manner
in which the reconnaissance force develops the situation once it makes con-
tact with an enemy force. A unit conducting aggressive reconnaissance uses
both direct- and indirect-fire systems and movement to rapidly develop the
situation. Firepower, aggressive exploitation of actions on contact, operations
security, and training are required for the unit to survive and accomplish its
mission when conducting aggressive reconnaissance. Mounted reconnais-
sance is normally characterized as aggressive.
13-17
FM 3-90
13-18
Reconnaissance Operations
stealthy maneuver to further develop the situation is not possible. The fires
may be either direct, indirect, or a combination. The advantage of indirect fire
is that it does not give away friendly locations and usually causes the enemy
to displace from the impact area. However, reconnaissance by fire may not
cause a seasoned or prepared enemy force to react. Reconnaissance by fire is
always characterized as aggressive.
13-66. Smoke and battlefield obscuration, fog, rain, and snow all result in re-
duced visibility. Generally, reconnaissance during limited-visibility conditions
takes more time. However, these conditions provide for better stealth and en-
hance the survivability of reconnaissance assets. A commander frequently
employs dismounted reconnaissance patrols at night. These patrols use light
amplification and thermal observation devices, electronic surveillance de-
vices, and surveillance radars to compensate for reduced visibility conditions.
13-67. In limited visibility, mounted reconnaissance tends to focus on road
networks. The enemy can detect engine and track movement noises of
friendly mounted reconnaissance elements at considerable distances at night,
which makes them susceptible to ambush. Strict sound and light discipline,
along with masking sounds, such as artillery fires, helps a mounted recon-
naissance force from being compromised or ambushed.
13-68. High winds, extreme temperature, and loose topsoil or sand may ad-
versely affect aerial reconnaissance. Air reconnaissance units plan their mis-
sions in much the same way as ground units. They use the same type of op-
erations graphics and consider the same critical tasks. The air reconnaissance
commander organizes his assets to accomplish his mission by considering the
same IPB aspects as those associated with ground forces. He focuses on air
hazards to navigation and anticipated enemy air defense capabilities. (The
effects or weather and atmosphere conditions are discussed in FM 2-01.3.)
13-19
FM 3-90
13-20
Chapter 14
Troop Movement
Aptitude for war is aptitude for movement.
Napoleon I, Maxims of War, 1831
14-1. Troop movements are made by foot marches, motor transport, rail,
water, air, and various combinations of these methods. The method employed
depends on the situation, the size and composition of the moving unit, the
distance the unit must cover, the urgency of execution, and the condition of
the troops. It also depends on the availability, suitability, and capacity of the
different means of transportation. Troop movements over extended distances
have extensive logistics considerations.
DISMOUNTED MARCHES
14-2. Dismounted marches, also called foot marches, are movements
of troops and equipment, mainly by foot, with limited support by ve-
hicles. They increase the number of maneuver options available to a com-
mander. Their positive characteristics include combat readiness—all soldiers
CONTENTS
Methods of Troop Movement.....................14-1 Approach March ..........................................14-8
Dismounted Marches..............................14-1 Movement Techniques ...............................14-9
Mounted Marches....................................14-2 Traveling ................................................14-10
Army Air Movement ................................14-2 Traveling Overwatch.............................14-10
Administrative Movement ..........................14-3 Bounding Overwatch ............................14-11
Tactical Road March ...................................14-3 Planning a Troop Movement ....................14-12
Organization for a Tactical Road March14-3 Preparing a Troop Movement ..................14-15
Graphic Control Measures .....................14-5 Executing a Troop Movement ..................14-15
Tactical March Techniques ....................14-6 Movement Control.....................................14-16
14-1
FM 3-90
can immediately respond to enemy attack without the need to dismount, ease
of control, adaptability to terrain, and their independence from the existing
road network. Their limitations include slow rate of movement and increased
personnel fatigue—soldiers carrying heavy loads over long distances or large
changes in elevation get tired. A unit conducts a dismounted march when the
situation requires stealth, the distance to travel is short, transport or fuel is
limited, or the situation or terrain precludes using a large number of vehicles.
(FM 3-25.18 has more information on the techniques and procedures for con-
ducting dismounted marches.)
MOUNTED MARCHES
14-3. A unit conducts mounted marches when it employs combat and tactical
vehicles to move all of its personnel and equipment. Armored and mechanized
units routinely conduct mounted marches. The speed of the march and the in-
creased amounts of supplies that can accompany the unit characterize this
march method. Heavy maneuver units are normally self-sufficient to conduct
mounted marches over short distances. Light maneuver units and most com-
bat support (CS) and combat service support (CSS) units are not completely
motorized and need assistance from transportation elements to conduct
mounted marches. Considerations for mounted marches over extended dis-
tances include:
· The ability of the route network to support the numbers, sizes, and
weights of the tactical and combat vehicles assigned to or supporting
the unit making the move.
· Available refueling and maintenance sites and crew-rest areas.
· The need for recovery and evacuation assets.
(FM 4-01.30 discusses considerations for mounted marches.)
14-2
Troop Movement
14-6. In cases of tactical necessity, a unit can accelerate its rate of movement
by conducting a forced march so that it arrives at its destination quickly.
Both heavy and light units can conduct a forced march. Forced marches re-
quire speed, exertion, and an increase in the number of hours marched or
traveled by vehicles each day beyond normal standards. Soldiers cannot sus-
tain forced marches for more than a short period. In a forced march, a unit
may not halt as often nor for as long as recommended for maintenance, rest,
feeding, and fuel. The commander must understand that immediately follow-
ing a long and fast march, his soldiers and combat vehicles experience a
temporary deterioration in their physical condition. The combat effectiveness
and cohesion of his unit also temporarily decreases. His plan must accommo-
date the presence of stragglers and address the increased number of mainte-
nance failures.
ADMINISTRATIVE MOVEMENT
14-7. Administrative movement is a movement in which troops and vehicles
are arranged to expedite their movement and conserve time and energy when
no enemy interference, except by air, is anticipated (JP 1-02). The com-
mander conducts administrative movements only in secure areas. Examples
of administrative movements include rail and highway movement within the
continental United States. Once a unit deploys into a theater of war, admini-
strative movements are the exception, not the norm. Since these types of
moves are nontactical, the echelon logistics officer (the G4 or S4) usually
supervises the moves. (FM 4-01.40 discusses administrative movement and
convoy planning.)
14-3
FM 3-90
M A IN B O D Y
SPT
C
C
T R A IL Q U A R T E R IN G RECON
PARTY PARTY
14-11. A march column provides excellent speed, control, and flexibility, but
sacrifices flank security. It provides the ability to deploy forces to the front of
the column. The commander uses a march column when speed is essential
and enemy contact is unlikely. However, the commander spaces combat sup-
port (CS) elements, such as air defense and engineers, throughout the column
to protect and support the movement. Reconnaissance elements augmented
by engineer, nuclear, biological, and chemical reconnaissance, and other CS
assets, as appropriate, conduct a route reconnaissance of the march routes.
This reconnaissance confirms and supplements the data obtained from map
studies and other headquarters.
14-12. A unit quartering party usually accompanies the reconnaissance effort
to the designated assembly area (AA). Unit standing operating procedures
(SOP) establish the exact composition of the quartering party and its trans-
portation, security, and communications equipment needs, and its specific
duties. The quartering party secures, reconnoiters, and organizes an area for
the main body’s arrival and occupation. It typically reconnoiters and confirms
the tentative locations selected by the commander of its parent element,
based on a map reconnaissance. When necessary, the quartering party chang-
es previously assigned unit locations within the AA. The quartering party
guides the main body into position from the release point (RP) to precise loca-
tions within the AA.
14-13. The main body of the march column consists of the remainder of the
unit, including attachments minus the trail party. The trail party is the last
march unit in a march column and normally consists of primarily mainte-
nance elements in a mounted march. It maintains communications with the
main body. The function of the trail party is to recover disabled vehicles or
control stragglers in a dismounted march. If the trail party cannot repair a
disabled vehicle immediately, it tows the disabled vehicle and moves its crew
14-4
Troop Movement
UMCP 31
141-5. RP 3 The start
point is a
TCP 8 location
TCP 12
on a route
where the
40 50 TCP 13 50 80 marching
A2
A2 elements
25m fall under
ST
20m
the con-
RU
N
O trol of a
IR E
UT
52
TE 23
XX
RO
U TCP 14 AD MD
20 23 O
R
XX
ID AD
SP 7
LL 23 AD
XX
JTF180
AA RAMONA
14-5
FM 3-90
Open Column
14-20. In an open column, the commander increases the distance between ve-
hicles and soldiers to provide greater dispersion. The vehicle distance varies
from 50 to 100 meters, and may be greater if required. The distance between
dismounted soldiers varies from two to five meters to allow for dispersion and
space for marching comfort. Any distance that exceeds five meters between
soldiers increases the length of the column and hinders control. The open col-
umn technique is normally used during daylight. It may also be used at night
14-6
Troop Movement
Close Column
14-21. In a close column, the commander spaces his vehicles about 20 to 25
meters apart. At night, he spaces vehicles so each driver can see the two
lights in the blackout marker of the vehicle ahead. The commander normally
employs a close column for marches during darkness under blackout driving
conditions or for marches in restricted terrain. This method of marching
takes maximum advantage of the traffic capacity of a route but provides little
dispersion. Normally, vehicle density is from 40 to 50 vehicles per kilometer
along the route in a close column.
14-22. The dismounted equivalent to the close column is a limited-visibility
march. The distance between individual soldiers is reduced to one to three
meters to help maintain contact and facilitate control. Limited-visibility
marches are characterized by close formations, difficult command and control
(C2) and reconnaissance, a slow rate of march, and good concealment from
enemy visual observation and air attack.
Infiltration
14-23. The commander dispatches vehicles in small groups, or at irregular in-
tervals, at a rate that keeps the traffic density down and prevents undue
massing of vehicles during a move by infiltration. Infiltration provides the
best possible passive defense against enemy observation and attack. It is suit-
ed for tactical road marches when there is enough time and road space and
when the commander desires the maximum security, deception, and disper-
sion. The disadvantages of an infiltration are that more time is required to
complete the move, column control is nearly impossible, and recovery of
broken-down vehicles by the trail party is more protracted when compared to
vehicle recovery in close and open columns. Additionally, unit integrity is not
restored until the last vehicle arrives at the destination, complicating the
unit’s onward deployment. Infiltration during troop movement should not be
confused with infiltration as a form of maneuver as discussed in Chapter 3.
14-24. During extended road marches, halts are necessary to rest personnel,
service vehicles, and adjust movement schedules as necessary. The march or-
der or unit standing operating procedures (SOP) regulates when to take
halts. In motor movements, the commander schedules short halts for every
two to three hours of movement and may last up to an hour. Long halts occur
on marches that exceed 24 hours and last no more than two hours. Long halts
are not scheduled at night, which allows maximum time for night movement.
During halts, each unit normally clears the march route and moves to a
previously selected AA to prevent route congestion and avoid being a lucra-
tive target. Units establish security and take other measures to protect the
14-7
FM 3-90
force. Unit leaders receive prompt notification of the time and approximate
length of unscheduled halts.
14-25. The commander emphasizes the need to maintain security during
halts. Once a unit stops moving, there is a natural tendency for soldiers to let
their guard down and relax their vigilance. The commander addresses this
problem by explicitly defining unit actions in his SOP for various types of
halts, such as maintenance halts, security halts, and unexpected halts.
APPROACH MARCH
14-26. An approach march is the advance of a combat unit when direct con-
tact with the enemy is intended (FM 3-0). However, it emphasizes speed over
tactical deployment. Both heavy and light forces conduct tactical road march-
es and approach marches.
14-27. The commander employs an approach march when the enemy’s ap-
proximate location is known, since it allows the force to move with greater
speed and less physical security or dispersion. (See Figure 14-6.) Units con-
ducting an approach march are task-organized before the march begins to al-
low them to transition to an on-order or a be-prepared mission without mak-
ing major adjustments in organization. For example, artillery units march
within their supported unit’s columns, while engineer units are well forward
to facilitate mobility. Air defense units may leapfrog short-range and
medium-range assets to ensure continuous coverage. The approach march
terminates in a march objective, such as an attack position, AA, or assault po-
sition, or can be used to transition to an attack. Follow-and-assume and re-
serve forces may also conduct an approach march forward of a LD.
SPT
14-8
Troop Movement
commander should assign the force conducting the decisive operation and
forces conducting each shaping operation separate routes, AOs, or axes of ad-
vance unless an individual unit has the task of either follow-and-assume or
follow-and-support.
14-29. As the approach march nears areas of likely enemy interference, the
commander divides his main body into smaller, less vulnerable columns that
move on additional multiple routes or cross-country while continuing to em-
ploy security elements. The commander takes advantage of successful recon-
naissance and security operations to increase the distance traveled before the
main body must transition to a tactical formation. As discussed in Chap-
ter 12, the advance and any flank guards remain within supporting distance
of the main body, which stays in these smaller columns to facilitate rapid
movement.
14-30. Tactical road marches and approach marches occur within a theater of
war when contact with the enemy is possible or anticipated. This style of
movement emphasizes tactical considerations such as security and de-empha-
sizes efficiency and ease of movement. The commander organizes his unit to
conduct combat operations in a tactical movement. A unit generally main-
tains unit integrity throughout its movement. It plans for enemy interference
either en route to or shortly after arrival at its destination. Units conducting
either a tactical road march or an approach march use formations and tech-
niques consistent with the factors of METT-TC. The unit may conduct them
over unsecured routes if there are no friendly forces between the foremost
elements of the moving force and the enemy. The echelon operations officer
(the G3 or S3) is the primary staff officer responsible for planning these tacti-
cal movements, with input from other staff members.
14-31. There are several differences between an approach march and a tacti-
cal road march. A force conducting an approach march employs larger secur-
ity forces because of its greater exposure to enemy attack. Units conducting
an approach march arrange their systems into combined arms organizations.
An approach march allows the commander to disperse his task-organized
force into a tactical formation in unrestricted terrain without being constrain-
ed to existing roads and trails. On the other hand, road marches can organize
their columns for administrative convenience; for example, vehicles of similar
type, speed, and cross-country capabilities move together. Units conducting
an approach march establish appropriate tactical intervals between vehicles;
they do not normally employ a close column. They also use more routes than
units conducting road marches.
MOVEMENT TECHNIQUES
14-32. The commander uses the combat formations described in Chapter 3 in
conjunction with three movement techniques: traveling, traveling overwatch,
and bounding overwatch. Figure 14-7 on page 14-10 shows when a unit is
most likely to use each technique.
14-33. Movement techniques limit the unit’s exposure to enemy fire and posi-
tion it in a good formation to react to enemy contact. The commander selects
the appropriate movement technique based on the chance of enemy contact.
While moving, individual soldiers and vehicles use the terrain to protect
14-9
FM 3-90
TRAVELING
14-34. The commander uses
the traveling movement tech-
nique when speed is necessary
and contact with enemy forces
is not likely. All elements of the
unit move simultaneously. The
commander or small-unit
leader locates where he can
best control the situation.
Trailing elements may move in
parallel columns to shorten the
column and reaction time. (See
Figure 14-8.)
14-10
Troop Movement
M A N EU V E R ELE M EN T
I
O V E R W A TC H
ELE M EN T
I
O VE R W A T C H U N IT D IS P LA C E S A S N E C ES S A R Y ,
M O V IN G A T A V A R IA B LE S P EE D
BOUNDING OVERWATCH
14-36. The commander uses the bounding overwatch movement technique
when he expects to make contact with enemy forces. There are two variations
of this technique: alternate bounds and successive bounds. In both cases, the
overwatching elements cover the bounding elements from covered, concealed
positions with good observation and fields of fire against possible enemy posi-
tions. They can immediately support the bounding elements with maneuver
or fires alone if the bounding elements make contact. Unless they make con-
tact en route, the bounding elements move via covered and concealed routes
into the next set of support-by-fire positions. The length of the bound is based
on the terrain and the range of overwatching weapons. The commander can
use the uncommitted part of the force whenever he feels it is needed as part
of an immediate and controlled reaction to any threat to the bounding force.
In bounding overwatch, all movement keys on the next support-by-fire posi-
tion, which should offer at least some of the following advantages:
· Cover and concealment.
· Good observation and fields of fire.
· Protection for stationary weapon platforms.
14-37. If the unit uses alternate bounds, the lead element moves forward,
halts, and occupies a support-by-fire position that is covered at all times by
the rear overwatching element. That former rear overwatching element ad-
vances past the former lead element and takes an overwatch position. The
initial lead element then advances past the initial trail element and occupies
a new support-by-fire position. One element moves at a time. This method is
usually more rapid than successive bounds. (See Figure 14-10.)
14-38. If the unit uses successive bounds, the lead element, covered by the
trail element, advances and occupies a support-by-fire position. The trail ele-
ment advances to a support-by-fire position abreast of the lead element and
halts. The lead element moves to the next position and the move continues.
14-11
FM 3-90
Only one element moves at a time, and the trail element avoids advancing be-
yond the lead element. (See Figure 14-11.)
FIRST THIRD
SUPPORT-BY-FIRE SUPPORT-BY-FIRE
POSITION POSTION
SECOND BOUND
SPT
SECOND
REST OF MOVING FORCE SUPPORT-BY-FIRE
POSTION
FIRST THIRD
BOUND BOUND
SECOND FOURTH
BOUND BOUND
BP BP
FIRST THIRD
BOUND BOUND
17 27
14-12
Troop Movement
14-13
FM 3-90
14-45. The simplest troop movement scenario to plan and conduct is one
where the commander directing the movement controls the entire AO. In this
situation, he can use his normal C2 system. The headquarters ordering the
tactical road march schedules the movement times and approves the routes,
while its movements control organization allocates the required space and
time on the approved routes. If the movement results in a unit going outside
its parent headquarters’ AO, coordination through various movement control
centers is required. Otherwise, a higher headquarters must plan and control
the movement.
14-46. Whenever possible, the commander should use multiple routes to
move his unit. This reduces the length of columns, the vulnerability to enemy
air attack, and the amount of time the routes are not available to other units.
Multiple routes provide the commander with the flexibility to react to unex-
pected situations and permit more rapid concentration of combat power. The
two primary disadvantages of using multiple routes are difficulty in exer-
cising C2, and the unit may not have enough resources to provide logistic and
maintenance support on all routes.
14-47. The echelon transportation officer uses route classification compon-
ents, such as route widths, route types, military load classifications, overhead
clearance, route obstructions and special conditions, as he determines his
traffic circulation plan. A supporting engineer terrain detachment provides
his the majority of this information. Engineer reconnaissance obtains neces-
sary information not contained in existing databases. FM 3-34.212 and
FM 3-34.310 defines these components and describes how to use them.
14-48. The staff depicts the echelon traffic circulation plan on overlays using
transportation control measures. The traffic circulation plan takes into ac-
count—
· The most restrictive route features and route designations.
· Direction of movement over each route.
· Location of boundaries, units, highway regulation points, TCPs, and
principal supply points.
· Major geographic features and light lines, if applicable.
· Routes designated for one-way traffic.
· Separate routes for CSS and tactical units.
· Current data on traffic regulation and control restrictions, obstructions,
detours, defiles, capacities, surface conditions, and enemy activities
that affect the highway net.
From information contained in the traffic circulation plan, a traffic control
plan is prepared—usually by the provost marshal—from information con-
tained in the traffic circulation plan. The traffic control plan normally is pre-
pared in the form of an overlay. The commander primarily uses available
aviation, movement regulating teams, and MP units to assist in traffic con-
trol, but can assign this mission to other units, such as battalion scout pla-
toons.
14-14
Troop Movement
14-15
FM 3-90
organic assets and any supporting security assets to protect his forces from
enemy activities. He positions them to the front, rear, and flanks of his forma-
tions while moving and at the halt to provide all-around security for the main
body. He can also enhance security by adopting a march formation and move-
ment technique that facilitate applying combat power in the direction he ex-
pects to make contact with the enemy.
14-55. Higher-echelon CSS organizations may support some tactical move-
ments. When the situation permits, CSS organizations establish mainte-
nance, ambulance exchange, and supply points along the route. While proced-
ures, amounts, and types of external support vary among major commands,
each logistics organization ensures that these sites are operational at the
designated times and locations. External CSS along the route may include
aeromedical evacuation, maintenance, water, and POL. Maintenance sites
generally consist of UMCPs where disabled vehicles can be moved for limited
maintenance and Class IX supplies. Vehicles unable to continue the move-
ment remain at a UMCP and join their parent organization when repaired.
The troop movement is complete when the last march unit clears the RP.
CORPS
OPS CSS
DMC
CSG CSG
RAOC REAR FWD
MCB MMC
- COSCOM
UNITS
COMMAND
- CORPS MCT MRT
COORDINATION ELEMENTS
STAFF SUPERVISION
MOVEMENT CONTROL
14-56. Movement control is the planning, routing, scheduling, and control of
personnel and cargo movements over lines of communications (JP 1-02). It is
a continuum that involves coordinating and integrating logistics, movement
information, and programs that span the strategic, operational, and tactical
levels of war. The balancing of requirements against capabilities and assign-
ing resources based on the commander’s priorities guides the conduct of
movement control. Movement control gives the commander the ability to de-
conflict the movement of units—troop movement—and the distribution of
supplies and services inherent in the provision of CSS. It is not a simple sys-
tem as is shown in Figure 14-12 by the number of different agencies involved
in corps movement control. (FM 4-01.30 discusses movement control.)
14-16
Chapter 15
Relief in Place
… the necessity for conservation of the fighting power of the troops
requires provision for the periodic relief of units in line.
FM 100-5, Field Service Regulations: Operations, 22 May 1941
15-1
FM 3-90
ORGANIZATION OF FORCES
15-3. Both units involved in a relief in place should be of similar type—such
as mounted or dismounted—and task organized to help maintain operations
security (OPSEC). The relieving unit usually assumes as closely as possible
the same task organization as the unit being relieved. It assigns responsibili-
ties and deploys in a configuration similar to the relieved unit.
15-4. The relieving unit establishes advance parties to conduct detailed co-
ordination and preparations for the operation, down to the company level and
possibly to the platoon level. These advance parties infiltrate forward to avoid
detection. They normally include the echelon’s tactical command post, which
co-locates with the main headquarters of the unit being relieved. The com-
mander may also attach additional liaison personnel to subordinate units to
ensure a smooth changeover between subordinate units.
CONTROL MEASURES
15-5. Control measures associated with a relief in place are generally restric-
tive to prevent fratricide. As a minimum, these control measures include the
AO with its associated boundaries, battle positions, contact points, start
points, routes, release points, assembly areas (AAs), fire support coordinating
measures, and defensive fire coordination measures, such as target reference
points and engagement areas. (See Figure 15-1.) Expanded discussions of all
these control measures appear elsewhere in this manual. A commander may
use any control measure he feels is necessary to conduct a relief in place.
15-2
Relief in Place
6 11 I
RP 15 RP 3
9 I I
I
I SP
17 X SP 14
II
I
1
5
TAC SP 10
SP 16
II
II RP 8
RP 7 X
X 1 RP 2
SP 13 RESERVE X
TAC
X
X 174
RP 1 SP 12
TOC
RELIEVED FORCE
RELIEVING FORCE
15-8. The relief is a tactically vulnerable operation. The units involved must
concentrate on security while preparing for and executing the operation. The
intent of the operation is to complete the relief without discovery by the ene-
my. Consequently, commanders typically plan reliefs for execution during
periods of reduced visibility, such as night or fog. Concealment of the relief
from the enemy is a primary concern when the unit is conducting the relief as
part of an economy of force measure to free forces for other operations. The
enemy should perceive only one unit’s command structure in operation—that
of the unit being relieved—until completing the operation. This requires a de-
tailed knowledge of friendly vulnerabilities. A counterintelligence assessment
of enemy collective capabilities directed against the friendly forces involved in
the relief can provide that detailed knowledge.
15-9. Generally, as soon as the mutual higher headquarters issues the warn-
ing order, the commander of the relieving unit co-locates one of his command
posts with the command post of the unit being relieved. As a minimum, he es-
tablishes communications and liaison with that unit. The warning order des-
ignates the time of relief, relieving and relieved units, and sequence of events.
It specifies the future missions of the relieved force, route priorities, any re-
strictions on advance parties, any extraordinary security measures, and the
time and place for issuing the complete order.
15-3
FM 3-90
15-10. During a relief, commanders and leaders from the relieving unit
should conduct reconnaissance of the area for which they will assume respon-
sibility. This leaders’ reconnaissance should include the lowest-echelon leader
allowed by the tactical situation. The reconnaissance should focus on the
route into the position the unit is to occupy, the positions themselves, the cur-
rent disposition of the unit being relieved, and any obstacles that could affect
troop movement.
15-11. The two commanders must decide on a time or an event that initiates
the passage of command. This allows the smooth transition of command and
control from one commander to another. Normally, this occurs when the
frontline subordinate commanders have assumed responsibility for their re-
spective AOs and the incoming commander has sufficient communication fa-
cilities in operation to control the operation. Regardless of their parent organ-
ization, all units in the AO come under the operational control of the AO com-
mander if the AO comes under attack or when a specified event occurs during
the relief.
15-12. The fire support coordinators coordinate fire support coordinating
measures and identify those artillery and other fire support units that are
available to support the relief. The relieving unit adopts the fire plan of the
unit being relieved. The fire support assets of both units support the relief.
This is critical if the enemy detects the relief and tries to exploit the situation.
Units plan their fires to deceive the enemy and expedite the relief. Units
should maintain normal activity patterns. For example, a unit should con-
tinue to expend the same average number of artillery rounds per day during
the relief that it expended prior to the initiation of the relief. The commander
should not relieve fire support and other CS and CSS units at the same time
as the maneuver units they support. The commander relieves these organiza-
tions at other times.
15-13. The relief plan must specify the method to use in relieving artillery
units. If terrain allows, relieving artillery units should not occupy previously
used firing positions. Instead, relieving firing units should establish firing po-
sitions nearby those firing positions of the relieved unit and carefully inte-
grate their fire with that of the relieved unit. Occupying firing positions at
night or during periods of poor visibility enhances OPSEC.
15-14. Priority of the air defense effort is to protect identified choke points,
battle positions, routes to conduct the operation, and AAs. The air defense as-
sets of both units support the relief. The air defense unit supporting the re-
lieving force coordinates with the replaced force’s supporting air defense unit.
This coordination covers, but is not limited to, air intelligence preparation of
the battlefield, rules of engagement, current air activity, present fire unit po-
sitions, Army airspace command and control information, the operation plan,
logistics, and communications. Higher-echelon and joint air defense organiza-
tions may also support the relief. Provisions to obtain local air superiority re-
duce the vulnerability of the forces during the relief in place when the units
involved cannot avoid congestion on the ground.
15-15. The relieving unit verifies the obstacle records of the unit being re-
lieved. Handover of obstacles is a complex procedure. Initially, the engineer
priority is on mobility to get the relieving unit into the AO. It focuses on those
15-4
Relief in Place
routes and lanes leading into the AO. Once the relief occurs, priority of the
mobility and survivability effort transitions to support the relieving unit’s
continuing mission. The commander may require his engineers to assist with
survivability tasks to support the relieving force.
15-16. Force-intermingling inherent in a relief, places an increased burden on
command and control systems. The consequences of mutual interference be-
tween the units and the complexity associated with such areas as traffic con-
trol, fire support coordination, obstacle plans, and communications require
close coordination between all headquarters involved. Establishing early liai-
son between the stationary and the relieving forces is critical.
15-17. The relieving unit is responsible for all sustaining operations. As the
support elements of the unit being relieved displace, they leave the relieving
unit supply stocks according to previously coordinated arrangements. If the
units conducting the relief have different modified tables of organization and
equipment (MTOEs), mission analysis must be conducted to determine how
the relieving unit will meet all of its responsibilities and what weapon sys-
tems will be used. The unit logistics staff must determine any special support
requirements the relieving unit will have and address supporting those re-
quirements with the available supporting organizations. The unit logistics
staff ensures that both commanders know of any CSS constraints that might
affect the relieving unit. The two units’ rear command posts also co-locate and
a single headquarters coordinates traffic movement into and out of the AO.
15-5
FM 3-90
15-6
Relief in Place
control of the relieving unit commander at the time or triggering event pre-
viously established by the plan for the operation.
15-27. As the first relieving element arrives from the AA to assume the posi-
tion, it establishes a screen of the relieved unit’s positions as the tactical sit-
uation permits. The remainder of the relieving unit moves forward to posi-
tions behind the unit being relieved. The relieving unit may use the relieved
unit’s alternate and supplementary defensive positions to take advantage of
any previous defensive preparations. At the previously established time or
event, passage of command takes place. At that point, if possible, the com-
mander of the relieving unit informs all units involved in the relief of the pas-
sage of command.
15-28. The relieved unit continues to defend. The relieving unit’s advance
parties coordinate procedures for the rearward passage of the relieved unit.
On order, the relieved unit begins withdrawing through the relieving unit
and moves to AAs. Crew-served weapons are usually the last elements re-
lieved after exchanging range cards. The relieving unit replaces them on a
one-for-one basis to the maximum extent possible to maintain the illusion of
routine activity. The relieved unit’s CS and logistics assets assist both the re-
lieved unit and the relieving unit during this period.
15-29. A relief does not normally require artillery units to relieve weapon sys-
tem for weapon system unless the terrain limits the number of firing posi-
tions available. Generally, the relieved unit’s artillery and other fire support
assets remain in place until all other relieved elements displace and are
available to reinforce the fires of the relieving unit in case the enemy tries to
interfere. If the purpose of the relief is to continue the attack, the artillery of
both forces generally remains in place to support the subsequent operation.
15-30. Multiple main supply routes that allow only one-way traffic can simp-
lify the forward and rearward movement of both units. The relieving unit’s
rear command post controls both units’ military police and any other traffic
management assets. (The main command post performs these functions if the
echelon does not have a rear command post.) The commander uses these as-
sets to help control unit and convoy movement on lines of communications,
main supply routes, and movement routes throughout his AO.
15-31. In the future, it is likely that conflicts will involve the relief of an
allied or coalition force. The commander should consider the following addi-
tional points when such reliefs occur:
· Dissimilar unit organizations may require special adjustments in as-
signed areas.
· Control of fire support may require special liaison.
· Language difficulties may require an increased use of guides and trans-
lators.
· Using relieved unit communications requires special signal arrange-
ments and additional operators.
· Ammunition and equipment incompatibility may make exchanging as-
sets more difficult.
· Impact of civilians on the operations.
15-7
Chapter 16
Passage of Lines
The principal task involved in a passage of lines is the preparation for
continuing the attack.
FM 1005, Field Service Regulations: Operations, 22 May 1941
16-1. The commander’s reasons for conducting a passage of lines are to—
· Sustain the tempo of an offensive operation.
· Maintain the viability of the defense by transferring responsibility from
one unit to another.
· Transition from a delay or security operation by one force to a defense.
· Free a unit for another mission or task.
The headquarters directing the passage of lines is responsible for determining
when the passage starts and finishes.
16-2. A passage of lines occurs under two basic conditions. A forward pas-
sage of lines occurs when a unit passes through another unit’s posi-
tions while moving toward the enemy. A rearward passage of lines
occurs when a unit passes through another unit’s positions while
CONTENTS
Organization of Forces............................... 16-1 Executing a Forward Passage ............... 16-7
Control Measures ....................................... 16-1 Rearward Passage of Lines ....................... 16-8
Planning a Passage of Lines ..................... 16-3 Planning a Rearward Passage............... 16-8
Forward Passage of Lines ......................... 16-6 Preparing a Rearward Passage ............. 16-9
Preparing a Forward Passage ............... 16-6 Executing a Rearward Passage............. 16-9
16-0
Passage of Lines
moving away from the enemy. Ideally, a passage of lines does not inter-
fere with conducting the stationary unit’s operations.
ORGANIZATION OF FORCES
16-3. A unit may participate in a passage of lines as either the passing or sta-
tionary force. Except for co-locating command posts and providing for guides
by the stationary force, conducting a passage of lines does not require a spec-
ial task organization. Both the passing force and the stationary force main-
tain their previous combat organization during the passage. Usually, if the
stationary unit has the capability, it is responsible for conducting operations
against uncommitted enemy forces. However, operations directed against un-
committed enemy forces may be the responsibility of a higher echelon, de-
pending on the echelon at which the passage takes place.
16-4. A forward passing unit’s order of march is generally reconnaissance
and security elements first. The ground combat force move next, followed by
combat support (CS) and combat service support (CSS) units. The commander
integrates his artillery, air defense, and engineers into the order of march in
accordance with the factors of METTTC. The passing unit reverses this order
of march in a rearward passage of lines. The stationary unit normally pro-
vides the moving unit with guides to expedite the passage. Attack helicopters
and air cavalry are useful in providing security.
CONTROL MEASURES
16-5. Control measures associated with a passage of lines are generally re-
strictive to prevent fratricide. As a minimum, they include the AO, assembly
areas (AAs), attack positions, battle handover line (BHL), contact points, pas-
sage points, passage lanes, routes, gaps, phase lines, and recognition signals.
The headquarters directing the passage designates or recommends contact
points, passage lanes, AAs, routes, and start and end times for the passage.
The commander may also use start points, release points, fire support coordi-
nating measures, such as coordinated fire lines (CFLs), and other control
measures as necessary to conduct this task. (See Figure 16-1, page 16-2.)
Unless the higher headquarters of the two units establishes the necessary
graphic control measures, the stationary unit establishes them for the pas-
sage. However, the stationary unit commander must coordinate them with
the passing unit commander. The stationary unit establishes these measures
because it owns the terrain, it knows where the obstacles are, and it knows
the tactical plan. If the control measures dictated by the higher headquarters
are not sufficient—because they do not contain enough passage points, lanes,
and so forth—the two units can agree to add the necessary measures.
16-6. A passage point is a specifically designated place where the
passing units pass through the stationary unit. The location of this
point is where the commander wants subordinate units to physically execute
a passage of lines. In a forward passage of lines, the passage point marks the
location where the passing unit is no longer bound by the restrictions placed
on it by the stationary force. On the other hand, in a rearward passage of
lines, the passage point marks the location where the stationary unit can re-
strict the movement and maneuver of the passing force. Between the contact
16-1
FM 3-90
ENY ENY
PL DANIEL/ PL DANIEL/
PP 14 PP 91
BHL PP 62 PP 34 BHL
PL FULTON PL FULTON
I I I 2
X I
II
II
ATK ATK I
1 4
5 I ATK ATK
PL COLLEEN RP 7 PL COLLEEN
II II
RP 17
ROUTE BLUE
ROUTE
GOLD
SP 45 SP 11
AA
SCOTT
PL JONES PL JONES
X
Figure 16-1. Control Measures Associated with a Forward Passage of Lines
16-2
Passage of Lines
16-3
FM 3-90
16-4
Passage of Lines
procedures among pilots and air defense fire units is critical, especially dur-
ing periods of limited visibility. Local air superiority also reduces the vulnera-
bility of the two forces when congestion cannot be avoided on the ground.
16-15. Once a passage of lines begins, it occurs quickly. Where possible, the
operation takes place when the enemy has the least capability to detect it,
such as at night or during periods of reduced visibility. In any passage of
lines, the commander considers using smoke to screen friendly movement,
even at night.
16-16. The passing unit prefers to conduct the passage through a gap in the
stationary unit’s positions rather than through a lane or a route that tra-
verses those positions. This reduces the vulnerability that results from con-
centrating forces when one unit passes directly through the occupied posi-
tions of another unit. It also avoids the danger of concentrating the passing
unit into passage lanes.
16-17. In a forward passage of lines, when there are no gaps through the sta-
tionary unit’s positions, each battalion task force normally needs at least two
passage lanes. In a rearward passage of lines, each battalion needs at least
one passage lane. In both cases, a brigade needs at least one additional lane
for its tactical vehicles. The routes and lanes provide cover, concealment, and
rapid movement of the passing force. The commander may designate alterna-
tive routes and lanes for elements of the moving force that are contaminated.
