2015 IPB Handbook
2015 IPB Handbook
STAFF HANDBOOK
Revised
FY 2015
Edition
The graphic on this page serves to remind us that IPB is a The commander or XO must allocate the time to conduct
four-step process that can only be conceived through the IPB. . . all of IPB . . . and must ensure the staff provides
careful examination of the environment, the threat, and input to all products. The most important products in moving
the possible effects that both have on a commander’s forward to COA Development come from Steps 3 and 4 of
operation. IPB. If time is short . . . weather and terrain can wait. These
are necessary to fully develop a set of threat COAs, but COA Development
The commander has the most important role in IPB by detailing to the will continue if the wind arrow is not created and posted on the fusion map.
staff the information he needs in order to make decisions and complete It will not continue without a well-thought-out set of threat COAs and
his situational understanding / visualization. This defines how the staff situation templates (SITTEMPs).
will adjudicate its time and becomes important in time-constrained
mission planning. Trends analysis has identified several factors as to While not a doctrinal acronym, this publication will use the abbreviation
why IPB is consistently done poorly. WFF for warfighting function as a method to condense text.
Decisive Action
DECISIVE ACTION
Army forces demonstrate the Army’s core competencies through decisive
action — the continuous, simultaneous combinations of offensive, defensive,
and stability or defense support of civil authorities tasks. In unified land
operations, commanders seek to seize, retain, and exploit the initiative while
synchronizing their actions to achieve the best effects possible. Operations
conducted outside the United States and its territories simultaneously
combine three elements — offense, defense, and stability. Within the United
States and its territories, decisive action combines the elements of defense
support of civil authorities and, as required, offense and defense to support
homeland defense.
As a single, unifying idea, decisive action provides direction for the entire
operation. Based on a specific idea of how to accomplish the mission,
Tasks of Decisive Action
commanders and staffs refine the concept of operations during planning.
In order to conduct IPB, we must lose our myopic idea of the one-
dimensionality of warfare and focus our IPB efforts proportionately
on all of the aspects of ULO. The graphic below depicts the
relationship between the type of operation and the amount of IPB
dedicated to each sub-part. In a primarily offensive-based operation,
the lion’s share of IPB will be dedicated to offensive operations, but
defensive and stability (civil support) IPB must not be overlooked.
Consider an offensive operation such as a As DSCA or stability tasks are conducted, there are
movement to contact. While the primary concern certain operations that must be undertaken to
Offense is offensive (defeating the enemy), your unit successfully accomplish them. Offensively, a
might be tasked to conduct a screening mission to subordinate element might be tasked with a Cordon
Stability protect vulnerable flanks. Unless the operation is and Search / Knock mission or combat patrols.
Defense being conducted in the frozen tundra of Defensively, considerations must be made
Antarctica, there will probably be civil concerning the security of forward operating bases
considerations. (FOBs), as well as the security of all friendly forces
operating in the area of operations (AO).
Analysis of the OE is based on the operational variables – political, military, economic, social, information, infrastructure, physical environment , and time
(PMESII-PT). This analysis gives commanders the relevant information required to understand, visualize, and describe the OE.
Army Doctrine Publication (ADP) 3-0 states, "No two operational environments are identical, even within the same theater of operations, and every operational
environment changes over time. Because of this, Army leaders consider how evolving relevant operational or mission variables affect force employment concepts
and tactical actions that contribute to the strategic purpose.”.”
Political Mission
Time
Military Civil
MISSION Enemy
Considerations
OPERATIONAL
Physical Environment VARIABLES VARIABLES
Economic
Terrain and
Weather
Infrastructure Time
Available
Information Social
Troops and
Support Available
IPB AND
Linkage THE O
Between PERATIONAL
Operational ENVIRONMENT
– Mission Variables (OE)
Getting Started
As the commander, S-2, S-3, and other staff members attend the OPORD brief, the remainder of the staff is busy preparing the command post (CP) to begin the
MDMP. Time is at a premium, and the first order of business following Receipt of Mission is conducting Mission Analysis, with IPB consuming a major portion
of the staff’s planning time. In order to streamline IPB, the commander and his key staff officers should focus the staff based on the type of mission they have
been tasked with and what specific information the commander and staff require to complete the MDMP. A simple checklist like the one pictured on the next
page can help identify where the staff should commit their time during IPB.
While not doctrinal, this publication has used the acronyms WFF for warfighting
function and COO for combined obstacle overlay as a method to condense text.
operation
Stability Defense Support of Civil
can be Offensive Defensive
Operation Authorities
As stated previously in the introduction, IPB, like the remainder of categorized
Mission Analysis and the MDMP, is a staff function. Without the as:
This
expertise of the entire staff and their combined contributions, IPB will operation
be incomplete. takes place
in:
Tropical Moist
Staff Roles The climate
Dry
Moist Mid-latitude (mild winter)
is:
Moist Mid-latitude (cold winter)
The Commander Polar
Regular
The Executive Officer (XO) The threat
Irregular Accident
is:
Hybrid Natural disaster
(Choose all
Other____________________________ Deliberate attack
The XO drives the train. Using tools such as the one third - two thirds that apply)
Other____________________________
planning rule, he is responsible for determining and calculating how
long each step of the MDMP should take, how much time should be
allocated to Mission Analysis and further, how much time within
Mission Analysis can be sub-allocated to IPB. Along with this, he Other things (Note: this list is not all-inclusive and should be
must develop a set of azimuth checks and benchmarks to ensure the to consider: modified per your unit Plans / Tactical SOP)
staff stays true to its schedule. He is the enforcer of the commander’s
guidance and ensures the tools required by the commander are
produced in a timely manner.
Commander’s IPB Focus Checklist
The S-2 has the responsibility for synchronizing information from the staff sections / elements in order to complete IPB. According to ATP 2-01.3, the S-2 does
not perform IPB in a vacuum … “Staff sections bring their own areas of expertise to IPB. Collaborative analysis among the staff facilitates a greater degree of
situational understanding for the commander.” Besides controlling and collating the information from the other staff sections / elements, the S-2 has the
responsibility, during IPB, to produce the following products: the combined obstacle overlay (COO), the modified COO (MCOO), situation templates
(SITTEMPs), the event template (EVENTEMP), weather and terrain effects products, enemy COA narratives with consolidated HVT lists (HVTLs), and the
intelligence estimate, which consolidates all input from each staff section / element into a document which highlights the enemy information pertinent to his
echelon and that of his subordinate commanders.
The Staff
During IPB, the staff has the responsibility to review their respective annexes / appendices from the HHQ OPORD and select the pertinent information for their
subordinate commanders. This pertains not only to the friendly information, but also the terrain and enemy information. The S-2 is NOT RESPONSIBLE for
developing the entire picture. The staff, with their subject matter expertise, refines the enemy situation and terrain pertinent to its respective WFFs and delivers
this product to the S-2. With the refined products from each staff section / element, the S-2 can create his COO and comprehensive threat models. The refined
terrain information from each staff section / element becomes Paragraph 1. b. (1) (Terrain) of their respective annexes and the refined threat products become the
paragraph 1c (Enemy Forces). In order to work well, this system requires complete staff synchronization, a plan (the Planning SOP / Tactical SOP), an enforcer
(the XO or S-3 Sergeant Major (SGM)), and a willingness to create the best products possible for subordinate commanders.
TIP The staff sections / elements review and refine the HHQ products (to include the OPORD) and pass the refined enemy situation to
the S-2 for inclusion in the Appendix 1 (Intelligence Estimate) of Annex B (Intelligence). They do not wait for the S-2 to write
Paragraph 1.c. in the base OPORD and copy it into their respective annex.
The product on the following page is a WFF / staff section worksheet. It is a simple and effective method to consolidate terrain, weather, and enemy
information, as well as other pertinent intelligence information from each WFF or staff section / element to be provided to the S-2. With a set of these from each
section / WFF, the S-2 can create an accurate depiction of how the terrain, weather, and enemy affect each of the staff sections / elements.
Staff Roles (cont.) CHARACTERISTICS OF THE ENVIRONMENT AFFECTING YOUR WARFIGHTING FUNCTION /
STAFF SECTION
Tools only work if their importance is articulated to the staff. This can not be a
“maybe” thing. It must be a requirement, established by the commander, SPECIFIC WEATHER OR TERRAIN CONSIDERATIONS AFFECTING YOUR WARFIGHTING
annotated in the Planning SOP / Tactical SOP, and placed as a benchmark on FUNCTION / STAFF SECTION
IPB Sub-task 1: Defining the Operational Environment ENEMY MISSION (Paragraph 1 your Annex)
The environment in which the unit will be operating must be defined in order to ENEMY FORCES AVAILABLE (Your WARFIGHTING FUNCTION / STAFF SECTION)
ensure all of the features which may require additional analysis are identified.
These features, as well as the area itself, may have profound impact on both ENEMY EQUIPMENT & CAPABILITIES (Your WARFIGHTING FUNCTION / STAFF SECTION)
friendly and threat COAs. IPB efforts are focused on those aspects of the AO, as
well as specific characteristics of the environment, that will affect mission
command. ENEMY CONSTRAINTS (Your WARFIGHTING FUNCTION / STAFF SECTION)
By identifying characteristics of the area that will affect the command’s mission, CRITICAL FACTS & ASSUMPTIONS ABOUT ENEMY (Your WARFIGHTING FUNCTION / STAFF
SECTION)
proper emphasis can be placed where needed, and superfluous analysis can be
avoided. This will allow all staff sections / elements and WFF areas to allocate
time wisely and focus their IPB efforts properly. Failure to identify all relevant HVTs AND WHY IMPORTANT TO ENEMY (Your WARFIGHTING FUNCTION / STAFF SECTION)
characteristics may result in the unit being surprised by factors not addressed or
ENEMY CCIRS & POTENTIAL DECISIONS
inadequately addressed during IPB.