They should not disrupt the combat capability of the stationary unit. The
commander seeks additional lanes to speed the process if the terrain and ene-
my situation allow.
16-18. The passing unit normally has priority of route use to and within the
stationary unit’s AO. Clearing and maintaining passage routes up to the BHL
are the responsibility of the stationary force. The stationary force must pro-
vide an obstacle overlay of its obstacles. The passing unit must be prepared to
help maintain these routes, and it positions its engineer equipment accord-
ingly. The stationary unit is responsible for traffic control within its AO until
the passing unit assumes control. During the passage, the passing unit aug-
ments the traffic-control capability of the stationary unit as required.
16-19. Based on the commander’s concept and intent, the passing force focus-
es its planning effort on two general areas: coordination with the stationary
force and guidance to subordinate units conducting the passage. These plan-
ning efforts occur simultaneously. If the enemy attacks during the passage,
the plan probably requires modification to prevent hampering friendly ma-
neuver.
16-20. Executing a passage of lines successfully requires effective communi-
cation between the two units. The commanders build redundancy of com-
munication signals and means into their passage plans, such as using mobile
subscriber equipment and combat net radios. The commanders also designate
contact points to ensure effective communication between the two forces at
the lowest tactical level.
16-5
FM 3-90
54
II
PP
II
RP 21
II
PP 1 PP 17 PP 91 PP 23 PP 4 BHL
BHL II II
II ATK PSN AT ATK PSN KP
SN KP
SN
AT LEE
AT YLA KY
ATK PSN PETER JO K P S KATELYN KA
ATK PSN SE N
II
OLIVIA PH
LANE 4
IRENE
LANE 14
LD
LANE 1
II
LANE 39
E GO
17
I
RP 11
LANE 32
NE
RP 5
LA
II
I T
ROU
II
NKEL
E2
RP 9 CP 22
LAN
CP 97 CP 117
S
SCHRA
PP
CP 51
CA
II II II
DAVIS
RTE
E
SP 92
E
RT
CP 53
ROUT
BSA CP 111
AA CP 24
HAWK
16-6
Passage of Lines
16-7
FM 3-90
16-29. The stationary unit furnishes the passing unit with any previously co-
ordinated or emergency logistics assistance within its capabilities. These typi-
cally include—
· Evacuating casualties and enemy prisoners of war.
· Controlling dislocated civilians.
· Using areas and facilities such as water points and medical facilities.
· Controlling routes and traffic management.
· Recovering disabled vehicles and equipment.
The passing force normally assumes full responsibility for its CSS support
forward of the BHL.
16-30. When dissimilar units, such as light infantry and mounted forces, are
involved in a passage of lines, the principles involved are the same; however,
the execution is different. For example, the type and amount of support pro-
vided by the stationary unit will change. In some cases, the higher head-
quarters ordering the passage needs to provide assets to support the passage.
16-8
Passage of Lines
forward of the BHL after twothirds of the passing force’s combat elements
move through the passage points.
16-34. After receiving the warning order, the passing unit begins coordina-
tion and establishes communication with the stationary unit. The command-
ers of these units coordinate the same details as those outlined for a forward
passage of lines. For example, the stationary commander coordinates for fires
to support the rearward passing force. The two staffs coordinate those control
measures necessary to support retrograde operations and their associated
rearward passage of lines. (See paragraphs 16-5 to 16-8.) The commanders es-
tablish a probable time to initiate passage. The stationary commander
assigns responsibility for closing and executing obstacles.
16-35. The stationary unit identifies multiple routes through its AO and
across its rear boundary to AAs. The passing unit begins reconnaissance of
these routes as soon as possible. The stationary unit must physically show all
obstacles and routes and gaps through them to the passing unit. It provides
guides for the passing unit—especially through obstacles—and mans contact
points and passage points. The passing unit begins to reconnoiter its routes to
the established contact points with the stationary unit’s troops. The station-
ary unit establishes a security area in which responsibility transitions from
the moving force to the stationary force. Normally, a BHL designates the for-
ward edge of this area. The BHL is within direct-fire range and observed
indirect-fire range of the stationary force.
16-9
FM 3-90
17 4 54
II
PP
II
PP PP 23 PP
1
II
54 SP 21
PP 1 23
91 4
17 BHL
BHL II II
II PP 91
LA
II
II
NE
LANE 4
LANE 14
OLD
1
LANE 39
LA N E
17
I
I
SP 11
TE G
LANE 32
SP 5
I II
ROU
II
RED
SP 9 CP 22
CP 117
ROUTE
N
CP 97
EE
CP 51
GR
II II II
BLUE
RTE
E
RP 92
RT
CP 53
BSA CP 111
AA CP 24
HAWK
16-38. The stationary unit provides the passing unit with as much assistance
as possible. Pivotal to the success of the rearward passage of lines is pro-
viding indirect and direct fire support by the stationary unit to the passing
unit. This is especially important in covering the withdrawal of elements left
in contact during a delay. The stationary unit’s fire support assets answer
calls for fire from the passing unit until battle handover occurs. The passing
unit’s fire support assets echelon rearward to provide continuous fire support
for the passing unit until it successfully disengages. Once the passing unit
hands over control of the battle to the stationary unit, the stationary unit ini-
tiates and clears calls for all fires forward of its location. The same procedure
applies to the dedicated air defense assets of the passing and stationary units.
16-39. The stationary unit’s engineer assets provide support to prepare the
defense and execute the passage. Priority of effort initially ensures that the
passing unit is able to move through passage lanes around the stationary
unit’s defensive positions. It shifts to close these passage lanes once the pass-
ing unit and any security elements disengage and withdraw through the se-
curity area and obstacles.
16-40. The stationary unit provides the passing unit with the previously co-
ordinated CSS as far forward as possible. The stationary unit concentrates on
providing the passing unit with emergency medical, recovery, and fuel sup-
plies to enable the passing unit to rapidly move through the stationary unit’s
positions.
16-10
Appendix A
The Army consists of the active component, reserve components, and ci-
vilians acting in concert with other US services and allies. Its flexibility,
versatility, and adaptability are based on a broad range of branch capa-
bilities and echelons that can be rapidly tailored for deployment and
task-organized for the prevailing conditions of METT-TC. The Army
groups its force structure into three general categories: combat, combat
support (CS), and combat service support (CSS). Each category incorpo-
rates diverse capabilities of varying degrees of lethality, deployability,
sustainability, and survivability. There are more than 400 types of Army
units. Each category complements and reinforces the others and the joint
force. Appropriate combinations provide a balanced and versatile force
mix, maximizing the commander’s freedom of action in virtually any
METT-TC condition.
CONTENTS
Combat Arms ................................................A-2 Combat Service Support ........................... A-11
Air Defense Artillery..................................A-3 Adjutant General Corps......................... A-12
Armor .........................................................A-4 Aviation ................................................... A-12
Aviation ......................................................A-4 Chaplain Corps....................................... A-13
Engineers...................................................A-5 Finance Corps ........................................ A-13
Field Artillery .............................................A-5 Engineers................................................ A-13
Infantry.......................................................A-6 Medical Corps ........................................ A-13
Special Operations Forces.......................A-7 Ordnance Corps ..................................... A-14
Combat Support............................................A-8 Quartermaster Corps ............................. A-14
Aviation ......................................................A-8 Transportation Corps ............................ A-15
Chemical Corps.........................................A-8 Tactical Echelons....................................... A-15
Engineers...................................................A-9 Companies, Batteries, and Troops....... A-16
Military Intelligence...................................A-9 Battalions and Squadrons .................... A-17
Military Police Corps ................................A-9 Brigades, Regiments, and Groups ....... A-18
Signal Corps............................................A-10 Division ................................................... A-19
Special Operations Forces.....................A-10 Corps....................................................... A-20
A-1
FM 3-90
COMBAT ARMS
A-2. Combat arms are units and soldiers who close with and destroy
enemy forces or provide firepower and destructive capabilities on
the battlefield. Combat branches of the US Army include Air Defense Artill-
ery, Armor, Aviation, Engineers, Field Artillery, Infantry, and Special Forces
(SOF). Figure A-1 lists some types of units that deploy to support operations.
The Army classifies combat arms units as heavy, light, or special operations
forces. However, the Army is currently developing a medium weight force
capable of increased strategic responsiveness in full spectrum operations.
A-2
Army Branches and Tactical Echelons
airborne, and air assault forces. Light forces are particularly suited to opera-
tions in restricted and urban terrain, where they have a mobility advantage
over heavy forces. Light forces are limited by a relative lack of protection
against direct and indirect fires and limited firepower compared with heavy
forces. They also have limited organic tactical mobility once deployed into an
area of operations (AO) compared to heavy forces. While light forces may be
lifted into engagement areas (EAs) by truck, helicopter, or airplane, they
fight mainly on foot. Depending on the factors of METT-TC, light forces either
complement or are complemented by heavy forces.
A-5. Special operations are actions conducted by specially organized, trained,
and equipped military forces to achieve military, diplomatic, economic, or
psychological objectives by unconventional means. Special operations forces
can reinforce, augment, and complement conventional forces, heightening the
effectiveness of the total effort. These forces can also conduct independent op-
erations in situations that demand a small, discrete, highly trained force. The
principal SOF missions are—
· Unconventional warfare.
· Foreign internal defense.
· Psychological operations. (See Paragraph A-37.)
· Civil affairs. (See Paragraph A-36.)
· Information operations.
· Direct action.
· Special reconnaissance.
· Combating terrorism.
· Counterproliferation.
Five types of units compose Army SOF. Army special operations aviation
(SOA), rangers, and special forces (SF) units are combat arms forces. Civil af-
fairs (CA) and psychological operations (PSYOP) units are CS organizations.
FM 3-05 is the capstone manual for Army SOF.
A-6. The Army is currently fielding two initial brigade combat teams (IBCTs)
as the prototypes of a medium weight force designed for increased strategic
responsiveness across all types of military operations. After experimentation,
these two IBCTs will transform into an interim, strategically responsive
force, which may expand to encompass almost a third of the regular Army’s
ground maneuver brigades. The desired end state of the objective force is an
operational force strategically responsive through increased deployability and
greatly reduced sustainability requirements when compared with current
heavy forces. The goal for the objective force is to deploy a brigade anywhere
in the world and close within 96 hours, given sufficient ports and strategic
lift. The objective force will also retain or increase the tactical agility, lethal-
ity, and survivability of current heavy forces and the versatility of current
light forces. Developing the objective force’s combat and tactical vehicles re-
quires scientific and technological breakthroughs.
A-3
FM 3-90
maneuver forces and vital assets. Divisional ADA units provide short-range
air defense (SHORAD) protection for units conducting tactical combat opera-
tions. Corps ADA brigades have both SHORAD and high-to-medium altitude
air defense (HIMAD) missile defense units to protect corps assets and rein-
force divisional ADA units.
A-8. Air defense artillery units contribute to intelligence and information op-
erations by gathering and disseminating information about the enemy air or-
der of battle. They also contribute by denying the enemy the ability to operate
his own reconnaissance and command and control (C2) aircraft. (FM 3-01 is
the capstone ADA manual. FM 3-01.12 discusses Army theater missile de-
fense.)
ARMOR
A-9. The tank is the primary offensive ground weapon in mounted warfare.
Its firepower, protection from enemy fire, and speed create the shock effect
necessary to disrupt or defeat the enemy. Tanks can destroy enemy armored
vehicles, infantry, and antitank guided missile carriers. Tanks can break
through suppressed defenses, exploit the success of an attack by striking deep
into the enemy’s rear area, and pursue defeated enemy forces. Armored units
can also blunt enemy attacks and launch counterattacks as part of a defense.
A-10. The primary missions of cavalry units are reconnaissance and security.
A cavalry unit’s ability to find the enemy, develop the situation, and provide
the commander with reaction time and security also makes it ideal for op-
erating in an economy-of-force role. Cavalry forces can delay an attacking
enemy and assist in a withdrawal. (There is no capstone manual for armor
operations. Doctrine on heavy combined arms echelons is found in
FMs 3-91.1, 3-91.2, 3-91.3, and 3-93. FM 3-20.95 addresses cavalry
operations.)
AVIATION
A-11. The firepower, agility, and speed of Army aviation permit ground com-
manders to close with and defeat a wide range of enemy forces. Attack heli-
copters are ideally suited for rapid reaction during decisive, shaping, and sus-
taining operations where the terrain restricts or prohibits ground force occu-
pation. Attack helicopters can influence the battle when ground forces are de-
cisively engaged. The tactical mobility provided to airborne, air assault, and
light infantry by assault aviation is limited by weather and lift asset availa-
bility.
A-12. Air cavalry platoons and troops can reconnoiter and maintain surveil-
lance coverage over a much larger area in a shorter period of time than
ground platoons and troops, but with less detail on ground features. During
security operations, air cavalry reconnoiters, screens forward and to the
flanks of ground forces, and acts as a rapid-reaction force. Scout helicopters
provide a wide range of reconnaissance and security capabilities. Air cavalry
scouts are essential in detecting and identifying enemy forces throughout the
battlefield—an important source of real-time battlefield information. On-
board radars and digital communications are key to the rapid dissemination
A-4
Army Branches and Tactical Echelons
of combat information that these systems obtain. (FM 3-04.100 is the cap-
stone manual for aviation doctrine.)
ENGINEERS
A-13. The commander task organizes combat engineer units with maneuver
units and integrates them into a combined arms formation. The engineer unit
provides demolition and breaching capabilities to the combined arms team.
The engineer unit also can employ direct-fire weapon systems to aid in em-
ploying demolition and breaching assets. These breaching assets include as-
sault bridges, rafts, and mechanized breaching systems. Regardless of the
mission, armored engineer vehicles are combat vehicles and provide a signifi-
cant contribution to the combat power of the entire formation. To accomplish
the mission, engineers fire and move under the direction of the formation
commander, as necessary, using engineer skills where appropriate. (FM 3-34
is the capstone engineer manual.)
A-14. When involved in an assault, engineers fight dismounted on the objec-
tive, focusing on breaching enemy close-in protective obstacles, as well as
demolishing fighting positions and dug-in vehicles. Demolition charges pro-
duce significant shock and concussion effects on defenders, as well as destroy-
ing critical positions, munitions, and combat vehicles.
A-15. Combat engineers employed on reserve demolition targets in the de-
fense mainly execute the technical procedures necessary to ensure target de-
struction. However, the engineer demolition party responds to enemy contact.
They assist the demolition guard in securing the target by holding it open or
gaining time to ensure that it is destroyed. The engineer force may assist in
target defense by installing command-detonated mines to support the de-
fensive scheme.
A-16. Combat-engineer units have a secondary mission to fight as infantry.
While engineers fight continually as engineers, employing them as infantry
requires serious considerations. Engineers employed as infantry require aug-
mentation, including crew-served weapons and medical support. Any com-
mander who owns engineers in a command relationship has the authority to
employ them as infantry unless otherwise prohibited. A commander must
carefully weigh the gain in infantry strength against the loss of engineer sup-
port. Engineers provide far more combat power in their primary mission than
when configured as infantry. Stopping the engineer work may reduce the
combat power of the commander’s entire force. Because of the long-term im-
pact, a commander notifies the next higher headquarters when he employs
his engineers as infantry.
FIELD ARTILLERY
A-17. Field artillery (FA) is the commander’s principal means for providing
indirect-fire support to his maneuver forces. Self-propelled or towed FA units
contain cannon or multiple rocket launchers. Field artillery can neutralize,
suppress, or destroy enemy direct-fire forces, attack enemy artillery and mor-
tars, and deliver scatterable mines to isolate and interdict enemy forces or
protect friendly operations. The commander may use artillery fires to cover
key terrain, flanks, obstacles, and dead space to reduce his risk when
A-5
FM 3-90
maneuver forces are not available. Field artillery elements within maneuver
organizations serve as the integrating center for all fire support elements.
Field artillery units contribute both to attacking the enemy throughout the
depth of his formations and suppressing enemy air defense systems to
facilitate ground and air operations. Artillery fires can provide simultaneous
precision strikes of targets at long ranges that other means cannot attack
without significant risk. As mobile as the maneuver force it supports, FA
systems provide continuous fires in support of the commander’s scheme of
maneuver. (FM 3-09 is the capstone FA manual.)
INFANTRY
A-18. There are many different types of infantry units, such as airborne, air
assault, light, long-range reconnaissance, mechanized, and ranger. Each dif-
ferent type of infantry unit has its own unique skills and organizational de-
sign, but all share the common mission: “To close with and destroy the enemy
by means of close combat, fire, and movement.” Regardless of their mode of
conveyance to the battlefield—aircraft, tracked or wheeled armored fighting
vehicle, truck, or foot—they all serve as a key source of combat power in close
combat. (There is not a capstone infantry manual. Echelon and unit specific
manuals, such as FMs 3-21.7, 3-21.8, 3-21.10, 3-21.20, and 3-21.30, describe
infantry operations at different tactical echelons.)
A-19. Airborne infantry units have the greatest capability for large-scale
force-projection operations. They rapidly deploy over great distances and con-
duct combined arms parachute or air-landing assaults to seize and secure
vital objectives. The commander can insert these units on virtually any objec-
tive area under almost any weather conditions. Once on the ground, their
capabilities and lethality are similar to other nonmechanized infantry units.
A-20. Air assault infantry units have great tactical mobility and train to fight
across the range of military operations. Their significant antiarmor capabil-
ity—coupled with strategic deployability—makes them well suited as an early
deploying force in contingency operations against heavy forces. They train
and fight as a team in combination with artillery, attack, and lift aviation.
They can penetrate deep into enemy territory to cut lines of communications,
seize airfields, destroy C2 nodes, block reinforcing units, or seize key terrain.
Because of their agility and mobility, air assault infantry units are well
suited for covering force operations in appropriate terrain.
A-21. Light infantry units can operate effectively in most terrain and weather
conditions. They may be the dominant arm in fast-breaking operations bec-
ause of their rapid strategic deployability. In such cases, they can wrest the
initiative early, seize and hold ground, and mass fires to stop the enemy.
They are particularly effective in urban terrain, where they can infiltrate and
move rapidly to the rear of enemy positions. The commander can enhance
their tactical mobility by using helicopters and tactical airlift.
A-22. Mechanized and motorized infantry forces integrate mobile, survivable,
and lethal, vehicle-mounted direct-fire and indirect-fire weapon systems and
dismounted infantry skills into an effective fighting system that enhances the
striking power of the combined arms force. Mechanized infantry has the same
mobility as armor forces, but less firepower and protection. Armor and
A-6
Army Branches and Tactical Echelons
mechanized infantry train and fight as a team to defeat enemy heavy forces.
When equipped with infantry fighting vehicles, mechanized infantry can ac-
company tanks in mounted assaults. The commander must carefully deter-
mine if, when, and where his infantry must dismount to accomplish its mis-
sion. Mechanized infantrymen can act as fixing forces in an attack and serve
as pivot points for maneuvering tank-heavy forces in the defense.
A-7
FM 3-90
COMBAT SUPPORT
A-27. Combat support encompasses critical combat functions pro-
vided by units and soldiers, in conjunction with combat arms units
and soldiers, to secure victory. Those functions include Army Aviation,
Chemical Corps, Engineers, Military Intelligence, Military Police Corps, Sig-
nal Corps, and Special Operations Forces (CA and PSYOP units). Figure A-2
lists some CS units and their capabilities that support tactical operations.
AVIATION
A-28. Army aviation units provide CS to the commander in the following
areas:
· C2, communications, and intelligence.
· Air movement of combat power.
· Aerial delivery of mines.
· Search and rescue.
· Air traffic services.
CHEMICAL CORPS
A-29. The chemical corps provides CS to the Army through two major activi-
ties. The first is chemical staff support organic from the battalion through the
corps echelon. Integrating organizational equipment and individual technical
expertise permits units to continue operations with minimal degradation of
capability. The second activity is the support provided by chemical units at
corps and higher levels, including nuclear, biological, and chemical (NBC) re-
connaissance, decontamination, smoke and obscuration, and further staff
augmentation. Both activities are critical; the former optimizes unit effective-
ness under NBC conditions, the latter augments and reinforces unit combat
A-8
Army Branches and Tactical Echelons
power and sustainability. (FM 3-11 is the capstone manual for chemical op-
erations.)
ENGINEERS
A-30. Engineers multiply the effectiveness of friendly forces on a lethal bat-
tlefield. Four of the five primary engineer functions are CS. Combat engi-
neers operate as an integral member of the combined arms team to provide a
full range of mobility, countermobility, survivability, and topographic capa-
bilities. Engineers advise the maneuver commander on the effective use of
terrain; construct, improve, and maintain routes, bridges, and airfields; and
reorganize to fight as infantry when required.
A-31. In offensive operations, combat engineers concentrate their efforts to
support maneuver by breaching and crossing obstacles, assisting in the as-
sault of fortified positions, and emplacing obstacles to protect the flanks of
friendly attacking forces. In defensive operations, engineers reinforce the ter-
rain to anchor the defense in critical areas, maximize the effects of defenders’
fires, provide maximum protection to friendly fighting positions, and facili-
tate the movement of counterattack forces. Topographic engineer units fur-
nish detailed terrain analysis products, maps, and digital terrain data. Topo-
graphic engineering products help the commander identify avenues and
routes, obstacle locations, EAs, unit positions, and possible target areas.
MILITARY INTELLIGENCE
A-32. Military intelligence (MI) units provide the commander with early
warnings of enemy intentions, intelligence preparation of the battlefield pro-
ducts, aid in the development of his situational understanding, and assist in
target development, force protection, and battle damage assessment. They
participate in offensive information operations, as well as provide critical
counterintelligence support to friendly command force protection programs.
(FM 2-0 is the capstone intelligence manual.)
A-33. Military intelligence involves four intelligence disciplines—human in-
telligence, imagery intelligence, measurement and signature intelligence, and
signals intelligence. There are two multidiscipline intelligence functions—
counterintelligence and technical intelligence. However, rarely will a single
discipline or function produce a comprehensive picture of the enemy. Each of
these disciplines and functions complement and cue each other. Each disci-
pline or function produces bits and pieces of information that analysts use to
create the enemy and environment portion of the common operational picture
and other products that facilitate the commander’s situational understand-
ing. The commander should compare information gained by one discipline or
function with information provided by the other disciplines and functions
whenever the situation permits to avoid deception by enemy information op-
erations. United States Code prohibits collecting intelligence information on
US personnel or institutions by MI assets except under specific situations.
A-9
FM 3-90
SIGNAL CORPS
A-35. The signal corps provides worldwide information systems and networks
for real-time C2 of Army, joint, and multinational forces. Signal corps units
enable effective control systems to operate. In force-projection operations, sig-
nal units make split-based operations possible by employing satellite down-
link equipment. (FM 6-02 is the capstone signal manual.)
A-10
Army Branches and Tactical Echelons
A-11
FM 3-90
AVIATION
A-41. Aviation units provide CSS to sustain combat forces, primarily through
air movement of personnel, supplies, and equipment and performing aero-
medical evacuation and aviation maintenance. Air movement CSS missions
include the aerial movement of personnel and supplies, to include—
· Over-the-shore logistics operations.
· Aerial preplanned and immediate resupply.
· Air movement of critically short or sensitive supplies.
A-12
Army Branches and Tactical Echelons
CHAPLAIN CORPS
A-42. The chaplain corps advises the commander on matters of religion,
morals, and morale as affected by religion; to include the impact of indige-
nous religions on the mission. The role of the chaplain is the personal deliv-
ery of religious support—worship care and counseling—to the soldier. Chap-
lains assist in reducing the rate and severity of psychiatric casualties by
working with combat stress teams. (FM 1-05 is the capstone doctrinal manual
for chaplains and chaplain assistants.)
FINANCE CORPS
A-43. Financial management operation provides a commander with—
· Financial support for soliders.
· Financial support for non-US military personnel and all Department of
Defense civilians.
· Pay for local hire civilians.
· Contract support.
· Payments to commercial vendors that provide services and supplies in
support of military forces on an immediate or recurring basis.
· Disbursements of public funds to support an Army presence on an
area-support basis.
· Accounting and disclosing expended funds.
(FM 1-06 is the capstone doctrinal manual for financial management sup-
port.)
ENGINEERS
A-44. Sustainment engineering is the primary CSS engineer function. It in-
volves a variety of roles, such as civil engineering, fire fighting, maintaining
lines of communications, managing inland waterways, prime power, and en-
vironmental protection.
MEDICAL CORPS
A-45. The Army’s health care team provides all types of medical support to
the commander and his soldiers. The Army’s health care team comprises six
medical corps: Medical Corps, Dental Corps, Medical Service Corps, Nurse
Corps, Veterinary Corps, and Medical Specialist Corps. (FM 4-02, is the cap-
stone doctrinal manual for health service support.)
A-46. Ordnance units sustain the commander’s weapon systems, ammunition,
missiles, and ground-mobility materiel. Ordnance soldiers are trained to re-
pair and manage tank-automotive/ground-mobility materiel, missile materiel,
and ammunition materiel, including explosive ordnance disposal. (There is no
capstone manual addressing all the activities of the ordnance corps, but
FM 4-0 provides references and information on ordnance support.)
A-13
FM 3-90
A-47. Future maintenance concepts call for the consolidation of the current
four levels of maintenance into two levels—field and sustainment. Field
maintenance combines the current organizational and direct support levels of
maintenance. Field maintenance includes those tasks performed by operators
and maintainers at the point of breakdown or the point of repair. This main-
tenance level focuses on the repair of vehicles through the replacement of
major system components. Sustainment maintenance consists of tasks nor-
mally focused on the repair of component items, and it combines the current
general support and depot maintenance levels. Additionally, it includes some
current direct support-level tasks. At this level of maintenance, maintainers
focus on the repair of component items, such as major assemblies, line-
replaceable units, and reparable items and their return to the distribution
system.
ORDNANCE CORPS
A-48. Ordnance units sustain the commander’s weapon systems, ammunition,
missiles, and ground-mobility materiel. Ordnance soldiers are trained to re-
pair and manage tank-automotive/ground-mobility materiel, missile materiel,
and ammunition materiel, including explosive ordnance disposal. There is no
capstone manual addressing all the activities of the ordnance corps, but
FM 4-0 provides references and information on ordnance support.
A-49. Future maintenance concepts call for the consolidation of the current
four levels of maintenance into tow levels-field and sustainment. Field main-
tenance combines the current organizational and direct support levels of
maintenance. Field maintenance includes those tasks performed by operators
and maintainers at the point of breakdown or the point of repair. This maint-
enance level focuses on the repair of vehicles through the replacement of
major system components. Sustainment maintenance consists of tasks nor-
mally focused on the repair of component items and combines the current
general support and depot maintenance levels. Additionally, it includes some
current direct-support-level tasks. At this level of maintenance, maintainers
focus on the repair of component items, such as major assemblies, line-
replaceable units, and reparable-type items and their return to the distribu-
tion system.
QUARTERMASTER CORPS
A-50. The quartermaster corps arranges for or provides supplies, materiel
management, distribution, procurement, and field services to support and
sustain soldiers, units and their equipment. These support functions are
broken down into two areas: supply and field services. Supplies provided by
quartermaster units include—
· Class I—substance and commercial bottled water.
· Class II—clothing, individual equipment, tentage, tool sets, and admin-
istrative and housekeeping supplies equipment including nonclassified
maps.
· Class III—petroleum, oils, and lubricants (POL), including petroleum
fuels, lubricants, hydraulic and insulating oils, preservatives, liquid
and compressed gases, checmical products, and coolants.
A-14
Army Branches and Tactical Echelons
TRANSPORTATION CORPS
A-52. The transportation corps provides transportation services to the com-
mander. These services include—
· Performing transportation unit operations, to include truck, boat, rail
and trailer/cargo transfer operations. Planning, scheduling, and super-
vising the use of each mode of transportation for effectively moving per-
sonnel and cargo.
· Providing terminal services for all modes of transportation and steve-
doring services at fixed ports and unimproved beach sites.
· Providing transportation engineering services.
· Providing direct maintenance and supply for marine and rail equip-
ment.
(FM 4-01 is the capstone doctrinal manual for the transportation corps.)
TACTICAL ECHELONS
A-53. The Army echelons its broad array of capabilities to perform diverse
functions. These functions vary with the type of unit and, particularly at op-
erational echelons, with the organization of the theater, the nature of the con-
flict, and the number of friendly forces committed to the effort. For a discus-
sion of operational echelons, including ARFOR, joint force land component,
and joint task force (JTF) see FMs 3-0 and 3-93.
A-15
FM 3-90
A-54. At each echelon, the commander task organizes his available capabili-
ties to accomplish the mission. The commander’s purpose in task organization
is to maximize subordinate commanders’ abilities to generate a combined
arms effect consistent with the concept of operations. Commanders and staffs
work to ensure the distribution of capabilities to the appropriate components
of the force to weight the decisive operation. The relationships between units
within and supporting an echelon are described in terms of command and
support relationships. (See FM 5-0 for a discussion of these relationships.)
A-16
Army Branches and Tactical Echelons
Il
l l l l
HHC l
A-17
FM 3-90
A-63. CS and CSS battalions vary widely in type and organization. They may
be separate divisional or nondivisional battalions, performing functional ser-
vices for a larger supported unit within that unit’s AO. All battalions are cap-
able of short-term limited, self-defense. ADA and signal battalions assigned
to or supporting divisions routinely operate throughout the division AO.
Their commanders also perform the additional duties of division special staff
officers.
I II II II I
HHC (DS)
MP (DS)
l II II
(DS) (DS) (DS) FSB (DS)
I
SD
(DS)
(from corps) MI (DS)
A-65. Maneuver brigades are the major combat units of divisions; they can
employ any combination of maneuver battalions. Division commanders adjust
the organization of their brigades and change their task organization into bri-
gade combat teams as required by the factors of METT-TC. A brigade com-
bat team is a semipermanent combined arms organization consisting
of a brigade headquarters, at least two combat arms battalions, and
all necessary supporting combat support and combat service sup-
port, formed for the purpose of carrying out a continuing specific
task. They normally include a direct support FA battalion, a combat engineer
battalion (in heavy divisions and heavy separate brigades), forward support
battalions, and smaller combat, CS, and CSS units. Brigades combine the ef-
forts of their battalions and companies to fight engagements and battles and
perform tactical tasks within division-level battles and engagements. Their
A-18
Army Branches and Tactical Echelons
I II II II II
II
HHC II BSB
I I I I
MI
A-67. The commander organizes other combat, CS, and CSS brigades and
groups to control capabilities for divisions, corps, and larger units. Engineer,
ADA, signal, aviation, MP, and transportation brigades are typical of such
units. They may also be the building blocks of large-unit support structures,
such as corps and theater army support commands, and CS commands, such
as engineer commands. When the span of control for a brigade exceeds seven
battalion-size subordinate units, the commander can establish a group head-
quarters under the brigade as an intermediate headquarters for two or more
CS and CSS battalions. Organic, brigade-size division artillery (DIVARTY),
an aviation brigade, and a division support command (DISCOM) of CSS bat-
talions and separate companies provide support for divisions. Heavy divisions
have an organic engineer brigade.
DIVISION
A-68. The division possesses great flexibility. Divisions are the largest
fixed organizations in the Army that train and fight as tactical
teams, and are organized with varying numbers and types of combat,
CS, and CSS units. Their commanders task organize their organic brigades
and attached forces for specific combat missions. The division commander
may attach or place any or all divisional CS and CSS battalions and separate
companies in support of one or more brigades for particular missions. (Fig-
ure A-7 on page A-20 depicts a heavy division’s organic elements.) They are
A-19
FM 3-90
XX
I X X X X X
HHC SPT
II I I II
II I
II HHC HHC A HHC
X MMC
II II II II
U
II II
DASB
I I
MP II
SPT Main
II
II
SPT Fwd
A-69. Divisions perform major tactical operations for the corps and conduct
sustained engagements. With significant augmentation, a corps or a num-
bered army may direct a division to perform tasks of operational importance.
These may include exploiting tactical advantages to seize objectives in depth,
moving to gain contact with enemy forces, or moving by air to seize positions
behind an enemy force.
A-70. Critical division roles include—
· Deployment.
· Conduct of full spectrum operations as part of a corps.
· Airborne and air assault divisions able to conduct force entry
operations.
With augmentation a division headquarters can perform as the ARFOR or
joint force land component headquarters. (FM 3-91 describes how divisions
conduct full spectrum operations.)
CORPS
A-71. The corps is the Army’s largest tactical unit and the instrument
by which higher echelons of command conduct maneuver at the op-
erational level. There is no standard organizational structure for a corps,
A-20
Army Branches and Tactical Echelons
although every corps typically has the components shown in Figure A-8. Op-
erational headquarters tailor corps to the theater and mission for which they
are deployed. Once tailored a corps contains all the combat, CS, and CSS
capabilities required to sustain its operations for an extended period.
XXX
XX X III X XXX
X X X X X
MI
Engineer Air Defense Signal Chemical Intelligence
A-72. A corps is normally tailored to comprise two to five divisions of any type
and combination required by the theater and the mission. It possesses organic
support commands and is assigned combat and CS organizations based on its
needs for a specific operation. Armored cavalry regiments and FA, engineer,
ADA, and aviation brigades are the nondivisional units commonly available
to the corps to weight its decisive operation and to perform special combat
functions. The commander may also assign separate infantry or armor bri-
gades to corps. Signal brigades, MI groups, and MP groups are the CS organi-
zations normally present in a corps.
A-73. A corps plans and conducts battles and major operations. Corps opera-
tions are combined arms operations that synchronize tactical activities, in-
cluding the maneuver of divisions, the fires of artillery units and supporting
aerial forces, and the actions of CS and CSS units. A corps may operate under
the control of a higher echelon, such as a numbered army. Its headquarters
may provide the headquarters for a land component command of a unified or
subunified command or JTF. The corps headquarters could also be employed
as the ARFOR headquarters of a JTF. A corps commander may serve as a
JTF commander. A corps normally exercises a mixture of operational and tac-
tical responsibilities. It may have a key role in translating strategic and op-
erational objectives of higher echelons into the specific and detailed tactics
used to achieve those objectives.
A-21
FM 3-90
A-74. Critical corps roles in the planning, preparing, executing, and assessing
full spectrum operations include—
· Planning, preparing, and executing operations with other elements of
the joint force to achieve campaign objectives, including force projection
of corps units to the AO.
· Integrating available joint, interagency, and multinational assets in
support of sustained land operations, including intelligence, target ac-
quisition, target attack, electronic warfare, suppression of enemy air
defenses, and CSS.
· Collecting intelligence, and anticipating enemy activities and inten-
tions.
· Providing the information pipelines over which the corps distributes
the common operational picture to all corps units.
· Planning, preparing, executing, and assessing shaping and sustaining
operations by corps troops that support the corps decisive operations.
With augmentation a corps headquarters can perform as an ARFOR, joint
force land component, or JTF headquarters. (FM 3-92 describes how corps
conduct full spectrum operations.)
A-22
Appendix B
The tactical mission tasks in this appendix describe the results or effects
the commander wants to achieve—the what and why of a mission state-
ment not previously addressed in this manual. A mission statement con-
tains the who, what, when, where, and why associated with a specific op-
eration. The what and why of a mission statement are not the same thing
and both are needed. The what is an effect that is normally measurable.
The why of a mission statement provides the mission’s purpose or reason.
These tasks have specific military definitions that are different from
those found in a dictionary. In some cases, the discussion includes more
than just a definition; it includes results or effects in relation to the ene-
my, terrain, or friendly forces not associated with any specific type or
form of an operation. Tasks that identify a friendly action rarely provide
sufficient clarity for a mission statement.