The “so what” in this step is clearly defining for the commanders
what the relevant characteristics of their AOIs are.
Success results in saving time and effort by focusing only on Sub-steps of Step 1 of the IPB Process
those characteristics that will influence friendly COAs and
command decisions. TIP Throughout this publication, reference is made
Consequences of failure: to the lack of available time to consider all of
Failure to focus on only the significant characteristics leads to the elements or factors requiring additional analysis.
wasted time and effort collecting and evaluating intelligence Through the use of national, allied, joint, and higher
on characteristics of the OE that will not influence the echelon databases available, this can be partially
operation. mitigated.
Identifying the Significant Characteristics Terrain characteristics and Military Aspects of Terrain:
• The nature of the disaster,
of the Environment accident, or incident.
• Hydrological data
• Elevation data • Terrain of the area.
At the tactical level, the memory aid ASCOPE (areas, structures, • Soil composition • Forecasted weather and effects.
capabilities, organizations, people, and events) has become • Vegetation • Civil considerations to include:
Population demographics
synonymous with describing civil considerations. At higher levels, (ethnic groups, religious
Weather characteristics that can significantly affect operations:
there is the inclusion of long-term diplomatic, informational, and groups, age distribution,
economic issues. • Visibility. income groups).
• Wind Velocity. Political or socio-economic
• Precipitation. factors.
There has been some discussion over the years as to the relevance Infrastructures (transportation
• Cloud cover.
of ASCOPE and that the elements of PMESII-PT cover the same • Temperature. or telecommunications).
information. Arguers against the removal of ASCOPE point out the • Humidity. Rules of Engagement (ROE) or
better focus at lower levels that ASCOPE brings in terms of • Atmospheric pressure (as required). other legal considerations
(curfews, martial law
defining civil considerations. PMESII-PT may work at the mandates).
Civil considerations
operational level, but it is less effective at the tactical level. Police structure and military
ASCOPE provides a more extensive, specific, and immediate When identifying significant characteristics of the environment support role.
Collection Plan than PMESII-PT, and can be used in a wide range ensure civilian aspects are being considered (this applies to more Criminal organizations and
than stability operations). The memory aid ASCOPE is used in activities.
of operations from day-to-day contact, negotiations, and route Political parties.
describing the civil consideration portion of the mission
selection of patrols, to site selection for combat outposts, variables (METT-TC) and refers to the six civil considerations
prioritizing clear-hold-build operations, and detecting underground of:
and auxiliary insurgent infrastructure. • Areas.
• Structures.
• Capabilities.
During this sub-task of identifying significant characteristics of the • Organizations.
environment, your unit is attempting to get their hands conceptually • People.
around those things in the environment that can create effects which • Events.
may impact operations. The specific determination of those effects,
as well as the possible impacts, will be discussed in Sub-task 2 of
IPB. Significant Characteristics of the OE by Operation Type
AO SHERMAN
AREA OF
KALA
ATP 2-01.3 defines the area of influence as, “a geographical area where a commander is directly capable of
INFLUENCE influencing operations by maneuver or fire support systems normally under the commander’s command or
KOTU
control.” This may include terrain both inside and outside the AO and may be determined by either the S-2 or
the S-3.
Area of Influence
The AOI is the area, both inside and outside the area of influence and the A O, that presents a
concern to the commander. It may be a concern because of enemy capabilities and their ability to
target inside the commander’s AO from outside of it. In this example, the AOI, due to the lines of
communication available from outside the commander’s AO, allows unrestricted movement into
it. An important factor in determining the AOI is the understanding that it may include a portion
of a country or another AO that the commander may not be allowed to operate or collect
KUJ
information in. Generally, the AOI requires more intelligence assets to monitor.
KORAM
WAZIR
AO SHERMAN
KALA
KOTU
AREA OF INTEREST
KORAM
WAZIR
AO SHERMAN
KALA
In this example, the improvised explosive device (IED) production lifecycle is KOTU
completely contained within the commander’s AOI, but only one piece, the logistics
hub, is located within his AO. That being said, the isolation or disruption of the
logistics hub can have profound effect on the remainder of the IED operation (see
isolation graphic on the following page). Without the capability to move the raw
materials into the AO, compensate the IED manufacturers and emplacers, or arrange for Raw materials
into AO
IED
Emplacement
IED
Manufacturing Logistics Hub Financier
the flow of money both within and outside his target area, the logistic hub manager’s
loss of effectiveness will cause the entire operation to slow or even stop. IED Production Inside and Outside the AO
IED
Manufacturing
Movement of IED
raw materials
into AO
Emplacement By using tools like the association and activities matrices below, the commander can begin to see
how, through the use of associations, he can further influence activities and people, both inside
and outside his AO.
Logistics
Manager
Movement of
finished product Financier
throughout AO
Paying off
officials to get Reconnaissance
videos on and
news filming
In DSCA operations, the AOI may be as small as a single city or as large as several states. Based on the size of the AOI during DSCA operations, it may be
necessary to coordinate with state and federal agencies to ensure the correct assets are requested and deployed in support of the disaster, accident, or incident.
In certain operations, the AOI may be defined by the lines of communications (LOCs), such as main and alternate supply routes (MSR / ASR) or infrastructure
pieces such as oil or natural gas pipelines, major electrical lines, or major water lines.
Take, for instance, a response to a major earthquake along the New Madrid Fault line. While
the fault line is relatively centered in the southeast corner of Missouri, where it borders both
Kentucky and Tennessee, the impact of the earthquake would require civil support planning
that would include the states of Alabama, Mississippi, Tennessee, Kentucky, Indiana, Illinois,
and Arkansas in their AOI, as well as the state of Missouri.
TIP When developing the AOI, take into consideration the possibility of an
area with limited collection capability, such as a neighboring foreign
country. Interagency, coalition, or multinational support may be required
for the collection and dissemination of information.
Earthquake Influence – New Madrid Fault
In the New Madrid earthquake scenario, consider the area that will be affected consists
of four Federal Emergency Management Areas (IV, V, VI, and VII). Each of these
regions is operated independently, but controlled collectively by the Director of the
Federal Emergency Management Agency (FEMA). A commander tasked with this
mission will be in direct contact with local, state, and federal agencies, and may be either
flooded with, or hamstrung by, the information available to him.
When determining AOIs for your unit, considerations should include identifying:
Further hazards to the AO, such as severe weather patterns, aftershocks, flowing
water, or armed urban gangs.
Any damage that will affect operations.
All military, other government agencies (OGAs), inter-governmental organizations
(IGOs), non-governmental organizations (NGOs), and indigenous populations and
institutions (IPIs) that may interact with each other and your unit.
Locations of all federal property with access rights to stage troops and equipment.
Local ARNG armories and U.S. Army Reserve (USAR) centers.
Locations of public and private schools with names of principles or administrators.
Location of state and local government seats of power and jurisdiction.
Location of operational hospitals and clinics.
Location and status of critical utilities (water, electricity, sewer and sanitation,
telephone, radio, and television).
Public service organizations and structures that are damaged. (These must be repaired
first to allow follow-on services to be provided. These facilities must be identified
early.)
Social Aspects Help Delineate AOI
Capacity of key roads and hospitals; planners primarily need to know when each will reach
capacity.
Location and capacity of area and regional municipal facilities.
Condition of air traffic control systems to identify if emergency aviation assets can be used.
Soldiers and civilians expert on the area, to includes Soldiers from the area or from similar environments.
Identify the Significant Characteristics within the Area of Interest for Further Analysis
In order to focus IPB and what is important to the commander, the staff identifies and defines the aspects of the enemy, terrain, weather, and civil
considerations of the OE to determine the significance of each in relation to the mission; essentially building an environmental model as the framework to
conduct and then present analysis to the commander. This prevents unnecessary analysis and allows the staff to maximize resources on critical areas. The
initial analysis that occurs in this sub-step determines the amount of time and resources the intelligence staff commits to the detailed analysis that occurs
in Step 2 of the IPB Process.
The Enemy
An enemy is a party identified as hostile against which the use of force is authorized (ADRP 3-0). Analysis of
the enemy includes not only the known enemy, but also other threats to mission success. Such threats might
include multiple adversaries posing with a wide array of political, economic, religious, and personal
motivations. Additionally, threats may wear uniforms and be easily identifiable, or, they may not wear
uniforms and blend into the population. To understand threat capabilities and vulnerabilities, commanders and
staffs require detailed, timely, and accurate intelligence produced as a result of IPB.
Terrain and weather are natural conditions that profoundly influence operations. Terrain and weather favor neither friendly nor enemy forces unless one is more
familiar with —or better prepared to operate in — the physical environment. Terrain includes natural features (such as rivers and mountains) and manmade
features (such as cities, airfields, and bridges). Terrain directly affects how commanders select objectives and locate, move, and control forces. Terrain also
influences protective measures and the effectiveness of weapons and other systems.
Effective use of terrain reduces the effects of enemy fires, increases the effects of friendly fires, and facilitates surprise. Terrain appreciation — the ability to
predict its impact on operations — is an important skill for every leader. For tactical operations, commanders analyze terrain using the five military aspects of
terrain, expressed in the Army memory aid OAKOC (Obstacles, Avenues of approach, Key terrain, Observation and fields of fire, and Cover and concealment).
(See ATP 3-34.80 and Joint Publication (JP) 2-01.3 for more information on analyzing the military aspects of terrain.)
Identify the Significant Characteristics within the Area of Interest for Further Analysis (cont.)
Terrain and Weather (cont.)