CONTENTS
Actions by Friendly Force ........................... B-3 Seize ........................................................ B-12
Attack-by-Fire ........................................... B-3 Support-by-Fire ...................................... B-12
Breach ....................................................... B-3 Effects on Enemy Force ............................ B-13
Bypass ...................................................... B-4 Block ....................................................... B-13
Clear .......................................................... B-6 Canalize................................................... B-14
Control ...................................................... B-6 Contain.................................................... B-15
Counterreconnaissance .......................... B-6 Defeat ...................................................... B-15
Disengage................................................. B-7 Destroy.................................................... B-15
Exfiltrate.................................................... B-8 Disrupt..................................................... B-16
Follow and Assume ................................. B-8 Fix ............................................................ B-17
Follow and Support ................................. B-9 Interdict ................................................... B-17
Occupy.................................................... B-10 Isolate...................................................... B-18
Reduce .................................................... B-11 Neutralize ................................................ B-19
Retain ...................................................... B-11 Suppress................................................. B-19
Secure ..................................................... B-11 Turn ......................................................... B-19
B-1
FM 3-90
language meanings. However, both the commander and the subordinate must
have a common understanding of the what and why of the operation. It
should be noted that tasks involving only actions by friendly forces rarely pro-
vide sufficient clarity for a mission statement thus the addition of a solid pur-
pose coupled with the task adds understanding and clarity. The commander
ensures that the missions he assigns his subordinate units are consistent
with his scheme of maneuver and the resources allocated to his subordinates.
For example, a defending unit requires far greater effort (resources) to de-
stroy an enemy force than to defeat it. Likewise, an attacking unit requires
more combat power to clear the enemy from a given area than to contain him
in that same area.
B-2. Many of the tactical mission tasks in this appendix have a tactical mis-
sion graphic associated with them. Tacticians use these graphics in conjunc-
tion with course of action development.
EFFECTS ON
ACTIONS BY FRIENDLY FORCE
ENEMY FORCE
Assault* Follow and Assume Block
Attack-by-Fire Follow and Support Canalize
Breach Linkup* Contain
Bypass Occupy Defeat
Clear Reconstitutioin** Destroy
Combat Search and Rescue Reduce Disrupt
Consolidation & Reorganization* Retain Fix
Control Secure Interdict
Counterreconnaissaince Seize Isolate
Disengagement Support-by-Fire Neutralize
Exfiltrate Suppress Penetrate
Turn
TYPES AND FORMS OF OPERATIONS
MOVEMENT TO CONTACT* RETROGRADE OPERATIONS*
Search and Attack* Delay*
ATTACK* Withdrawal*
Ambush* Retirement
Demonstration* RECONNAISSANCE OPERATIONS**
Feint* SECURITY OPERATIONS*
Raid* INFORMATION OPERATIONS**
COMBINED ARMS BREACH
Spoiling Attack*
OPERATIONS**
EXPLOITATION* PASSAGE OF LINES*
PURSUIT* RELIEF IN PLACE*
FORMS OF OFFENSIVE MANEUVER* RIVER CROSSING OPERATIONS**
Envelopment* TROOP MOVEMENT*
Frontal Attack* Administrative Movement*
Infiltration* Approach March*
Penetration* Road March*
Turning Movement*
AREA DEFENSE* *Defined elsewhere in this manual
MOBILE DEFENSE** **Defined in other manuals
B-2
Tactical Mission Tactics
BREACH
B-5. Breach is a tactical mission task in which the unit employs all
available means to break through or secure a passage through an
enemy defense, obstacle, minefield, or fortification. A commander at-
tempts to bypass and avoid obstacles and enemy defensive positions to the
maximum extent possible to maintain tempo and momentum. Breaching
enemy defenses and obstacle systems is normally his last choice. When they
occur, they are a synchronized combined arms operation under the control of
B-3
FM 3-90
BYPASS
B-6. Bypass is a tactical mission task
in which the commander directs his
unit to maneuver around an obsta-
cle, position, or enemy force to main-
tain the momentum of the operation
while deliberately avoiding combat
with an enemy force. A commander
orders a bypass and directs combat power
toward mission accomplishment. A by-
pass can take place in offensive or defen-
sive actions. (Figure B-4 shows the tacti- B
cal mission graphic for a bypass.) The
arms of the graphic go on both sides of Figure B-4. Bypass Tactical
the location or unit that will be bypassed. Mission Graphic
B-4
Tactical Mission Tactics
ensures that the bypassing force checks the bypass route for enemy presence
and trafficability. At no time can the bypassing force allow the bypassed ene-
my force to interfere with the moving friendly force.
B-9. The two bypass techniques that the force can employ are—
· Avoiding the enemy totally.
· Fixing the enemy in place with fires and then conducting the bypass.
B-10. If the force cannot avoid the enemy, the bypassing force must fix the
enemy with part of its maneuver elements and bypass with the balance of the
force. (See Figure B-5.) Generally, a commander will not attempt to bypass an
enemy force if more than a third of his combat power is required to fix the
enemy. The commander assigns one subordinate unit the mission of fixing
the enemy in this situation, reinforcing the fixing force as required by the fac-
tors of METT-TC. The fixing force coordinates with the unit assigned to re-
lieve him as soon as possible and provides the new commander with all avail-
able information about the enemy and terrain. The relieving unit is normally
another unit assigned a follow-and-support task. Once relieved, the force fix-
ing the enemy either rejoins its parent organization or becomes part of the
following element and comes under its control.
F
B-11. Occasionally the commander may direct the fixing force to break con-
tact with the enemy after the bypassing force completes the bypass. This oc-
curs when the bypassing force has no requirement to maintain an uninter-
rupted logistics flow, such as in a raid. In this case, the fixing force fixes the
enemy by employing defensive and limited offensive actions in synchroniza-
tion with all available fire support until ordered to rejoin the bypassing force.
B-5
FM 3-90
CLEAR
B-12. Clear is a tactical mission task
that requires the commander to re-
move all enemy forces and eliminate
organized resistance within an
assigned area. The force does this by
destroying, capturing, or forcing the
C
withdrawal of enemy forces so they can-
not interfere with the friendly unit’s mis-
sion. In all cases, this task requires a
thorough reconnaissance to discover the
enemy’s locations. After discovering the
location, the clearing force maneuvers Figure B-6. Clear Tactical
against the enemy force. (Figure B-6 Mission Graphic
shows the tactical mission graphic for
clear.) The bar connecting the arrows designates the desired limit of advance
for the clearing force. The bar also establishes the width of the area to clear.
B-13. This task requires significant time and other resources. In his mission
statement, a commander can modify the objective associated with this task to
destroying, capturing, or forcing the withdrawal of only enemy forces larger
than a stated size. In this case, the clearing force keeps smaller enemy forces
under observation while the rest of the friendly force bypasses them.
CONTROL
B-14. Control is a tactical mission task that requires the commander
to maintain physical influence over a specified area to prevent its
use by an enemy or to create conditions necessary for successful
friendly operations. That influence can result from friendly forces occupy-
ing the specified area or dominating that area by their weapon systems. Con-
trol of an area does not require the complete clearance of all enemy soldiers
from the specified area. The tactical mission task of control differs from that
of secure because secure does not allow enemy fires to impact on the secured
area. The enemy can engage targets within the controlled area but cannot
move his ground forces through that area.
B-15. Control may also mean a command relationship or a function com-
manders exercise through their C2 system. (See FMs 3-0, 3-52, and 6-0.)
COUNTERRECONNAISSANCE
B-16. Counterreconnaissance is a tactical mission task that encom-
passes all measures taken by a commander to counter enemy recon-
naissance and surveillance efforts. Counterreconnaissance is not a
distinct mission, but a component of all forms of security operations.
It prevents hostile observation of a force or area. Counterreconnaissance is an
element of all security operations and most local security measures. It in-
volves both active and passive elements and includes combat action to destroy
or repel enemy reconnaissance units and surveillance assets.
B-17. Destroying enemy ground reconnaissance assets while denying the ene-
my information through other collection systems allows friendly force
B-6
Tactical Mission Tactics
DISENGAGE
B-18. Disengage is a tactical mission task where a commander has his
unit break contact with the enemy to allow the conduct of another
mission or to avoid decisive engagement. It involves moving to a location
where the enemy cannot engage the friendly force with either direct fires or
observed indirect fires. Disengaging from the enemy while displacing from
one position to the next is a difficult procedure. A disengagement plan in-
cludes—
· The maneuver concept of operations for tactical elements after disen-
gagement, along with the movement routes for each subordinate unit.
· Fires to suppress the enemy and cover the unit’s movement.
· Screening smoke to conceal the unit’s movement, as part of a deception
operation, or to cover passage points.
· Contact and passage points if moving through friendly lines. (See
Chapter 15.)
· The time disengagement starts.
· The earliest time that CS and CSS elements move.
B-19. The senior headquarters conducts operations to support the disengag-
ing forces and relieve pressure on units in contact with the enemy. For ex-
ample, if a division is conducting a delay, the division commander uses his
aviation assets to help a ground maneuver brigade disengage from the close
fight. Simultaneously, the division uses its long-range artillery, rocket, and
EW systems to destroy or disrupt enemy follow-on echelons to prevent them
from interfering with the disengagement. The intent is to create conditions
that allow the unit to disengage while avoiding decisive combat.
B-20. To facilitate disengagement, the commander suppresses the enemy in
contact by bombarding him with large volumes of both direct and indirect
fires provided by forces other than the disengaging unit. In open terrain, the
unit generally moves its short-range systems first. In close terrain, it gener-
ally moves its long-range systems first to support by fire positions. The time
involved to move a system to its next position also affects when that system
moves. Small unit leaders usually direct this movement because of the
limited range of combat net radios and the fact that the tactical situation
varies across a unit’s front. The process repeats as necessary. Once disen-
gagement starts, units must complete it rapidly. The commander can employ
supporting units or reserves to protect the disengaging unit’s flanks and as-
sist in freeing any closely engaged elements. The unit then moves to its next
position using the appropriate movement techniques. (See Chapter 14.)
B-21. If enemy combat systems have not closed within direct-fire range of the
friendly disengaging unit, all its elements may be able to move simultane-
ously under the cover of intense fires and smoke. Speed of execution and con-
tinued coordination are essential to the success of this task.
B-7
FM 3-90
EXFILTRATE
B-22. Exfiltrate is a tactical mission task where a commander re-
moves soldiers or units from areas under enemy control by stealth,
deception, surprise, or clandestine means. Friendly forces exfiltrate
when they have been encircled by enemy forces and cannot conduct a break-
out or be relieved by other friendly forces. Forces returning from a raid, an in-
filtration, or a patrol behind enemy lines can also conduct an exfiltration. The
commander exfiltrates an encircled force to preserve a portion of the force; it
is preferable to the capture of the entire force. A force exfiltrates only after
destroying or incapacitating all equipment (less medical) it must leave be-
hind. Only as a last resort, when the alternative is the capture of the entire
force, does a force conducting an exfiltration leaves its casualties in place
with supplies, chaplain support, and medical attendants.
B-23. Exfiltration is most feasible through rough or difficult terrain in areas
lightly covered by enemy observation and fire. These conditions often allow
undetected movement of small elements, when movement of the entire force
would present more risk. Exfiltration requires resourcefulness, a high degree
of discipline, expert land navigational skills, and motivation. It is unlikely
that the entire force will be able to exfiltrate, since part of it may have to cre-
ate a diversion. Good, small-unit leadership is essential in this type of opera-
tion.
B-24. The exfiltrating force first establishes its rally points and exfiltration
lanes. It coordinates its linkup plans with other friendly units. The com-
mander designates exfiltration lanes as restricted fire areas (RFAs) or no-fire
areas (NFAs). The exfiltrating force uses preparatory fires to cover its move-
ment and to expend stockpiled ammunition. Based on reconnaissance and
available intelligence, the exfiltrating force subdivides into small groups and
exfiltrates during periods of limited visibility, passing through or around ene-
my defensive positions. If detected, it tries to bypass the enemy. Exfiltration
may be more difficult with combat and tactical vehicles because of the noise
they make and the limitations they impose on exfiltration routes, make detec-
tion more likely.
B-8
Tactical Mission Tactics
OBJECTIVE
OBJECTIVE
DAN
MARGE
ENY
ENY
{
FOLLOW
AND
ASSUME
FORCE
B-9
FM 3-90
OBJECTIVE
OBJECTIVE
DONALD
BEULAH
{
FOLLOW
AND
SUPPORT
FORCE
B-31. A commander assigns a unit the task of follow and support to keep the
supported force from having to commit its combat power to tasks other than
the decisive operation, which would slow the offensive operation’s momentum
and tempo. The follow-and-support force must accomplish its tasks to prevent
the enemy, obstacles, and other factors from interfering with offensive opera-
tions, especially along the lines of communications.
B-32. The commander assigning the follow-and-support task has two options
in establishing the relationship between the supported and the supporting
units. He can place the follow-and-support unit in a standard command rela-
tionship with the supported unit, such as attached or operational control. Al-
ternatively, he can retain command of the follow-and-support force and re-
quire that all tasking request from the supported unit go through his head-
quarters.
OCCUPY
B-33. Occupy is a tactical mission task that involves moving a
friendly force into an area so that it can control that area. Both the
B-10
Tactical Mission Tactics
REDUCE
B-34. Reduce is a tactical mission task that involves the destruction
of an encircled or bypassed enemy force. There is no tactical mission
graphic for this task. This task can occur at any location on the battlefield.
(Appendix D discusses the reduction of an encircled enemy.) Reduce is also a
mobility task that involves creating sufficient lanes through an obstacle to ne-
gate its intended effect.
RETAIN
B-35. Retain is a tactical mission task in
which the commander ensures that a ter-
rain feature controlled by a friendly force
remains free of enemy occupation or use.
The commander assigning this task must spec-
ify the area to retain and the duration of the R
retention, which is time- or event-driven.
While a unit is conducting this task, it expects
the enemy to attack and prepares to become
decisively engaged. A unit tasked to retain a
specific piece of terrain does not necessary
have to occupy it. (Figure B-10 shows the tacti- Figure B-10. Retain
cal mission graphic for retain.) The direction of Tactical Mission Graphic
the arrow has no significance, but the graphic
should include the entire area the commander wants to retain.
SECURE
B-36. Secure is a tactical mission task that involves preventing a unit,
facility, or geographical location from being damaged or destroyed
as a result of enemy action. This task normally involves conducting area
security operations. (See Chapter 12.) A force given the mission of securing a
unit, facility, or geographical location not only prevents enemy forces from
over-running or occupying the secured location, but also prevents enemy di-
rect fires and observed indirect fires from impacting the secured location.
This is the primary difference between control and secure. The control tacti-
cal mission task allows enemy direct and indirect fires to affect the location
being controlled. A unit does not have to physically occupy the area
B-11
FM 3-90
SEIZE
B-37. Seize is a tactical mission task
that involves taking possession of a
designated area by using overwhelm-
ing force. (Figure B-12 shows the tactical S
mission graphic for seize.) An enemy force
can no longer place direct fire on an objec-
tive that has been seized. The arrow points
to the location or objective to seize. This
task differs from secure because it requires
offensive action to obtain control of the des-
Figure B-12. Seize
ignated area or objective. It differs from the
Tactical Mission Graphic
task of occupy because it involves overcom-
ing anticipated enemy opposition. Once a force seizes a physical objective, it
clears the terrain within that objective by killing, capturing, or forcing the
withdrawal of all enemy forces.
SUPPORT-BY- FIRE
B-38. Support-by-fire is a tactical mission task in which a maneuver
force moves to a position where it can engage the enemy by direct
fire in support of another maneuvering force. The primary objective of
the support force is normally to fix and suppress the enemy so he cannot ef-
fectively fire on the maneuvering force. The secondary objective is to destroy
the enemy if he tries to reposition. The commander must specify the desired
effect on the enemy when assigning this task to a subordinate.
B-39. A unit conducting the task of support by fire does not maneuver to cap-
ture enemy forces or terrain. The commander gives this task to another unit
as part of a larger maneuver. When assigning a support-by-fire mission, the
commander designates the enemy, when to attack, the general location from
which to operate, the friendly force to support, and the purpose of the task,
such as fix or suppress. (Figure B-13 shows the tactical mission graphic for
support by fire.) The ends of the arrows should point in the general direction
of the targeted unit or location. The base of the area indicates the general
area from which to deliver fires.
B-40. Once the commander gives an element the task of support by fire, it
should occupy support by fire positions that have cover and concealment,
B-12
Tactical Mission Tactics
B-13
FM 3-90
CANALIZE
B-45. Canalize is a tactical mission
task in which the commander re-
stricts enemy movement to a narrow
zone by exploiting terrain coupled
with the use of obstacles, fires, or
friendly maneuver. (See Figure B-16.)
Figure B-17 shows how successful
canalization results in moving the
enemy formation or individual soldiers
and weapon systems into a predeter- C
mined position where they are vul-
nerable to piecemeal destruction by di- Figure B-16. Canalize
rect and indirect fires. Tactical Mission Graphic
TREES 20 TO 25 CM IN DIAMETER,
SPACED NOT MORE THAN 5
METERS APART
COMPLETED ANTITANK
DITCH REINFORCED BY
AT MINES AND AN ABATIS
C
EA
COLLEEN
SLOPE > 45% ANGLE
Figure B-17. Canalizing Terrain Enhanced by Obstacles Used with an Engagement Area
B-14
Tactical Mission Tactics
CONTAIN
B-46. Contain is a tactical mission
task that requires the commander
to stop, hold, or surround enemy
ENY
forces or to cause them to center
their activity on a given front and
prevent them from withdrawing C
any part of their forces for use else-
where. Containment allows an enemy ENY
to reposition himself within the desig-
nated geographical area, whereas fixing
an enemy does not. Geo-graphic terms
or time may express the limits of the Figure B-18. Contain
containment. The contain graphic en- Tactical Mission Graphic
compasses the entire geographical area
in which the commander desires to contain the enemy during the develop-
ment of alternative courses of action. (Figure B-18 shows the tactical control
graphic for contain.)
DEFEAT
B-47. Defeat is a tactical mission task that occurs when an enemy
force has temporarily or permanently lost the physical means or the
will to fight. The defeated force’s commander is unwilling or unable
to pursue his adopted course of action, thereby yielding to the
friendly commander’s will and can no longer interfere to a signifi-
cant degree with the actions of friendly forces. Defeat can result
from the use of force or the threat of its use.
B-48. A commander can generate different effects against an enemy to defeat
him:
· Physical. The enemy loses the physical means to continue fighting. He
no longer has the personnel, weapon systems, equipment, or supplies to
carry out his assigned mission.
· Psychological. The enemy loses the will to fight. He becomes mentally
exhausted, and his morale is so low that he can no longer continue to
carry out his assigned mission.
These effects typically occur as a result of catastrophic losses inflicted over a
very short time or from sustained attrition. An opponent who is not ideologi-
cally motivated opponent may be defeated psychologically on observing prep-
arations for the delivery of clearly overwhelming combat power on his posi-
tion. Defeat manifests itself in some sort of physical action, such as mass sur-
renders, abandonment of significant quantities of equipment and supplies, or
retrograde operations.
DESTROY
B-49. Destroy is a tactical mission task that physically renders an ene-
my force combat-ineffective until it is reconstituted. Alternatively, to
destroy a combat system is to damage it so badly that it cannot per-
form any function or be restored to a usable condition without being
entirely rebuilt. The amount of damage needed to render a unit combat-
B-15
FM 3-90
DISRUPT
B-50. Disrupt is a tactical mission
task in which a commander inte- Figure B-19. Destroy
grates direct and indirect fires, ter- Tactical Mission Graphic
rain, and obstacles to upset an ene-
my’s formation or tempo, interrupt
his timetable, or cause his forces to
commit prematurely or attack in a
piecemeal fashion. This increases the
enemy’s vulnerability to friendly fires. It
may temporarily knock a unit out of the D
battle. Disruption is never an end; it is the
means to an end. (Figure B-20 shows the
tactical mission graphic for disrupt. The
center arrow points toward the targeted
enemy unit.)
Figure B-20. Disrupt
B-51. The maneuver force attempting to Tactical Mission Graphic
disrupt an enemy must attack him with
enough combat power to achieve desired results with one mass attack or sus-
tain the attack until it achieves the desired results. It may involve attacking
the enemy while he is still in his assembly areas or in an approach march be-
fore he can deploy into a combat formation. The commander deter-mines the
amount of risk he is willing to accept based on anticipated friendly losses, the
location of the attack, and the number of attacks.
B-52. Disrupt is also an engineer ob-
stacle effect that focuses fire plan-
ning and obstacle effort to cause the
enemy to break up his formation and
tempo, interrupt his timetable, com-
mit breaching assets prematurely,
and attack in a piecemeal effort. It
also helps to deceive the enemy concern-
ing the location of friendly defensive posi- I
B-16
Tactical Mission Tactics
commander normally uses the disrupt obstacle effect forward of his EAs. Ob-
stacles alone cannot disrupt an enemy unit. (FM 3-34.1 describes the disrupt
engineer obstacle effect.)
FIX
B-53. Fix is a tactical mission
task where a commander pre-
vents the enemy from moving
any part of his force from a spe- F
cific location for a specific per-
iod. This may occur by engaging him
Figure B-22. Fix Tactical Mission
to prevent his withdrawal for use
Graphic
elsewhere, or by using deception,
such as transmitting false orders. The commander uses fix in offensive and
defensive actions; it is always a shaping operation. (Figure B-22 shows the
tactical mission graphic for fix.) The commander points the arrow toward the
enemy unit that he desires to fix. The broken part of the arrow indicates the
desired location for that event to occur.
B-54. Fixing an enemy force does not mean destroying it. The friendly force
has to prevent the enemy from moving in any direction. This task usually has
a time constraint, such as fix the enemy reserve force until OBJECTIVE
FALON, the decisive operation, is secured. The tactical mission task of fix dif-
fers from that of block in that a fixed enemy force cannot move from a given
location, but a blocked enemy force can move in any direction other than the
one obstructed.
B-55. Fix is also an engineer obstacle
effect that focuses fire planning and
obstacle effort to slow an attacker’s
movement within a specified area,
normally an engagement area. Primary
use of this effect is to give the friendly unit
Figure B-23. Fix Obstacle
time to acquire, target, and destroy the at-
Intent Graphic
tacking enemy with direct and indirect
fires throughout the depth of an EA or avenue of approach. The irregular part
of the arrow in the obstacle-intent graphic indicates the location where the
enemy’s rate of advance will be slowed by complex obstacles. The arrow indic-
ates the direction of enemy advance. (See Figure B-23.) (FM 3-34.1 describes
the fix engineer obstacle effect.)
INTERDICT
B-56. Interdict is a tactical mission task where the commander pre-
vents, disrupts, or delays the enemy’s use of an area or route. Interdic-
tion is a shaping operation conducted to complement and reinforce other on-
going offensive or defensive operations. (Figure B-24 on page B-18 shows the
tactical mission graphic for interdict.) The two arrows should cross on the
unit or location targeted for interdiction. An interdiction tasking must specify
how long to interdict, defined as a length of time or some event that must oc-
cur before the interdiction is lifted, or the exact effect desired from the inter-
diction.
B-17
FM 3-90
ISOLATE
B-61. Isolate is a tactical mission task
that requires a unit to seal off—both
physically and psychologically—an ene-
my from his sources of support, deny him
freedom of movement, and prevent him
from having contact with other enemy
forces. A commander does not allow an iso-
lated enemy sanctuary within his present po-
sition but continues to conduct offensive ac-
tions against him. (Figure B-25 shows the tac- I
tical mission graphic for isolate.) The position
or direction of the arrow has no significance, Figure B-25. Isolate
but the graphic should surround the targeted Tactical Mission Graphic
enemy unit.
B-18
Tactical Mission Tactics
NEUTRALIZE
B-62. Neutralize is a tactical mission task
that results in rendering enemy per-
sonnel or materiel incapable of interfer-
ing with a particular operation. (Fig-
ure B-26 shows the neutralize tactical mis-
sion graphic.) The two lines cross over the N
symbol of the unit or facility targeted for neu-
tralization. When assigning a task to neu-
tralize, the commander must specify the ene-
my force or materiel to neutralize and the
duration, which is time- or event-driven. The Figure B-26. Neutralize
neutralized target may become effective Tactical Mission Graphic
again when casualties are replaced, damage
is repaired, or effort resulting in the neutralization is lifted. The commander
normally uses a combination of lethal and nonlethal fires to neutralize enemy
personnel or materiel. The assets required to neutralize a target vary
according to the type and size of the target and the weapon and munitions
combination used.
SUPPRESS
TURN
B-64. Turn is a tactical mission task
that involves forcing an enemy ele-
ment from one avenue of approach or T
movement corridor to another. The
commander relates obstacles, fires, and ter-
rain to improve his tactical situation while
degrading the enemy’s situation. For ex-
ample, in the offense, a commander might Figure B-27. Turn
want to turn an enemy force he is pursuing Tactical Mission Graphic
to place it in a position where he can de-
stroy it. In the defense, a commander might want to turn an attacking enemy
force to allow him to conduct a counterattack into its flank. (Figure B-27
shows the turn tactical mission graphic.) The place where the arrow breaks
indicates the general location of the obstacle complex that will force the ene-
my to move from one avenue of approach to another.
B-65. Turn is also a tactical obstacle effect that integrates fire plan-
ning and obstacle effort to divert an enemy formation from one
B-19
FM 3-90
B-20
Appendix C
C-1. The capability to conduct airborne and air assault operations allows the
commander to—
· Threaten enemy rear areas, causing the enemy to divert combat ele-
ments to protect vital installations and hold key terrain.
· Overcome distances quickly, overfly barriers, and bypass enemy de-
fenses.
· Extend the area over which he can exert his influence.
· Disperse his reserve forces widely for force protection reasons while
maintaining their capability for effective and rapid response.
· Exploit his combat power by increasing tactical mobility.
COMMON FACTORS
C-2. Factors common to airborne and air assault operations are the use of the
reverse planning process, condition setting, and the impact of meteorological
conditions (weather and light data).
CONTENTS
Common Factors.......................................... C-1 Planning Considerations ......................... C-8
Reverse Planning Process ...................... C-2 Executing Airborne Operations .............. C-9
Condition Setting ..................................... C-2 Air Assault Operations............................... C-12
Meteorological Conditions ...................... C-3 Organization of Forces .......................... C-12
Airborne Operations .................................... C-3 Control Measures ................................... C-13
Organization of Forces ............................ C-4 Planning Considerations ....................... C-13
Control Measures..................................... C-5 Executing Air Assault Operations ........ C-16
C-1
FM 3-90
CONDITION SETTING
C-7. Setting conditions is also a common factor necessary for the success of
air assault and airborne operations. Condition setting postures the air assault
or parachute force for success with minimal or acceptable losses. The com-
mander determines the exact conditions required in accordance with the fac-
tors of METT-TC, to include the degree of risk he is willing to accept with re-
gard to each condition. Setting conditions is not limited to conducting sup-
pression of enemy air defense and preparatory fires. It requires the
C-2
Airborne and Air Assault Operations
METEOROLOGICAL CONDITIONS
C-9. Meteorological conditions affect airborne and air assault operations more
than they affect any other type of operation. Long-range forecasts are vital to
planning. As part of the planning process, commanders determine what ad-
verse weather conditions would delay or cancel operations.
C-10. Commanders consider current and forecasted weather conditions in
terms of their impact on tactical operations and aircraft performance. To
issue the execution order that initiates the operation, the commander must
know the current weather information at departure sites and pickup zones
(PZs), along approach routes, and in the objective area. Operations conducted
during marginal weather conditions may enhance the element of surprise,
but they also increase the risk of accidents. The commander may have to
postpone a planned operation or reduce the tempo of an ongoing operation
when the risk becomes unacceptable because of deteriorating weather condi-
tions.
C-11. Weather conditions affect aircraft performance and influence the con-
duct of operations. These conditions include: wind shears, crosswinds, and the
ambient temperatures throughout the course of the operation. High tempera-
ture and altitude degrade aircraft lift performance. The combination of these
factors results in trade-offs in the operating parameters of all missions. For
example, a commander may insert dismounted reconnaissance teams on
mountainsides in the cool of the morning, but be unable to execute the same
mission in the noonday heat.
AIRBORNE OPERATIONS
C-12. An airborne operation is an operation involving the air movement into
an objective area of combat forces and their logistic support for execution of a
tactical, operational, or strategic mission. The means employed may be any
combination of airborne units, air transportable units, and types of transport
aircraft, depending on the mission and the overall situation (JP 3-17). The ob-
jective area is known as the airhead. The airhead contains enough drop zones
(DZs) and landing zones (LZs) to allow airborne forces to mass effects on their
C-3
FM 3-90
objectives. The airhead should also contain extraction zones (EZs), interior
lines of communications (LOCs), and terrain that allows for conducting a de-
fense in depth. An administrative air movement of personnel, supplies, or
equipment is not an airborne operation, although some procedures used in an
airborne operation may apply. (JP 3-18 and FM 3-18.11 provide the doctrinal
basis for airborne operations.)
C-13. Airborne operations are joint operations because of the interservice
links of modern command and control (C2) systems, the multiservice struc-
ture of the defense transportation system, and the broad range of forces and
support involved. Airborne operations require secure staging and departure
areas coupled with the need to maintain operations security (OPSEC).
OPSEC measures may include establishing intermediate support bases with-
in tactical airlift range. The operation begins and ends on the order of the
commander who establishes the joint airborne force.
ORGANIZATION OF FORCES
C-14. Once the commander determines the principal components of the
ground tactical plan and the maneuver and fire support schemes, the air-
borne force organizes to execute its assigned mission. The commander bal-
ances the immediate need for combat power with the need to ensure force
sustainability over time. To ensure unity of effort, part or all of the assigned
forces’ subordinate units can form into one or more temporary tactical group-
ings, such as teams or task forces. Each tactical group has a designated com-
mander. Doctrine cannot prescribe in advance a standard organization to
meet all conditions. However, airborne forces generally divide into one of
three echelons: the assault echelon, the follow-on echelon, and the rear eche-
lon.
C-15. The assault echelon is the element of a force that is scheduled for initial
assault on the objective area (JP 4-01.2). In an airborne assault it normally
comprises those forces capable of insertion by parachute in a single drop by
the available lift systems. The assault echelon is a combined arms organiza-
tion with only limited sustainment capabilities. The commander cross-loads
vital assets, such as commanders, principal staff, communication systems, re-
connaissance and security forces, and crew-served weapons among the vari-
ous transportation systems so the loss of a single air frame will not compro-
mise the operation. (Cross-loading also applies to air assault operations.)
C-16. The follow-on echelon contains those additional forces moved
into the objective area after the assault echelon. They provide the com-
bat power necessary to expand the initial airhead, secure the lodgment area,
and establish one or more air or seaports of debarkation. The composition of
the follow-on echelon depends on the factors of METT-TC. It can consist of
heavy and light combined arms formations, field and air defense artillery as-
sets, and combat engineers, as well as significant combat support (CS) and
combat service support (CSS) elements. Introducing this echelon can extend
over several days and involve multiple sorties by individual lift systems. Usu-
ally, this echelon does not require cross-loading of its allocated lift systems.
This increases the carrying capacity of the lift systems delivering this eche-
lon. This echelon contains increased sustainment capabilities.
C-4
Airborne and Air Assault Operations
C-17. The rear echelon contains those elements of the force that are not re-
quired in the objective area. It may remain at home station or at an intermed-
iate staging base or intermediate support base throughout short-duration op-
erations. This echelon generally contains the airborne unit’s long-term sus-
tainment capabilities.
CONTROL MEASURES
C-18. The commander has the full range of graphic control measures to help
control his operation. As a minimum, the commander must assign each sub-
ordinate unit an AO. The airborne operation commander also use DZs, LZs,
EZs, assault objectives, and the airhead line to focus the efforts of his subordi-
nates.
C-19. Selecting DZs and LZs is a joint responsibility. The mission commander
is responsible for delivering personnel and cargo to the DZ or LZ and for se-
lecting approaches to the landing area. Both the joint and component com-
manders must base their decisions on their knowledge of respective problems
and on the needs of the overall operation. The nature and location of landing
areas are important when preparing the scheme of maneuver. The mission
governs the general area where they should be established. At higher eche-
lons, commanders can assign landing areas in broad terms. At lower echelons,
they must describe these locations specifically. The commander selects his
DZs only after conducting a detailed analysis. He uses the information pro-
vided by his intelligence system and Army pathfinders as he considers the fol-
lowing factors when selecting DZs and LZs:
· Ease of identification.
· Straight-line approach.
· Suitable for the weather and terrain.
· Out of range of enemy air defenses, strong ground defenses, and sup-
pressive indirect fires.
· Close to or on top of an assault objective.
Since the last two entries conflict, he must decide which consideration has
priority. (FM 3-17 provides detailed information regarding the desired char-
acteristics of DZs and LZs.)
C-20. When assigning objectives and boundaries in airborne operations, the
commander must consider other factors in addition to those inherent in con-
ventional operations. He selects specific assault objectives based on an analy-
sis of the situation. (See Figure C-1, page C-6.) The assault objectives dictate
the size and shape of the airhead, although the commander develops the air-
head line and determines the assault objectives concurrently. He selects as-
sault objectives for his subordinate elements. Concurrently, the commanders
of these subordinate elements decide the size, type, or disposition of the force
that they commit to gain and maintain control of their objectives.
C-21. Selecting assault objectives should allow forces to accomplish mission-
essential tasks while meeting the commander’s intent. However, they may
not include those objectives that must be seized to secure the airhead line. An
appropriate assault objective is one that the force must control early in the
assault to accomplish the mission or enhance the security of the airborne
force. This can include key terrain within the airhead or terrain required for
C-5
FM 3-90
C-6
Airborne and Air Assault Operations
· The airhead contains enough DZs, LZs, and EZs to ensure the force has
interior LOCs and to permit one massed parachute assault by the en-
tire assault echelon rather than piecemeal insertion.
· The airhead allows enough space to disperse units and supplies to re-
duce the airhead’s vulnerability to nuclear, biological, and chemical
weapons if they are a threat.
· The airhead must be large enough to provide for defense in depth, yet
small enough for the airborne unit to defend. Although this depends
largely on the factors of METT-TC, a battalion can defend an airhead 3
to 5 kilometers in diameter. A brigade can occupy an airhead 5 to 8
kilometers in diameter.
C-24. When assigning boundaries and subordinate AOs in airborne op-
erations, the commander considers several factors beyond those affecting
more routine operations. Ideally, each unit’s AO should include at least one
DZ and one LZ to enable the unit and its attachments to land within its as-
signed AO during the assault. Each unit’s presence also facilitates resupply
and evacuation of enemy prisoners of war and casualties. Establishing a LZ
and a DZ reduces coordination requirements with adjacent units. The com-
mander assigns boundaries that should not require a unit to defend in more
than one direction at the same time. Boundaries should extend as far as nec-
essary beyond forward security forces to coordinate fires. This enables sub-
ordinate security units to operate forward of the airhead with minimal coordi-
nation. (See Figure C-3.)
X
2
20
7
1-501 2-502
II
DZ ABLE
1-501 AIRHEAD LINE
II DZ BAKER
2-508 DZ EAGLE
2-502
BDE
II
REAR 3-187
AREA 11
DZ CHARLIE
DZ DOG
2-508 3-187 9
II
2
X
CFL (2nd BDE 11TH ABN DIV)
071800 JUN 99
Figure C-3. Boundaries and Fire Support Coordinating Measures for an Airhead
C-7
FM 3-90
PLANNING CONSIDERATIONS
C-25. The airborne force commander begins planning when he receives an
initiating directive or a warning order. JP 3-18 describes the contents of an
initiating directive or warning order as including the—
· Mission for subordinate units.
· Higher commander’s concept of the operation.
· Command structure for the operation.
· Time and duration of the operation, including D-day and H-hour (exe-
cution time).
· Intelligence and security requirements.
· Allocation and distribution of airlift assets.
· Unit deployment list and sequence.
· Departure airfields, remote marshaling bases, and intermediate stag-
ing bases.
· Signal requirements and instructions.
· Linkup and withdrawal concept.
C-26. In an airborne operation that envisions an early linkup with conven-
tional ground maneuver forces, the airborne unit defends the airhead until
completing the linkup. After linkup, the airborne force either resumes the of-
fensive within the commander’s concept of the operation or prepares for sub-
sequent operations. Tactical airborne operations begin with an initial assault
followed by independent operations. They then transition to the defense of
the established airhead until enough forces can be delivered to the objective
area to break out of the established lodgment or linkup with ground forces.
C-27. The flexibility of airborne forces gives the commander wide latitude to
select approach routes and objective areas. Airborne forces bypass ground ob-
stacles and enemy positions to strike objectives in otherwise inaccessible
areas. The ability of airborne forces to move rapidly and land on or near their
objectives increases the element of surprise. It also facilitates the massing of
relative combat power because airborne forces can attack the objective from
any direction, which leads to the dissipation of the enemy’s defenses. The
presence of airborne forces also constitutes a threat that affects the enemy’s
capability to mass. These forces compel him to disperse combat power to pro-
tect vital sustainment installations and other key locations.
C-28. The primary prerequisites to conducting successful airborne operations
are moving forces to an objective area without incurring unacceptable losses
and supplying these forces with the required combat power, CS, and CSS.
Steps taken to attain these objectives include—
· Obtain and maintain air superiority.
· Suppress enemy air defense capabilities and ground fires.
· Provide adequate air defense in the marshaling area and en route to
and within the objective area.
C-29. In an airborne operation, the commander’s primary initial sources of
long-range fire support are air support and rocket or missile fires that can
range the airhead. Other sources may include naval surface fires. The com-
mander may insert airborne artillery cannon units and attack helicopters to
C-8
Airborne and Air Assault Operations
provide close supporting fires during the initial assault. He may also intro-
duce additional cannon, MLRS, and helicopter assets into the airhead during
subsequent phases of the operation.
C-30. The capacity and availability of aircraft limit the size and amount of
equipment and supplies available for movement to the objective area. The
commander can insert his heavy equipment into the objective area by heavy
parachute airdrops or an air landing. The limited number of vehicles in air-
borne units reduces the unit’s tactical mobility in open terrain compared with
that of armored and mechanized formations. However, airborne units may
gain considerable mobility by using helicopters. Units also make concerted ef-
forts to capture and exploit enemy supplies, equipment, weapons, vehicles,
and petroleum, oils, and lubricants (POL).
C-31. Because of the displacement range of forces and the need for air LOCs,
airborne operations magnify the problems normally inherent in sustaining a
combat force. Therefore, commanders must emphasize planning for resupply,
equipment maintenance, casualty evacuation, graves registration, and pris-
oner of war handling. Prepackaging company- and battalion-size resupply
sets can ease these problems when support units must push supplies to the
combat units.
C-32. Commanders consider all supplies and equipment required for mission
accomplishment as part of their tactical planning. The initial combat require-
ments dictate the quantities and types of supplies and equipment carried by
assault forces in the operation. Commanders ensure that only supplies re-
quired to meet the immediate needs of the assault force initially deploy into
the objective area. Excess supplies and equipment can constitute a burden on
the assault force. Staffs establish and maintain required levels of supply by
phasing supplies into the objective area on an accompanying, follow-on (auto-
matic and on-call), and routine basis. Ammunition, water, and POL products
normally constitute the major tonnage items in airborne operations.
C-33. As part of the preparation for the airborne operation, soldiers receive
briefings on the plan of their unit, adjacent units, and higher echelons in-
cluding contingencies. It is particularly important that all personnel under-
stand the commander’s intent of the next two higher echelons. This helps
units or soldiers landing in unplanned areas direct their efforts toward ac-
complishing the mission.
C-9
FM 3-90
C-10
Airborne and Air Assault Operations
C-11
FM 3-90
ORGANIZATION OF FORCES
C-50. Air assault operations employ AATFs. An AATF is a combined arms
force specifically designed to hit fast and hard. It is under the command of a
single headquarters. Tactical commanders use an AATF in situations that
provide a calculated advantage because of surprise, terrain, threat, or mobil-
ity. An AATF consists of infantry, attack helicopters, fire support, electronic
warfare, and logistic assets. The ground or air maneuver commander is desig-
nated as the AATF commander.
C-12
Airborne and Air Assault Operations
CONTROL MEASURES
C-53. The control measures that apply to an airborne operation also apply to
an air assault operation. As a minimum, the commander assigns each sub-
ordinate unit an AO. The AATF and aviation staffs select LZs that support
the ground tactical plan and offer the best survivability for the AATF. As in
airborne operations, designating LZs within the unit’s AO simplifies the pro-
vision of additional support to the unit. The AATF commander also uses as-
sault objectives and the airhead line to focus the efforts of his subordinates.
As necessary, the commander uses those attack control measures introduced
in Chapter 5 to help control the force’s maneuver once it enters the AO.
C-54. In air assault operations, the commander makes extensive use of Army
airspace command and control (A2C2) measures to control the movement of
the assault, attack, special electronic mission, and cargo aircraft. For ex-
ample, Figure C-4 on page C-14 shows flight routes as depicted on an overlay.
(FM 3-52 details A2C2 measures.)
PLANNING CONSIDERATIONS
C-55. Integrating aviation and infantry does not fundamentally change the
nature of combat operations. The air assault force continues to fight as a com-
bined arms team. However, the tempo and distance involved in such opera-
tions change dramatically. Missions normally assigned to an AATF should
take advantage of its superior mobility. However, the commander should not
employ an AATF without a detailed resupply plan in operations that require
sustained ground combat. Once the air assault is complete, the aviation unit
can continue to support the infantry by conducting aerial movement of sys-
tems and critical supplies.
C-56. There are several basic air assault planning operational guidelines—
· Assign a mission that takes advantage of the AATF’s mobility.
· Task organize the AATF as a combined arms team.
· Ensure the air assault plan supports the AATF commander’s intent.
C-13
FM 3-90
· Allow extra time for planning and preparing for limited-visibility and
adverse weather air assaults.
· Maintain small-unit integrity throughout the air assault to ensure the
ability to fight as a cohesive unit immediately upon landing.
· Plan and posture fire support to provide suppressive fires along flight
routes, on LZs, and on enemy air defense systems.
C-57. The foundation of a successful air assault operation is the commander’s
ground tactical plan. The AATF staff prepares this plan based on input from
all task force elements. All aircrews must be familiar with the ground tactical
plan and the ground commander’s intent.
LZ 2 LZ 5
ACP
OBJ
QUEEN RP
ACP EAGLE
CLUB LZ 14
E
UT EY
ACP RO CE TR RP
KING DU
ACP IS
AX
PZ 6
ACP ACP
19 JACK 11
ACP
ACP 3
2 ACP
SP
5 ACE
DOR
PZ RRI
SP CO
7 SP
PZ 4
C-58. The ground tactical plan for an air assault operation comprises essen-
tially the same elements as any other infantry attack but differs in the re-
quirements for speed and mobility. The plan places task-organized assault
units on or near the objective so they are capable of seizing objectives immed-
iately and consolidating quickly. If the commander cannot introduce adequate
combat power quickly into the objective area, the air assault force must land
away from the objective and build up combat power. This force then assaults
like any other infantry unit; however, this diminishes the effectiveness of the
air assault operation. The scheme of maneuver may take many forms depend-
ing on the situation and the factors of METT-TC.
C-59. The ground tactical plan addresses—
· Assault objectives for subordinate elements.
C-14
Airborne and Air Assault Operations
C-15
FM 3-90
C-16
Airborne and Air Assault Operations
C-17
Appendix D
Encirclement Operations
When the enemy is driven back, we have failed, and when he is cut off,
encircled and dispersed, we have succeeded.
Field Marshal Prince Aleksander V. Suvorov
CONTENTS
Offensive Encirclement Operations........... D-0 Organization of Forces.......................... D-10
Organization of Forces............................ D-1 Control Measures................................... D-12
Control Measures..................................... D-2 Planning a Breakout .............................. D-12
Planning an Encirclement ....................... D-2 Executing a Breakout ............................ D-14
Executing an Encirclement ..................... D-4 Exfiltration .................................................. D-17
Defending Encircled .................................... D-7 Attacking Deeper into Enemy Territory ... D-17
Organization of Forces............................ D-8 Linkup ......................................................... D-17
BOS Considerations ................................ D-9 Control Measures................................... D-17
Breakout from an Encirclement ............... D-10 Execution ................................................ D-18
D-0
Encirclement Operations
ORGANIZATION OF FORCES
D-2. An encirclement operation usually has at least two phases—the actual
encirclement and actions taken against the isolated enemy. The commander
should consider adjusting his task organization between phases to maximize
his unit’s effectiveness in each phase. The first phase is the actual encircle-
ment that results in the enemy force’s isolation. The organization of forces for
an encirclement is similar to that of a movement to contact or an envelop-
ment. The commander executing an encirclement operation organizes his
forces into a direct pressure force and one or more encircling arms. Armor,
mechanized and motorized infantry, aviation, air assault, and airborne units
are especially well suited for use as an encircling arm since they have the tac-
tical mobility to reach positions that cut enemy lines of communications
(LOCs). The presence of bypassed and encircled enemy forces on the flanks
and rear of advancing friendly forces requires all-around security, which in-
cludes local security measures and security forces.
D-3. One commander should direct the encirclement effort. However, there
must also be unity of command for each encircling arm. The encircling force
headquarters may name one of its subordinate units as the headquarters for
an encircling arm. Alternatively, that force headquarters may create a tempo-
rary command post from organic assets, such as its tactical command post, to
control one or more arms of the encirclement. If that encircling arm has sub-
ordinate inner and outer arms, each of them also requires separate
subordinate commanders. The missions and spatial orientation between the
inner and outer encircling arms are sufficiently different; therefore, one force
cannot act in both directions at once. (See Figure D-1.)
1-73 AX
AO BLUE AXIS BILL
IS
RU
II LE
1 73
ENY
PL OWL
1/51MD PL OWL
X
2/51MD
INNER
Y
ENCIRCLING
EN
ARMS II
EN
LD
2 87
AXIS SLICK
GO
AO DOG
IS
2-87
AX
1-34 II
1 34
OUTER ENCIRCLING ARM
AO THRUSH
Figure D-1. Inner and Outer Arms of an Encirclement
D-1
FM 3-90
CONTROL MEASURES
D-7. Control measures for an encirclement are similar to those of other offen-
sive operations, especially an envelopment, but with a few additional consid-
erations. (See Figure D-2.) If the commander uses both an inner and an outer
encircling arm, he must establish a boundary between them. He should place
the boundary so that each element has enough space to accomplish the mis-
sion. The inner force must have enough space to fight a defensive battle to
prevent the encircled force from breaking out. The outer force must have ade-
quate terrain and enough depth to its area of operations (AO) to defeat any
attempt to relieve the encircled force.
D-8. The commander who controls both converging forces establishes a re-
stricted fire line (RFL) between them. The commander may also establish a
free fire area (FFA), which encloses the area occupied by a bypassed or en-
circled enemy forces. (Chapter 2 discusses the use RFLs, FFAs, and other fire
support coordinating measures.)
PLANNING AN ENCIRCLEMENT
D-9. Encirclement operations may require allocating large forces and signifi-
cant resources. They take a great deal of time and usually slow an advance. If
the mission of the encircling force is to maintain contact with a bypassed ene-
my force, the following general planning considerations apply:
D-2
Encirclement Operations
· Determine the best available assets that gain and maintain contact
with the enemy.
· Keep the enemy isolated and incapable of receiving intelligence, logis-
tics, and fire support from enemy formations outside of the encircle-
ment.
· Use intelligence, surveillance, and reconnaissance (ISR) assets so that
the commander knows the capabilities of the encircled force and, as
much as possible, its commander’s intentions.
· Retain freedom of maneuver.
D-10. The commander applies the general defensive planning considerations
outlined in Chapter 8 if the mission is to contain or fix the encircled enemy
force in a given location. If the mission is to attack and destroy the encircled
enemy force, he applies the planning considerations outlined in Chapters 3
and 5. Commanders should plan to rotate the forces involved in reducing the
encircled pocket to maintain constant pressure on the enemy.
AO DEEP 2-50
II
1-73
I
BP 19
AO BLUE I
B
P
13
I
17
BP
FFA 51MD
EN
BP
1/51
I
291400Z
14
9
Y
I
BP
91
EN
I
BP9 93
AO DOG 2 BP
I I
II
1-34 2-87
AO THRUSH
Figure D-2. Encirclement Control Measures
D-11. Every encircled enemy unit reacts differently. Initially, some become
demoralized and cannot offer any serious resistance. However, if left undis-
turbed, most enemy units recover and attempt to break out and regain con-
tact with their main force or attack the flank and rear of advancing friendly
units. The encircling force must plan for the enemy’s most probable reactions.
D-12. If the enemy force is not reduced and it can be resupplied, or it has ac-
cess to considerable supply stocks, it continues to be a serious threat to the
commander in future operations. The encircling force must be approximately
equal in size to this type of encircled force to fix or contain it. This situation
occurred when German forces occupied various fortified French ports after
Allied armies liberated the rest of France in 1944. Each encircled German
D-3
FM 3-90
division took approximately one Allied division to maintain its isolation. Con-
versely, an enemy force isolated without adequate supplies either surrenders
or faces containment by considerably smaller forces. This situation occurred
in Egypt during the 1973 Arab-Israeli War when an Israeli division isolated
the Egyptian 3rd Army. Planning considerations for the linkup of encircling
forces, such as command and control relationships, are outlined later in this
appendix.
EXECUTING AN ENCIRCLEMENT
D-13. When feasible, the encircling force advances parallel to the enemy’s di-
rection of movement. It attempts to reach defiles, bridges, and other critical
points before the main enemy force reaches them. When the encircling force
cannot outdistance the enemy, it engages his flanks to force him to fight un-
der the most unfavorable conditions possible, ultimately in two or more direc-
tions simultaneously. Engineer units rapidly breach obstacles in the path of
the encircling force. Friendly forces emplace obstacle complexes, supported by
fires, to block probable avenues of escape as they counter attempted enemy
breakouts from encirclement. The commander may use air assault and air-
borne forces to seize defiles or other critical terrain objectives to cut enemy
LOCs. He completes the encirclement when all enemy ground LOCs are cut.
This generally occurs when the two arms of a double envelopment complete
their linkup.
D-14. A commander usually creates intervals between the advancing units of
an enveloping force to provide protection from enemy weapons of mass de-
struction (WMD). They can also occur during combat operations as the result
of different rates of advance by combat formations that face dissimilar de-
grees of enemy resistance and different terrain. The encircled enemy at-
tempts to discover intervals and take advantage of them as he tries to escape
from or breakout of the encirclement. Once the enveloping force completes
the linkup that actually creates the encirclement, it must close these inter-
vals as quickly as possible to prevent the enemy from exploiting them.
D-15. The enemy may attempt to cut off the encircling force and extend his
flank beyond the area of the friendly attack. If the commander attempts to
outflank such a hostile extension, it may lead to his own overextension or to a
dangerous separation of the enveloping force from support. It is usually bet-
ter to take advantage of the enemy’s extension and subsequent weakness by
penetrating his thinly held front rather than overextending in an effort to
completely outflank his position. Alternatively—in response to the unfolding
encirclement—the enemy may attempt a frontal, spoiling attack. In this case,
the friendly force in contact defends itself or engages in a delaying operation
while the enveloping force continues the envelopment or moves directly
toward the enemy force in a counterattack.
D-16. The commander of a highly mobile force forming the inner encircling
arm may choose not to establish a continuous series of positions around an
encircled enemy. He may order his forces to occupy only key terrain from
which they can strike at the encircled enemy to prevent him from concentra-
ting forces and to further isolate him. To effectively isolate the enemy, a com-
mander who adopts this technique must be able to detect enemy attempts to
breakout and concentrate sufficient combat power against these attempts to
D-4
Encirclement Operations
thwart them. The commander of the outer encircling arm prevents additional
enemy forces from reinforcing the isolated enemy force or interfering with the
activities of the inner encircling arm.
D-17. Other operations may result in the encirclement of enemy forces. These
include offensive operations that bypass large enemy forces to maintain the
momentum of the force. Reconnaissance and security missions conducted by
the main body must focus on detecting and reporting bypassed units. The
main body should conduct these missions not only to its flanks, but also to its
rear to discover if enemy forces move in behind them. Unit ISR assets should
watch for measures taken by the enemy’s main body to relieve or assist its by-
passed or encircled forces.
D-18. Once the commander decides to destroy an encircled enemy force, he re-
duces the enemy as rapidly as possible to free resources for use elsewhere.
The reduction of an encircled enemy force should continue without interrup-
tion, using the maximum concentration of forces and fires, until the encircled
enemy force’s complete destruction or surrender. A commander may destroy
encircled enemy forces by fires alone or by a combination of fire and move-
ment. The five main methods for reducing an encircled enemy are fire strike,
squeeze, hammer and anvil, wedge, and escape route.
D-19. A fire strike is the massed, synchronized, and nearly simultane-
ous delivery of precision-guided munitions. It is the preferred method
for destroying an encircled enemy force. The initial targets for these muni-
tions are systems that present the greatest danger to the encircling force,
such as the enemy’s WMD, command posts, fire support and air defense sys-
tems, and field fortifications. However, the commander’s ability to use
precision-guided munitions in mass may be limited by the ability of the comb-
at service support (CSS) system to supply them. Therefore, fixed-wing and
rotary-wing aircraft and conventional artillery continue to play an important
role in the destruction of encircled forces. The commander also conducts of-
fensive information operations—such as psychological operations (PSYOP)
and electronic warfare (EW)—against the encircled enemy force. In some sit-
uations, fire strikes result in the rapid destruction of the encircled enemy.
However, destruction is not guaranteed. In most cases, reducing the enemy
pocket requires using ground maneuver forces.
D-20. The squeeze technique uses simul-
taneous, coordinated blows on the enemy
from various directions. (See Figure D-3.)
Following the initial encirclement, the cap-
I
D-5
FM 3-90
D-21. The squeeze technique promotes the enemy’s confusion and rapid dis-
persion of combat power and prevents him from using his reserves in a decis-
ive manner. The commander should shape the operation by initially concen-
trating on destroying enemy command nodes, air defense systems, artillery
systems, and CSS capabilities. These CSS capabilities include any drop zones,
landing zones, or airstrips available to the enemy that would allow him to re-
ceive support from outside the encirclement.
D-22. The hammer and anvil technique em-
HAMMER (MOVING FORCE)
ploys a stationary blocking force as an anvil
on one or more sides of the inner perimeter
while other elements of the encircling force
use offensive action as a hammer to force
the encircled enemy force against the block-
ENY
ENY
ing force. (See Figure D-4.) Either the anvil
or the hammer can destroy the enemy.
Usually the hammer, as the attacking ele-
ment, accomplishes this task. This tech-
nique is most effective when the blocking
force is located on or to the rear of a na- ANVIL (STATIONARY FORCE)
tural terrain obstacle. On favorable terrain,
Figure D-4. Hammer and
an airborne or air assault force can be used
Anvil Technique
as an anvil or a blocking element.
D-23. The wedge technique uses a unit to II
divide enemy forces within the pocket
while the rest of the encircling force re-
mains in place. (See Figure D-5.) This ENY
II
X
technique allows the commander to con-
centrate against a small portion of the en-
circled enemy. However, the encircling
force must maintain pressure on other en-
circled enemy forces to prevent them from ENY
II
D-6
Encirclement Operations
Even total, long-term isolation does not necessarily lead to decisive defeat of
the encircled enemy. It is a temporary measure designed to provide the at-
tacking force additional time.
DEFENDING ENCIRCLED
D-26. An encircled force can continue to defend encircled, conduct a breakout,
exfiltrate toward other friendly forces, or attack deeper into enemy-controlled
territory. The commander’s form of maneuver once his unit becomes encircled
depends on his senior commander’s intent and the factors of METT-TC, in-
cluding the—
· Availability of defensible terrain.
· Relative combat power of friendly and enemy forces.
· Logistic status of the encircled force and its ability to be resupplied, in-
cluding the ability to treat and evacuate wounded soldiers.
· Morale and fighting capacity of the soldiers.
D-27. Encirclement of a friendly force is likely to occur during highly mobile
fluid operations, or when operating in restricted terrain. A unit may find it-
self encircled as a result of its offensive actions, as a detachment left in con-
tact, when defending a strong point, when occupying a combat outpost, or
when defending an isolated defensive position. The commander must antici-
pate becoming encircled when he has a mission as a stay-behind force, or
when he occupies either a strong point or a combat outpost. He must then
make the necessary preparations.
D-28. The senior commander within an encirclement assumes command over
all encircled forces and takes immediate action to protect them. In the confu-
sion leading to an encirclement, it may be difficult to even determine what
units are being encircled, let alone identify the senior commander. However,
the senior commander must be determined as quickly as possible. When that
commander determines he is about to be encircled, he must decide quickly
what assets stay and what assets leave. He immediately informs his superior
of the situation. Simultaneously, he begins to accomplish the following tasks:
· Establish security.
· Reestablish a chain of command.
· Establish a viable defense.
· Maintain morale.
D-29. The commander positions his security elements as far forward as pos-
sible to reestablish contact with the enemy and provide early warning. Vigo-
rous patrolling begins immediately. Each unit clears its position to ensure
that there are no enemy forces within the perimeter. Technical assets, such
as JSTARS and EW systems, augment local security and locate those areas
along the perimeter where the enemy is deploying additional forces.
D-30. The commander reestablishes unity of command. He reorganizes any
fragmented units and places soldiers separated from their parent units under
the control of other units. He establishes a clear chain of command through-
out the encircled force, reestablishes communications with units outside the
encirclement, and adjusts support relationships to reflect the new organiza-
tion.
D-7
FM 3-90
ORGANIZATION OF FORCES
D-31. The commander of the encircled force establishes a perimeter defense.
(Chapter 8 discusses conducting a perimeter defense.) He must be aware of
the unique capabilities and limitations of the different units within the encir-
clement. Therefore, he designs his defense to maximize the capabilities of his
available forces. Forward units establish mutually supporting positions
around the perimeter and in depth along principal avenues of approach.
Units occupy the best available defensible terrain. It may be necessary to at-
tack to seize key or decisive terrain so that it is incorporated within the peri-
meter defense. Once the commander assigns defensive AOs and battle posi-
tions, preparations are the same as in the defense. (See Figure D-6.) Encir-
cled units make their defensive positions as strong as possible given time and
resource constraints. The defensive scheme must anticipate that the enemy
will attempt to split the defenses of the encircled force and defeat it in detail.
II
II
X
II x II
II HHC (+)
II II
II
x II X X
HHC HHC
II
II II II
FSB
II X
x X
FSB
CBT (-)
(-)
II II
II
MI (-) CBT
CBT
X
II
XX
HHC (+)
II X
DISCOM (-)
II
D-32. The encircled force commander establishes a reserve, which must have
sufficient mobility to react in a timely manner. Therefore, given the availabil-
ity of sufficient fuel, the commander uses armored and mechanized infantry
units as his reserve. He centrally positions them to take advantage of interior
lines, which exist if he can shift his forces’ locations or reinforce faster than
the enemy can shift location or reinforce. He can achieve interior lines
through central position (with operations diverging from a central point),
from superior lateral LOCs, or greater tactical mobility. If only dismounted
infantry forces are available, the commander should establish small local re-
serves to react to potential threats. He organizes a mobile antiarmor element
from the best available antiarmor systems. If possible, subordinate echelons
should also retain a reserve.
D-8
Encirclement Operations
D-33. While defending encircled, the commander may use his reserve to limit
penetrations along the perimeter. It may conduct spoiling attacks or vigorous
counterattacks. He initiates a counterattack at the decisive moment and loca-
tion as the enemy force attempts to penetrate the defensive positions.
BOS CONSIDERATIONS
D-34. Divisions and corps may consider relocating their aviation systems to
locations that are not encircled. Aviation can rapidly bring additional fire-
power to bear on the encircling enemy force or rapidly move reaction forces to
threatened locations along the defensive perimeter. Generally, aviation assets
fly out of the encirclement when it becomes small enough to allow the ene-
my’s artillery to range throughout the area.
D-35. The commander centrally controls his fire support systems, such as ar-
tillery, to provide support at numerous points along the perimeter and mass
the effects of his fires. Designating a fire support coordinator for all fire sup-
port systems is a technique for centrally controlling his fires. At lower levels,
mortars from various units may be co-located under centralized control, espe-
cially if there are insufficient artillery assets. The encircled commander also
centrally controls his air defense assets, ensuring that the forward units have
sufficient short-range air defense coverage.
D-36. Generally, engineers concentrate first on countermobility, then surviva-
bility. An encircled force is particularly vulnerable to the enemy’s use of
WMD. Dispersal is difficult in a perimeter-type defense; therefore, the next
best alternative is position hardening by constructing field fortifications.
D-37. Encircled units must closely monitor their logistic assets, especially if
they cannot be resupplied for an extended period. Conservation and central-
ized control of available resources are imperative. The commander may force
his forward units to virtually cease all vehicle movement to allocate remain-
ing fuel assets to the reserve. He retains essential CSS capabilities to sustain
his operations. They fall under the control of a senior logistician. When pos-
sible, the commander positions these units and their assets out of the reach of
potential penetrations in protected and concealed locations. He may incorpo-
rate other CSS units into defensive positions in depth or around key facilities.
He may choose to use soldiers from CSS units as fillers for combat units, al-
though this action may affect his sustainment capabilities.
D-38. Casualty evacuation and mortuary affairs pose particular challenges for
the encircled force. The commander evacuates his wounded from the encircle-
ment whenever possible for humanitarian reasons. This also reduces the lo-
gistic burden of providing long-term medical care to wounded soldiers.
D-39. Soldiers have an inherent fear of being encircled by the enemy. Un-
checked, this fear can lead to a degradation in morale and discipline. When
encircled, soldiers under the firm control of their leaders can withstand the
mental strain. Discipline can disintegrate rapidly in an encirclement. Officers
and NCOs must uphold the highest standards of discipline. Their personal
conduct sets the example. The commander must be seen frequently by his
troops and display a calm and confident manner.
D-9
FM 3-90
D-40. Soldiers in the encirclement must not regard their situation as desper-
ate or hopeless. Commanders and leaders at all levels maintain the confi-
dence of soldiers by resolute action and a positive attitude. They must keep
soldiers informed to suppress rumors. The commander counters enemy
PSYOP by conducting defensive information operations.
ORGANIZATION OF FORCES
D-42. Units typically task organize into a rupture force, follow-and-assume
force, main body, and rear guard to conduct a breakout attack. (Figure D-7).
If sufficient forces exist within the encirclement, the commander can organize
a reserve and a separate diversionary force from his available resources.
Some encircled units will be weakened, and if sufficient combat power does
not exist to resource each of these forces, the commander must prioritize
POINT
OF
ATTACK
RUPTURE FORCE
MAIN BODY
RESERVE
DIVERSIONARY/
SHAPING DIVERSIONARY/
FORCE SHAPING
FORCE
REAR GUARD
D-10
Encirclement Operations
which ones to resource. Normally, his first priority is to resource the rupture
force. He assigns the responsibilities of those unresourced forces to the forces
he can resource. For example, the follow-and-assume force could receive a be-
prepared mission to help extract the rear guard, a mission generally given to
the reserve. Forces located outside the encirclement can assist the breakout
by conducting shaping operations. Above all, the encircled force must main-
tain the momentum of the attack; otherwise, it is more vulnerable to destruc-
tion than it was before the breakout attempt.
D-43. The force must reorganize based on available resources to conduct the
breakout. Without resupply, armored and mechanized infantry units may not
be able to move all of their vehicles during the breakout attack. Priority of
support may be limited to the rupture force and the rear guard, with the re-
maining force keeping only sufficient transportation assets to move the
wounded and critical assets and supplies. The breakout plan should outline
the commander’s destruction criteria for equipment or supplies left behind.
All vehicles, critical munitions and other supplies, and equipment—less
medical—that cannot be moved should be destroyed as soon as possible.
D-44. An encircled force attacks by using the rupture force to penetrate the
enemy defensive positions in at least one location. The commander must pro-
duce overwhelming combat power at each breakout point. The commander
assigns the rupture force, which varies in size from one-third to two-thirds of
the total encircled force, the mission to penetrate the enemy’s encircling posi-
tion, widen the gap, and hold the shoulders of the gap until all other encircled
forces can move through. The rupture force must have sufficient strength to
penetrate the enemy line. This force must use surprise, mobility, and fire-
power to achieve a favorable combat power ratio over the enemy at the point
of attack. (Chapter 3 discusses the penetration as a form of maneuver.)
D-45. Initially, the rupture force is the decisive operation. The attack occurs
at a location where the commander anticipates a successful rupture of the
enemy’s inner ring, which facilitates subsequent operations by enabling the
commander to attack enemy units from their flanks and rear. The rupture
force commander most likely has additional assets attached to his unit, such
as air defense artillery assets or additional engineer soldiers. The commander
should integrate these assets to achieve the rupture.
D-46. The follow-and-assume force follows the rupture attack and is commit-
ted, as necessary, to maintain the momentum of the attack and secure objec-
tives past the rupture. After the rupture force secures a gap in the enemy en-
circlement, the follow-and-assume force normally conducts the decisive opera-
tion until completing linkup operations with another friendly force. When a
unit receives a follow and assume mission in a breakout, its commander must
coordinate closely with the rupture force commander regarding the location of
the gap, the enemy situation at the rupture point, and the enemy situation, if
known, along the direction of attack past the rupture point. The commander
should not assign this force supporting shaping tasks, such as clear routes
and fix bypassed enemy forces, if those tasks would dissipate its available
combat power. If executing these support tasks is vital to the success of the
breakout and resources permit, the commander should designate a separate
follow and support force to perform these tasks.
D-11
FM 3-90
D-47. The main body consists of the main command post, the bulk of the CSS,
the unit’s casualties, and some CS assets. It contains combat forces not re-
quired for other missions and has sufficient combat power to protect itself.
The commander should place one individual in charge of the various elements
of the main body to ensure orderly movement. Typically, the main body estab-
lishes a flank security force that deploys once the main body passes through
the point of penetration and performs flank screen or a guard mission.
D-48. The rear guard consists of soldiers and equipment left on the perimeter
to provide protection for the rupture attack and any shaping operations, such
as diversionary forces. Forces left in contact must conduct a vigorous delaying
operation on the perimeter so that no portion of the rear guard gets cut off.
Under a single commander, the rear guard protects the main body from at-
tack while it moves from the area. In addition to providing security, the rear
guard deceives the enemy about the intentions of the encircled force, simu-
lating its activities until the main body clears the gap.
D-49. The primary purpose of a reserve is to retain flexibility through offen-
sive action. The commander makes every attempt to keep a small portion of
the encircled force uncommitted so he can employ it at the decisive moment
to ensure the success of the breakout. The situation may preclude establish-
ing a separate reserve force because of the need to resource either the rupture
force, the follow-and-assume force, or the rear guard. In this event, the com-
mander assigns and prioritizes various be-prepared missions to the follow-
and-assume force.
D-50. A successful diversion is important to the success of any breakout op-
eration. If the diversion fails to deceive the enemy regarding the intentions of
the encircled force, he could direct his full combat power at the rupture point.
On the other hand, the diversionary force may rupture the enemy’s lines. If a
rupture occurs, the diversion force commander must know the intent of the
commander of the encircled force. The encircled force commander may choose
to exploit the success of forces conducting a diversion, or he may have to dis-
engage them for use elsewhere in the breakout attempt.
CONTROL MEASURES
D-51. As a minimum, a commander uses boundaries; a line of departure (LD)
or line of contact; time of the attack; phase lines; axis of advance or direction
of attack; objectives; and a limit of advance (LOA) to control and synchronize
the breakout. (Chapter 2 describes using boundaries and phase lines. Chap-
ter 3 discusses using axis of advance, direction of attack, objectives, LD or
line of contact, LOA, and time of attack.) The commander imposes only those
control measures necessary to synchronize his operations.
PLANNING A BREAKOUT
D-52. The commander should initiate a breakout attack as quickly as possible
after the enemy encircles his force. While detailed combat information about
the enemy’s disposition is probably not available, the enemy is normally dis-
organized at that point in time and is least likely to respond in a coordinated
manner. The enemy has not yet brought in sufficient combat power to en-
circle the friendly force in strength, and weak points exist in his perimeter.
D-12
Encirclement Operations
However, sometimes the commander will not attempt a breakout until all
other options fail.
D-53. Early in an encirclement, there are gaps between or weaknesses in the
enemy’s encircling forces. The commander uses his available ISR assets to
provide information that increases the accuracy of his situational under-
standing and determines enemy weak points. The commander plans for the
breakout attack to capitalize on identified weak points. Although the re-
sulting attack may be along a less-direct route or over less-favorable terrain,
it is the best course of action (COA) because it avoids enemy strength and in-
creases the chance for surprise.
D-54. An encircled force may be operating under adverse conditions and may
not have all of its ISR systems operating. This forces the commander to op-
erate with low levels of intelligence regarding enemy strengths, weaknesses,
and intentions. Within this environment, he should conduct aggressive recon-
naissance to gather information on the enemy. The commander should also
obtain information from long-range surveillance units, stay-behind units, and
special operations forces in the area. If the enemy is in close contact, the com-
mander may be forced to conduct a reconnaissance in force to ascertain infor-
mation on enemy strengths. In either case, he must select a COA quickly and
develop a plan accordingly.
D-55. A shaping operation, such as a diversionary attack, can assist a break-
out by diverting enemy attention and resources away from the rupture effort.
The force conducting shaping operations may be located either inside or out-
side the encirclement area. The enemy must regard the efforts of this force as
credible and a threat to the continuity of his maneuver plan. The commander
should direct the force’s efforts to a point where the enemy might expect a
breakout or relief effort. The diversionary force is as mobile as available vehi-
cles, fuel stocks, and trafficability allow so it can reposition to take part in the
breakout or maneuver elsewhere to support the breakout. Mobile, self-pro-
pelled weapon systems suit the needs of forces conducting shaping opera-
tions. Additionally, the probability of a successful breakout increases measur-
ably if another friendly force attacks toward the encircled force as it attempts
to breakout.
D-56. The commander conducts offensive information operations to assist the
breakout attempt. Deception operations mislead the enemy about the inten-
tions of the encircled force, especially the location of the breakout attempt. If
it is not possible to breakout immediately, the commander attempts to de-
ceive the enemy regarding the time and place of the breakout by concealing
his preparations and changing positions. He can also give the appearance
that the force will make a resolute stand and await relief.
D-57. The commander can use dummy radio traffic for the enemy to monitor
or landlines that he might tap to convey false information. The breakout
should not be along the obvious route toward friendly lines unless there is no
other alternative. In this respect, the preparations for a breakout mirror the
preparations for any other type or form of offensive operations. As in other of-
fensive actions, secrecy, deception, and surprise allow for success. The other
planning considerations for the breakout are the same as for any other
attack.
D-13
FM 3-90
EXECUTING A BREAKOUT
D-58. The commander exploits darkness and limited visibility during a break-
out if his encircled forces have superior night-operations capabilities. The
cover of darkness, fog, smoke, or severe weather conditions favor the break-
out because the encircling enemy weapons are normally less effective then.
The enemy has difficulty following the movements of the breakout force dur-
ing conditions of limited visibility. However, if the encircled force commander
waits for darkness or limited visibility, the enemy may have time to consoli-
date his containment positions. If friendly forces enjoy air superiority, they
may initiate a breakout attack during daylight to fully exploit the capabilities
of close air support.
D-59. The unit takes all possible precautions to deceive the enemy about the
location of the decisive operation. The rupture force minimizes occupation of
attack positions before starting the breakout. A commander may require one
or more shaping operations to assist the rupture force in penetrating enemy
positions and expanding the shoulders. He may use feints and demonstra-
tions to deceive the enemy concerning the location and time of the decisive
operation. However, diversionary attacks need not always occur first.