Climate refers to the average weather conditions for a location, area, or region for a specific time of
the year as recorded for a period of years. Operational climatology is used to assess effects on
weapon systems, collection systems, ground forces, tactics and procedures, enemy tactics,
techniques, and procedures (TTPs), and other capabilities based on specific weather sensitivity TIP CLIMATE IS WHAT YOU EXPECT …
thresholds when operational planning occurs more than ten days prior to operational execution. WEATHER IS WHAT YOU GET!
Climatological data is important at both the operational and tactical levels. Actual weather
forecasts and/or predictions, using weather models and other tools, are used to assess weather
effects on weapon systems, collection systems, ground forces, TTPs, and other capabilities when
operations occur within ten days of operational planning.
Civil Considerations
Civil considerations reflect the influence of manmade infrastructure, civilian institutions, and attitudes
and activities of the civilian leaders, populations, and organizations within the OE on the conduct of
military operations. Commanders and staffs analyze civil considerations in terms of the categories
expressed in the memory aid ASCOPE.
Civil considerations help commanders understand the social, political, and cultural variables within the
AO and their effect on the mission. Understanding the relationship between military operations and
civilians, culture, and society is critical to conducting operations and is essential in developing effective
plans. Operations often involve stabilizing the situation, securing the peace, building host-nation
capacity, and transitioning authority to civilian control. Combat operations directly affect the populace,
infrastructure, and the force’s ability to transition to host-nation authority. The degree to which the
populace is expected to support or resist U.S. and friendly forces also affects offensive and defensive
operational design.
(See Field Manual (FM) 4-02, Army Health System, for more extensive information on the medical
aspects of IPB that relate mainly to civil considerations in the AO.)
Identify the Significant Characteristics within the Area of Interest for Further Analysis (cont.)
Evaluate Current Operations and Intelligence Holdings to
Determine Additional Information Needed to Complete IPB
CAUTION It is never the same as it was before. Any analyst or Soldier trying to compare the operational environment in the present to how it
was in the past WILL fail. “This is the way we did it in Iraq” will not work in Afghanistan. “This is the way we did it last time in
Afghanistan” will not work this time in Afghanistan. One natural disaster is different than another and the same type of disaster in the same area
will require different and additional IPB and analysis. Nothing ever stays the same nor reacts the same way. Use the knowledge you gained from past
experience as a baseline to begin developing and refining new data.
Each staff section / element should endeavor not to recreate the wheel, but rather to smooth out the flat spots. There are few times when a unit arrives in a
“new” environment void of any previous collection. Strive to find the sources and data your predecessors have left you, and determine what is still viable and
what must be discarded. When you are done with this, you will have identified the “gaps” that must be answered. Each staff section / element must identify the
missing pieces from their WFF or staff section / element point of view. This is required to adequately perform IPB.
Many databases at the national, allied, joint, and higher echelon are available and should be used to ensure duplicate work is not being done. By identifying
gaps early, they can be prioritized, have requests for information (RFIs) sent to HHQ, identify open sources where missing information may be found, or apply
collection assets to find answers and close identified gaps.
Sometimes gaps cannot be filled in a timely manner or at all. When this happens, assumptions need to be
made per Sub-task 6 (Identify critical facts and develop assumptions) from Mission Analysis (MDMP).
There is a balance that must be achieved when defining how much information we can get
based on how much time we have versus how much data we really need to be effective in our
mission. As Napoleon said, " Strategy is the art of making use of time and space. I am less
concerned about the latter than the former. Space we can recover, lost time never.” The key to
effectively evaluating existing databases is to know where the databases are and where to find
additional information. Absent commander’s guidance, focus first on the AO, then the area of
influence, and finally on the AOI.
Identify the Significant Characteristics within the Area of Interest for Further Analysis (cont.)
Evaluate Current Operations and Intelligence Holdings to
Determine Additional Information Needed to Complete IPB (cont.)
Databases may already exist for your AO. In DSCA operations, FEMA, as well as local city or county agencies, will be able to provide you with critical
information. Historically, these types of agencies will provide a liaison to work with Department of Defense (DOD) assets.
In the last sub-task, the gaps in information were identified. Those gaps will be closed through either RFIs to the HHQ, through unit or HHQ / adjacent unit
information collection activities, or through open-source mining.
Initiate Processes Necessary to Acquire the Information Needed to Complete IPB (cont.)
INFORMATION
develop assumptions to allow for continued planning. During the collection
phase, ensure that any assumptions made are quickly confirmed as viable or, if
found false, the evaluations and determinations made based on these
assumptions are reexamined.
+
=
know how to prioritize their time.
INFORMATION
As reality is constantly changing, so is IPB constantly being updated and annotated
on individual staff section / element running estimates. No staff will ever get 100%
resolution of the OE. This is why branches and sequel COAs must be developed to
answer the “what-if’s.” Once all the gaps have been filled, the staff must develop or
refine existing databases and products in order to have the information on the
enemy, terrain, weather, and civil considerations available. By thoroughly
understanding the environment, fewer RFIs will be required, and staff members TIP The point of intelligence gathering efforts, either through
will become a source of information to higher and lateral organizations. information collection activities, RFIs, or open-source
mining, is to present to the commander and staff a
“perception” of the OE that most closely matches the actual
situation on the ground.
Terrain Overlays
Slope Map
Operational Overlays
Unit Boundaries
10 20 30 40 Cachar 50 60
.
.
X
CHALLENGER CAVE SPRINGS
30
1st BCT
I
McLEAN
McLEAN
21 ID DRINKWATER LAKE .
LIMAVILLE
LAKE
LAKE
.
DRINKWATER SPRINGS
.
EL NORBO KARAMU
KAPISA Province KHEYL
X ZARA
1071
1071
MSR STARR
KALA II
1064
1064 981 NO NAME LAKE
1003 985
985
NELSON
NELSONLAKE
LAKE
FOB AO
20 .
NELSON LAKE MINING CAMP
X
GOW DARREH
KALA SHAH
ZINC .
AO COPPER
.
EL CENTRO
PIONEER KORAM
TUT FOB JOROBAY
910
910 KUJ 800
800
EAST RANGE RD
GOLDSTONE
GOLDSTONE
LAKE
LAKE
X
1489
1489
AO BRONZE 876
876
780
780
701
701
699
WAZIR 760
1478
1478 FOB 720
720
10 MSR WARNER
1214
1214
899
899 781W
781W
GOLDSTONE
GOLDSTONE
KARA
BLAAF
BICYCLE LAKE TIEFORT
TIEFORTMTN
MTN
Kabul 50 km X
Offensive Operations Overlay
FIELD PAKTYA Province
ASP LANGFORD LAKE
957
957
909N 4th BCTNO MANEUVER
Hosaynkhel
938
938
909S
909S
21 ID Mollayan
90 729
729
837
837
NO MANEUVER
Infrastructure Overlays
the areas, structures, capabilities, organizations, Road System Dams Jobs and Employment Police Organizations Sports
people, and events in order to get an understanding Water Sources Bridges Religion Nomads Religious Gatherings
Refugees and Displaced Refugees and Displaced
of what the civil considerations are. During the next Water Coverage Police Stations Persons Persons Parks / Town Squares
IPB sub-task (Describe Environmental Effects on Water Districts Gas Stations Political Voice Government Agencies Family Gatherings
Operations), civil considerations will be analyzed Military / Police Civil Rights and Lines for Purchasing
with an eye toward the tasked mission to determine Construction Sites Barracks Individual Rights Volunteer Groups Gasoline
the impact they may have on the operation. Center Intergovernmental
Gang Territory Courthouses/Jails Agencies (IGA) Bars / Tea Shops
for Army Lessons Learned (CALL) Publication
Safe Areas/
number 10-41, Assessment and Measures of Sanctuaries Oil and Gas Pipelines Political Organizations Food Lines
Effectiveness in Stability Operations, provides a Water Pumping
detailed and comprehensive list of possible sub- Trade Routes Stations Contractors Job Lines
elements of ASCOPE that may be used to detail the Nongovernmental
Power Grids Water Lines Organizations (NGO)
civil considerations portion of METT-TC.
Power Lines
Power Plants
ASCOPE Considerations
= Completely broken,
non-existent
SWEAT Assessment
LINE 9: RECOMMENDED ACTIONS NEXT 24-96 HRS: RECOMMEND ENGINEER ASSISTANCE IN
ZONE 3 FOR SEWER AND WATER LINE REPAIR
When IPB Sub-task 1 is complete, the following objectives will have been met:
The AO, area of influence, AOI, and area of intelligence responsibility have been identified and either marked on the map based on unit SOP or
presented in some other graphic format.
The characteristics of the AO that may impact the unit mission have been identified.
Information regarding the AO is collected or will be collected.
Intelligence gaps have been identified and analysts have begun filling the gaps through collection efforts, RFIs, or open-source mining.
During IPB Sub-task 1, the OE was defined. Now the commander and staff have an understanding of the significant characteristics of the environment, the
limit of the commander’s influence, and a grasp on what information still needs to be collected, either through information collection activities, RFIs, or open-
source mining. From here, the characteristics of the environment must be evaluated based on the upcoming mission to determine the effects they may have on
both friendly and enemy operations.
The Players
As stated in the introduction “led by the intelligence officer, the entire staff participates in IPB
to develop and maintain an understanding of the enemy, terrain and weather, and key civil
considerations.” What the introduction doesn’t say is, “ intelligence personnel perform IPB
while the remainder of the staff develops estimates and builds products for the Mission
Analysis Briefing.” Each member of the sta ff brings his or her WFF experience to the IPB
table. While each staff section / element may not contribute physical products to the IPB
effort, they have the responsibility of detailing how the environment affects their specific
section / WFF. Without this input, the IPB will be incomplete and the commander and staff
will make decisions based on an incomplete data set.
A unique change in IPB doctrine is the statement, “They may face one unified threat
force or several disparate threat forces that must be engaged in order to accomplish CAUTION When facing an irregular threat conducting
the mission.” operations as part of an insurgency in a failing
nation-state, the state of governance and other civil
Later, we will discuss what this means. considerations may be more significant than the threat posed by
those irregular threats.
Although detailed analysis of enemy forces occurs during Steps 3 and 4 of the
IPB Process, the type of enemy forces and their general capabilities must be
defined during Step 2. This is done to place the existence of these forces in context
with other variables to understand their relative importance as a characteristic of the
OE.
The threat overlay is a depiction of the current physical location of all potential threats
in the AO and the area of interest. This graphic includes the identity, size, location,
strength, and AO for each potential threat.
The threat overlay does not deal with alliances, end states, support structure, training,
or any other aspect of the threat other than what type threat (if known), capabilities (if
known), disposition (if known) and locations (if known). At this early stage of IPB,
much information may be based solely on early assessments and historical data.
Again, detaining threat capabilities is the function of IPB Step 3, while identifying
possible threat COAs based on these capabilities is the function of Step 4.
Describe How the Threat Can Affect Friendly Operations (cont.) TYPE UNIT SIZE LOCATION KNOWN/TEMPLATED
SPF FORCES
The Threat Description Table Dsmnt Tm 1/992nd SPF BDE Tm TD691811 T
Dsmnt Tm 2/992nd SPF BDE Tm TD700804 T
Dsmnt Tm 3/992nd SPF BDE Tm TD806789 T
The threat description table supports the threat overlay by classifying the type of threats Dsmnt
Dsmnt
Tm
Tm
4/992nd SPF
5/992nd SPF
BDE
BDE
Tm
Tm
TD840782
TD879783
T
T
identified on the overlay and describing the broad capabilities of each threat.
COMMANDO FORCES
BTG RECON
High Mobility Plt 4 Plt, 191st BTG Rec Co PLT TD919760 Screening (T)
LRR Plt LRR Plt, 191st Rec Co PLT TD761789 Screening (T)
Rec Plt 1 Plt, 191st DTG Rec Co PLT TD756693 T
DISRUPTION FORCE
BATTLE ZONE
SUPPORT ZONE
Example Threat Description Table
2S1 1 BTY, 191st ARTY Bn BTY TD845481 T
2S1 (Regular
2 BTY, 191st ARTY Bn BTY Threats)
TD871483 T
ATP 2-01.3 states, “Terrain analysis is the evaluation of geographic information on the natural and manmade features of the terrain, combined with other
relevant factors, to predict the effect of the terrain on friendly and enemy operations. It involves the study and interpretation of natural and manmade features of
an area, their effects on military operations, and the effects of weather and climate on these features. Terrain analysis is a continuous process as changes in the
operational environment may alter the analysis of its effect on operations.”
A doctrinal change came about in the 2009 edition of FM 2-01.3, Intelligence Preparation of the Battlefield. The memory aid formally used to describe the
military aspects of terrain changed from OCOKA (observation and fields of fire, cover and concealment, obstacles, key terrain, and avenues of approach) to
OAKOC. Only the order changed, not the elements.
When looking at OCOKA, it was a logical approach to the military analysis of terrain, but sequentially, it was incorrect. Cover and concealment and observation
and fields of fire can only be analyzed after terrain has been identified as restrictive or unrestrictive. In order to determine where friendly forces can see and
engage enemy forces or where friendly forces, as well as enemy forces, can use terrain to mask their location, first, identification of maneuverable terrain must
be made. It is an impossibility to determine cover and concealment, as well as observation and fields of fire, for the entire battlefield.
The change from OCOKA to OAKOC sequenced the analysis of terrain logically. The only issue left was which “O” was “obstacles” and which was
“observation and fields of fire.” Clearly, the doctrine writers understood how OCOKA affected the sequencing of terrain analysis. To change OCOKA to
OAKOC and let the first “O” stand for observation and fields of fire would have been contrary to a logical approach.
This approach has been taught for years. First, identify the obstacles (O), this leads to the determination of avenues of approach (A) and key terrain (K) relevant
to the avenues of approach. Finally, analyze the observation and fields of fire (O) and cover and concealment (C) relevant to those avenues of approach.
This forms a logical flow in terms of product development, from the COO to the MCOO, and finally determining the cover and concealment, as well as
observation and fields of fire based on the identification of maneuverable terrain.
As stated earlier, when doing analysis on the terrain, there are five aspects which can affect the mission. These factors are:
Obstacles
Avenues of approach
Key and decisive terr ain
Obser vation and fields of fire CAUTION Do not rely solely on HHQ products for your
Cover and concealment IPB. Analysis should be based on your unit, its
mission, and specific information needs.
Obstacles
ADRP 1-02, Terms and Military Symbols, defines obstacles as, “Any natural or man-made obstruction designed or employed to disrupt, fix, turn, or block the
movement of an opposing force, and to impose additional losses in personnel, time, and equipment on the opposing force.” Some examples include buildings,
cities, mountains, rivers, forests, minefields, cultural sites, and certain wire obstacles.
There are two tools used to depict terrain. The combined obstacle overlay and the modified combined obstacle overlay (MCOO). The combined obstacle
overlay is a product constructed by layering multiple obstacle overlays of different types into a single product . These single over lays might include
structures and population centers, mobility or lines of communication, vegetation, hydrology, and terrain classification. By looking at the obstacles to movement
(where the unit cannot or does not want to go), the remaining terrain represents where the unit can or would like to go. These individual overlays are derived
from the map. Once layered, they show all of the obstacles to movement in an AO. This forms the basis for developing mobility corridors, avenues of approach,
and finally, the terrain within the AO that may be considered key or decisive. Analysis must be used to build the MCOO.
Different obstacle types affect movement in different ways. The Obstructive terrain
same obstacle might impact the movement of different WFFs in
different ways as well. Because of this, it is incumbent on each
staff section / element to look at the terrain from his perspective Water features
and be prepared to provide that information to the Intelligence or
Topographic Section to be included in the combined obstacle Surface drainage
overlay.
Population centers
Obstacles can be found on the map or other digital terrain
products. Some are easier to identify than others. Some are
present all year round and some require meteorological and
oceanographic (METOC) analysis to determine if the effects of
the obstacle are present based on the time of year and/or weather Determine the effect of each No restriction to
in the area. obstacle on the mobility of movement
the evaluated force
Moderately restricts
Basically speaking, anything that is not flat and paved will affect
movement
some unit, vehicle, or piece of equipment detrimentally.
Severely restricts
As stated earlier, the terrain will affect each staff section / movement
element or WFF differently. An obstacle to one may have no
affect on another. There is no hard and fast rule as to what
constitutes unrestricted, restricted, or severely restricted terrain. Combine the effects of
individual obstacles into an
integrated product, such as
the COO
Defining Obstacles
Restricted Terrain – “. . . hinders movement to some degree. Little Light Infantry swamps or rugged
effort is needed to enhance mobility, but units may have difficulty terrain
maintaining preferred speeds, moving in combat formations, or forests or jungles
transitioning from one formation to another.” urban areas or villages
Severely Restricted Terrain – “. . . severely hinders or slows Airborne Infantry swamps or rugged mountainous areas
movement in combat formations unless some effort is made to enhance (LZ emplacement) terrain severe hydrology (lakes)
mobility. This could take the form of committing engineer assets to Artillery areas where mounted areas with slope ≥ 90 mils
improving mobility or of deviating from doctrinal tactics, such as forces plan to maneuver areas with sight to crest issues
moving in columns instead of line formations or at speeds much lower
Sustainment any terrain without deep defiles or waterways
than those preferred.”
hard-packed (or packed without bridges
gravel) roads
TIP Not all terrain is classified as “less than optimal” based Signal defiles and areas of low areas of terrain which will
on the effects. Artillery personnel prefer not to establish ground along the FM severely impact line of sight to
artillery firing points (AFPs) or Paladin Zones in areas where path FM communications
follow-on forces are preparing to maneuver. What Makes Terrain Restrictive?
The severity of obstacle effects on different types of maneuvering forces and equipment is directly proportional to the mobility capability they possess. The
terrain has less effect on tracked vehicles and high-mobility multi-wheeled vehicles (HMMWVs). Wheeled vehicles, especially support and logistics vehicles,
require improved surfaces to move about the terrain. Specialty equipment and equipment susceptible to damage fall into the same category.
Obstacles (cont.)
When evaluating the terrain for obstacles, look for manmade obstacles tied into natural
obstacles. These will generally be more effective when covered by observation,
indirect fire (IDF) or direct fire (DF). Even undefended obstacles can be effective if
they force the maneuvering element to change their course or canalize their formation.
While not addressed yet, as analysis is done on the terrain, ensure the effects of
weather are taken into account. A dry river bed, which has been labeled as restrictive
during map reconnaissance, may become severely restrictive if it fills during a flash
flood. Likewise, intermittent streams on maps may become impassable for many
months following spring thaws.
Not all maneuver elements prefer unrestricted terrain. While swamps, rugged terrain,
forests, and jungles may be categorized as restrictive terrain for light infantry Soldiers, it
is the terrain they prefer to move in due to the increased cover and concealment.
Remember, terrain classifications are not absolute. There are many examples of forces
achieving surprise and victory based on the enemy’s determination that they are protected
by the terrain.
ATP 2-01.3 defines an avenue of approach (AA) as, “... air or ground routes of an attacking force leading to its objective or to key terrain in its path.”
Understanding and being able to define AAs is important because any operation which involves maneuver depends on AAs. The unit’s ability to identify,
categorize, and group smaller corridors capable of maneuver into AAs will lead to the recommendation of the most efficient route toward an objective or the
identification of where the enemy will likely be moving through the unit’s AO.
To this point, obstacles, such as cities and towns, vegetation, hydrology, and terrain which can hinder movement have been identified and annotated on an
analog or digital map.