D-60. The commander organizes and controls his rupture force as he would
an attack or movement to contact. (See Figure D-8.) The rupture force gener-
ates overwhelming combat power at the point of penetration and attempts to
rapidly overwhelm enemy positions and expand the penetration. A command-
er hard pressed to generate sufficient combat power for both the rupture force
and the perimeter defense can thin his defensive perimeter in certain areas
by using a detachment left in contact in conjunction with a withdrawal prior
to executing the attack. He may also shorten the perimeter’s length, which re-
duces the size of the area occupied by the encircled force.
{
X 1 ATK HEL BN (OPCON)
G
X 3 AR BNS
X XX
2 MECH BNS
REAR (-) 2 FA BNS
GUARD FOLLOW AND
RUPTURE
G MAIN ASSUME FORCE FORCE DIV CAV SQDN
BODY
D-14
Encirclement Operations
D-61. The rupture forces applies the breaching fundamentals of suppress, ob-
scure, secure, reduce, and assault to ensure its success at the point of pene-
tration. These fundamentals always apply, but their application will vary
based on the prevailing factors of METT-TC. FM 3-34.2 defines these breach-
ing fundamentals and provides guidance regarding the organization of forces,
control measures, and planning, preparation, execution, and assessment con-
siderations of combined arms breaching operations.
D-62. If enemy forces at the point of penetration have roughly the same com-
bat power as the rupture force, the commander orders the rupture force to
hold the shoulders of the penetration while the follow-and-assume force
moves forward. It then becomes the decisive operation. (See Figure D-9.) If
the enemy is not in strength, the commander may have the rupture force con-
tinue its attack. If there are no identified enemy formations beyond the pene-
tration, the rupture force may transition to a movement to contact. After the
encircled friendly force breaks out, it moves toward other friendly forces and
links up with them. The next section addresses the control measures and con-
siderations associated with conducting a linkup.
PL JOHN
D6-3. PL DAN
PL MARK
RUPTURE FORCE
(MOST ASSETS TRANSFERRED
TO FOLLOW & ASSUME FORCE)
II
G C
XX X II
X II
Rear (-) (+)
Guard MAIN BODY
FOLLOW & ASSUME C
G RESERVE II FORCE
PL MARK
PL JOHN PL DAN
D-63. Initially, the follow-and-assume force passes through the gap created by
the rupture force. It is essential that this force continue to move rapidly from
the encircled area toward its final objective. If the follow-and-assume force
becomes the encircled commander’s decisive operation, it cannot allow itself to
become bogged down. Preparatory fires by artillery, Army aviation, close air
support, and air interdiction may help the follow-and-assume force in main-
taining momentum out of the encircled area.
D-15
FM 3-90
D-64. Once the breakout attack starts, the rear guard and any diversion
forces disengage or delay toward the area of the rupture. Perimeter forces
integrate smoothly into the rear of the breakout column. The commander
shifts his priority of fires as required by METT-TC once the breakout occurs.
D-65. As other encircled units support or move through the area of penetra-
tion, the rear guard commander must spread his forces over an extended
area. This requires flexibility and mobility by the rear guard. The perimeter
must withstand enemy pressure. If the enemy succeeds in destroying or en-
circling the original rear guard in the breakout process, the commander must
reconstitute a new rear guard.
D-66. The main body follows the follow-and-assume force. It moves rapidly as
a single unit on multiple routes in an approach march or road march forma-
tion immediately behind the follow-and-assume force, protected on its flanks
by security elements. It contains sufficient combat power to protect itself and
reinforce the flank or rear security forces if they come under attack.
D-67. Normally, the rear guard initially conducts a withdrawal to break con-
tact with the enemy forces around the perimeter. It contracts the perimeter
as it delays back behind the main body. If the enemy closely pursues the
breakout force, the efforts of the rear guard may become the decisive op-
eration for the encircled force. The commander should position the reserve
where it can also support the rear guard.
D-68. Initially, the priority for fire support is with the rupture force and
should focus on suppressing and obscuring the point of penetration. Fire sup-
port assets move as part of the main body and rear guard so security forces
have adequate fire support. Target identification difficulties resulting from
close proximity and intermixing of forces, as well as the rapidly changing
ground situation during the execution of a breakout, make the provision of
close air support difficult.
D-69. Engineers with the rupture force focus on mobility operations. Engi-
neers with the follow-and-assume force or the reserve improve routes as nec-
essary. Engineers supporting flank security elements focus on conducting
countermobility operations. The rear guard must also have enough engineers
to conduct countermobility operations.
D-70. The commander prioritizes his air defense assets to protect the rupture
force, the rear guard, and the main body. The rear guard is second in priority
of protection to help prevent it from being overrun by an enemy pursuit tar-
geted at the main body. The commander must dedicate air defense systems to
cover critical points through which the encircled force will pass.
D-71. The commander can relieve his logistics shortfalls by using aerial re-
supply, ordering external forces to establish support areas, and by using cap-
tured supplies. All units and vehicles carry the maximum supplies possible,
with emphasis on carrying POL and ammunition. The encircled force only
takes vehicles it can support. It may be possible for the higher headquarters
of the encircled force to establish an intermediate support base as the break-
out attack moves toward a linkup.
D-16
Encirclement Operations
EXFILTRATION
D-72. If the success of a breakout attack appears questionable, or if it fails
and a relief operation is not planned, one way to preserve a portion of the
force might be through organized exfiltration. (Appendix B describes exfiltra-
tion as a tactical mission task.)
LINKUP
D-75. A linkup is a meeting of friendly ground forces, which occurs in
a variety of circumstances. It happens when an advancing force reaches
an objective area previously seized by an airborne or air assault; when an en-
circled element breaks out to rejoin friendly forces or a force comes to the re-
lief of an encircled force; and when converging maneuver forces meet. Both
forces may be moving toward each other, or one may be stationary. Whenever
possible, joining forces exchange as much information as possible before start-
ing an operation.
D-76. The headquarters ordering the linkup establishes—
· A common operational picture.
· Command relationship and responsibilities of each force before, during,
and after linkup.
· Coordination of fire support before, during, and after linkup, including
control measures.
· Linkup method.
· Recognition signals and communication procedures to use, include-ing
pyrotechnics, armbands, vehicle markings, gun-tube orientation,
panels, colored smoke, lights, and challenge and passwords.
· Operations to conduct following linkup.
CONTROL MEASURES
D-77. The commander establishes minimum control measures for units con-
ducting a linkup. He assigns each unit an AO defined by lateral boundaries
and a RFL that also acts as a LOA. The commander establishes a no-fire area
around one or both forces and establishes a coordinated fire line beyond the
D-17
FM 3-90
area where the forces linkup. The linkup forces use the linkup points estab-
lished by the commander to initiate physical contact. The commander desig-
nates alternate linkup points since enemy action may interfere with the pri-
mary linkup points. He adjusts such control measures during the operation to
provide for freedom of action as well as positive control.
EXECUTION
D-78. There are two methods of conducting a linkup. The preferred method is
when the moving force has an assigned LOA near the other force and con-
ducts the linkup at predetermined contact points. Units then coordinate fur-
ther operations. The commander uses the other method during highly fluid
mobile operations when the enemy force escapes from a potential encircle-
ment, or when one of the linkup forces is at risk and requires immediate rein-
forcement. In this method, the moving force continues to move and conduct
long-range recognition via radio or other measures, stopping only when it
makes physical contact with the other force.
D-79. When one of the units involved is stationary, the commander usually lo-
cates the linkup points near the RFL/LOA. (See Figure D-10.) The linkup
points are also located near the stationary force’s security elements. Station-
ary forces assist in the linkup by opening lanes in minefields, breaching or re-
moving selected obstacles, furnishing guides, and designating assembly
areas. When a moving force is coming to relieve an encircled force, it brings
additional logistics assets to restore the encircled unit’s combat effectiveness
to the desired level.
LOA CFL
LINKUP OPERATIONS
LAST STAGE
RFL/LOA LU 13 STATIONARY
CFL FORCE
LU 24
LINKUP FORCE
RFL/LOA
CFL
LOA
D-80. Linkup between moving units is one of the most difficult operations.
The commander establishes a LOA to prevent fratricide. He establishes
D-18
Encirclement Operations
primary and alternate linkup points for the moving forces near the LOA. Fire
support considerations are similar to when a stationary and moving force
linkup. Leading elements of each force should exchange liaison teams and be
on a common radio net. (See Figure D-11.)
3
X
1 II II II
LU 31
LU 42
LU 8
1
LO A/RFL X OBJ JASON
O/O
2
52ID(M)
II
II
I
S
S S
52ID
XX
25AD
Figure D-11. Linkup of Two Moving Forces
D-81. The commander must carefully coordinate linkup operations with forces
of other nations. This is especially true if the two armies are not both
members of an alliance with established internationally standardized
procedures, or if the units involved have not previously established the
necessary procedures.
D-19
Appendix E
This appendix provides basic guidance for commanders and staff officers
on the organization of forces, control measures, and planning, preparing,
and executing considerations pertaining to rear area and base security
and route and convoy security operations. The tactics and techniques ex-
pressed in this appendix are applicable across the full spectrum of opera-
tions (offense, defense, stability, and support). However, commanders
must interpret them in accordance with the enemy’s capabilities. For ex-
ample, the physical layout of a base will be vastly different if the enemy
has a significant air capability than if the enemy has no air capability.
The purpose of rear area and base security operations is to prevent inter-
ruption of current and future operations. Rear area and base security op-
erations constitute one of the five elements that constitute sustaining op-
erations. (See FM 3-0 for a discussion of sustaining operations as part of
the battlefield framework.)
CONTENTS
Command Responsibilities ......................... E-1 Preparing a Base Defense .....................E-23
DOD Civilians and Contractors ............... E-2 Executing a Base Defense .....................E-25
Command Relationships ......................... E-3 Route Security ............................................E-31
Base ........................................................... E-4 Passive Security .....................................E-32
Base Cluster.............................................. E-6 Route Reconnaissance ..........................E-32
Control Exercised by US Area Cordon Security......................................E-32
Commanders............................................. E-7 Combat Security .....................................E-33
Threat Levels ............................................ E-7 Convoy Security .........................................E-33
Utility of Different Locations ................... E-8 Organization of a Convoy Escort..........E-34
Political Considerations Impacting Convoy Control Measures .....................E-35
the Rear Area ............................................ E-9 Planning Convoy Operations ................E-36
Base and Base Cluster Defense ............... E-10 Preparing Convoy Security Measures..E-38
Organization of Forces .......................... E-10 Executing Convoy Security
Control Measures ................................... E-15 Operations...............................................E-38
Planning Considerations ....................... E-15
E-0
Rear Area and Base Security
COMMAND RESPONSIBILITIES
E-1. One of the fundamental
considerations in rear area ECHELON
and base security is the resolu- COMMANDER
tion of command authority.
The echelon commander must
clearly define command rela- SUPPORT REAR AREA COMMANDER
tionships before initiating any COMMAND/ OR COMMANDER
operations. A conflict of in- FUNCTIONAL ASSIGNED AN
COMMAND AREA SECURITY MISSION
terest can occur if command
relationships and responsibili-
ties for rear area and base BASE/ COMBAT
security are not clearly identi- BASE CLUSTER FORCES
fied. All tenant units in a
specific geographical area are OPCON
responsible to the commander TACTICAL CONTROL WHEN COMMITTED
TO SECURITY OPERATIONS
of that area for rear area and
base security. Therefore, a Figure E-1. OPCON versus TACON in
rear area commander has tac- Rear Area and Base Security
tical control (TACON) over
tenant units for conducting rear area and base security. The echelon com-
mander resolves conflicts between the tactical and functional command ele-
ments. (See Figure E-1.)
E-2. There are units subordinate to commanders other than the echelon com-
mander located throughout an echelon’s rear area. Many units operating in
the rear areas of a corps, division, or brigade are not organic to those eche-
lons. For example, units from the theater support command and other thea-
ter organizations, such as the theater signal command or theater engineer
command, operate within the corps rear area. The division has elements of
corps support groups (forward) and other corps organizations, such as a corps
signal battalion, operating within the division rear area. The brigade many
have elements of theater, corps, and division organizations operating within
its rear area.
E-3. However, an echelon rear area, base cluster, or base commander is re-
sponsible for the rear area and base security of all units in his assigned area.
The echelon rear area commander has the authority for terrain management
within the echelon rear area and assigns every unit to a base or base cluster.
All units assigned to a base or base cluster are TACON to the commander of
that base or base cluster when an emergency or tactical situation requires
the implementation of rear area and base security measures unless specifi-
cally exempted by order of the echelon commander.
E-4. The echelon commander establishes the relationships between the sub-
ordinate forces of different countries occupying the same geographical area.
This structure unifies the different forces to the maximum degree feasible.
Resulting language, doctrinal, and philosophical differences may be resolved
by—
· Recognizing national affinities and permitting homogenous elements to
operate together.
E-1
FM 3-90
E-2
Rear Area and Base Security
COMMAND RELATIONSHIPS
E-11. The success of rear area and base security hinges on binding together
diverse resources. The commander must meet the following requirements to
eliminate a potential confusion and to achieve a cohesive effort—
· There must be a single responsible commander.
· Geographical areas of operations (AOs) and thus responsibility must be
clearly defined.
E-12. Overall responsibility for conducting sustaining operations in a com-
mander’s AO rests with the commander. Because the commander cannot af-
ford to focus strictly on sustaining operations he assigns that responsibility to
another officer and gives that individual a staff to help him accomplish that
operation. The individual responsible for a tactical echelon’s sustaining op-
erations is called the rear area commander.
E-13. A corps commander normally assigns the mission of sustaining opera-
tion to the deputy corps commander. In a similar manner, the assistant divi-
sion commander (support) is responsible to the division commander for sus-
taining operations in the division rear area. The forward support battalion
commander supporting the brigade is normally responsible to the maneuver
brigade commander for sustaining operations in the brigade rear area. While
the echelon commander has the authority to designate someone else as the
echelon’s rear area commander, doing so complicates staff relationships.
E-14. The responsible rear area commander at each of these three echelons
uses the echelon rear command post to monitor the echelon’s sustaining op-
erations. This assures the synchronization of the five elements of sustaining
operations and an orderly, effective, and timely escalation when conducting
rear area and base security. This encompasses the use of host nation and or-
ganic combat support (CS) and combat service support (CSS) units through
employing a tactical combat force (TCF). The echelon rear command post de-
velops plans integrating the rear area and base security activities of all units
located within the echelon rear area. Each echelon rear area commander has
the authority to further divide the echelon rear area into subordinate AOs,
base clusters, and bases.
E-15. A rear operations center (ROC) provides the corps or division rear area
commander with the nucleus of an operations cell within the corps or division
rear command post. It is a reserve component organization since the func-
tions it performs are not required in garrison. It contains no organic life sup-
port capabilities, such as mess, supply, and maintenance, and relies on the
echelon headquarters’ commandant for those functions. The soldiers assigned
in peacetime to these organization lose their separate identity after being
activated and deployed. They are assigned to the corps or division head-
quarters company and become the rear command post representatives of the
echelon G2 and G3.
E-16. A corps rear area commander generally subdivides the corps rear area
into subordinate AOs that correspond to the AOs of his subordinate corps
support groups. A rear area operations center (RAOC) provides the corps sup-
port group commander with a greatly increased plans and operations capabil-
ity for his operations center to assist in conducting terrain management, rear
area and base defense, movement control and area damage control (ADC)
E-3
FM 3-90
within his AO. It also provides him a limited capability to conduct liaison
with subordinate base cluster defense operations centers (BCOCs) and base
defense operations centers (BDOCs). (See Figure E-2.)
XXX
HQS
REAR
CSS OPS
BDOC
BDOC BDOC
BDOC BDOC
BDOC BDOC
BDOC BDOC
BDOC BDOC BDOC
BDOC
BDOC BDOC
BDOC BDOC
BDOC BDOC
BDOC BDOC
BDOC BDOC
BDOC
BDOC BDOC BDOC BDOC
BASE
E-19. A base is a locality from which operations are projected or supported
(JP 1-02). It can contain one unit or multiple units. It has a defined peri-
meter, established access controls, and is situated and configured to take ad-
vantage of natural and man-made terrain features. Missions and security
considerations determine the selection of a base site. To nullify or reduce the
effectiveness of enemy attack, the rear area commander assigns all units lo-
cated in the rear area that are not actively involved in operations to a base.
E-4
Rear Area and Base Security
Base Commander
E-20. In base defense operations, the base commander is the officer assigned
to command a base (JP 1-02). The base commander is responsible for de-
fending his base. He is normally the senior Army competitive category officer
on the base unless the base contains only medical units. He exercises C2 over
the base and necessary control of resident and transient units. The base com-
mander’s responsibilities include establishing the overall base defense org-
anization as well as planning, preparing, executing, and assessing all local
security measures. This includes the tactical control of US Navy, Air Force,
and Marine Corps forces assigned to the base primarily for the purpose of
local base defense, such as a US Air Force security flight. Forces of other ser-
vices or functional components assigned or attached to the base for primary
purposes other than local base defense will support local base defense during
an imminent attack or threat of an attack. For more information on joint rear
area and base security see JPs 3-10 and 3-10.1.
E-21. The base commander uses all assets within the base perimeter to create
the required level of local security. He has the authority to position units as-
signed to his base in mutually supporting positions. He directs employing of
obstacles, such as wire- and command-detonated antipersonnel mines, to de-
fend each base within the guidance of his rules of engagement (ROE). He
identifies shortages in materiel or weaknesses in required defensive capabili-
ties early and requests the necessary reinforcements and supplies to correct
those weaknesses.
E-22. A base commander is also usually a battalion commander, and the
BDOC forms around the nucleus provided by his battalion staff. The echelon
rear area commander normally does not assign the function of base command
to MP commanders because of their need to exercise command over MP ele-
ments responding to Level II threats within the echelon rear area.
E-5
FM 3-90
the BDOC. The base commander provides other BOS representatives to his
BDF commander on an “as required” basis. Multiservice, other agency, and
multinational representation, with decision making authority, is present in
the BDOC when elements of their armed forces, police, or paramilitary forces
are directly involved in the overall base defense effort.
E-25. The center consists of two primary sections—the command section and
the plans and operations section—with additional sections as deemed neces-
sary. These additional sections could include a CSS section to plan the provi-
sion of services and support to the base, and an ADC section that provides in-
spection, planning, and control of the base’s ADC resources. This center is
fully manned and operates continuously. It primary functions are—
· Keeping the base commander informed of the current situation within
his AO, including enemy, friendly, and civilian activities.
· Preparing comprehensive plans to implement the commander’s overall
base defense and security guidance.
· Ensuring the participation of all units within the base perimeter in
conducting active and passive defense and security measures.
· Reducing any conflicting interests inherent in multiservice or multina-
tional BDF environment.
· Providing centralized collection and processing of information from
various intelligence and operational sources and disseminating resul-
tant intelligence products as appropriate.
· Providing the essential C2 organization necessary to conduct coordi-
nated defensive operations.
E-26. The base commander establishes the BDF from available base CS and
CSS assets if MP and combat arms units are not available to provide the nec-
essary local security. He designates the BDF commander to avoid confusion
and provides that individual necessary guidance.
BASE CLUSTER
E-27. A base cluster in base defense operations, is a collection of bases, geo-
graphically grouped for mutual protection and ease of command and control
(JP 3-10). A base cluster normally does not have a defined perimeter or estab-
lished access points. The base cluster is normally the next higher tactical C2
headquarters of the base. A base cluster typically contains five bases but can
range from two to seven bases. The rear area commander designates each
base cluster and assigns it either a name or an alphanumeric designation.
E-6
Rear Area and Base Security
THREAT LEVELS
E-31. Threats to bases in the rear area are categorized by the three levels of
defense required to counter them. Any or all levels may exist simultaneously
in the rear area. Emphasis on specific base defense and security measures
may depend on the anticipated threat level. A Level I threat is a small ene-
my force that can be defeated by CS and CSS units operating in the
rear area or by the perimeter defenses established by friendly bases
and base clusters. A Level I threat for a typical base consists of a squad-
size unit or smaller groups of enemy soldiers, agents, or terrorists. Typical ob-
jectives for a Level I threat include supplying themselves from friendly sup-
ply stocks; disrupting friendly C2, logistics, and facilities; and interdicting
friendly lines of communication (LOC).
E-32. A Level II threat is enemy activities that can be defeated by a
base or base cluster augmented by a response force. A typical response
force is a MP platoon; however, it can be a combat arms maneuver element.
Level II threats consist of enemy special operations teams, long-range recon-
naissance units, mounted or dismounted combat reconnaissance teams, and
partially attritted small combat units. Typical objectives for a Level II threat
include the destruction, as well as the disruption, of friendly C2 and logistics
and commercial facilities, and the interdiction of friendly LOCs.
E-7
FM 3-90
E-33. A Level III threat is beyond the defensive capability of both the
base and base cluster and any local reserve or response force. It nor-
mally consists of a mobile enemy force. The friendly response to a Level III
threat is a TCF. Possible objectives for a Level III threat include seizing key
terrain, interfering with the movement and commitment of reserves and
artillery, and destroying friendly combat forces. Its objectives could also in-
clude destroying friendly CSS facilities, supply points, command post facili-
ties, airfields, aviation assembly areas, arming and refueling points, and in-
terdicting LOCs and major supply routes.
E-8
Rear Area and Base Security
the responsibility for detecting and countering enemy activity in those areas
to the host nation.
Forcible Entry
E-43. Forcible entry entails the seizure of terrain and facilities from enemy
forces. Depending on circumstances, the operation may require the removal
of existing civil or martial governmental apparatus or the restoration of a
suppressed government. In the absence of civil authority, Army forces estab-
lish measures to control the civilian population and provide basic services.
When US combat forces enter enemy territory to occupy it, initial disclosure
of the nature and extent of US authority should include basic occupation
directives in accordance with the laws of land warfare and CA doctrine. (See
FMs 1-27.10 and 3-57.) These actions include issuing necessary proclama-
tions concerning US authority as it relates to civil government, curfew,
E-9
FM 3-90
movement control, public order, and similar matters. Civil affairs units ini-
tiate, coordinate, and supervise local compliance with these directives.
ORGANIZATION OF FORCES
E-48. The rear area commander uses a combination of base and base cluster
defense forces, designated response forces, and TCF, to provide the required
security within the echelon rear area. Special operations forces (SOF) may
conduct counterterrorism operations within the rear area on an exception
basis.
E-10
Rear Area and Base Security
assets provided by each unit on the base toward the ongoing security re-
quirements of the base. These assets include crews, weapon systems, and
radios of combat vehicles temporarily located on the base for maintenance or
other reasons. It may consist of MP, infantry, armor, or cavalry units when
the echelon commander’s mission focuses on stability or support operations.
The mission of the BDF is to conduct reaction operations to deter, resist, or
destroy an enemy Level I force attacking the base. The BDF must be suffi-
ciently flexible to defend the base perimeter, provide for the base’s interior
guard requirements, and conduct local offensive operations beyond the base
perimeter if allowed by the host nation.
E-50. The base commander
Base
normally appoints a BDF Commander
commander to assist in
executing base defense Base Defense
Operations Center
functions. He tasks units (BDOC)
located within the base to
provide soldiers, equip-
BDF
ment, and materiel to form Commander
Emergency
Augmentation
the BDF. The principal From
Base Units
I
BDF tactical increments I
I
are normally provisionally BDF Security
HQ Security
organized security pla- Security
Security
toons. (See Figure E-3.)
The base commander or-
ganizes his BDF as re- Figure E-3. Typical Base Defense Organization
quired by the intensity of
enemy activity within the rear area.
E-51. A BDF should have a high degree of direct-fire lethality provided by a
mixture of small arms, automatic weapons, and antitank systems. It should
also have access to supporting indirect fires, a high degree of tactical mobil-
ity, and a reasonable span of control. It should be capable of—
· Conducting reconnaissance patrols for detecting and reporting the loca-
tion, strength, and capabilities of enemy forces located near the base.
· Developing positions within and outside the base from which enemy
advances can be stopped or destroyed.
· Using reserve elements to attack relatively small enemy units that
threaten to penetrate the base perimeter.
· Providing internal security for critical capabilities located on the base.
The base commander must reconcile any issues about personnel and equip-
ment resources shortfalls affecting the BDF and the desired level of security.
E-52. Most CS and CSS companies can provide a platoon-size security ele-
ment toward the defense of their assigned base. (Figure E-4 on page E-12
shows a possible organization of such a security platoon.) A base having more
than one security platoon also establishes a provisional security company
headquarters for the BDF. The BDF commander will be the commander of
this provisional security company. Most CS and CSS battalion headquarters
can provide the resources for a provisional security company headquarters.
The BDF commander designates a portion of the available security force as
E-11
FM 3-90
Security
Platoon
1 Officer/21 Enlisted
E-12
Rear Area and Base Security
E-13
FM 3-90
E-14
Rear Area and Base Security
between units common to the rear area. The TCF must be as mobile as the
enemy. It should be capable of destroying armor-protected vehicles and dis-
mounted infantry and of suppressing enemy shortrange air defense
(SHORAD) systems. Consequently, a TCF typically consists of infantry, Army
aviation (attack and utility helicopters), and air cavalry elements with engi-
neer and field artillery support. The commander may also organize a TCF
with armored cavalry, armor, and mechanized infantry units if the situation
so dictates.
E-64. The commander strives to obtain tactical self-sufficiency within both
the response force and the TCF. He does this by attaching or placing in direct
support adequate fire support, CS, and CSS elements so that they can per-
form semiindependent operations. In addition, he must obtain resources,
such as CA, PSYOPS, and interpreters, for interacting with the civilian popu-
lation of the area being secured.
CONTROL MEASURES
E-66. Control measures in base defense operations are the same as those
used in other defensive operations. (See Figure E-5, page E-16.) The head-
quarters establishing the base or base cluster designates the base’s AO using
rear, lateral, and forward boundaries. The AO for the base may or may not be
contiguous to the AO of other units. The echelon rear area commander may
further subdivide his assigned area into subordinate AOs, bases, and base
clusters. He can assign maneuver forces to assembly areas and battle posi-
tions. He establishes phase lines, contact points, objectives, and checkpoints
as necessary to control his maneuver. He establishes fire support coordi-
nating measures (FSCM) to permit or restrict fires in and around the base.
(See Chapters 2, 3, and 8 and FM 3-09 for a discussion of FSCM.) No-fire
areas may be required to protect civilians, prevent disruption of sustaining
operations, or protect combat outposts, observation posts, and patrols from
friendly fire. All established control graphics are coordinated with host nation
agencies to minimize interference, misunderstandings, and unnecessary col-
lateral damage. The BDF commander, in coordination with the base com-
mander, designates the base perimeter, target reference points, and sectors of
fire to organizations located within the base.
PLANNING CONSIDERATIONS
E-67. The echelon commander designs his rear area and base security system
to ensure—
· Maximum effectiveness of BDFs provided by CS and CSS units.
E-15
FM 3-90
3
MS 108
MP
I
II
CSB
BASE CLUSTER
RM
AN
ICO
I
CON
543
I HARRINGTON
E
555 PS
RE II 993
CSB I
501
II
102
II
II
I
447
II
NFA NFA CSB
917 CSG 917 CSG 711
EFF 051000ZAUG05 EFF 051000ZAUG05
III
CSG
917
GRIFFIN
II
MS
13 RM
AN
70 7
M15 ICO SPHINX
M17 RE I
881
I
NFA
917 CSG
EFF 051000ZAUG05 663
E-16
Rear Area and Base Security
E-17
FM 3-90
can produce a combined arms effect. Synchronizing forces and fires produces
a synergy capable of defeating a larger enemy force. This synergy results
from making enemy movement difficult or impossible and by causing a reac-
tion that may make enemy forces more vulnerable to other friendly capabili-
ties. Periodic rehearsals of security plans ensure effectiveness of the alert
system, proficiency of key individuals, and identification of potential problem
areas.
E-77. Balance Base Security with Political and Legal Constraints.
Base security may have to be designed around numerous political con-
straints.
E-78. Know the ROE. The base commander and his subordinates must com-
ply with established ROE. He ensures the reconciliation of any inconsisten-
cies between service component and multinational ROE.
E-79. Responsiveness. The echelon rear area commander and his subordi-
nate base cluster and base commanders have the authority and the capability
to communicate operational requirements directly to units located within
their AOs. The chain of command frequently changes from the functional to
the tactical chain of command after implementing a rear area and base secur-
ity plan. Therefore, the rear area commander must critically analyze and test
his communication systems that filter through various levels of command to
assure that they are responsive under given emergency conditions. The eche-
lon rear area commander establishes direct communication links between the
echelon rear command post and its subordinate base cluster and base opera-
tions centers if existing information systems are not adequate to transmit
rear area and base security-related information to those centers in a timely
manner.
E-80. Responsiveness may be attained by many different procedures and
capabilities, some of which are listed below:
· Clearly established authority granted to base cluster and base com-
manders.
· A wide-area information system that provides a flexible warning sys-
tem for a large variety of situations.
· Continuous identification and tracking of resources that can assist in
providing rear area and base security, such as maintenance float wea-
pon systems and replacement crews.
· Response forces have communication systems capable of using the
existing wide-area information systems to communicate directly with
the threatened BDOC. They also can communicate with the BCOC lo-
cated in the threatened base cluster and the echelon rear command
post.
· MP forces responding to Level II rear area threats have combat vehi-
cles with a mixture of firepower, armor protection, and a high degree of
tactical mobility.
· Identifying dual-capable units. For example, a rear area security force
identified to respond to Level I or Level II threats also has capabilities
to perform rescue or provide labor in an ADC mission. However, a rear
area security element is not concurrently identified as an ADC ele-
ment.
E-18
Rear Area and Base Security
E-19
FM 3-90
E-20
Rear Area and Base Security
friendly force. Soldiers must understand this and follow strict ROE when
conducting sustaining operations.
E-92. Because of the decentralized nature of sustaining operations and the
intermingling of military forces and civilians, the commander must address
fratricide prevention when planning for rear area and base security. Fires
that miss their intended targets can affect other forces, routes, and installa-
tions in the secured area. When considering a COA, the commander weighs
the risk of fratricide against losses to enemy fire.
E-93. Fire Support. Artillery and mortars, if available, are the fastest
means of responding to intruders beyond the base perimeter in the absence of
maneuver forces positioned there. The commander desires the designation of
a free-fire area beyond the base perimeter to allow for the optimum employ-
ment of available fire support systems. He positions no-fire or restricted fire
areas over locations occupied by civilians and friendly forces operating out-
side the base, such as patrols and observation posts. These areas are large
enough to provide the necessary degree of standoff protection.
E-94. Air Defense. Air and missile attacks are perhaps the greatest threats
to units in the rear area. Rear area bases normally rely on passive air defense
for protection against enemy air threats. Most rear area bases will not be
supported by SHORAD systems. They will normally be located within the
coverage provide by high- to medium-altitude air defense (HIMAD) systems.
They will not normally control the positioning of HIMAD systems. (Chapter 8
discusses passive and active air defense considerations. Ballistic missile de-
fense is an operational-level task addressed in FM 3-01.12.)
E-95. Mobility/Countermobility/Survivability. The commander directs
the construction and improvement of perimeter barriers. This includes estab-
lishing clear fields of fire and implementing physical security measures, such
as checkpoints on vehicle and pedestrian routes leading into the base, to im-
prove overall base security. Barriers, natural obstacles, and aggressive offen-
sive actions deny enemy access to the area immediately surrounding the
base. If the force keeps the enemy at a distance, he cannot launch damaging
attacks toward the base. The commander continues to direct improvement in
his base defenses, as time and other resource permit, to ensure a stable se-
curity system.
E-96. Force protection considerations against terrorist attack are part of base
defense planning. The base commander assesses the vulnerability of the base
to terrorist attack and other nonbattlefield threats. He must assess the base’s
vulnerability to each identified threat. Risk and vulnerability assessments
are the foundation for priorities of work and resource distribution.
E-97. The base defense plan includes those ADC measures necessary to mini-
mize damage to the base’s critical facilities resulting from fire, natural disas-
ter, or enemy action. The commander dedicates resources to protect areas
that, if destroyed, could cause catastrophic loss or mission failure since force
protection resources are limited. The plan delineates responsibilities for ADC
activities, such as fire fighting, light rescue and labor, and decontamination,
and assigns appropriate priorities for assistance furnished by each unit on
the base.
E-21
FM 3-90
E-98. Combat Service Support. Since base security forces generally oper-
ate in close proximity to the base, the commander tailors the load carried by
his dismounted elements to the immediate requirements of METT-TC. Re-
supply of dismounted elements takes place using ground or air modes.
E-99. Command and Control. Planning for rear area and base security op-
erations, like all planning, requires the rear area commander to have an ac-
curate common operational picture of his AO. This includes the strength and
security potential of available units, terrain and environmental data, and in-
telligence information. The rear area commander uses existing echelon rear
command posts and information systems to provide him and his subordinate
commanders that common operational picture.
E-100. In planning for base security, a simple, flexible defensive plan dis-
seminated to the lowest level of command is normally the best COA. The plan
should include the maximum use of standing operating procedures (SOPs)
and battle drills at the user level. It should incorporate adequate control
measures to ensure the safety of friendly troops and civilians. Such a plan
minimizes the impact of the inevitable miscues that accompany any combat
operation.
E-101. The base commander integrates the base security plans with those of
its base cluster and supporting rear area security forces. He periodically re-
views the base defense plan. Alterations in the units assigned to the base and
changes to their defense capabilities because of mission requirements also re-
quire updating the base defense plan. Frequent alterations of base security
procedures reduce the base’s vulnerability. The continuous monitoring of
plans also allows adjustments based on experience to be incorporated into
those plans.
E-102. The base commander establishes communications with the BCOC (or
the echelon rear command post if the base in not part of a base cluster). He
also establishes communications with the headquarters of the designated
Level II response force.
E-103. Communication problems can occur in information exchanges during
the planning for base security involving multinational forces. The commander
must address any language barriers because units operating in the rear area
normally need to communicate with various host nation governmental agen-
cies and the civilian population. The ability to communicate with these differ-
ent agencies and the local population helps to protect the force.
E-104. The echelon rear area commander maintains simplicity by making the
minimum number of plans necessary. Rear area and base security is a
secondary mission for CS and CSS units. The echelon rear command post,
BCOC, and the BDOC must ensure that rear area and base security is not
neglected in favor of the parent organization’s primary mission. A BDOC
sends out liaison teams to each base in its base cluster, with RAOC assist-
ance, to ensure that each base’s defensive plans are workable, coordinated
with the BCOC, and routinely practiced.
E-22
Rear Area and Base Security
E-23
FM 3-90
E-111. Units may construct fighting positions or prefabricate and move them
into position for assembly. These bunkers are constructed to withstand a di-
rect hit by a medium antitank missile on the front and sides and a direct hit
by a mortar on the top. Installing chain link fences around these positions
can prematurely detonate shaped-charge warheads.
E-112. Constructing revetments for critical resources provides protection
against mortar or rocket fragmentation. These revetments may be sand-
filled, double-walled construction with either plywood or steel plate sides.
Units within the base provide overhead cover for critical facilities and func-
tions when possible. The base commander’s preventive measures to avoid or
minimize effects of enemy attacks also contribute to his ADC efforts by pro-
viding units, soldiers, facilities, and supplies on the base protection from
major accidents and natural disasters as well.
E-113. The commander uses tactical wire barriers within the perimeter to
limit and canalize penetrations by enemy groups or individuals. These inter-
ior barriers can be as simple as a single roll of concertina wire. Generally, the
commander should place them to prevent a direct approach to vital facilities
within the base. He should make provisions to cover these barriers by auto-
matic weapons. The base should construct inconspicuous barriers and peri-
odically relocate them to prevent counterplanning by the enemy. Further, the
barriers should not be so intensive as to preclude freedom of movement by
the reaction or reserve force. These forces, as well as all soldiers, should be
familiarized with the location of all barriers through daylight and night
drills.