Evaluate avenues of
Sustainability
approach
Medina Wasl
10
Once identification of obstacles in the AO is complete, and restricted and severely restricted Wadi Ra’id
terrain has been annotated on the map, as well as the hydrology and population centers, only
unrestricted terrain remains. This product is called a COO because it represents the Legend Medina Irwin
compilation of single overlaysMKreflecting terrain, population centers, and hydrology all placed
MK NK Severely Mezra’s Mazik Ahmar
capable of passing through them in combat formations. Evaluating the terrain in terms of what Restricted
size maneuver element it supports provides the unit with a set of mobility corridors from Terrain
Airports
which to create avenues of approach. Towns
90
50 60 70 80 90 MJ NJ 10 20 30 40 50 60 70
The combined obstacle overlay is the beginning of the MCOO.
Combined Obstacle Overlay
Unfortunately, at this point, we must take a step backward and do some doctrinal “wordsmithing.”
FMI 2-01.301, Specific Tactics, Techniques, and Procedures and Applications for Intelligence Preparation of the Battlefield, stated in paragraph 1-80, “To
construct a MCOO, begin with a COO and add the following:
Mobility corridors.
AAs (air and ground).
Key terrain.”
When FM 2-01.3 and FMI 2-01.301 were combined and updated into ATP 2-01.3, this simple statement failed to make the direct transition. What was brought
forward were the following:
Paragraph 4-54: “The combined obstacle overlay provides a basis for identifying ground AAs and mobility corridors. Unlike the cross-country mobility, the
combined obstacle overlay integrates all obstacles to vehicular movement, such as built-up areas, slope, soils, vegetation, and hydrology into one overlay. The
overlay depicts areas that impede movement (severely restricted and restricted areas) and areas where friendly and enemy forces can move unimpeded
(unrestricted areas).”
and
Paragraph 4-53: “The MCOO is a graphic product that portrays the effects of natural and urban terrain on military operations. The MCOO normally depicts
military significant aspects of the terrain and other aspects of the terrain that can affect mobility. Though not all inclusive, some of these aspects are:
AAs.
Mobility corridors.
Natural and manmade obstacles.
Terrain mobility classifications.
Key terrain.”
This basically says the same thing as FMI 2-01.301 … If we take away the mobility corridors, AAs (air and ground), and key terrain (elements of the MCOO),
we are left with the natural and man-made obstacles and the terrain mobility classifications of the terrain in the AO (the COO). So … the difference between the
COO and the MCOO is the analysis which allows us to develop the mobility corridors and AAs, and from that, allows us to determine key terrain.
Airfield
At this point, the AAs must be evaluated as to their Playa
relative
China Lake
/ sabkha
worth. The AA in the center (AA2),
K Key terrain
would support movement of up to a brigade-size 40 element. This movement would generally be across
Legend open terrain with little cover or concealment. The AA in the south (AA3), would support up to a I
strictive terrain
battalion-size element with relatively little obstacle interference, yet still provide cover from both the
everely restrictive
ilt up area front and northern flank. The AA in the north (AA1), is constricted at the entrance and at the far
bility corridor 30
latoon
eastern edge. While this avenue of approach would only support a company-size element, the terrain II
I
ompany offers good cover and concealment
attalion II
e of approach
60 and
70 could be used to stealthily
80 90 MK NK 10 20 30 40 50 60 70 80
I
50
Quuam Sakhrat
I
X
X Medina Wasl
10
Wadi Ra’id
I
II
30
AA1 I X
II
Quuam Sakhrat
Legend Medina Irwin
MJ MJ NJ Restricted
20 El Whaleo
X
Terrain
Restricted
Medina Ma’akl
Terrain
AA2 X
Airports II
Medina Wasl
X
Towns 10
90
Wadi Ra’id
I
50 60 70 80 90 MJ NJ 10 20 30 40 50 60 70 80
X
MK NK
MJ NJ
Severely
Restricted
El Whaleo
Mezra’s Mazik Ahmar
The
NJ Mobility Corridors
NK
Terrain
Restricted
Terrain
Airports II AA3
Towns
90
60 70 80 90 MJ NJ 10 20 30 40 50 60 70 80
Avenues of Approach
Grouping together the mobility corridors produces
three distinct avenues of approach.
Describe How Terrain Can Affect Friendly and Threat Operations (cont.) Terrain Reason it is "Key"
restricted to large mobility corridors and, because of the ability to blend in with the local Flat area in otherwise rough terrain airborne operations, aerial resupply
populace, insurgent movement is generally done during the daylight hours and along Road Intersections Mobility
civilian transportation lines. Insurgents have discovered that movement of any kind during Gaps in severely restricted terrain Mobility
limited visibility or along sub-optimal avenues of approach attracts the attention of friendly
Stability Operations
forces.
Bridges Mobility
Road Networks Mobility
In DSCA operations, AAs are used more to determine routes for convoy operations and Buildings Cover, Observation
emergency evacuation routes. In some cases, AAs may be used to determine how criminals
Military Logistic Facilities Logistics
might infiltrate the area. Choke Points Mobility, Logistics
JP 2-01.3, Joint Intelligence Preparation of the Operational Environment, defines key Key Personnel Communications, Leadership
Road intersections Mobility
terrain as, “any locality, or area, the seizure or retention of which affords a marked
advantage to either combatant.” DSCA Operations
The definition of “key terrain” has different meanings to different staff sections / elements Bridges Mobility, Evacuation, Logistics
and WFFs. For the S-4 or forward support company (FSC) commander, a single bridge into, Road Networks Mobility, Evacuation, Logistics
out of, or through the AO may be “key” in order to provide sustainment to the force. For the Military Logistic Facilities Logistics
S-6, the only piece of high ground in the AO may be “key” because of the limitations of
Choke Points Mobility, Evacuation, Logistics
frequency modulation (FM) communications that require retransmission. Like defining Telephone Exchange Communications
obstacles in an AO, all of the staff section / element recommendations for key terrain must Power Lines Infrastructure Support
be analyzed for their benefit to friendly and enemy forces. Government Offices Infrastructure Support
TIP JP 2-01.3 instructs that the four other aspects of terrain should be evaluated prior to
the evaluation of key terrain. Once the other four aspects of terrain have been
evaluated, use these results to identify and assess key terrain.
As with other aspects of Mission Analysis, individual staff sections / elements need to understand that their assessment of what is, or is not, key terrain might
not match the unit’s overall assessment of what is, or is not, key terrain. Like risk, once an area has been designated “key,” it requires additional analysis, even
if the friendly unit’s plan does not include it. Analysis might indicate that assets may be required to deny that terrain to enemy forces for the successful
completion of the friendly mission.
A commander might determine that a piece of terrain is so critical that failure to gain and retain it would cause mission failure. In that case, he has identified
“decisive terrain.” Decisive terrain has an extraordinary impact on the mission. Keep in mind that decisive terrain is rare and is not present in every situation.
Observation is the condition of weather and terrain that allows a force to see friendly, enemy, and neutral personnel, systems, and key aspects of the
terrain. Fields of fire are areas which a weapon system or group of weapon systems may effectively cover with fire from a given position . Fields of fir e
are directly tied to observation, and through careful analysis of each, the commander and staff will be able to identify potential engagement areas, defensible
terrain, vulnerabilities from threat observation and fires, and visual and weapons dead space.
2 3 4 5 6 7
D ≈ 1.32 x (E)
IVLs, contrary to popular belief, are not another terrain POINT SHAPE
feature such as a hilltop, valley, saddle, ridge, or
depression. Rather, they are an effect caused by subtle
changes in elevation. These changes in elevations tend In a pass shape, the LOS is clear to the front but blocked to the obliques.
to block LOS in a general direction. While the examples Once he passes the two points which create the pass, his LOS and field of
view will increase.
to the right look like terrain features, keep in mind, an
IVL is NOT a terrain feature.
PASS SHAPE
In one sense, concealment, which, according to Joint Publication (JP) 1-02, is protection from observation or surveillance, is the other side of the “Observation
and Fields of Fire” coin. If you look at the terrain in terms of the dead space from observation, you have identified areas that can provide concealment for you
and the enemy. There are many things that provide concealment from observation, including subtle changes in the terrain, certain vegetation such as trees, tall
grasses and cultivated vegetation, (orchards, cornfields), and obscuring weather conditions, which might include rain, fog, and snow. In and of themselves,
concealment and man-made camouflage do not necessarily provide cover.
Here, the restricted terrain is addressed. While not a significant set of Hydrology is added here. Hydrology must be addressed to determine if the
obstacles in this AO, restricted terrain to maneuver elements may be viewed water features are easily fordable, or require engineering assets to cross.
as severely restricted terrain to artillery units (due to sight-to-crest issues) or Many water features, like this one running completely through the AO, serve
sustainment elements (due to lack of available hard-packed roads). as informal boundaries and must be evaluated as to how intelligence will be
Creating the COO and MCOO gathered and where enemy forces might attempt to cross.
Creating the COO and MCOO
Restricted Terrain (Obstacles) Added to the COO Hydrology (Obstacles) Added to the COO
Severely Restricted Terrain (Obstacles) Added to the COO Unrestricted Terrain on the COO
Building the COO and MCOO (cont.) By grouping together the mobility corridors, AAs are created. AAs are ground
or air routes of an attacking force of a given size leading to its objective or key
terrain in its path. In this example, due to the severely restricted hydrological
In this example, historical smuggling routes have been added to the terrain which bisects the AO, there are two AAs through the AO. These two
mobility corridors derived through evaluation of unrestricted terrain to avenues of approach originate on either side of the water feature.
further clarify the natural lines of drift, as well as the historical use of
terrain as it applies to movement through the AO. Creating the COO and MCOO
Historical Routes Added to the COO Avenues of Approach Identified on the COO
Completed MCOO
This simple chart below shows the effects of terrain based on the military In this example, the effects of terrain are broken down based on
aspects of terrain. As with all intelligence products, the producer should WFFs rather than military aspects of terrain, and encompass
strive to develop a comprehensive intelligence estimate . . . the “so what” multiple areas of the battlefield. While it is good to know that
of the product. While this product begins to show the effects of terrain conditions are favorable throughout much of the AO based on
from phase line to phase line, and in both offensive and defensive these WFFs, it is more important to know why some of the
operations, it still lacks the refinement necessary to show the staff the true WFFs are showing marginal or unfavorable effects of terrain in
terrain effects. some areas. This will become very important when attempting
to develop friendly COAs, as well as depicting the threat COAs
throughout the AO the unit has been assigned.
TERRAIN EFFECTS
Mission Command
Fires
Protection
FAVORABLE MARGINAL UNFAVORABLE
FAVORABLE MARGINAL UNFAVORABLE
One of the most prolific users of terrain effects products is the signal officer, As the S-6 continues to identify communications dead space, he emplaces
or S-6. His FM communications are completely based on LOS. In this more retransmission sites to fill out his FM coverage.
example, the S-6 has used terrain software with digital terrain elevation data
(DTED) to identify the FM footprint in his AO. Based on his LOS
capabilities, the S-6 can recommend where, or if, retransmission nodes must
be emplaced in order to provide FM support to the commander and troops.
No FM Coverage
No FM Coverage
Suitable Terrain for Retransmission Nodes (From FOB COPPER) Suitable Terrain for Retransmission Nodes (From Retrans 1)
As the S-6 emplaces his final organic assets, he must make recommendations The commander takes the recommendations of the S-6 and either requests
to the commander as to how the “gaps” in communications might be additional assets from HHQ (based on a thorough war-game), adjusts assets
mitigated. as necessary to provide coverage where his forces are, or accepts risk based
on the inability to provide FM communications. In some cases, the lack of
FM communications can be mitigated with non-LOS communications
systems.
No FM Coverage No FM Coverage
Communications
Deadspace
Suitable Terrain for Retransmission Nodes (From Retrans 2) Suitable Terrain for Retransmission Nodes (From
FOB tower plus two retrans locations)
All the climate information in the world will not prepare you for the
multitude of faces the weather can conjure during operations. The best
weather predictions are no good for more than 48 -72 hours out. This is
why it is incumbent on each staff section / element to have a thorough
understanding of how weather, and changes in weather patterns, can
affect their respective WFF and equipment.
In defining the impact weather can have on operations and the OE, there
are several military aspects that must be considered. These are visibility,
wind, precipitation, cloud cover, temperature, humidity, and sometimes
atmospheric pressure. While the military aspects of weather in DSCA
operations do not differ greatly from offensive or defensive operations,
take into consideration how additional precipitation would affect DSCA
operations stemming from a flooded river.
Position of Sun and Moon Relative to the Horizon
Visibility
Visibility, according to ATP 2-01.3, is “. . . the greatest distance that prominent objects can be seen and identified by the unaided, normal eye.” Important to
note, unlike the other military aspects of weather, visibility is not a “stand alone” aspect of weather, rather it is a result of other weather conditions. Visibility
relies on the ability of light to illuminate an object and reflect that light to an observer. Visibility can be reduced by the reduction of ambient light due to the
rotation of the Earth, atmospheric interference, such as rain, snow, fog, or other cloud effects, or the presence of atmospheric particles, such as smoke, dust, or
haze.
Both the sun and moon affect ambient light reaching the Earth, and, as the diagram above shows, at different times during the day, the amount of light increases
and decreases based on the curvature of the Earth, as well as the relationship of the sun or moon to both the object viewed and the observer.
The effects of loss of visibility may not affect specific systems but may diminish the system capability. The inability of an observer to adequately identify a
target will hinder indirect fire operations even though the weapon systems are unaffected by lack of visibility.
Wind Considerations
The effects of wind can reduce the combat effectiveness by limiting or eliminating visibility caused by blowing sand, dust, smoke, or precipitation. The effects
of wind must be considered when factoring both friendly and enemy chemical, biological, radiological, and nuclear (CBRN) operations. The effects of smoke
may be nearly negated based on how, and from what direction, the wind is blowing. Wind turbulence, coupled with wind speed at the ground, can limit aircraft
performance and reconnaissance capability.
The ability to use aviation assets, either fixed, rotary, or unmanned, requires analysis of wind conditions, not only at ground level, but also at different air
levels. This will generally be done by HHQ, but their “go” or “no-go” evaluation could affect planned operations. Strong winds can hamper the efficiency of a
directional antenna due to antenna wobble. Strong winds can also greatly change the trajectory of non-guided, indirect-fire munitions.
Precipitation
Precipitation occurs at all locations and at all temperatures. Rarely does it provide positive impacts on operations. Precipitation can take the form of rain,
sleet, drizzle, freezing rain, hail, or snow. What type of precipitation a unit receives is generally based on the factors of temperature, wind speed, and weather
patterns. Whatever type of precipitation is received, the only positive effects that can be derived are the enemy’s loss of visibility and the inability to detect
friendly forces. In the negative, precipitation hinders friendly force observation, communications, mobility, sustainment efforts, unit morale, and many
civilian activities. While a little rain might cool off a hot summer day, there is seldom just a little rain.
Cloud Cover
Cloud cover has two significant impacts on ground operations. First, the density of the cloud cover can affect the amount of light that is allowed to
illuminate objects. Referring to what was previously discussed in the section on visibility, a lack of ambient light reduces visibility. However, dense cloud
cover can increase ambient light from ground sources. So, depending on where the light comes from, an increase or decrease in visibility is possible. Another
double-edged effect of cloud cover is fog. While fog is considered a type of cloud, it is distinguished from other clouds by its low-lying nature and because the
moisture is generally derived locally (e.g., a local body of water, or nearby marshes, or moist ground). Fog can be an ally or an enemy depending on the
operation. In defensive operations, fog favors the attacking force because of its ability to conceal. Conversely, in attacking scenarios, fog helps obscure
movement, muffle sound, and distort distances. Based on the density of the cloud cover, certain aviation operations may also be affected. Many information
collection and target acquisition assets are degraded by cloud cover.
Temperature
Temperature affects Soldiers, equipment, and the environment. Extreme temperatures decrease Soldier capabilities, increase injury, and ca use equipment
malfunctions and breakdowns. Tactics that are effective at one temperature, may not work in another. Temperature is a factor which is impacted by other
weather factors. Low temperature taken with wind speed produces wind chill. Temperature taken with humidity affects air density. The “critical” temperature
(wind chill) factor is –25° F (-32°C). This wind chill temperature can be produced with an actual temperature of 10°F and a wind speed of 20 miles per hour
(mph). Conversely, the opposite extreme is 120°F (49°C). The military uses the wet-bulb-globe-temperature (WBGT) of 90°F as critical to personnel operating
in hot weather climates.
Extreme temperatures require an almost constant need for either heating or cooling of Soldiers and equipment, and will cause difficulty in constructing
fortifications, severely increase the dependence on logistical support, and require special clothing, equipment, and training. In extreme temperatures, leader
skills are taxed and every Soldier becomes responsible for his buddy. Work becomes restricted in extreme temperature conditions and certain operations may
have to be postponed or cancelled altogether based on temperature extremes.
Humidity
Humidity, in shor t, is the amount of water vapor in the air. There ar e two measur ements of humidity used in military operations – relative humidity
and absolute humidity. Relative humidity is the ratio of the water content in the air at a given temperature to the amount of water the air is capable of
holding before it condenses into precipitation. Absolute humidity is the total amount of water in a given volume of air . In tr opical ar eas, the absolute
humidity is high and in arctic regions, the absolute humidity is low. The level of humidity affects the formation of clouds and fog, affects the capability of the
human body to cool itself, and can affect automated sensors and “smart” weapons. High humidity decreases the capability of both lift and propulsion in fixed-
wing and rotary-wing aircraft.
Thermal Crossover
While not a military aspect of weather, thermal crossover is a natural phenomenon that occurs when an unheated object loses its thermal contrast with respect
to nearby objects. This generally occurs twice a day as the temperatures move from low-to-high in the morning and high-to-low in the evening. This effect
causes problems for thermal sights and forward-looking infrared (FLIR) sensors. A difference in temperature is required for these types of equipment to “see”
their targets.
Temperature Inversion
Temperature inversions occur when the air closest to the Earth is cooler than
the air above it. This happens when a less dense air mass moves over a more
dense air mass. This phenomenon generally occurs in the presence of warm
fronts or sea coasts. When a temperature inversion occurs, a layer of air is
trapped between the Earth and a low-lying inversion cap. When sufficient
humidity is present, fog forms and stays close to the ground. Until the ambient
temperature of the ground warms, the fog remains. The military aspect of
temperature inversion is the tremendous capability it has to keep
obscurants at ground level. Smoke pots, hand-held AN-M8
hexachloroethane (HC), and AN-M18 colored smoke grenades achieve
greater results when used in conjunction with this weather effect.
Conversely, the effects of chemical agents are also intensified because
their effect is trapped into a smaller layer of air. Soldiers in fighting
positions are further affected because the warmer air tends to drift and find
the lowest, coolest air.
Depicting Weather Effects
Weather effects are harder to depict graphically and are generally
presented in a chart or matrix format. Some examples of these products
will be included at the end of this section. The single most important,
easiest to create, and most often overlooked product, is the wind direction arrow. This simple device should
be placed on the fusion map and annotated with a date-time stamp and wind velocity. By placing the wind
direction arrow on the map, the Fires Support Element (FSE) has the capability of adjusting targets to
achieve desired effects, the effects of smoke can be easily calculated, and chemical downwind predictions
can be easily displayed.