E-114. Base defense training is an essential element of preparing to conduct a
base defense. Base defense requires integrating the BDF and its emergency
augmentation by all units on the base. Because they rarely function together,
the commander can form an efficient fighting entity only through proper
training. The BDF commander carefully coordinates the training of base
units for base defense operations with the support operations of the base. All
individuals receive training to allow them to participate, at least to a limited
degree, in the base’s defense. All units receive training to provide at least
limited local security for the facilities they operate. Conducting rehearsals
that test the base defense plan is an essential part of base defense training.
Some equipment deemed necessary for base defense or for training purposes
may not be available. The BDF commander must use his initiative to over-
come these shortfalls.
E-115. Most of the training required to support base defense operations is
currently a part of individual and unit training programs. Soldiers desig-
nated to take any part in base defense operations will probably require addi-
tional training in the following areas as applicable to their roles in the base
defense effort:
· Ambush techniques and defensive measures against enemy ambushes.
· Use of hearing, sight, and smell as detection means.
· Police-type patrolling and operating roadblocks and checkpoints.
· Limited-visibility operations to include using night vision devises, sen-
sors, and techniques for using sign and countersign procedures.
· Marksmanship, especially night firing.
E-24
Rear Area and Base Security
E-25
FM 3-90
Patrols
E-123. Base defense operations to counter small enemy forces include ag-
gressive, frequent patrolling by squad- and platoon-size forces to detect and
capture or destroy small enemy bands. Host nation personnel are well suited
to assist BDF patrols. Their knowledge of the terrain, inherent ability to op-
erate effectively in the environment, language skills, and familiarity with
local customs increases the effectiveness of these patrols.
E-124. Small, highly mobile units conduct patrols by moving on foot or by
land, water, or air vehicles during daylight and darkness. They search popu-
lated areas contiguous to the base and establish surprise checkpoints along
known or suspected routes used by enemy forces.
E-125. The BDF mans dug-in or concealed night ambush sites located outside
of the base’s external barrier system on a random basis. Host nation security
personnel should accompany patrols traveling through populated areas. The
base develops fire support targets to support the ambush in accordance with
their availability and the ROE. If the area adjacent to the base perimeter is a
free fire area, it is seldom necessary to occupy ambush sites there. When local
restrictions preclude establishing a free-fire area, ambush sites are manned
forward of the perimeter and the BDF is prepared to assist those elements
conducting the ambush as necessary.
E-126. Patrols can install sensors in locations enemy forces threatening the
base would cross to provide early warning of enemy movements. Such patrols
also observe and report enemy activities, such as assembling personnel; mov-
ing weapons, amunition, or other supplies; and preparing firing positions for
indirect-fire weapons. In addition to the acquisition of specific targets, patrols
E-26
Rear Area and Base Security
may confirm or deny the presence of enemy activity in named areas of in-
terest located near to base.
E-127. The base uses any available small boats to patrol nearby rivers and
coasts. An infiltrating enemy takes advantage of waterways to transport
heavy weapons because of their weight and bulk. Detecting these weapon sys-
tems is an important river and coastal surveillance mission for the BDF com-
mander. The Army has type-classified small watercraft suitable for use in
this type of patrol, as does the Navy and Coast Guard.
E-128. Military working dogs are a valuable asset in base defense operations.
Their employment should habitually be considered in planning all patrol and
security operations. Successfully using these dogs depends on the skill of the
handler and the knowledge and full understanding of the capabilities and
limitations of the dogs by employing commanders and staffs. (Army Regula-
tion 190-12 provides this information.)
E-129. During base security operations, the base commander monitors the lo-
cation of friendly troops and their relationship to friendly fires. The base com-
mander must be constantly aware of the relative location of enemy, friendly,
and neutral personnel. Subordinate elements, such as patrols, must under-
stand the importance of accurately reporting their positions. Automation and
navigation aids, such as the global positioning system (GPS) tied to combat
net radios, assist in maintaining a common operational picture. When em-
ploying artillery, mortars, and air support, the commander must exercise pos-
itive control, whereby an observer must be able to see the target area. Unit
SOP at all levels must address specific procedures for clearing indirect fires
directed against identified targets located within the rear area.
Static Positions
E-130. The static positions of the base defense consist primarily of the bunk-
ers and towers forming the base’s defensive positions. Positioning bunkers
and towers correctly affords maximum observation and mutually supporting
fires over the area forward of the perimeter to include the perimeter barrier
and sensor system.
E-131. The base commander establishes communications between the BDOC,
the command posts of the units occupying the base, and the base’s bunkers,
towers, and reserve. In addition, each node be able to communicate laterally
with adjacent units and defensive positions.
E-132. Bunkers. Although full-time observation and all-around defense of
the base are essential, the BDF commander may reduce the number of sol-
diers conducting static defense mission by designating key bunkers around
the perimeter to be manned at all times, with the remainder to be fully man-
ned during periods of reduced visibility and increased enemy threat. The base
prepares individual fighting positions near the bunkers to provide supporting
fires. Night vision devices, binoculars, automatic weapons, grenade launch-
ers, and hand grenades are commonly available within the bunker positions,
and antitank systems cover possible ground vehicle approaches.
E-133. Towers. Towers provide increased visibility, which may be desired in
specific situations. Elevated platforms enhance the capability of detecting
E-27
FM 3-90
perimeter infiltration when coupled with night vision devices, binoculars, and
spotter scopes. They may enhance the base’s ability to determine the firing
positions of enemy indirect weapon systems. Towers can be constructed ac-
cording to standard military design using standard construction materiels or
constructed from local materiels. Multistory buildings, such as grain silos,
can also serve as towers. Installating sandbags or steel plating around the ob-
servation platform provides protection against automatic weapons and small-
arms fire. Constructing a ground-level bunker near the base of the tower pro-
vides additional protection when the enemy directs fires against the tower.
Access to the bunker from the tower may be by means of a fireman’s pole or a
ladder. Towers should incorporate the following safety measures—
· Lightning arresters.
· Built to withstand strong winds and to support two observers and their
equipment.
· Enclosed mounting ladder.
· Provision of safety nets around tall towers.
· Painted an appropriate color to reduce reflection from moonlight.
· Installation of a suitable roof to shield observers from the elements
without interference to observation. (A double-roof design can cause
some types of mortar rounds to detonate at a height that affords some
protection to the observers positioned in the tower.)
The base commander’s decision to use towers is a result of his analysis of the
factors of METT-TC. For example, he must decide if the additional security
they provide is worth the effort to construct them in a fluid situation or the
risk that they will attract additional enemy attention to the base.
Reaction Operations
E-134. Reaction operations are operations conducted by the BDF, operating
from the base or from positions outside the base, for the purpose of counter-
ing local enemy activities. They are offensive in nature and conducted as
either spoiling attacks or counterattacks.
E-135. The commander uses his BDF to destroy any small enemy units de-
tected in the vicinity of the base. The base requests assistance if its forces
cannot destroy or contain the enemy force in its current location. Elements of
the BDF do not pursue a retrograding enemy outside of supporting distance
from the base, because it could be part of a diversion designed to weaken the
base’s defensive capabilities. Pursuit of such fleeing enemy forces is turned
over to rear area response forces instead.
E-136. Reaction operations are simple, planned, and rehearsed because the
majority of actions are required at night. Designating primary and alternate
checkpoints within the base facilitates response to multiple contingencies.
Within security limitations, the force uses actual checkpoints during rehears-
als to promote familiarity with the area and the reaction plan.
E-28
Rear Area and Base Security
base commander lifts or shifts base defense fires to support the maneuver of
the response force. The response force attempts to delay and disrupt the
threat until a TCF arrives if it cannot destroy or deter the enemy. The base
commander notifies his BCOC if the base defense and the response forces
engage an enemy they cannot defeat. They maintain contact with the enemy
force until the TCF arrives. The TCF commander has operational control
(OPCON) of all base and response forces within his designated AO on com-
mitment of the TCF.
E-29
FM 3-90
Sniper Teams
E-142. Sniper teams are useful when forces come under harassing small-arms
fire by a small enemy element firing from, among, or near areas where civil-
ians or cultural monuments protect it from the return fires of more non-
discriminating weapons. These teams allow the BDF commander to fix the
enemy and move other BDF elements into positions where they can engage
the enemy without endangering civilian lives or causing excessive collateral
damage. The commander can employ smoke and, if authorized, riot-control
agents to aid in this maneuver. If the force cannot engage the enemy without
endangering civilian life or property, the BDF commander can try to
disengage his forces and move them to positions that block the enemy’s
escape routes. However, the base commander must use all available means to
protect his forces, even when it may place civilians at risk.
E-143. These teams may be provided from infantry units. Alternatively, this
capability may be provided by giving special training to selected BDF soldiers
to maximized the capabilities of their assigned individual weapons or special-
ized equipment provided to them.
E-30
Rear Area and Base Security
E-147. The base establishes traffic control using MP or other elements to en-
sure fire-fighting equipment gains access to the area and ambulances and
evacuation vehicles clear the area. The BDOC notifies the BCOC of blocked
routes and necessary traffic diversions. The element conducting traffic con-
trol can also temporarily provide for controlling displaced civilians and strag-
glers and provide a degree of local security for the damaged area.
E-148. The BDOC coordinates with the BCOC and echelon rear command
post for engineer support to restore critical facilities and any specialized fire
fighting capabilities required. Engineer support is normally needed to clear
debris and rubble to support the base damage control mission and extinguish
extensive fires. The BDOC also coordinates for any necessary explosive ord-
nance disposal (EOD) and decontamination support.
E-149. The base commander takes precautions by maintaining local security
and interior guard posts when receiving ADC support from host nation re-
sources to ensure the security of the base. He cannot afford confusion sur-
rounding the base’s damage control efforts to provide an opportunity for sabo-
teurs and other hostile personnel to penetrate the base perimeter.
ROUTE SECURITY
E-150. Route security operations are a specialized kind of area secur-
ity operations conducted to protect lines of communication and
friendly forces moving along them. Enemy attempts to interdict LOCs
may have little immediate impact on ongoing decisive and shaping operations
because of unit basic loads and previously positioned caches. However, the se-
curity of those routes over which the echelon’s sustaining operations flow is
critical to sustained land operations, regardless of whether the commander is
attempting to exploit success or recoup from failure.
E-151. The security of routes and LOCs, whether rail, pipeline, highway, or
waterway, presents one of the greatest security problems in an echelon’s rear
area. Route security operations are defensive in nature and are terrain-
oriented. A route security force prevents an enemy force from impeding,
harassing, or destroying traffic along the route or portions of the route itself.
Having a base permits the concentration of security resources. LOC security
requires dedicated resources at almost infinite points or reaction forces to
counter possible enemy action. Units performing missions that require the
habitual use of LOCs, such as MP, transportation, supply, and service units,
can perform route security operations in conjunction with their primary ac-
tivities. The echelon rear area commander can employ the following tech-
niques to provide route security:
· Passive security.
· Route reconnaissance.
· Cordon security.
· Combat security.
While the scope of these operations depends on the factors of METT-TC, route
security operations tend to require significant resources. A combination of
passive and route reconnaissance is commonly used over secured routes such
as a LOC.
E-31
FM 3-90
PASSIVE SECURITY
E-152. The passive security technique for provide route security includes
measures initiated to achieve security without a significant expenditure of
manpower or resources. It includes—
· Camouflage
· Formation and march control of convoys so they present the least
lucrative target possible under prevailing conditions.
· Proper selection of routes.
· Capitalizing on security offered by other activities not related to the
route’s security requirements. These activities include aircraft travers-
ing the route, maintenance activities taking place along the route,
training exercises or troop movements adjacent to or along the route,
military and host nation police traffic control activities, and the activi-
ties of the civilian population.
· Defensive information operations.
E-153. The commander uses passive security for all conditions or situations
and as an adjunct to any other technique of route security employed. They
are the products of a long-term and continually improved program for an
integrated security system.
ROUTE RECONNAISSANCE
E-154. Route reconnaissance addresses not only the route itself, but also all
terrain along the route from which the enemy could influence a friendly
force’s movement. Route reconnaissance takes place at irregular intervals to
avoid developing a regular pattern that an enemy could exploit. (Chapter 13
discusses route reconnaissance.)
CORDON SECURITY
E-155. It is normally not feasible to secure all points on a route by physically
allocating resources to each point. Cordon security is the security pro-
vided between two combat outposts positioned to provide mutual
support. A commander can assign air assault, mechanized, or motorized
units to combat outposts established at critical locations along the route. He
locates these combat outposts within supporting distance of each other when-
ever possible. Units assigned to these combat outposts provide response
forces in the event of enemy activity along the route within their assigned
AO. Forces based at these combat outposts conduct reconnaissance patrols
and offensive operations to counter enemy activities between these two points
on a frequent but irregular schedule. Cordon security requires considerable
manpower and other resources. The commander uses it only when a clear and
evident requirement exists.
E-156. Normally, each combat outpost contains at least a platoon-size ele-
ment equipped with automatic weapons, communications, and sensors and
supported by those fire support assets available to the rear area commander.
(Chapter 12 contains additional information on the combat outpost.) The out-
post commander rotates his soldiers between duty at the combat outpost and
duty on patrol. The higher commander contacts each of his deployed combat
outposts frequently to check its status.
E-32
Rear Area and Base Security
E-157. The establishment of cordon security will do little to eliminate the rear
area threats that require its adoption. A commander directing the establish-
ment of cordon security should also direct a series of parallel corrective
actions, to include—
· Searching for a new route.
· Vigorous search and attack operations to destroy the enemy within the
echelon rear area.
· Rigorously enforcing circulation control measures in coordination with
the host nation over the civilian population.
· Removing cover from areas offering concealment to an enemy.
· Constructing new routes to bypass dangerous areas.
· Repositioning supply activities to permit better route selection.
· Mass evacuation of the civilian population from towns and villages
along the route. (This is an extreme measure and requires consultation
with host nation authorities and adherence to the laws of land wa-
rfare.)
E-158. The commander must recognize the loss of complete control over any
given route early. The continued investment of resources into a “lost route”
merely serves the enemy. Those resources and energy should be diverted to
security measures elsewhere whenever feasible.
COMBAT SECURITY
E-159. The combat security technique for providing route security includes all
measures taken by combat arms units to seize and secure the terrain neces-
sary to permit use of the route in question. Units conduct combat security
along a route to prevent enemy ground forces from moving into direct fire
range of the protected route. The route and its adjoining terrain compose the
AO. A route security force operates on and to the flanks of a designated route.
E-160. Combat security is the most costly technique for providing route secur-
ity and draws on the strength of the maneuver force. For example, because of
the distances involved, a commander usually assigns at least one battalion-
size unit, if not more, to secure one route through a division-size AO. The ma-
neuver force establishes a perimeter around the route or cordons sections of it
to search suspected enemy locations while establishing roadblocks and check-
points along the main route and lateral routes to stop and search vehicles
and people as they enter or leave the route. Special considerations include
coordinating with segments manned by rear area security forces and the ech-
elon rear command posts integrating the maneuver force’s operations with
other rear area and base defense activities, and clarifying of C2 arrange-
ments.
CONVOY SECURITY
E-161. Convoy security operations are specialized area security oper-
ations conducted to protect convoys. Units conduct convoy security op-
erations anytime there are not enough friendly forces to continuously secure
LOCs in an AO and there is a significant danger of enemy ground action di-
rected against the convoy. The commander may also conduct them in conjunc-
tion with route security operations. A convoy security force operates to the
E-33
FM 3-90
front, flanks, and rear of a convoy element moving along a designated route.
Convoy security operations are offensive in nature and orient on the force
being protected. (Chapter 14 discusses convoy movement operations; this sec-
tion only addresses convoy security concerns.)
E-162. To protect a convoy, the convoy escort element must accomplish the
following critical tasks:
· Reconnoiter the convoy route.
· Clear the route of obstacles or positions from which the enemy could
affect movement along the route.
· Provide early warning of enemy presence along the route.
· Prevent the enemy from attacking the convoy.
E-34
Rear Area and Base Security
and responds if the convoy encounters an enemy unit the escort element
cannot defeat or repel. It must be able to respond within 15 minutes. The
reaction force always anticipates an ambush when moving to the relief of a
convoy under enemy attack.
E-166. When a lack of resources prevents establishing all five elements, the
commander normally first resources his forward reconnaissance or advance
guard. He then resources his escort, flank screening, and rear guard elements
in that order. It is the responsibility of the headquarters directing the convoy
to designate the response element.
E-167. If available, air cavalry assets can participate in the convoy security
operation by screening the convoy’s movement as it moves along the route of
march. Alternatively, they can assist in clearing the route ahead of the con-
voy as it moves along the route of march, or clearing the route in conjunction
with the route reconnaissance element. Air cavalry can also assist by control-
ling indirect-fire support and coordinating with forward air controllers from
other services for close air support. The supporting air cavalry unit must
know the maneuver intentions of the ground element if contact with the ene-
my occurs. If heavy forces are not available for use as a convoy escort, the
commander can use light infantry to augment the self-defense capabilities of
transportation units.
FWD RECON/GUARD
S ELEMENTS
EN
RE
SC
ESCORT
K
S
ELEMENTS
AN
FL
SCREEN
ELEMENTS
S
N
EE
R
SC
REACTION FORCE
S K
N
A
FL
G
REAR G
GUARD
Figure E-6. Convoy Security Organization
E-35
FM 3-90
· Checkpoints.
· Phase lines.
· Observation posts.
· Target reference points.
· Areas of operation for various units that affect the convoy.
· Staging or marshaling areas.
· Known obstacles and lanes.
E-169. Although convoy size, passage time, and march speed are not graphic
control measures, they determine how long it takes to execute the convoy se-
curity mission. Rules of engagement are also not a graphic control measure,
but they greatly influence how a commander conducts convoy security opera-
tions.
III
E
2 4 7A S G 917C S G
(-)
+
A B 0171
TC P 2
S T A G IN G
CSA
AREA
DUKE
M S R W A G G A W A G G A (P R IM A R Y )
RP 7
SP 3
5 to n 57
MS PL OTTAWA
R S
H R IN
E
PA
RK
(A L
T)
E-36
Rear Area and Base Security
· Fire support elements to provide close and continuous fire support for
the movement.
· Training in immediate actions drills, including actions at danger areas
and in case of a near ambush, a far ambush, booby traps, encounters
with enemy tactical combat vehicles, sniper contact, aerial attack, and
indirect fire.
· Communications and coordination with supporting units and other
units along the route, adjacent host nation forces, and higher head-
quarters, including airborne radio relay.
· Various locations for leaders, communications, medical support, and
weapon systems within the movement formation.
· Questions asked of local civilians along the movement route for intelli-
gence information, including possible enemy ambush sites.
E-171. The convoy commander must consider the unique requirements of con-
voy security when formulating his plan. He briefs his subordinates on the
latest information regarding the enemy situation and the area through which
the convoy will pass. He formulates his plan and issues his order, which in-
cludes the movement formation, intervals between echelons and vehicles,
rate of travel, and a detailed plan of action if the convoy encounters an enemy
force. Since there is seldom time to issue complicated orders during an am-
bush, subordinate commanders must plan the actions of the escort element
and reaction force in the event of an ambush. Units should rehearse these
actions before movement and execute them as drills if enemy contact takes
place.
E-172. Communications are vital to the success of convoy movements. The
convoy commander must plan for radio communication and ensure the avail-
ability and compatibility of communication means between convoy elements
and indirect-fire support and air cavalry assets, as well as with units and
host nation agencies in areas along the movement route. The convoy com-
mander prearranges visual and sound signals, such as colored smoke, identi-
fication panels, whistles, or horns. Many of these signals can be SOP items.
He must ensure that all convoy members understand these signals and re-
hearse the actions required by each. This is necessary because of the limited
number of radios and other communications equipment in tactical vehicles.
E-173. The commander’s fire support plan covers the entire convoy route,
paying special attention to known danger areas and potential choke points.
Convoy security elements may have mortars organic to the escort element or
indirect fires provided by fire support elements positioned to range all or por-
tions of the route. Coordinating with fire direction centers before the convoy’s
departure enables fire support teams in the convoy security element to enter
the appropriate fire control nets, calling for and adjusting fires as necessary.
E-174. The convoy security commander must carefully plan for the appropri-
ate CSS to support the operation. He should include fuel, maintenance, and
recovery elements in the convoy or pre-position them in secure areas along
the route. He also plans for casualty evacuation support that covers the en-
tire route.
E-37
FM 3-90
E-38
Rear Area and Base Security
calling for counterfire if the direction and approximate distance to the enemy
artillery system can be estimated.
E-180. The convoy commander has three passive options when the convoy
comes under enemy artillery fire: halt in place, continue to march, or disperse
quickly to concealed positions. Regardless of the option selected, the unit SOP
should cover the action taken and the signal directing the action. The pri-
mary consideration is the immediate departure from the impact area. The
convoy only halts when the artillery concentration is ahead of the convoy. The
convoy commander looks for an alternate route around the impact area and
the convoy should remain prepared to move out quickly. The mission or the
terrain may require the convoy to continue through the beaten area. In this
case, the convoy increases its speed of movement and spreads out to the
maximum extent allowed by the terrain.
Sniper Fire
E-181. The convoy commander takes caution when receiving sniper fire to en-
sure that any return fire does not harm friendly troops or civilians in the
area. The best reactive measures against sniper attack by a convoy are pas-
sive. Ensure all soldiers wear helmets and available body armor. Vehicles
move through the area without stopping. Convoy escort personnel act as nec-
essary to locate, suppress, and kill snipers in accordance with the ROE.
Ambush
E-182. The very nature of an ambush—a surprise attack from a concealed po-
sition—places an ambushed convoy at a disadvantage. No single defensive
measure, or combination of measures, prevents or effectively counters all am-
bushes. The training of the convoy elements directly relates to the effective-
ness of counterambush measures. Immediate reaction and aggressive leader-
ship are essential to limit casualties and damage to vehicles, cargo, and per-
sonnel. Small enemy forces are seldom able to contain an entire convoy in a
single kill zone. This is due to the extensive road space occupied by even
platoon-size convoys and because of the presence of security elements es-
corting the convoy. More often, an enemy is able to ambush only a part of a
convoy—either the head, trail, or a section of the main body. Fire in the kill
zone may be from only one side of the road, with a small holding force on the
opposite side. An enemy frequently places mines and booby traps on the hold-
ing force side to contain the convoy in the kill zone. The part of the convoy
that is in the kill zone and receiving fire must exit as quickly as possible if
the road ahead is open. The security escort takes care in assaulting the main
ambush forces because an enemy will commonly use mines and booby traps
to protect his flanks.
E-183. The convoy leaves disable vehicles behind or, if they are blocking the
road, pushes them out of the way with following vehicles. Combat vehicles
providing escort to the convoy must not block convoy vehicles by halting in
the traveled portion of the road to return fire. If the main body splits into two
or more elements because of the ambush, those elements forward of the am-
bush site move to a secure location. Vehicles that have not entered the kill
zone must not attempt to do so. They should stop, their personnel should dis-
mount, take up a good defensive position, and await instructions. Since escort
E-39
FM 3-90
vehicles may have left the road to attempt to overrun a hostile position, ele-
ments of the convoy should not fire on suspected enemy positions without
coordinating with the escort forces.
E-184. Other actions that the convoy commander can take to neutralize the
ambushing enemy force include—
· Calling for artillery fire on enemy positions.
· Calling for attack helicopters to engage the enemy positions.
· Directing the crew-served weapons mounted on convoy vehicles and the
individual weapons of nondriving personnel to suppress the ambush
force while the rest of the convoy’s vehicles move out of the kill zone.
· Calling for the reaction force.
E-185. A convoy with a limited escort is seldom able to defeat an ambushing
enemy force and should not attempt to do so. When part of the convoy is iso-
lated in the kill zone, vehicles that have not entered the ambush area must
not attempt to do so. They should stop in a herring bone formation; personnel
should dismount, take good defensive positions, and await instruction until
supporting forces clear the ambush area. Normally, the transportation unit
conducting the convoy will not maneuver to attack the enemy ambush force
unless it is necessary for self-preservation. It relies on its escort force, fire
support, and reaction forces.
E-186. Convoy personnel will dismount, take cover, and return fire on enemy
positions when an element of a convoy halts in the kill zone and is unable to
proceed because of disabled vehicles, damaged bridges, or other obstacles,
Personnel dismount their vehicles away from the direction of enemy fire.
Escorting security forces that have passed through the kill zone or have not
yet entered the kill zone maneuver to destroy the ambushing element. The
convoy commander calls for the reaction force as soon as the ambush occurs.
E-187. The convoy clears the route and movement resumes as soon as pos-
sible after the ambushing enemy force is defeated or withdraws. Wounded
soldiers are evacuated using the fastest possible mode. When the convoy
cannot tow disabled vehicles, it should distribute their cargo among other
vehicles if time permits. The convoy destroys vehicles and cargo on order of
the convoy commander if it is not feasible to evacuate them. The convoy re-
covers combat net radios and other critical items before it destroys the vehi-
cles. These items should not fall into enemy hands.
E-40
Source Notes
These are the sources quoted or used as sources for historical examples in
this publication. They are listed by page number. Boldface indicates the
titles of historical vignettes.
1-1 “War is, above all things, an art…”: Francis V. Greene, “The Important Improvements in the Art of
War During the Past Twenty Years and Their Probable Effect on Future Military Operations,”
Journal of the Military Service Institution of the United States 4, no. 13 (1883): 41.
1-5 The Human Dimension—Combat at Han-sur-Nied: Hugh M. Cole, The Lorraine Campaign,
volume 5, United States Army in World War II—The European Theater of Operations
(Washington, D.C.: Historical Division, United States Army, 1950), 358–361. The action took place
on 11 November 1944. The American units were from Combat Command A, 6th Armored Division.
They were opposed by elements of the German 48th and 17th SS Panzer Genadier Divisions.
1-6 Cowpens, 17 January 1781: John Moncure, The Cowpens Staff Ride and Battlefield Tour (Fort
Leavenworth, Kans.: Combat Studies Institute, US Army Command and General Staff College,
1996.
2-1 “In war, obscurity…”: The Infantry Journal, Infantry in Battle, 2d edition (Washington, D.C.:
Infantry Journal, 1939; reprint, Fort Leavenworth, Kans.: US Army Command and General Staff
College, 1981), 16.
3-0 “To move swiftly,…”: Thomas J. “Stonewall” Jackson, cited in Dictionary of Military and Naval
Quotations, compiled by Robert Debs Heinl (Annapolis: US Naval Institute Press, 1966 [hereafter
cited as Heinl]), 131.
3-1 The 101st Airborne Division (Air Assault), 24–28 February 1991: Command Report, 101st
Airborne Division (Air Assault) for Operations Desert Shield and Desert Storm, 2 August 1990
through 1 May 1991 (Fort Leavenworth, Kans.: Combined Arms Research Library Archives, 1991),
17–26, 46–60; see also Robert H. Scales, Certain Victory: The US Army in the Gulf War
(Washington, D.C.: Office of the Chief of Staff, US Army, 1993; reprint, Fort Leavenworth, Kans.:
US Army Command and General Staff College Press, 1994); Richard M. Swain, “Lucky War”:
Third Army in Desert Storm (Fort Leavenworth, Kans.: US Army Command and General Staff
College Press, 1994).
4-1 “When armies approach each other…”: Winston Churchill, (1949), cited in Heinl, 186.
4-2 The Soviet Manchuria Campaign, August 1945: David M. Glantz, August Storm: The Soviet
1945 Strategic Offensive in Manchuria, Leavenworth Papers No. 7; August Storm: Soviet Tactical
and Operational Combat in Manchuria, 1945, Leavenworth Papers No. 8 (Fort Leavenworth
Kans.: Combat Studies Institute, US Army Command and General Staff College, 1983).
5-0 “I approve of all methods of attacking…”: Frederick the Great (1747), cited in Heinl, 20.
5-39 The Raid in Mogadishu, 3–4 October 1993: Kent DeLong, Mogadishu!: Heroism and Tragedy
(Westport, Conn.: Praeger, 1994); see also Kenneth C. Allard, Somalia Operations: Lessons Learned
(Washington, D.C.: National Defense University Press, 1995); John L. Hirsch, Somalia and
Operation Restore Hope: Reflections on Peacemaking and Peacekeeping (Washington, D.C.: United
States Institute of Peace Press, 1995).
6-1 “The most important goal…”: Field Marshal Prince Mikhail I. Kutuzov (1745-1813), cited in
Warriors’ Words: A Quotation Book, compiled by Peter G. Tsouras (London: Arms and Armour
Press, 1992 [hereafter cited as Tsouras]), 134.
7-1 “In pursuit you must…”: Field Marshal Viscount Allenby of Meggido (1917), cited in A Dictionary
of Military Quotations, compiled by Trevor Royle (New York: Simon & Schuster, 1989), 4.
8-1 “So the defensive form…”: Carl von Clausewitz, On War, edited and translated by Michael Howard
and Peter Paret (Princeton, N.J.: Princeton University Press, 1984), 357.
Source Notes-1
FM 3-90
8-2 The Battle of Kursk, July 1943. David M. Glantz, “Soviet Defensive Tactics at Kursk,” CSI
Report No. 11 (Fort Leavenworth Kans.: Combat Studies Institute, US Army Command and
General Staff College, 1986).
9-1 “Regardless of the considerations…”: FM 100-5, Field Service Regulations: Operations (Washington,
D.C.: War Department, 22 May 1941; reprint, Fort Leavenworth, Kans.: US Army Command and
General Staff College Press, 1992 [hereafter cited as FM 100-5 (1941)]), 152 (paragraph 652).
10-1 “A swift and vigorous transition…”: Carl von Clausewitz, cited in Heinl, 83.
10-2 Manstein’s Donbas Operation, February 1943: David M. Glantz, From the Don to the Dnepr:
Soviet Offensive Operations, December 1942–August 1943, Cass Series on Soviet Military
Experience (London: Frank Cass, 1991), 82-150.
11-1 “The withdrawal should be…”: B.H. Liddell Hart (1944), cited in Heinl, 362.
11-2 The Atlanta Campaign, 1864: Albert Castel, Decision in the West: The Atlanta Campaign of 1864
(Lawrence: University Press of Kansas, 1992), 151–181, 188.
12-0 “The officers and men who…”: D.H. Hill (1863), cited in Heinl, 317.
12-3 Operation Bagration, 1944. William M. Connor, “Analysis of Deep Attack Operations: Operation
Bagration, Belorussia, 22 June–29 August, 1944” (unpublished paper, Combat Studies Institute,
US Army Command and General Staff College, Fort Leavenworth, Kans., March, 1987).
13-0 “You can never have too much reconnaissance.”: George S. Patton Jr., in War As I Knew It (Boston:
Houghton-Mifflin Co., 1947), 400.
13-4 The Battle of the Sajo River: Simon Goodenough, Tactical Genius in Battle (Oxford, England:
Phaidon Press, Limited, 1979), 123-126.
14-1 “Aptitude for war…”: Napoleon I (1831), cited in Heinl, 198.
15-1 “…the necessity for conservation…”: FM 100-5 (1941), 158 (paragraph 669).
16-0 “The principal task involved…”: FM 100-5 (1941), 130 (paragraph 572).
A-1 “It is not so much…”: Antoine Henri, Baron de Jomini, Precis de l’Art de la Guerre (1838), cited in
Heinl, 58.
B-1 “Doctrine provides a military organization…”: George H. Decker (1960), cited in Heinl, 95.
C-1 “A landing against organized…”: George C. Marshall (1943), cited in Heinl, 11.
D-0 “When the enemy is driven…”: Field Marshal Prince Aleksandr V. Suvorov (1729-1800), cited in
Tsouras, 134.
E-0 “The base commander’s plan…”: FM 31-81 (Test), Base Defense, 17 March 1970, i.
Source Notes-2
Glossary
The glossary lists acronyms and terms with Army or joint definitions, and
other selected terms. Where Army and joint definitions are different,
(Army) follows the term. Terms for which FM 3-90 is the proponent
manual (the authority) are marked with an asterisk (*). The proponent
manual for other terms is listed in parentheses after the definition.
Glossary-1
FM 3-90
Glossary-2
Glossary
area of interest that area of concern to the commander, including the area of
influence, areas adjacent thereto, and extending into enemy terri-
tory to the objectives of current or planned operations. This area
also includes areas occupied by enemy forces who could jeopardize
the accomplishment of the mission. (JP 2-03)
area of operations an operational area defined by the joint force commander for land
and naval forces. Areas of operations do not typically encompass
the entire operational area of the joint force commander, but
should be large enough for component commanders to accomplish
their missions and protect their forces. (JP 1-02)
*area reconnaissance a form of reconnaissance that focuses on obtaining detailed
information about the terrain or enemy activity within a
prescribed area
*area security a form of security operations conducted to protect friendly forces,
installations, routes, and actions within a specific area
ARFOR the senior Army headquarters and all Army forces assigned or
attached to a combatant command, subordinate joint force
command, joint functional command, or multinational command
(FM 3-0)
*Army air movements operations involving the use of utility and cargo rotary-wing
assets for other than air assaults
Army airspace command and control those actions that ensure the synchronized use of
airspace and enhance the command and control of forces using
airspace (FM 3-52)
*art of tactics The art of tactics consists of three interrelated aspects: the
creative and flexible array of means to accomplish assigned
missions, decision making under conditions of uncertainty when
faced with an intelligent enemy, and understanding the human
dimension—the effects of combat on soldiers
ASCC Army service component command
ASG area support group
aslt assault
*assailable flank a flank exposed to attack or envelopment
assault echelon the element of a force that is scheduled for initial assault on the
objective area (JP 4-01.2) [The joint definition includes a sentence
relating to amphibious operations that is omitted.]