Whatever the means used to display weather, focus should remain on its effects. The commander and staff
do not need to know it is going to rain; they need to know that mobility, observation, and sustainability will
be impaired, and that system functionality may be adversely affected.
The following pages show examples of weather tools and how they
explain the effects of the weather to commanders and their staffs.
The easiest to produce and yet most neglected weather effect product
is the weather arrow. Remember, based on the earlier discussion,
when dealing with wind, there are two factors – direction and A more permanent wind direction and velocity tool can be created using two
velocity. This is an example of a product that can be easily made out pieces of cardboard. The bottom piece is labeled with numbers and the top piece
of scrap cardboard and covered with combat acetate. This can be is unadorned other than a window at an edge. The wind direction arrow is
taped to the fusion map and rotated as necessary. The wind velocity placed on top and all three pieces of cardboard are secured with a rivet or round-
can be changed using an alcohol pen. This provides a great point of headed fastener. This tool can be permanently mounted on the fusion map, does
reference and is a critical factor when using smoke, firing non-LOS not require moving to change wind direction, and only requires turning the outer
weapons, and determining additional weather effects. wheel to change wind velocity.
19 calm 1
18 2
3
17
4
16
5
15
6
14
13 7
12 8
11 9
10
Another tool used both as part of the intelligence running estimate and This is another example of a Light and Weather Chart. This chart
for Mission Analysis Briefings is the Light and Weather Chart. This deals with the military aspects of weather in a timeline format. The
single product displays the military aspects of weather in a single, easy- advantage of this type of product over the previous one is that the
to-read format. Like the terrain products previously discussed, the only mission timeline can be added to the bottom and the effects of the
thing lacking is the comprehensive estimate. While this is a good stand- weather on the operation can be easily seen. In this example, if the
alone product for the running estimate or intelligence wing board, an unit is attacking, they should be in their attack positions prior to
explanation of the effects of the weather on the upcoming and future 0230 hours to take advantage of the lack of ambient lighting. Based
operations would be required. on the commander’s discretion, the unit can attack prior to the fog
forming, as the fog forms, or as the fog lifts.
111200SEP11
120001SEP11
101200SEP11
110001SEP11
100001SEP11
While not associated with the two previous
091200SEP14
100001SEP14
101200SEP14
110001SEP14
111200SEP14
120001SEP14
91200SEP11
FRIENDLY EFFECTS ON TOP examples, the tool to the left represents the
ENEMY EFFECTS ON BOTTOM depiction of the effects of the weather broken
Dismounted forces down into 6-hour blocks.
Favorable Unfavorable
The days of offensive or defensive operations without regard to civilian infrastructure and “human terrain” are gone. An appreciation of civil considerations
and their ability to impact missions remain key to successful operations. The analysis of civil infrastructures enhances several aspects of military operations –
the selection of objectives, location, movement and control of forces, use of weapons, and protective measures.
There are six characteristics that comprise civil considerations derived from the mission variables. These are expressed using the memory aid “ASCOPE:”
Ar eas.
Str uctur es.
Capabilities.
Or ganizations.
People.
Events.
Areas
When dealing with areas as a civil consideration understand that they may have no military significance. When looking at civil areas, it must be done from a
civilian standpoint. Commanders and their staffs must analyze civilian areas based on how they will impact military operations and how military operations
will, in turn, affect them. Examples of key civilian areas include:
Areas defined by political boundaries, such as districts within a city or municipalities within a region.
Locations of government centers.
Social, political, religious, or criminal enclaves.
Agricultural and mining regions.
Trade / smuggling routes.
Possible sites for the temporary settlement of dislocated civilians or other civil functions.
These areas need to be annotated on products and are as important as unit boundaries or other operational graphics. The success or failure of a mission could
well hinge on a thorough understanding of where the unit is operating and what the political, religious, and/or sentimental atmosphere is towards friendly
forces.
Structures
Other aspects of the infrastructure that have the capacity to influence military operations:
Toxic industrial materials.
Fertilizer plants.
Chemical plants.
Battery production facilities.
Structures must be analyzed based on how their location, function, and capabilities may support the operation. Sometimes there is also a consequence in using
a structure that must be assessed. If the military use of a structure competes with its intended civilian use, the attitude of the public might be swayed away from
cooperation. When possible, commanders should attempt to compensate locals for the use of shared facilities.
Structures (cont.)
Some additional aspects of structure that should be considered are:
Locations of police stations or other security operation structures.
Locations of essential services and key logistic and sustainment facilities such as:
Potable water sources (wells and pumps) and water distribution stations.
Sewage treatment plants and sewer systems.
Refineries and fuel oil or propane storage facilities.
LOCs.
Communication facilities (phone, internet, cell phone).
Transportation nodes (air, rail, bus).
Highways and critical intersections.
Cultural and religious shrines.
Centers of learning.
Media structures (television, radio, and newspaper).
Capabilities
Commanders and staffs analyze capabilities from different aspects. Generally, capabilities are assessed in three areas:
Existing infrastructure that allows the populace to sustain itself.
Gaps in infrastructure, such as public works, utilities, public health, or emergency services which are required for the populace to sustain itself.
Available resources and services that can be contracted to support the military mission (interpreters, laundry services, construction materials, labor).
In order for a staff to truly understand the capabilities of a region, they need to understand what the capabilities were prior to operations, what will be required
after operations to bring the infrastructure back to a level where the populace can sustain itself, and what capabilities are available in the area that can be
leveraged towards successfully completing the mission.
Organizations
Organizations ar e nonmilitar y gr oups that may or may not be tied to gover nmental agencies. They influence and interact with the remainder of the
populace, the military force, and each other. Civil organizations provide the commander with a network to share information about present and upcoming
activities in the AO and help influence the populace. Civil organizations also provide the commander with a set of informal leaders who generally garner more
respect within their organizations than do formal leaders.
Organizations (cont.)
There is no blanket statement that can be made regarding internal or external organizations … They are not good, they are not bad; they just are. Commanders
must remain familiar with the organizations operating in their areas. They must consider the effect the organizations will have on the population and the
military operation and must consider how the mission may impact the operations of the organization. The organizations in their areas provide a viable link to
the people living in the AO and this link should be examined as to how it can be leveraged to help both the commander in accomplishing the mission, while
repairing and strengthening the infrastructure of an area.
People
People is a br oad ter m used to descr ibe all nonmilitar y for ces that will be encounter ed by military
forces. The term “people” is not limited to the population living inside a commander’s AO. It also includes
all people who may influence or have an influence on people, activities, or military operations within the AO.
The people in an area can have a positive, negative, or neutral impact on operations. It is because of the
possibility of operational influence that a commander must understand the people in his AO, as well as their
beliefs, fears, and possible preconceived resentment.
JP 3-24, Counterinsurgency Operations, states, “Analysts must consider historical, cultural, ethnic,
political, economic, and humanitarian factors when examining a given population. Any affiliations
may have tremendous effect on the local population’s support to an insurgency, including areas where
people and insurgents may transit, retreat, evade, or hide. Populations such as squatters, the
homeless, refugees, displaced persons, and outcast groups can also have an immense impact on the
OE, and can be exploited by insurgents.”
It is useful and necessary to separate the population in an AO into categories based on their
capabilities, needs, and intentions. People should also be examined from the standpoint of historical,
cultural, ethnic, political, economic, and humanitarian factors. The key communicators (which may
not always be the formal leaders) should be identified, as well as the formal and informal processes
used to influence the population.
People (cont.)
The language or languages spoken within an area may vary. It is incumbent on the commander to
understand where he will be operating so specific language training, communications aids, such as
phrase cards, and the requisitioning of translators can begin. Translators are crucial for collecting
information, interacting with the local population, and developing products for military information
support operations (MISO).
As the languages in an area vary, so do the religions. Religion has shaped many conflicts in the past,
and its influence will only grow. When incorporating religion into planning, consider the following:
When will religious traditions be impacted by the mission and how will they impact the
operation?
When and who are the religious figures who have, or can influence, social transformation in
either a positive or negative way?
Even though violent or exclusive, all parties must be considered.
The command must strive to understand the day-to-day lives of the population … not
only what they eat and drink, but also their ideologies and religions, perceptions, their
appreciation of their homeland and how it influences the insurgency, and how the
insurgency influences it.
People (cont.)
The analyst must not analyze an area or its people with any
sort of preconceived notions. His preconceptions can
severely skew the data required to thoroughly understand
the population. When analyzing cultural factors, the
military studies the following broad categories:
Social structure.
Behavioral patterns.
Perceptions.
Religious beliefs.
Tribal relationships.
Behavioral taboos.
Centers of authority.
Lifestyles.
Social history.
Events
ATP 2-01.3 defines events as, “routine, cyclical, planned, or spontaneous activities that significantly affect organizations, people, and military operations.”
Some examples include:
National and religious holidays.
Agricultural, crop, or livestock market cycles:
Tilling.
Planting.
Harvesting.
Market days.
Elections.
Civil disturbances.
Celebrations.
Other events are disasters that are either manmade, natural, or technological in nature. These events impact the population through civil hardship and
emergency response shortfalls. Combat operations are another type of significant event that cannot be planned for by the populace, but will have great impact
on their lives.
Once all events are identified, it is incumbent on the commander and staff to template them, analyze them, and determine the political, psychological,
economic, environmental, and legal implications.
LAKE
LAKE
.
DRINKWATER SPRINGS
IRAQ
IRAN
.
EL NORBO KARAMU
KHINJANI
KHEYL
X ZARA
1071
1071
MSR STARR
KALA II AL AZIZIYAH
AZ
NELSON
NELSONLAKE
LAKE
Al Halif Tribe
Maysan
Wasit
FOB AO
20 .
NELSON LAKE MINING CAMP
X
GOW DARREH
KALA SHAH
ZINC .
AO COPPER
KUT AL
HAYY
The accompanying .
EL CENTRO ALI AL GARBI
PIONEER KORAM
TUT FOB JOROBAY
ALLAL SHARQI
X
1489
1489
AO BRONZE 876
876
780
780
701
701
699
WAZIR
the diversity in civil
760
FOB GARY OWEN QAL AT SALIH
1478
1478 FOB 720
720
10 MSR WARNER
1214
1214
899
899 781W
781W
BLAAF
AO STEEL Al-bu Muhammed Tribe
BICYCLE LAKE TIEFORT
TIEFORTMTN
MTN
SHUYAKH
RED PASS LAKE
GOLDSTONE RD IRWIN
SHANTY
NO MANEUVER
URMURI
FOB
MSR ALLEN
TOWN
X KOTU Al Sari Tribe
00
TRIBE
BAGRAMI SOMAMZI
FIELD X
ASP LANGFORD LAKE
909N
NO MANEUVER AL AMARAH
957
957
938
938 FOB DELTA
909S
909S
90 729
729
837
837
NO MANEUVER
Return to map
A B C D E
1 1
100 101 102 N
Sadik 301
103
104
110 111
120
300
Hadiya
112
113
900 308 130
901 131 140
800 803 304 305
2 302 306 307
132 143 2
801 142
802 303 141
400 401
902 402
805 700 411
707 200
706
804 701 201
702 410
408 403
409 404
3 3
405
705 406 202
704
703 601 407
205
600 500
508 501
507 502
504 503
505
506
4 4
204
203
5 5
A B C D E
100 Carpenter's Shop 120 Shia Mosque 143 Nursery School 302 ISF Barracks 400-408 Residence 601 Propane Sales 900 Bank
101-102 Construction Yard 130 Civil Engineer Res 201-202 Residences 303 Electronics Store 409 Bakery 700 Resort Habib 901 Polling Station
103 Mayor’s Residence 131 Residence 203 al Khuzaai Mukhtar Res 304 JSS 410-411 Residence 701 Mayor’s Office / Town Hall 902 UNK
104 Polling Station 132 El Boracho Burrito 204 DG of Electricity & Public 305 Hospital 500-501 Residences 702-705 Resort Habib
110 Imam’s Residence 140 Theater Affairs Office/Residence 306 Barber Shop 502 JCC Director Res 706 Mayor’s Villa
111 Motorcycle Repair Shop 141 Kamel Dog Café 205 UNK 307 UNK 503-508 Residences 707 Police Chief’s Villa
112-113 UNK 142 UNK 300-301 JSS 308 JSS 600 Shia Mosque 800-805 Residences
Product Depicting Structures and Tribal Areas Medina Jabal (NV 441 100)
MSR VOLVO
E GV CR
MIXED SUPPORT E GV CR
A P S/E
ll x A P S/E
T M ll ALLAH ALI T M
2 MED
MED ROUTE FORD
FOB
FOB COLD
COLD HARBOR
HARBORKUMAYSH
HABIB AN NAJIR
AL ANI HADID ll
S FO AIF
MOST SUPPORTIVE
x MSR VOLVO ROUTE CHEVY
W NGO ET
TO US/COALITION SOMAMZI
E GV CR AO GATOR
A
T
P
M
S/E
KUMAYSH HADID SOMAMZI ll FADIL
Tribal
E
A
AO REDx ARROW
GV
P
CR
S/E
E
A
GV
P
CR
S/E
E
A
GV
P
CR
S/E
E
A
GV
P
CR
S/E
FOB FADIL T M
T M
Leader
WTTA
T M T M
MED MED
FOB ANTIETAM 5
MED
VICKSBURG
3 x MED
MSR OPAL
outskirts of town.
W NGO ET ll A P S/E
SEWER KARAMU KHEYL E GV CR
T M
S FO AIF A P S/E
Water system improved. No W NGO ET T M
MED
shortages. Wells are well E GV CR
x MED
ZARA KALA
positioned with adequate Market A P S/E x S FO AIF
WATER flow rates. T M ll ROUTE TOYOTA
FOB SHILOH ZARA KALA
W NGO ET
MED 4 E GV CR
AZRO
A P S/E
Grid is in poor condition and QIZIBAH KARAMU KHEYL
HISSARAK HISSARAK
T M
provides 8 hours of power Houses MIXED SUPPORT
ELECTRICITY
AO LIGHTHORSE S FO AIF
MED
per day. W NGO ET
AO RED ARROW E GV CR
Electrical A P S/E
Small school in village for Building PMESII OVERVIEW T M
boys. Girls are sent to
ACADEMIC provincial schhool. x MED
CAUTION The memory aid “SWEAT” means different things to different people. While originally developed by the Army,
it was later modified by the Army Corps of Engineers (USACE) for use in civil disasters. The modification
changed the acronym to: security, water, energy, accessibility, and telecommunications. This is not functionally different from
the use of SWEAT-MSO where the “O” can account for any additional factor used in infrastructure assessment.
When dealing with military operations, it is imperative to understand who you are dealing with. Full spectrum operations, unified land operations, and the
Decisive Action Training Environment have, over the last twenty years, provided the Army with many diverse threats to evaluate. But before a unit is deployed
into an area of hostilities, invariably they conduct local exercises, command post exercises, or full-scale exercises at either the National Training Center (NTC)
or the Joint Readiness Training Center (JRTC). This brings them into contact with a dedicated “training” enemy known as the opposing forces (OPFOR).
The eXportable Combat Training Capability (XCTC) is a National Guard program that represents a fully-instrumented group of field training exercises (FTX)
based on the current OE. The XCTC was developed to provide units in the “ready” phase of the Army Force Generation (ARFORGEN) cycle, a capability to
train on the tactics, techniques, and procedures that are used in joint operational areas while not overtaxing the Army’s combat training centers (CTCs)
burgeoning load. The XCTC is the Army National Guard’s (ARNG) solution for a bridging strategy until other solutions can be found to ensure all deploying
units receive a “dirt” CTC rotation.
Who Are the “Bad” Guys (the Enemy, the Threat, Adversaries, and the OPFOR)?
Training Circular (TC) 7-100 (Hybrid Threat) defines enemy combatant as “in general, a person engaged in hostilities against the United States or its coalition
partners during an armed conflict”. This means whoever is actually opposing the U.S. in a given conflict. This word is synonymous with adversary or opponent.
The “threat” is defined as a potential adversary. This includes “any specific foreign nation or organization with intentions and military capabilities that suggest it
could become an adversary or challenge the national security interests of the United States or its allies.” Once hostilities begin, the “ threat” becomes the
“enemy” if they are actively participating in hostilities.
More wordsmithing here … It may become necessary, while conducting IPB, to take into account both enemies and threats. An example … your unit is planning
an attack against a nation state’s forces. While planning, you find that your planned route places you in close proximity to a village that has known non state-
sponsored actors. While they may or may not currently be considered hostile to friendly efforts, their capabilities and disposition must be addressed. Failure to
address threats or potential enemies may cause issues you can ill afford to have.
The OPFOR is a training tool created as a virtual sparring partner for training units. It provides a challenging and plausible force that represents any number of
potential opponents that a unit might face on the battlefield. Based on the training scenario, the OPFOR might begin as the threat teetering on the cusp of being
an enemy. But since the OPFOR’s role is one of an actual enemy force, an event or series of events moves them from a threat status to an enemy status. This
may occur prior to the training exercise or during it based on how the scenario is written.
Since its inception in 1976 when outlined in Army Regulation (AR) 350-2 (Opposing Force Program), the OPFOR has operated using doctrine approved by the
U.S. Army Training and Doctrine Command (TRADOC). While not originally detailed to support mission rehearsal exercises (MREs), at the commander’s
request, these assets may be used to provide a realistic atmosphere prior to unit deployment.
Because of the changing dynamics of the OE, a new “contemporary” OPFOR was required. FM 7-100 defines the contemporary OPFOR as “a plausible,
flexible military and/or paramilitary force representing a composite of varying capabilities of actual worldwide forces, used in lieu of a specific threat force,
for training and developing US forces.”
But be they enemy, threat, or OPFOR, Sub-tasks 3 and 4 of IPB remain the same and require the same outputs.
Soldiers and units must be prepared to evaluate threats and enemies using combinations of technology at varying levels of intensity. While high-intensity
operations may be characterized as purely military in nature, in DSCA operations, as well as stability operations, they may be a combination of military,
paramilitary, or small-cell-oriented forces. How the threat or enemy is defined is crucial to determining both their capabilities and their strategies. No matter
the size, it is important to depict their operations in as much detail as possible based on their past operations in order to accurately predict what they might do
given the current situation. If the staff fails to determine all of the organizations or capabilities, or to understand their doctrine and/or tactics, the following is
likely to occur:
The threat will surprise friendly forces with capabilities not accounted for.
The staff will lack the intelligence needed for planning.
The staff will waste time analyzing capabilities that do not exist.
The staff will believe the threat is static and not understand that they are thinking and adaptive.
Understanding that each engagement is different, the staff must endeavor to determine how the threat conducts operations under similar situations. In order to
accomplish this, the staff conducts threat characteristic analysis for each group identified during Sub-task 1 of IPB.
Threats are generally nation states, organizations, people, groups, or conditions that can damage or
destroy life, vital resources, or institutions. Army doctrine divides these threats into the following
categories: regular, irregular, hybrid, disruptive, catastrophic, and hazards. This publication only
discusses the evaluation of regular, irregular, and hybrid threat forces. Evaluating the threat should
begin with acknowledging that there is a threat, followed by the analysis of the threat’s characteristics,
and ultimately leading to the identification of the threat model (regular, irregular, or hybrid structure).
Regular threats are part of nation states employing recognized military capabilities and forces in
understood forms of military competition and