*assault position a covered and concealed position short of the objective, from
which final preparations are made to assault the objective
*assault time the moment to attack the initial objectives throughout the geo-
graphical scope of the operation
*assembly area an area a unit occupies to prepare for an operation
AT antitank
Glossary-3
FM 3-90
Glossary-4
Glossary
battle a set of related tactical engagements that last longer and involve
larger forces than an engagement (FM 3-0)
battlefield organization the allocation of forces in the area of operations by purpose. It
consists of three all-encompassing categories of operations:
decisive, shaping, and sustaining. (FM 3-0)
*battle handover line a designated phase line on the ground where responsibility
transitions from the stationary force to the moving force and vice
versa
*battle position a defensive location oriented on a likely enemy avenue of
approach
BCD battlefield coordination detachment
BCOC base cluster operations center
BCT brigade combat team
BDAR battle damage assessment and repair
BDOC base defense operations center
bde brigade
BDF base defense force
BFV Bradley fighting vehicle
BG brigadier general
BHL battle handover line
*block a tactical mission task that denies the enemy access to an area or
prevents his advance in a direction or along an avenue of
approach. Block is also an engineer obstacle effect that integrates
fire planning and obstacle effort to stop an attacker along a
specific avenue of approach or prevent him from passing through
an engagement area
bn battalion
Bn TF battalion task force
BOS battlefield operating systems
boundary a line that delineates surface areas for the purpose of facilitating
coordination and deconfliction of operations between adjacent
units, formations, or areas (JP 0-2)
BP battle position
*breach a tactical mission task in which the unit employs all available
means to break through or secure a passage through an enemy
defense, obstacle, minefield, or fortification
*brigade combat team a semipermanent combined arms organization, consisting of a bri-
gade headquarters, at least two combat arms battalions, and all
necessary supporting combat support and combat service support,
formed for the purpose of carrying out a continuing specific task
Glossary-5
FM 3-90
Glossary-6
Glossary
co company
COA course of action
COL colonel
COLT combat observation and lasing team
*combat arms units and soldiers who close with and destroy enemy forces or
provide firepower and destructive capabilities on the battlefield
*combat formation an ordered arrangement of forces for a specific purpose and the
general configuration of a unit on the ground
combat information (Army) unevaluated data gather by or provided to a commander
that, due to its highly perishable nature or the critical nature of
the tactical situation, cannot be processed into tactical intelli-
gence or other staff products in time to meet the commander’s
information requirements (FM 6-0)
*combat outpost a reinforced observation post capable of conducting limited com-
bat operations
combat power the total means of destructive and/or disruptive force which a
military unit/formation can apply against the opponent at a given
time (JP 1-02)
combat service support battlefield operating system the support and services provided
to sustain forces during war and military operations other than
war (FM 7-15)
*combat support (Army) critical combat functions provided by units and soldiers in
conjunction with combat arms units and soldiers to secure victory
combined arms the synchronized or simultaneous application of several arms—
such as infantry, armor, artillery, engineers, air defense, and
aviation—to achieve an effect on the enemy that is greater than if
each arm was used against the enemy separately or in sequence
(FM 3-0)
command and control battlefield operating system all tasks associated with the
exercise of authority and direction by a properly designated
commander over assigned and available forces in the
accomplishment of the mission (FM 7-15)
*company a unit consisting of two or more platoons, usually of the same
type, with a headquarters and a limited capacity for self-support
*company team a combined arms organization formed by attaching one or more
nonorganic tank, mechanized infantry, or light infantry platoons
to a tank, mechanized infantry, or light infantry company, either
in exchange for, or in addition to, its organic platoons
*consolidation the process of organizing and strengthening a newly captured
position so that it can be defended
*contact point an easily identifiable point on the terrain where two or more
ground units are required to make physical contact
Glossary-7
FM 3-90
Glossary-8
Glossary
*critical friendly zone an area, usually a friendly unit or location, that the maneuver
commander designates as critical to the protection of an asset
whose loss would seriously jeopardize the mission
CS combat support
CSG corps support group
CSS combat service support
*cueing the integration of one or more types of reconnaissance or surveil-
lance systems to provide information that directs follow-on
collecting of more detailed information by another system
DAG division artillery group
DASB division aviation support battalion
*decisive terrain key terrain whose seizure and retention is mandatory for success-
ful mission accomplishment
decisive engagement in land and naval warfare, an engagement in which a unit is
considered fully committed and cannot maneuver or extricate
itself. In the absence of outside assistance, the action must be
fought to a conclusion and either won or lost with the forces at
hand. (JP 1-02)
deep area an area forward of the close area that commanders use to shape
enemy forces before they are encountered or engaged in the close
area (FM 3-0)
*defeat a tactical mission task that occurs when an enemy force has
temporarily or permanently lost the physical means or the will to
fight. The defeated force’s commander is unwilling or unable to
pursue his adopted course of action, thereby yielding to the
friendly commander’s will and can no longer interfere to a
significant degree with the actions of friendly forces. Defeat can
result from the use of force or the threat of its use.
*defeat in detail Defeat in detail is achieved by concentrating overwhelming
combat power against separate parts of a force rather than
defeating the entire force at once.
defensive operations operations to defeat an enemy attack, buy time, economize forces,
or develop conditions favorable for offensive operations. Defensive
operations alone normally cannot achieve a decision. Their
purpose is to create conditions for a counteroffensive that allows
Army forces to regain the initiative. (FM 3-0)
delay a form of retrograde [JP 1-02 uses an operation] in which a force
under pressure trades space for time by slowing down the
enemy’s momentum and inflicting maximum damage on the
enemy without, in principle, becoming decisively engaged
(JP 1-02, see delaying operation)
*delay line a phase line where the date and time before which the enemy is
not allowed to cross the phase line is depicted as part of the
graphic control measure
Glossary-9
FM 3-90
Glossary-10
Glossary
*divisions (Army) the largest fixed organizations in the Army that train and
fight as tactical teams, and are organized with varying numbers
and types of combat, CS, and CSS units
DLIC detachment left in contact
DOD Department of Defense
DS direct support
DSA division support area
DZ drop zone
EA engagement area
EAC echelon above corps
eff effective
*encirclement operations operations where one force loses its freedom of maneuver because
an opposing force is able to isolate it by controlling all ground
lines of communication and reinforcement
engagement a small, tactical conflict between opposing maneuver forces,
usually conducted at brigade level and below (FM 3-0)
*engagement area where the commander intends to contain and destroy an enemy
force with the massed effects of all available weapons and
supporting systems
*engagement criteria protocols that specify those circumstances for initiating
engagement with an enemy force
*engagement priority the order in which the unit engages enemy systems or functions
envelopment (Army) a form of maneuver in which an attacking force seeks to
avoid the principal enemy defenses by seizing objectives to the
enemy rear to destroy the enemy in his current positions. At the
tactical level, envelopments focus on seizing terrain, destroying
specific enemy forces, and interdicting enemy withdrawal routes.
(FM 3-0)
ENY enemy (graphics)
EOD explosive ordnance disposal
EPW enemy prisoner of war
ESB enhanced separate brigade
evac evacuation
EW electronic warfare
*exfiltrate a tactical mission task where a commander removes personnel or
units from areas under enemy control by stealth, deception,
surprise, or clandestine means
exploitation a type of offensive operation that usually follows a successful at-
tack and is designed to disorganize the enemy in depth (JP 1-02)
Glossary-11
FM 3-90
EZ extraction zone
FA field artillery
FARP forward arming and refueling point
FCL final coordination line
FEBA forward edge of the battle area
feint (Army) a form of attack used to deceive the enemy as to the
location or time of the actual decisive operation. Forces
conducting a feint seek direct fire contact with the enemy but
avoid decisive engagement. (FM 3-0)
FFA free-fire area
*field of fire the area that a weapon or group of weapons may cover effectively
from a given position
*final coordination line a phase line close to the enemy position used to coordinate the
lifting or shifting of supporting fires with the final deployment of
maneuver elements
final protective fires an immediately available preplanned barrier of fires designed to
impede enemy movement across defensive lines or areas (JP 3-09)
*fire strike the massed, synchronized, and nearly simultaneous delivery of
precision-guided munitions
*fire superiority that degree of dominance in the fires of one force over another
that permits that force to conduct maneuver at a given time and
place without prohibitive interference by the enemy
fire support battlefield operating system the collective and coordinated use of target-
acquisition data, indirect-fire weapons, fixed-wing aircraft, offen-
sive information operations, and other lethal and nonlethal
means against targets located throughout an area of operations
(FM 7-15)
fire support coordination line a FSCM that is established and adjusted by appropriate land
or amphibious force commanders within their boundaries in
consultation with superior, subordinate, supporting, and affected
commanders. The FSCL facilitates the expeditious attack of
surface targets of opportunity beyond the coordinating measure.
A FSCL does not divide an area of operations by defining a
boundary between close and deep operations or a distinct area
[JP 3-09 uses zone] for close air support. The FSCL applies to all
fires of air-, land-, and sea-based weapon systems using any type
of ammunition. Forces attacking targets beyond an FSCL must
inform all affected commanders in sufficient time to allow
necessary reaction to avoid fratricide. Supporting elements
attacking targets beyond the FSCL must ensure that the attack
will not produce adverse effects on, or to the rear of, the line.
Short of an FSCL, all air-to-ground and surface-to-surface attack
operations are controlled by the appropriate land or amphibious
force commander. The FSCL should follow well-defined terrain
Glossary-12
Glossary
Glossary-13
FM 3-90
free-fire area a specific area into which any weapon system may fire into
without additional coordination with the establishing
headquarters (JP 3-09)
front an echelon of the Soviet Army two levels above corps, the
equivilent of a US army group
frontal attack (Army) a form of maneuver in which an attacking force seeks to
destroy a weaker enemy force or fix a larger enemy force in place
over a broad front (FM 3-0)
FSB forward support battalion
FSCL fire support coordination line
FSCM fire support coordinating measure
FSCOORD fire support coordinator
G guard (used on graphics to indicate a security mission. See
paragraph 12-13)
G1 assistant chief of staff, personnel
G2 assistant chief of staff, intelligence
G3 assistant chief of staff, operations
G4 assistant chief of staff, logistics
G5 assistant chief of staff, civil affairs
G6 assistant chief of staff, communications
*gap (Army) an area free of armed mines or obstacles whose width and
direction allow a friendly force to pass through the area
containing obstacles while dispersed in a tactical formation
GEN general
GPS global positioning system
GRC guards rifle corps
grd ground
GS general support
GSR ground surveillance radar
*guard (Army) a form of security operations whose primary task is to pro-
tect the main body by fighting to gain time while also observing
and reporting information and preventing enemy ground obser-
vation of and direct fire against the main body. Units conducting
a guard mission cannot operate independently because they rely
upon fires and combat support assets of the main body.
*hasty operation an operation in which a commander directs his immediately
available forces, using fragmentary orders, to perform activities
with minimal preparation, trading planning and preparation time
for speed of execution
Glossary-14
Glossary
hel helicopter
HHC headquarters and headquarters company
HIMAD high- to medium-altitude air defense
HQ headquarters
HUMINT human intelligence
IBCT initial brigade combat team
ID infantry division
IFF identification, friend or foe
IMINT imagery intelligence
IN infantry
infiltration (Army) a form of maneuver in which an attacking force conducts
undetected movement through or into an area occupied by enemy
forces to occupy a position of advantage in the enemy rear while
exposing only small elements to enemy defensive fires (FM 3-0)
*infiltration lane a control measure that coordinates forward and lateral movement
of infiltrating units and fixes fire planning responsibilities
intelligence battlefield operating system the activity to generate knowledge of and products
portraying the enemy and environmental features required by a
commander in planning, preparing, executing, and assessing
operations (FM 7-15)
*interdict a tactical mission task where the commander prevents, disrupts,
or delays the enemy’s use of an area or route
IO information operations
IPB intelligence preparation of the battlefield
ISB intermediate support base
*isolate a tactical mission task that requires a unit to seal off—both
physically and psychologically—an enemy from his sources of
support, deny an enemy freedom of movement, and prevent an
enemy unit from having contact with other enemy forces
ISR intelligence, surveillance, and reconnaissance
JAAT joint air attack team
JAG judge adcocate general
JAOC joint air operations center
JFACC joint force air component commander
JFC joint force commander
JFLCC joint force land component commander
JP joint publication
JSOA joint special operations area
Glossary-15
FM 3-90
Glossary-16
Glossary
*logistic package a grouping of multiple classes of supply and supply vehicles under
the control of a single convoy commander
LOGPAC logistic package
LRP logistics release point
LRSU long-range surveillance unit
LTC lieutenant colonel
LU linkup
LZ landing zone
M mechanized
meters
*main battle area the area where the commander intends to deploy the bulk of his
combat power and conduct his decisive operation to defeat an
attacking enemy
maneuver the employment of forces on the battlefield through movement in
combination with fires, or fires potential, to achieve a position of
advantage with respect to the enemy in order to accomplish the
mission (JP 1-02)
maneuver battlefield operating system the movement of forces to achieve a position of
advantage with respect to enemy forces. This system includes the
employment of forces on the battlefield in combination with direct
fire or fire potential. This system also includes the conduct of
tactical tasks associated with force projection. (FM 7-15)
*march column all elements using the same route for a single movement under
control of a single commander
*march serial a major subdivision of a march column that is organized under
one commander who plans, regulates, and controls the serial
*march unit a subdivision of a march serial. It moves and halts under the
control of a single commander who uses voice and visual signals.
MASINT measurement and signature intelligence
max maximum
MBA main battle area
MCC movement control center
MD mechanized division
MDMP military decision making process
MECH mechanized infantry
MED medical
meeting engagement (Army) a combat action that occurs when a moving force engages
an enemy at an unexpected time and place (FM 3-0)
METL mission-essential task list
Glossary-17
FM 3-90
METT-TC mission, enemy, terrain and weather, troops and support avail-
able, time available, and civil considerations (FM 6-0)
MG major general
MI military intelligence
military gamble a situation in which a commander risks the force without a
reasonable level of information about the outcome (FM 6-0)
min minimum
*mixing using two or more different assets to collect against the same
intelligence requirement
MLRS Multiple Launch Rocket System
MMC materiel management center
mobile defense (Army) a type of defensive operation that concentrates on the
destruction or defeat of the enemy through a decisive attack by a
striking force (FM 3-0)
mobility/countermobility/survivability battlefield operating system Mobility
operations preserve the freedom of maneuver of friendly forces.
Countermobility operations deny mobility to enemy forces.
Survivability operations protect friendly forces from the effects of
enemy weapon systems. (FM 7-15)
MOPP mission-oriented protective posture
mort mortar
movement control the planning, routing, scheduling, and control of personnel and
cargo movement over lines of communication (JP 4-01.3)
movement to contact a type of offensive operation designed to develop the situation and
establish or regain contact (FM 3-0)
MP military police
MRB motorized rifle battalion
MRR minimum risk route
MRT movement regulating team
MSR main supply route
MTC movement to contact
mutual support support that units render to each other against an enemy because
of their assigned tasks, their position relative to each other and to
the enemy, and their inherent capabilities (JP 1-02)
NAI named area of interest
*named area of interest the geographical area where information that will satisfy a
specific information requirement can be collected
NBC nuclear, biological, and chemical
Glossary-18
Glossary
Glossary-19
FM 3-90
Glossary-20
Glossary
Glossary-21
FM 3-90
rear area (Army) The rear area for any command extends from its rear
boundary forward to the rear boundary of the next lower level of
command. This area is provided primarily for the performance of
support functions and is where the majority of the echelon’s
sustaining operations occur. (FM 3-0)
*rearward passage of lines when a unit passes through another unit’s positions while moving
away from the enemy
recon reconnaissance
*reconnaissance in force (Army) a deliberate combat operation designed to discover or test
the enemy’s strength, dispositions, and reactions or to obtain
other information [The Army definition adds dispositions, and
reactions to the joint definition.]
*reconnaissance objective a terrain feature, geographical area, or an enemy force about
which the commander wants to obtain additional information
*reconnaissance operations (Army) those operations undertaken to obtain, by visual observa-
tion or other detection methods, information about the activities
and resources of an enemy or potential enemy, or to secure data
concerning the meteorological, hydrographical or geographical
characteristics and the indigenous population of a particular area.
[The Army definition adds and the indigenous population to the
joint definition.]
reconstitution those actions that commanders plan and implement to restore
units to a desired level of combat effectiveness commensurate
with mission requirements and available resources. Reconstitu-
tion operations include regeneration and reorganization.
(FM 4-100.9)
*reduce a tactical mission task that involves the destruction of an
encircled or bypassed enemy force
*redundancy using two or more like assets to collect against the same
intelligence requirement
*release point a location on a route where marching elements are released from
centralized control
*relief in place (Army) a tactical enabling operation in which, by the direction of
higher authority, all or part of a unit is replaced in an area by the
incoming unit
reorganization action taken to shift internal resources within a degraded unit to
increase its level of combat effectiveness (FM 4-100.9)
response force a mobile force with appropriate fire support designated, usually
by the area commander, to deal with Level II threats in the rear
area (JP 1-02)
restrictive fire area an area in which specific restrictions are imposed and into which
fires that exceed those restrictions will not be delivered without
coordination with the establishing headquarters (JP 3-09)
Glossary-22
Glossary
restrictive fire line a line established between converging friendly surface forces that
prohibits fires or their effects across that line (JP 3-09)
*retain a tactical mission task in which the commander ensures that a
terrain feature already controlled by a friendly force remains free
of enemy occupation or use
retirement a form of retrograde [JP 1-02 uses operation] in which a force out
of contact with the enemy moves away from the enemy (JP 1-02)
retrograde (Army) a type of defensive operation that involves organized
movement away from the enemy (FM 3-0)
RFA restricted fire area
RFL restricted fire line
RGR ranger
RIF reconnaissance in force
RISTA reconnaissance, intelligence, surveillance, and target acquisition
rly rally
ROC rear operations center
ROE rules of engagement
ROM refuel on the move
route the prescribed course to be traveled from a specific point of origin
to a specific destination (JP 1-02)
*route reconnaissance a form of reconnaissance that focuses along a specific line of
communication, such as a road, railway, or cross-country mobility
corridor
*route security operations a specialized kind of area security operations conducted to protect
lines of communication and friendly forces moving along them
RP release point
rte route
rules of engagement directives issued by competent military authority which delineate
the circumstances and limitations under which United States
forces will initiate and/or continue combat engagement with other
forces encountered (JP 1-02)
S screen (used on graphics to indicate a security mission. See
paragraph 12-13)
S1 battalion/brigade personnel staff officer
S2 battalion/brigade intelligence staff officer
S3 battalion/brigade operations staff officer
S4 battalion/brigade logistics staff officer
S5 battalion/brigade civil-military operations staff officer
Glossary-23
FM 3-90
Glossary-24
Glossary
sqd squadron
*start point a location on the route where the marching elements fall under
the control of a designated march commander
STAVKA acronym for the Soviet high command during World War II
*stay-behind operation an operation in which the commander leaves a unit in position to
conduct a specified mission while the remainder of his forces
withdraw or retire from an area
striking force a committed force organized to conduct the decisive attack in a
mobile defense. It normally comprises the maximum combat
power available to the commander at the time of the attack.
(FM 3-0)
*strong point (Army) a heavily fortified battle position tied to a natural or
reinforcing obstacle to create an anchor for the defense or to deny
the enemy decisive or key terrain
*subsequent position a position that a unit expects to move to during the course of
battle
*supplementary position a defensive position located within a unit’s assigned AO that
provides the best sectors of fire and defensive terrain along an
avenue of approach that is not the primary avenue along which
the enemy is expected to attack
*support-by-fire position the general position from which a unit conducts the tactical
mission task of support by fire
*support by fire a tactical mission task in which a maneuver force moves to a
position where it can engage the enemy by direct fire in support of
another maneuvering force
*supporting distance the distance between two units that can be traveled in time for
one to come to the aid of the other. For small units, it is the dis-
tance between two units that can be covered effectively by their
fires. (FM 3-0)
*supporting range the distance one unit may be geographically separated from a
second unit, yet remain within the maximum range of the second
unit’s indirect-fire weapon systems (FM 3-0)
*suppress (Army) a tactical mission task that results in the temporary
degradation of the performance of a force or weapon system below
the level needed to accomplish its mission
surveil surveillance
sys system
TAA tactical assembly area
tactical combat force a combat unit, with appropriate combat support and combat
service support assets, that is assigned the mission of defeating
Level III threats (JP 1-02)
Glossary-25
FM 3-90
tactical level of war the level of war at which battles and engagements are planned
and executed to accomplish military objectives assigned to tactical
units or task forces. Activities at this level focus on the ordered
arrangement and maneuver of combat elements in relation to
each other and to the enemy to achieve combat objectives.
(JP 1-02)
*tactical mobility the ability to move rapidly from one part of the battlefield to
another, relative to the enemy
tactical road march a rapid movement used to relocate units within an area of
operations to prepare for combat operations (FM 3-0)
*tactician an individual devoted to mastering the science and art of tactics
tactics (Army) the employment of units in combat. It includes the
ordered arrangement and maneuver of units in relation to each
other, the terrain, and the enemy to translate potential combat
power into victorious battles and engagements. (FM 3-0)
TAI targeted area of interest
target in the fire support context, an area designated and numbered for
future firing (JP 1-02)
*target reference point an easily recognizable point on the ground, such as a building or a
road junction, used in conjunction with engagement areas and
sectors of fire to initiate, distribute, and control fires
*targeted area of interest the geographical area or point along a mobility corridor where
successful interdiction will cause the enemy to abandon a
particular course of action or require him to use specialized
engineer support to continue. It is where he can be acquired and
engaged by friendly forces.
TCF tactical combat force
TCP traffic control point
TECHINT technical intelligence
*techniques the general and detailed methods used by troops and commanders
to perform assigned missions and functions, specifically, the
methods of using equipment and personnel
TF task force
*time of attack the moment the leading elements of the main body cross the line
of departure, or in a night attack, the point of departure
tm team
TOC tactical operations center
TOW tube-launched, optically-tracked, wire-guided (refers to the Ar-
my’s heavy, antitank missile system)
trans transportation
Glossary-26
Glossary
*trigger line a phase line used to initiate and mass fires into an engagement
area or an objective at a predetermined range for all or like wea-
pon systems
*troop a company-size organization in a cavalry organization
*troop movement the movement of troops from one place to another by any
available means
TRP target reference point
TTP tactics, techniques, and procedures
*turn a tactical mission task that involves forcing an enemy force from
one avenue of approach or movement corridor to another. Turn is
also a tactical obstacle effect that integrates fire planning and
obstacle effort to divert an enemy formation from one avenue of
approach to an adjacent avenue of approach or into an
engagement area
turning movement (Army) a form of maneuver in which the attacking force seeks to
avoid the enemy’s principal defensive positions by seizing
objectives to the enemy rear and causing the enemy to move out
of his current positions or divert major forces to meet the threat
(FM 3-0)
UAV unmanned aerial vehicle
UMCP unit maintenance collection point
US United States
USAF United States Air Force
USMC United States Marine Corps
USN United States Navy
withdrawal a planned operation in which a force in contact disengages from
an enemy force (JP 1-02) [The Army considers it a form of retro-
grade.]
WMD weapons of mass destruction
*zone reconnaissance a form of reconnaissance that involves a directed effort to obtain
detailed information on all routes, obstacles, terrain, and enemy
forces with a zone defined by boundaries
Glossary-27
Bibliography
JOINT PUBLICATIONS
Most joint publications are online at http://www.dtic.mil/doctrine/jel/
Bibliography-0
Bibliography
Bibliography-1
FM 3-90
Bibliography-2
Bibliography
Bibliography-3
Index
Entries are by paragraph number unless page (p.), figure (fig.), or table
(tbl.) is specified.
Index-0
Index
airborne forces/operations formation for, 3-131, 3-132 reserve, 9-2, 9-10–9-15, 9-51,
(continued) IPB, 14-28 9-65, 9-81–9-82, 9-84
ISR for, C-38 reconnaissance operations reserve, positioning of, 9-34–
linkup operations and, C-26, and, 14-29 9-38
C-44, D-75 security operations and, 14-29 retransmission nodes for, 9-36
NBC operations and, C-23 tactical road march, compared risk during, 9-7
patrolling and, C-38 with, 14-31 security operations during,
pursuit, use during, 7-7, 7-12 area ambush, 5-133 9-27, 9-57–9-66, 9-75
reconnaissance operations, area defense, battlefield shaping operations during,
C-37, C-43 organization for, 2-80 9-57, 9-67–9-71
reserve, C-41–C-42 BHL, 9-75 smoke, use during, 9-75
security operations, C-37, C-43 control measures for, 9-16– spoiling attacks during, 9-39–
9-18 9-43
stay-behind operations, use for,
11-120 counterattacks during, 9-39– stalemate, 9-83–9-84, 9-88
tactical mobility of, C-30 9-43 TCF, resourcing, 9-7
airspace C2. See A2C2, CSS for, 6-64, 9-66, 9-77 transitions from, 3-198, 8-161,
decisive operation of, 9-8 9-88–9-89
alternate bounds, 14-37
defense in depth, as a, 9-3, WMD threat during, 9-29, 9-36
alternate position, 8-19
9-28–9-31 area of influence, AO and, 2-39,
ambush, 5-123–5-144
defined, p. 9-1 2-53
area, 5-133
example of, p. 8-2–8-3 area of interest, 3-115
base/base cluster defense, use
execution of, 9-54–9-89 area reconnaissance, 13-35–
during, E-125
13-38
categories of, 5-125 force protection during, 9-6,
9-36 base/base cluster defense,
control of, 5-134–5-135, 5-137 E-106, E-107
forward defense, as a, 9-3,
defined, 5-123 zone reconnaissance,
9-32–9-33
delay, use in, 11-40 compared with, 13-35
guard as an, 12-66
infiltration (form of maneuver), area security, 12-113–12-117
ISR during, 9-4–9-5, 9-44, 9-57
and, 3-58 civil considerations, 12-116
keys to a successful, 9-21
point, 5-129–5-132 defined, 12-1
linear obstacle, of, 8-114
AO, 2-36–2-56 force protection, 12-116
local counterattack during,
A2C2 and, 2-46–2-48 hostile IO, 12-116
9-10, 9-25, 9-79–9-82
ACM and, 2-48,2-49 human dimension, 12-116
MBA operations for, 9-8–9-9
area of influence and, 2-39 local security and, 12-115
movement planning for, 9-18
assembly area and, 2-58 rear area and base security,
obstacles, use of, 9-72, 9-77
assignment of and mission E-23
offensive operations during,
command, 2-37 route security, E-150
9-69
contiguous. See contiguous AO rules of engagement, 12-116
planning for, 9-19–9-43
defined, 2-36 Army air movements, 14-4
possible results of, 9-83, 9-88–
fires and, 2-43–2-44 9-89 Army aviation. See also airborne
noncontiguous. See preparing for, 9-44–9-53 operations; air assault
noncontiguous AO operations,
rear area and base security
PAA and, 2-117 during, 9-7 attack, use during, 5-85
security and, 2-45 rehearsals for, 9-49–9-50, base/base cluster defense, use
approach march, 14-26–14-31 9-52–9-53 during, E-76
defined, 14-26 breakout, use during, D-63
Index-1
FM 3-90
Army aviation (continued) assembly area, 2-57–2-59 civil affairs, E-82, E-144
communications for, 3-148 attack, breakout, D-60 civil considerations, E-66, E-77,
CSS, in support of, 3-174 daylight, 5-29 E-82, E-90, E-107
defense, use in the, 8-50 defined, p. 5-1 COP, E-99, E-116
defensive encirclement fire support for, 5-5, 5-39–5-41, counterattacks during, E-75
operations, use during, D-34 5-50, 5-82, 5-85, 5-96 counterintelligence for, E-72
delay, use during, 11-12, 11-41, ISR for, 5-19, 5-20, 5-49, 5-65 countermobility operations
11-42, 11-55 limited-visibility, 5-30–5-38 during, E-95
exploitation, use during, 6-10, maneuver sequence during, counterreconnaissance during,
6-44, 6-45 5-83 E-75
fire support and, 3-144, 5-115 MTC, differences, 3-7 CSS and, E-98
flank guard and, 12-81 offensive IO and, 5-28 fire support, E-76, E-93, E-125,
forward passage of lines, use E-129
preparation tasks, 5-48
during, 16-27 force protection, E-96
rehearsal for, 5-51
infiltration (form of maneuver), fratricide, E-90
reserve and, 5-5, 5-6, 5-7–5-10
and, 3-73 fundamentals of, E-70–E-80
shaping operations and, 5-6
mobile defense, use during, IPB, E-59, E-72, E-82, E-83
10-10, 10-30 situational understanding
during, 5-65 ISR, E-82, E-140
MTC, use during, 4-12, 4-54
attack position, defined, 3-15, local security and, E-87
offensive encirclement
5-54 military working dogs and,
operations, D-6, D-19
attack-by-fire position, defined, E-128
passage of lines, 16-4
3-14 MP forces, use of during, E-59
penetration, 3-93, 3-100
axis of advance, defined, 3-16 multinational operations, E-55,
pursuit, use during, 7-20 E-66, E-84, E-103,
trigger line and, 2-70
reconnaissance operations, E-105, E-107, E-120, E-123,
13-13, 13-58, 13-68 E-138
B
retirement, 11-99 NBC operations, E-118
base, 8-113, E-19–E-22. See also
security operations, 12-30, offensive IO, E-144
perimeter defense
12-39, 12-40
base/base cluster defense, E-47– offensive operations during,
spoiling attacks and, 5-166, E-119
E-149. See also perimeter
5-168
defense patrols, E-123–E-129
TCF, as a, E-63
ADC, E-97, E-112, E-145– perimeter defense, E-122
troop movement, use for, 14-48 E-149 reaction operations, E-134–
art of tactics, 1-12–1-19, p. 1-6– air defense for, E-94 E-136
1-9
ambush, use during, E-125 rear area security forces, E-57–
artillery. See fire support (assets), E-64
area reconnaissance for,
assailable flank, defined, 2-18 E-106, E-107 reconnaissance operations,
envelopment and an, 3-29, Army aviation, E-76 E-106, E-107
3-31, 3-38 reserve, E-51
attack-by fire, defense against,
frontal attack and an, 3-102 E-139 response force, E-56, E-84,
penetration and an, 3-82 base cluster defense force, E-87, E-117–E-118, E-137
assault echelon, airborne E-56 responsiveness of, E-79–E-80
operations, C-15, C-35 BDF, E-49–E-55 risk, E-59
assault position, defined, 3-12, bunkers, E-130, E-132 security operations, E-72,
5-84, 5-89–5-93 E-89–E-90, E-129
C2 of, E-79
assault time, 3-13 security platoons, E-50, E-52
CFZ, E-141
Index-2
Index
Index-3
FM 3-90
civil considerations (continued) cohesion, 5-112. See also human linkup, during a, D-76
defensive operations, during, dimension mobile defense, during a, 10-1
8-31, 8-74 column formation, 3-125–3-126 offensive operations, during,
denial operations, during, combat formation, 3-122–3-137 3-3, 3-184
11-110, 11-113, 11-116 combat information, 1-24. See security operations, during,
exploitation, during, 6-34 also information 12-32
forward passage of lines, combat load, 3-168 transitions, during, 8-169
during, 16-29 combat outpost, 12-121–12-123. cordon security (route security
infiltration (form of maneuver), See also defensive technique), E-155–E-158
during, 3-68, 3-72 encirclement operations counterattack(s), 5-145–5-159,
movement of fire support combat power, 2-4, 8-176 8-44
assets, for, 5-115 combat security (route security area defense, during, 9-39–
offensive operations, during, technique), E-159–E-160 9-43
3-117 combat-configured loads, 8-97 base/base cluster defense,
perimeter defense, during, combination pursuit, 7-10–7-13 during, 8-113, E-75
8-120 cover, during, 12-94
combined arms, 2-12–2-14
rear area and base security, defensive cover, during, 12-109
commander’s visualization. See
during, E-29, E-40–E-46
visualization, defined, 5-145
reconnaissance operations,
complementary effects, 2-13 delay, during, 11-54
13-1, 13-9, 13-14
concealment, 8-68–8-69 local, 5-149, 5-152, 5-158,
retirement, during, 11-106,
consolidation, 5-105–5-112, 5-114 5-159
11-108
contact point, 2-61–2-62, 11-15 major, 5-147, 5-152
RFL, for, 2-95
contiguous AO, 2-50, 2-52, 2-74– mobile defense, during. See
route reconnaissance, during,
2-80 striking force
13-23
continuous operations, 1-19 withdrawal, during, 11-89
TCF, for, E-64
contractors, E-6–E-10 counterfire missions, timing of,
troop movement, for, 14-5,
8-55
14-41 control measures, basic, 2-31–
2-34 counterintelligence, rear area and
clear (tactical mission task),
base security, E-46, E-72
base/base cluster defense, direct fire. See 2-64–2-73
during, E-119 countermobility operations,
labeling for security operation,
base/base cluster defense,
heavy force technique for, 12-13
E-95
5-103 convex slope, fig. 8-14
breakout, during, D-69
close area, 2-77 convoy security, CSS for, E-174
CSS considerations, 8-76, 8-83
close column, 14-21–14-22 fire support for, E-173, E-179
defensive encirclement
close combat, close area and, urban environment, in an, operations, during, D-36
2-77 E-175
defensive operations, during,
defined, 3-120 coordinating altitude, 2-46, 2-48 8-76–8-84, 8-112
CMO, base/base cluster defense, COP, 1-22, 5-66 delay, during, 11-45
during, E-82, E-144
airborne operations, during, denial operations, compared to,
defensive operations, during, C-38 11-113
8-74
area defense, during an, 9-59, mobile defense, during, 10-14,
denial operations, during, 9-80 10-18
11-113
base/base cluster defense, offensive encirclement
exploitation, during, 6-34 during a, E-99, E-116 operations, during, D-13
rear area and base security, decision making and, 1-16 offensive operations, during,
during, E-43
delay, during a, 11-43 3-157–3-160
troop movements and, 8-103
Index-4
Index
Index-5
FM 3-90
Index-6
Index
delay order, 11-24–11-26 area security as, 12-115 supporting distance and, 3-34,
delaying operation, offensive base/base cluster defense as, 3-39
encirclement operations, D-15 E-106 transitions during, 3-36, 3-41
deliberate operation, 1-21–1-37 defensive operations, during, turning movement, compared
demolition policy, denial 8-45, 8-115 with, 3-42, 3-34
operations and, 11-114 delay as, 11-6 varieties of, 3-29
demonstration, 5-160–5-161 screen as, 12-48 vertical, 3-29, 3-42
frontal attack, and, 3-106 electronic warfare. See offensive escape route (reduce technique),
denial operations, 11-110–11-117 IO D-24
destruction criteria, breakout, elements of operational design, exfiltration, D-72
D-43 2-9 exploitation. See also follow and
withdrawal, 11-85 emergency destruction of support; follow and assume
equipment. See denial advance guard, use of, 6-14
destruction of civilian property,
operations
11-110 air assault operations during,
enabling operations, tactical, 2-2 6-47
destruction of equipment to
prevent capture, 11-104. See encirclement operations, 8-49 air defense considerations for,
also denial operations breakout and, D-41–D-71. See 6-9, 6-32
diamond formation, 3-132–3-133 also breakout air support and, 6-9, 6-30
direct fire control measures, 2-64– defensive, D-26–D-40. See airborne operations during,
2-73. See also under individual also defensive encirclement 6-47
control measures operations
Army aviation, use of, 6-10,
direct fire plan, engagement defined, p. D-0 6-44, 6-45
criteria and, 2-66 envelopment and, 3-36 CFL, use of, 6-18
direct pressure force. See pursuit, example, D-12 civil considerations, during,
directed obstacle. See obstacle, exfiltration and, D-72 6-34
direction of attack, defined, 3-17 linkup and, D-75–D-81 civil-military operations, during,
trigger line and, 2-70 offensive. See offensive 6-34
disengagement line, 8-27 encirclement operations commander’s intent and, 6-20–
pursuit during, 7-10, 7-25, 6-21
disintegration, indications of, 6-40
7-33–34 conducting an, 5-119
dismounted assault, 5-100–5-103
encircling force. See pursuit control of, 6-21, 6-24
dismounted march, 14-2
engagement, 1-4, 1-6 CS factors, 6-15
disrupt (tactical mission task),
5-67–5-72 engagement criteria, 2-66 CSS for, 3-174, 6-15, 6-33–
engagement priority, 2-67 6-34
diversion. See military deception
engineer reconnaissance, troop defined, 3-9
DLIC, 11-72–11-74, D-60.See
also defensive encirclement movement, for, 14-44, 14-47 engineers, use of, 6-10, 6-34
operations entry operations, 3-5 fire support for, 6-8, 6-28–6-30
doctrinal hierarchy, 2-1–2-3 envelopment, 3-29–3-41 follow and support during, 6-52
DOD civilians, E-6–E-10 defined, 3-29 force, size of, 6-5
double envelopment, 3-30 double, 3-30 formation for, 3-131, 3-132,
encirclement and, 3-36 6-25–6-27
E pursuit, during, 3-36, 7-3, 7-10, information and, 6-48
EA, 2-65, 2-70 7-16 initiative during, 6-39
echelon formation, 3-129–3-130 reserve, use of, 3-41 ISR during, 6-38, 6-40, 6-42–
shaping operations and, 3-38 6-44
economy of force (operation),
5-74, 5-75 liaison, requirement for, 6-7
Index-7
FM 3-90
exploitation (continued) fire support (assets), air assault reconnaissance operations, for,
LOA and, 3-19 operations, for, C-60 13-10, 13-17, 13-21, 13-65
local, 6-3 airborne operations, for, C-29, relief in place, for, 15-12, 15-13,
C-34 15-29
major, 6-3
Army aviation, and, 3-144 screen, for, 12-55
mobility requirements for, 6-7,
6-10 assault on an objective, for, search and attack, for, 4-66
5-95 security operations, for, 12-29
obstacles, use of, 6-17, 6-31
attack criteria, 5-39–5-40 spoiling attacks, for, 5-166,
offensive IO and, 6-28
attack, for, 5-41 5-168
penetration and, 3-100
base/base cluster defense, for, supporting range and, 3-147
pursuit, transition to, 7-39
E-76, E-93, E-125, E-129 trigger line for, 2-71–2-72
rear area and base security,
breakout, for, D-63, D-68 zone reconnaissance, for,
during, 6-34
CAS and, 3-144 13-31
reconnaissance forces, use of,
6-12 CFZ and, 2-61 fire support base, search and
control of, 5-5 attack, use during, 4-69
reserve, use of during, 6-11,
6-26, 6-34, 6-54 convoy security and, E-173, fire support target, 2-96–2-98. See
E-179 also target
risk during, 6-49
defensive encirclement TRP as, 2-69
security forces, use of, 6-13
operations, for, D-35 fires, AO and, 2-43–2-44, 3-7
security, during, 6-23, 6-45
defensive operations, for, 8-50– fix (tactical mission task), air
targeting considerations, 6-28
8-58 interdiction, as a means of,
delay, for, 11-20, 11-55, 11-60 5-77
F attack and, 5-73–5-78
exploitation, for, 6-28–6-30
FCL, 3-12, 3-18, 5-89–5-93 exploitation and, 6-46
FCL and, 3-18
FEBA, airhead line, compared interdiction, as a means of,
forward passage of lines, for,
with, C-23 5-77
16-21, 16-27
defined, 8-13 pursuit, during, 7-25, 7-31
fratricide and, 3-143
FLOT and, 2-99 fixing force, mobile defense, in,
LD and, 3-20
security force, 8-13 8-6, 10-28. See also search
linkup, for, D-76, D-80
feint, 3-106, 5-160–5-161 and attack
maneuver of, 5-82, 5-85, 5-96,
FFA, 2-86 flank(s), 2-17–2-19
5-115
field artillery. See fire support defined, 2-17
mobile defense, for, 10-15–
field of fire, 11-31 10-16 delay and, 11-22, 11-48
finishing force. See search and MTC, for, 4-23, 4-34, 4-54 envelopment and, 2-38
attack, obstacle belts and, 2-109 offensive operations and, 3-158
fire and movement, mutual offensive encirclement penetration and, 3-99
support of, 2-21 operations, for, D-19 screen and, 12-48
fire control measure(s), 2-64–2-73 offensive operations, for, support-by-fire position and,
check point as, 2-60 3-141–3-149 3-24
defensive operations, during, passage of lines, for, 16-13 flank cover, 12-91, 12-105–12-106
8-28–8-27 planned targets, 2-98 flank guard, 12-76–12-85, 12-105
fire discipline, ambush, during, position areas for, 5-82 flank security. See security
5-141 operations,
pursuit, for, 7-12, 7-30
fire plan. See fire support, flanking position, 2-19
quick-fire net and, 3-148
fire strike (reduce technique), FLOT, 2-99
rearward passage of lines, for,
D-19
16-36, 16-38
fire superiority, 5-17
Index-8
Index
follow and assume (force), defensive operations, during, frontal attack, 3-102–3-109
breakout, in a, D-42, D-46, 8-12 CSS for, 3-108
D-62, D-63 LOA and, 3-19 defined, 3-102
exploitation, in the, 5-119, 6-3, forward defense, linear obstacle, reconnaissance in force
6-7 of, 8-114 conducted as, 13-40, 13-41
forward passage of lines, in a, perimeter defense and, 8-122, reserve for, 3-108
6-7 8-123
shaping operation, 3-31, 3-102,
penetration, in a, 3-82, 3-85, forward military crest, fig. 8-14 3-106
3-99, 3-100
forward passage of lines, 16-21– frontal pursuit, 7-9
follow and support (force), 16-30
breakout, during a, D-46 FSCL, 2-84–2-85
civil considerations for, 16-29
bypassed enemy, and, 5-88 FSCM, 2-81–2-95. See also
CSS for, 16-29 individual measures
exploitation, during an, 5-119,
defined, 16-2 defensive operations, during,
6-7, 6-52
exploitation, in the, 6-7 8-24–8-25, 8-53
offensive encirclement
operations, during, D-5 fire support for, 16-21, 16-27 permissive, 2-82–2-86. See
offensive IO for, 16-27 also individual measures
penetration, during a, 3-82
reconnaissance operations for, pursuit, during, 7-17
pursuit, during a, 7-7, 7-15,
7-25 16-26 restrictive, 2-87–2-95. See also
security of LD and, 16-21 individual measures
follow-on echelon, C-15
security operations and, 16-26 security operations, 12-22
foot march, 14-2
force protection, 1-32 forward slope, fig. 8-14
FPF, 8-25 G
area defense, during, 9-6, 9-36
fratricide (prevention), 5-141, gamble. See military gamble,
area security and, 12-116
8-56, 8-65 general control (rear area and
base/base cluster defense and,
base/base cluster defense and, base security), E-37
E-96
E-90 ground tactical plan, C-4, C-5
contractors for, E-6–E-10
EA and, 2-65 air assault operations, C-58–
DOD civilians for, E-6–E-10
fire support and, 3-143 C-59
obstacles and, 2-110
FLOT and, 2-99 airborne operations, C-35
offensive operations, 3-157–
FSCL and, 2-84 guard (form of security operation),
3-166
12-62–12-87
perimeter defense and, 8-127 infiltration (form of maneuver),
and, 3-65 advance, 12-69–12-75
rear area and, 2-79
linkup and, D-80 area defense, as a, 12-66
security operations and, p. 12-0
LOA and, 3-19 breakout and, D-47
forced march, 14-6
mobile defense and, 10-1 cover and, 12-93
formation, box, 3-131
obstacles and, 2-110 cover, compared to, 12-89–
column, 3-125–3-126 12-90
passage of lines, and, 16-5,
diamond, 3-132–3-133 defined, 12-1
16-14
echelon, 3-129–3-130 delay, as a, 12-66
pursuit and, 7-15
line, 3-127–3-128 flank, 12-76–12-85. See also
relief in place and, 15-5
vee, 3-136–3-137 flank guard
search and attack and, 4-67
wedge, 3-134–3-135 MTC, as a, 12-66
security operations and, 12-22
forms of maneuver, 3-28–3-107. rear, 12-86–12-87
stay-behind operations and,
See also individual forms screen and, 12-62
11-120
forward boundary, 2-51 screen as part of, 12-68
striking force and, 10-16
terrain management and, 2-41 types of, 12-63
Index-9
FM 3-90
guard (form of security operation) retrograde, 11-3 intermediate staging area, C-15
(continued) transitions, during, 3-195, intermediate staging base, 10-19,
zone reconnaissance, as a, 8-165, 8-174 C-15
12-66 IPB, aerial, 8-72
I–J approach march, for, 14-28
H IBCT, combat formations for, base/base cluster defense, for,
hammer and anvil (reduce 3-124 E-59, E-72, E-82, E-83
technique), D-22 illumination, during limited visibility defensive operations, during,
hasty attack, ISR, as a means of, attacks, 5-34–5-35 8-12
1-32 infiltration, rally point and, 3-24 delay, during, 11-19
pursuit and, 7-11, 7-25, 7-39 infiltration (form of maneuver), direct fire control measures
hasty defense, pursuit during, 3-56–3-82 and, 2-64
7-12 aborting of, 3-81 offensive cover and, 12-101
hasty operation, 1-21–1-37 defined, 3-56 offensive operations, for, 3-115
heavy forces, assailable flank for, mutual support and preventing, reconnaissance operations,
2-18 2-22 and, 13-2, 13-10, 13-46, 13-68,
assembly area location and, infiltration (movement technique), p. 13-0
2-59 14-23–14-25 reconnaissance-pull/push and,
defense, use in the, 8-47 relief in place and, 15-4 13-49–13-50
delay, use in, 11-39 infiltration lane, 3-65 search and attack and, 4-64
infiltration (form of maneuver), information, attack planning, and, security operations, and, 12-7,
and, 3-58 5-20 12-45
penetration, 3-92, 3-100 exploitation, during, 6-48 survivability operations and,
pursuit, use during, 7-11, 7-12 3-165
pursuit, during, 7-12, 7-28, 7-35
rear area and base security, isolate (tactical mission task),
information management, rear
use in, 8-113 nonlethal fires and, 5-76
area and base security, E-25
tactical mobility and, 2-30 ISR (assets/operations). See also
reconnaissance operations,
reconnaissance by fire;
H-hour, different meanings of, 13-9
reconnaissance in force;
3-27 information requirements, reconnaissance objective;
host nation support. See offensive operations, 3-119 reconnaissance operations;
multinational operations, reconnaissance operations, reconnaissance-pull;
human dimension, 1-17–1-19 13-17 reconnaissance-push,
airborne operations, during, information superiority, air defense, role in, 8-72
C-33, C-35 envelopment and, 3-37 airborne operations, and, C-38
area security and, 12-116 turning movement and, 3-52 area defense, during, 9-4–9-5,
cohesion and, 5-112 initiating directive, airborne 9-44, 9-57
defensive encirclement operations, C-25 attack, for, 5-19, 5-20, 5-65
operations, during, D-26, D-28, initiative, 1-38–1-42 base/base cluster defense,
D-39–D-40 area defense, during, 9-10 E-82, E-140
example of, p. 1-5 exploitation, during, 6-3, 6-39 breakout, for, D-53–D-54
limited visibility operations, offensive operations during, characteristics of, 13-14
during, 3-140 3-1, 3-111 consolidation, during, 5-106
march discipline and, 14-53 intelligence. See ISR cueing of, 13-52
offense to defense, during shift interdiction, fix and, 5-77 defensive operations, for, 8-31–
from, 9-87
TAI and, 2-121 8-94
reconnaissance operations,
intermediate objective, 3-21, 5-87 delay, for, 11-47, 11-35–11-36
during, p. 13-0
Index-10
Index
ISR (assets/operations) LD, attack position and, 3-15 methods of, D-78–D-80
(continued) defined, 3-20 multinational, D-81
exploitation, during, 6-12, 6-38, fire support, 3-20 RFL and, 2-95
6-40, 6-42–6-44
LC and, 3-20, 2-100 stay-behind operations and,
fighting for information, 9-4 11-119
time of attack and, 3-26
follow-though, during, 5-114, transitions and, 3-49
transitions and, 3-20
5-121
leadership. See human linkup point, 3-66
hasty attack as a means of,
dimension, LOA, defined, 3-19
1-32
levels of war, 1-3, 1-4, 1-7–1-8 exploitations and, 3-19
infiltration(form of maneuver),
and, 3-62, 3-67 light forces, assailable flank for, forward boundary and, 3-19
2-18 objective and, 3-19
mobile defense, 10-25, 10-32
assembly area location and, pursuit and, 3-19
modernized, 5-66
2-59
MTC, use during, 4-2, 4-41 LOC(s), defined, 3-35
defense, use in the, 8-48
offensive encirclement noncontiguous AO and, 2-56
delay, use in the, 11-32
operations, during, D-6, D-17 offensive operations, 3-170,
delay, use in the, 11-40 3-171
offensive operations, during,
3-115–3-119 infiltration(form of maneuver), local counterattack, area defense,
use in a, 3-58 9-10, 9-79–9-82
PD and, 3-22
penetration, use in a, 3-92 decisive counterattack,
perimeter defense, during,
8-129 pursuit, use during, 7-11 comparison, 9-85
plan, 13-47, 13-48 stay-behind operations, use in, local exploitation, 6-3
11-120 local security, 12-118–12-120
pursuit, during, 7-19, 7-28, 7-29
light line, 14-18 area security and, 12-115
rear area and base security,
during, E-39 limited conversion division, base/base cluster defense and,
combat formations for, 3-124 E-87
reconnaissance operations,
13-9, 13-20, 13-21, 13-43, limited visibility operations, defined, 12-1
13-47, 13-48 breakout, during a, D-58
rear area and base security
relief in place, 15-21 human dimension, 3-140 and, E-21
reverse slope defense, for, offensive operations, during, reconnaissance operations
8-148 3-138–3-140 and, 13-5
risk and, 1-30 passage of lines, during a, LOGPAC, 4-14
16-15
security operations, support to,
12-9, 12-27, 12-32 reconnaissance operations,
M
during, 13-66–13-67
tactical road march, 14-11 main effort, 3-181
relief in place, 15-8
transitions, 8-175 maintenance operations,
troop movement, during a,
troop movement, 14-49–14-52 defensive operations, during,
14-22, 14-52
list, tbl. 13-1 8-100
withdrawal, during a, 11-86
offensive operations, during,
line formation, 3-127–3-128 3-172
K–L
linear obstacle, defense of, 8-114 retirement, during, 11-104
key terrain, defined, 2-55
linkup operations, D-75–D-81 major exploitation, 6-3
examples of, 8-38
airborne operations, C-26, C-44 major operation, 1-4
kill zone, 5-129
communications for, D-76 maneuver, defined, 2-20
landing plan, C-4
COP, D-76 forms of, 3-28–3-107. See also
LC, defined, 2-100
fire support for, D-76, D-80 individual forms
LD and, 3-20
fratricide during, D-80 means of exploiting, 5-80
Index-11
FM 3-90
Index-12
Index
noncontiguous AOs, and, 3-6 infiltration (form of maneuver), delay, 11-20, 11-23, 11-32,
and, 3-58 11-40, 11-56
offensive cover during, 12-101
search and attack and, 4-67 directed, 2-103
offensive IO during, 4-2, 4-54
TAI and, 2-101 emplacement authority for,
operational-level example, 2-102
p. 4-2 zone reconnaissance and,
13-30 exploitation, use during, 6-17,
pursuit and, 7-11 6-31
NBC operations, 8-47
reconnaissance and fix, as a means of, 5-78
surveillance plan for, 4-26 airborne operations, during,
C-23 force protection and, 2-110
reconnaissance in force
conducted as, 13-40, 13-41 base/base cluster defense, fratricide and, 2-110
during, E-118 mobile defense, use during,
reserve and, 4-13
defensive operations, during, 10-18, 10-29
security operation, as a, 12-40
8-75, 8-90–8-92 offensive operations, use
shaping operation as a, 4-28 during, 3-157, 3-159
offensive operations, during,
situations requiring, 4-2 3-166 penetration, use during, 3-99
sustainment of, 4-14–4-15 rear area and base security protective. See protective
use of advance guard during, and, E-8, E-10 obstacles
4-8 reconnaissance operations, reconnaissance operations, use
MP forces, base/base cluster during, 13-17, 13-25 during, 13-12
defense and, E-59 NFA, 2-93, 8-56 recording/reporting, 2-114
troop movements and, 8-103, noncontiguous AO, 2-53–2-54, relief in place, use during,
14-48 2-55, 2-56 15-14
MSR, designations for, 2-120 area security and, 12-114 reserve, 2-103
multinational operations. See also defensive operations and, 9-7, restrictions on the use of, 2-115
rear area and base security 9-26
security operations, use during,
base/base cluster defense, defined, 2-50 12-31
E-55, E-66, E-84, E-103,
MTC and, 3-6 smoke and, 8-93
E-105, E-120, E-123, E-138
noncontiguous rear area, security stay-behind operations, use
linkup operations, D-81
of, 2-79 during, 11-120
Index-13
FM 3-90
offensive cover, 12-97–12-104 defensive operations, use example of, p. 3-1–3-3, p. 8-2–
offensive encirclement operations. during, 8-44 8-3
See also envelopment, defensive operations, use fire support during, 3-143–
exploitation, MTC, penetration, during, 8-1 3-149
pursuit, delay, use during, 11-34 flanks during, 3-158
Army aviation, use during, D-19 disrupt, use during, 5-68 force protection during, 3-157–
C-2 of, D-3 exploitation, use during, 6-28 3-166
countermobility operations, fire superiority and, 5-17 force-oriented, 3-2
during, D-13 initiative during, 3-111
forward passage of lines, use
CSS for, D-19 during, 16-27 IPB during, 3-115
delay and, D-15 hostile, area security and, limited visibility, during, 3-138–
escape route (reduce 12-116 3-140
technique), D-24 infiltration (form of maneuver), LOC for, 3-170, 3-171
fire strike (reduce technique), and, 3-73, 3-78 main effort of, 3-181
D-19 mobile defense, use during, maintenance operations during,
fire support for, D-19 10-22, 10-27 3-172
follow and support and, D-5 MTC and, 4-2, 4-54 medical operations during,
hammer and anvil (reduce offensive encirclement 3-173
technique), D-22 operations, use during, D-19, mobility operations during,
ISR during, D-6, D-9, D-17 D-24 3-154–3-156
mobility operations during, D-13 offensive operations, use momentum during, 3-112,
during, 3-149, 3-180 3-155
offensive IO during, D-19, D-24
penetration, use during, 3-90 NBC operations use during,
phases of, D-2–D-6
preparation fires, use during, 3-166
reconnaissance operations
3-146, 5-57 obstacles use during, 3-157,
during, D-17
pursuit, use during, 7-30 3-159
reducing and enemy, D-18–
D-25 reconnaissance operations, use offensive IO use during, 3-149,
during, 13-21 3-180
security of, D-2
offensive operations, air defense perimeter defense, during,
security operations during, D-4,
for, 3-150–3-152 8-139
D-17
area defense, during, 9-69 preparation fires for, 3-145–
spoiling attack during, D-15
base/base cluster defense, 3-146
squeeze (reduce technique),
during, E-87, E-119 reconnaissance in force
D-20–D-21
BDAR, during, 3-172 conducted as, 13-39, 13-40
wedge (reduce technique),
C2 of, 3-176–3-185 rivers, effect on, 3-156
D-23
CFL, 3-147 security operations during, 3-3,
WMD, use during, D-14
3-157, 3-158
offensive IO, area defense, use characteristics of, 3-3
survivability operations, 3-161–
during, 9-68 communications during, 3-148,
3-166
assault on an objective, use 3-184
TCF use during, E-63
during, 5-95 COP during, 3-3, 3-184
tempo of, 3-185
attack, use during, 5-28 CSS during, 3-167–3-175
terrain-oriented, 3-2
base/base cluster defense, use culminating point of, 3-186–
during, E-144 3-198 transitions during, 3-186–3-198
breakout, use during, D-55– decision points during, 3-181 transportation operations
D-57 during, 3-171
decisive terrain for, 3-121
counterattacks, use during, types of, 3-5–3-9
defensive IO use during, 3-3
5-157 visualization of, 3-110
defined, p. 3-0
Index-14
Index
OP, types of, 12-23 perimeter defense, use during, PIR, 13-2
open column, 14-20 8-119, 8-129 PL, checkpoint as a substitute for,
operation, defined, 2-23 rally point and, 3-24 2-60
operational framework, 2-4–2-5 screen, use during, 12-23, defined, 2-116
12-54 FCL and, 3-18
operational pause, transitions to
the offense, 8-159 PD, defined, 3-22 flank guard, 12-83
OPSEC, during withdrawal, 11-67 direction of attack and, 3-18 LD as, 3-20
ORA, 2-115 ISR and, 3-22 LOA and, 3-19
ORP, infiltration (form of security operations and, 3-22 PLD and, 3-22
maneuver), and, 3-60 time of attack and, 3-26 security operations and, 12-16
use of, 5-55 PLD, actions at, 5-89–5-93
P–Q penetration, 3-82–3-101 assault position and, 3-12
PAA, 2-117–2-119 conducting a, 5-118 defined, 3-22
passage lane, 16-7 exploitation and, 3-100 point ambush, 5-129–5-132
passage of lines, 16-1, p. 16-0 flanks during, 3-99 position areas, 5-82
air defense during, 16-14 local counterattacks during, preparation fires, 5-57–5-58
air support during, 16-15 5-159
offensive IO and, 3-146, 5-57
area defensive operations, obstacles, use during, 3-99
offensive operations, during,
during, 9-64 offensive cover during, 12-103 3-145–3-146
communications during, 16-20 phases of, 3-91–3-92, 3-96– primary position, 8-18
defensive cover during, 12-111 3-100
principles of war, 2-6
fire support during, 16-13 shaping operations during,
priority area (rear area and base
3-93, 3-97,3-101
forward, 16-21–16-30. See also security), E-36
forward passage of lines transitions during, 3-100
protective obstacles, 2-110, 8-83
fratricide during, 16-5, 16-14 perimeter defense, 8-118–8-141.
emplacement authority for,
See also base/base cluster
limited visibility operations 2-102
defense; defensive
during, 16-15 provost marshal, troop movement
encirclement operations
order of march for, 16-4 and, 14-48
base/base cluster defense and,
perimeter defense, during, E-122 psychological factors. See human
8-129 dimension
control measures for, 8-131
rearward, 16-31–16-40. See PSYOP, encirclement, use during,
CSS of, 8-141
also rearward passage of lines 7-37
force protection and, 8-127
reasons for conducting, 16-1 pursuit, Army aviation, use of,
ISR during, 8-129 7-20
security operations during, 16-4
offensive operations during, CAS, use of, 7-20
traffic control during, 16-18
8-139
passage point, 16-6 combination, 7-10–7-13
passage of lines during, 8-129
passive air defense, 8-67–8-70 control of, 7-14–7-17
patrolling during, 8-129
passive security (route security countermobility operations
planning, 8-132–8-139 during, 7-21
technique), E-152–E-153
rear operations and, 8-128 CSS during, 3-174, 7-22–7-23
patrols/patrolling, combat outpost
and, 12-123 reserve and, 8-120, 8-130, culmination during, 7-5
8-136, 8-140
consolidation, during, 5-106– decisive operation of, 7-24,
5-107 security operations during, 7-30
8-129
defense, use during, 8-46 defensive operations, transition
piecemeal commitment, 2-24 to, 7-39
defensive encirclement
operations, use during, D-29 pile on technique, 2-24, 3-98 defined, p. 7-1
Index-15
FM 3-90
pursuit (continued) CSS for, 3-175 host nation support of. See rear
encirclement during, 7-10, example of, p. 5-39 area and base security,
7-33–7-34 multinational operations
infiltration (form of maneuver),
engineer considerations, 7-13, and, 3-58 information management for,
7-21 E-25
rail movements, 14-5
envelopments during, 3-36 ISR and, E-39
rally point, ambushes and, 5-139
exploitation, compared with, multinational operations and,
defined, 3-24
7-3, 7-4 E-4, E-5, E-23, E-24, E-38,
RAOC, E-16–E-17 E-39
exploitation, transition to, 7-39
reaction force, air assault NBC operations and, E-8, E-10
fire support for, 7-20, 7-30 operations, C-48, C-62
priorities of, E-34–E-39
follow and support during, 7-18 reaction operations, E-134–E-136
purpose of, p. E-0
formation for, 3-131, 3-132 rear area, 2-78–2-79. See also
RAOC, E-16–E-17
frontal, 7-9 rear area and base security
rear area commander, E-12–
FSCM for, 7-17 terrain management in, 8-100
E-14, E-18
hasty attack, transition to, 7-39 rear area and base security. See
rear area security forces, E-57–
hasty defense during, 7-29 also base/base cluster defense,
E-64
initiation of, 6-3 rear area threat levels, E-31–
area classifications, E-34–E-39
ISR during, 7-19, 7-28, 7-29 E-33
area defense, and, 9-7
LOA and, 3-19 rear command post, 2-78
area security and, 12-115
mobility operations during, 7-21 reconnaissance operations for,
base, E-19–E-22 E-46
mobility requirements for, 7-11–
7-12 base/base cluster defense, response force, E-32, E-33
E-47–E-149. See also
MTC during, 7-11 responsibilities, E-1–E-31
base/base cluster defense
offensive IO during, 7-30 ROC, E-15
base cluster, E-19, E-27–E-29
operational pause during, 7-18 route security, E-150–E-160.
base commander, E-20
organization for, 7-8–7-13 See also route security
BDOC, E-23–E-26
planning considerations for, security operations and, E-38–
civil affairs, E-43 E-39, E-46
7-18
civil considerations, E-29, Special Operations Forces, role
reserve, use during, 7-7, 7-18,
E-40–E-46 of, E-65
7-20
command relationships, E-11– TCF, role of, E-33
risk and, 7-4
E-18
security considerations, 7-22 threat levels, E-31–E-33
control of, E-30–E-46
security operations during, utility of locations, E-34–E-39
convoy security, E-161–E-187.
7-29, 7-35 rear area operations. See rear
See also convoy security
termination of, 7-5, 7-38 area and base security,
counterintelligence operations
quartering party, tactical road rear area security forces, E-57–
during, E-46
march, 14-12 E-64
counterterrorism operations
troop movement, 14-50 rear area threat levels, E-31–E-33
during, E-48, E-65
withdrawal, 11-84 rear guard, 12-86–12-87
criminal investigation and, E-46
quick-fire net, 3-148 breakout, during, D-48, D-65,
CSS and, E-25, E-36
D-67
defensive operations, during,
withdrawal, during, 11-74,
R 8-49, 8-112–8-113
11-87
radio silence/listening silence, DOD civilians and contractors
rear operations. See rear area
15-19 and, E-6–E-10
and base security
raid, 5-162–5-165 exploitation, during, 6-34
Index-16
Index
rearward passage of lines, 16-2, ISR and, 13-9, 13-43, 13-47, CSS and, 9-52
16-31–16-40 13-48 exploitation and, 6-39
reconnaissance. See ISR ISR plan, 13-47, 13-48 reinforcing effects, 2-13
reconnaissance by fire, 13-65 limited-visibility operations and, release point, 14-16
reconnaissance in force, 13-39– 13-66–13-67
relief in place, advance party for,
13-42 local security and, 13-5 15-4, 15-28
breakout, during, D-54 military intelligence assets and, air defense and, 15-14
defined, 13-39 13-21
air support and, 15-14
frontal attack, conducted as, multinational, E-46
communications for, 15-18–
3-102, 13-40, 13-41 NBC operations and, 13-17 15-19
MTC, conducted as, 13-40, obstacles and, 13-12 CSS, 15-7, 15-12, 15-17, 15-28
13-41 offensive encirclement defined, p. 15-1
offensive operations, conducted operations and, D-17
fire support for, 15-12, 15-13,
as, 13-39, 13-40 offensive IO during, 13-21 15-29
reconnaissance operations, rear area and base security fratricide during, 15-5
compared with other, 13-39 and, E-46, E-51
military deception during,
reconnaissance objective, 13-2— relief in place and, 15-10 15-18, 15-23
13-3
reserve and, 13-7 mobility operations during,
reconnaissance operations,
risk and, 13-59, 13-64 15-14
airborne operations, during,
C-37, C-43 security operations and, 13-5 movement control during, 15-30
approach march, 14-29 security operations, compared multinational, 15-19, 15-31
with, p. 12-1 reconnaissance for, 15-10,
Army aviation, use during,
13-19, 13-58, 13-64, 13-68 smoke for, 13-66 15-21
base/base cluster defense and, surveillance, compared with, security of, 15-8
E-106, E-107 13-20 survivability operations during,
civil considerations for, 13-1, task organizing for, 13-55 15-14
13-9, 13-14 visualization of, 13-43 techniques for, 15-1
close combat and, 13-11 reconnaissance-pull, 5-21, 13-49 warning order for, 15-9
decisive engagement and, reconnaissance-push, 5-22, 13-49 reorganization, 2-25, 5-112, 13-72
13-10, 13-11 reconstitution, defensive cover, replacements, 5-112
defined, p. 13-0 12-110 reserve(s), 5-156, 9-15
fire support for, 13-10, 13-17, defined, 2-25 airborne operations, use during,
13-21, 13-65 reconnaissance operations, C-41–C-42
forms of, 13-22–13-42, p. 13-0. and, 13-69–13-72 area defense, use during, 9-2,
See also individual forms training for, 13-71 9-51, 9-65, 9-81–9-82, 9-78,
forms of, unit capabilities, tbl. recovery operations, delay and, 9-84
13-2 11-53 attacks, use during, 5-5, 5-6
forward passage of lines and, retirement and, 11-104 base/base cluster defense, use
16-26 during, E-51
recuperation, 13-69
fundamentals of, 13-4–13-12 breakouts, use during, D-42,
redundancy, reconnaissance
historical example, 13-13 assets, of, 13-54 D-49
human dimension and, p. 13-1 refuel on the move, 14-51 consolidation, use during,
information management and, 5-110
regeneration, 2-25
13-9 counterattack force, use as,
rehearsal(s), area defense, for,
IPB and, 13-2, 13-10, 13-46, 5-146
9-49–9-50, 9-52–9-53
13-68, p. 13-0 covering force operations, use
combat formations, 3-124
during, 12-94
Index-17
FM 3-90
Index-18
Index
Index-19
FM 3-90
security platoons, E-50, E-52 attacks, use of during, 5-84 striking force, 5-146, 5-148, 8-44,
sequels. See transitions, defensive operations, use 8-64–8-65, 10-6–10-12, 10-21,
during, 8-93–8-94, 8-117 10-24, 10-25, 10-27, 10-32
shaping operation, breakout as a,
D-55–D-57, D-59 delay, use of during, 11-34, area defense and, 9-1
delay as a, 11-5 11-46 combat formation for, 10-34
frontal attack as a, 3-31, 3-102 fix, as a means of, 5-78 composition of, 10-3
area defense, during, 9-57, military deception and, 8-94 countermobility operations and,
9-67–9-71 MTC, use of during, 4-34 10-36
attacks and, 5-6 obstacles and, 8-93 defined, 8-6
attack, during, 5-68, 5-70 passage of lines, use of during, linear obstacle, defense of,
16-15 8-117
defensive operations, during,
8-107 penetration, use of during, 3-93 mobility operations and, 10-36
mobile defense and, 10-5, rear areas, use of to protect, reserve, compared with, 10-6
10-27, 10-28 5-93 strongpoint, 8-22. See also
MTC and, 4-27 reconnaissance operations, use defensive encirclement
of during, 13-66 operations; perimeter defense
penetration and, 3-93, 3-97,
3-101 support-by-fire positions and, subsequent position, 8-21
width of AO and, 5-6 5-87 successive bounds, 14-38
shuttling (troop movement), 14-43 thermal viewers, defeating with, supplementary position, 8-20
5-93, 8-93, 8-94 support-by-fire position, bounding
situational understanding, 1-32,
5-66 withdrawal use of during, 11-86 overwatch and, 14-37, 14-38
airborne/air assault operations, SOF, infiltration (form of defined, 3-24
during, C-8 maneuver), and, 3-58 infiltration (form of maneuver),
area defense, during, 9-80 rear area and base security, and, 3-58
role in, E-65 supporting distance, 6-23, 6-46,
assault on an objective, during,
5-97 spoiling attack, 5-166–5-169, 8-44 7-32
attack execution and, 5-64 area defense, during, 9-39– air assault operations and,
9-43 C-63
base/base cluster defense and,
E-116 defensive encirclement contiguous AOs and, 2-52
operations, during, D-15, D-33 defined, 2-28
breakout, during, D-53
withdrawal, during, 11-89 envelopment and, 3-34, 3-39
decision making and, 1-16
squeeze (reduce technique), turning movement and, 3-43,
defensive operations and,
D-20–D-21 3-51
8-106
staff estimates, 3-158 supporting range, 6-23, 6-30,
exploitation, during, 6-12
start point, 14-15 7-12, 7-29
infiltration (form of maneuver),
and, 3-58 stay-behind force/operations, contiguous AOs and, 2-52
11-118–11-122. See also defined, 2-29
mobile defense, during, 10-31
defensive encirclement
noncontiguous AO and, 2-55 fire support and, 3-147
operations
passage of lines, during, 16-12 flank guard and, 12-77
breakout and, 11-119
smoke, 5-90, 5-93 forward passage of lines and,
defined, 11-118
16-21
air assault operations, use of delay and, 11-40
during, C-69 mobile defense and, 10-15–
fratricide and, 11-120 10-16
area defense, use of during,
linkup and, 11-119 noncontiguous AO and, 2-55
9-75
obstacles and, 11-120 security operations and, 12-21
assault on an objective, use of
during, 5-95, 5-98 turning movement and, 3-43,
3-44
Index-20
Index
supporting range (continued) BDF and, E-51 rear area and base security
zone reconnaissance, 13-31 defense operations and, 9-25 and, 8-113
surprise, air assault operations defined, 2-30 risk and, E-60
and, C-48, C-60 delay and, 11-20 tempo, modernized systems and,
airborne operations and, C-36 5-66
envelopment and, 3-37
ambushes and, 5-136, 5-141 offensive operations, 3-185
mobile defense and, 10-14
attacks, and, 5-25 techniques for maintaining,
noncontiguous AOs and, 2-55
3-161
counterattacks and, 5-153 reconnaissance operations
tenets of Army operations, 2-7
envelopments and, 3-37 and, 13-10
terrain information,
factors that contribute to, 5-72 security operations and, 12-31
reconnaissance operations
offensive operations and, TCFs and, E-63 and, 13-17
3-138, 3-180 turning movements and, 3-43 terrain management, 2-41
preparation fires and, 3-145 tactical obstacles, 8-83 fratricide and, 2-41
reverse slope defense and, tactical problems, solving, 1-38– rear area and base security
8-143, 8-145, 8-149, 8-154 1-49 and, E-3
shaping operations and, 5-68 tactical problems, TTP and, 1-2 rear area, in the, 8-100
survivability operations, area tactical proficiency, 1-46 thermal viewers, defeating, 5-93,
defense, during, 9-48
tactical road march, 14-8–14-25 8-93–8-94
base/base cluster defense,
approach march, compared threat levels, rear area, E-31–
during, E-95
with, 14-31 E-33
CSS considerations for, 8-87
quartering party for, 14-12 time-constrained environment,
damage-limiting measures, decision making in a, 1-31
reconnaissance and, 14-11
8-71
retirement and, 11-93 time of attack, defined, 3-26
defensive operations, during,
tactician, defined, 1-9 topographic crest, fig. 8-14
8-85–8-94, 8-112
tactics, defined, p. 1-1 traffic circulation plan, 14-48
delay, during, 11-46
TAI, defined, 2-121 traffic control, area defense, 9-82
IPB for, 3-165
infiltration (form of maneuver), passage of lines, 16-18
military deception and, 8-88
and, 3-58 traffic control plan, 14-48
mobile defense, during, 10-18
NAI and, 2-101 training, 5-112
offensive operations, during,
3-161–3-166 target(s), 2-96–2-98. See also base/base cluster defense, for,
indirect fire target E-114–E-115
OPSEC and, 8-88
targeting, exploitation, during, decision making and, 1-29
relief in place, during, 15-14
6-28 exploitation and, 6-39
sustaining operations, 2-78. See
task organization, defensive offensive operations and, 3-138
also CSS
operations, for, 8-108
sustainment load, 3-168 reconstitution for, 13-71
reconnaissance operations,
task organizing and, 8-108
13-55
T transitions, 1-47, 2-1, 5-120, 7-39
training and, 8-108
tactical enabling operations, 2-2 area defense and, 9-83, 9-87–
TCF, E-33, E-60–E-64, E-118
9-89, 3-198
tactical level of war, 1-3–1-8 area defense, and, 9-7
attacks, during, 5-81, 5-86
tactical march techniques, 14-19– base/base cluster defense,
14-25 combat power and, 8-176
and, E-84, E-87
tactical mobility, airborne COP and, 8-169
civil considerations for, E-64
operations and, C-30 CSS and, 8-164
CSS for, E-64
assembly area location and, decision points and, 3-47
fire support for, E-63, E-64
2-59 defense to offense, 8-105
Index-21
FM 3-90
Index-22
Index
WMD (continued)
zone reconnaissance, 13-29–
13-34
airborne operations and, C-38
area reconnaissance,
compared with, 13-35
defined, 13-29
fire support for, 13-31
flank guard and, 12-81
guard as an, 12-66
offensive cover and, 12-101
reserve and, 13-31
security operation, as a, 12-41
supporting range and, 13-31
Index-23
*FM 3-90
4 JULY 2001
ERIC K. SHINSEKI
General, United States Army
Official: Chief of Staff
JOEL B. HUDSON
Administrative Assistant to the
Secretary of the Army
0117305
DISTRIBUTION: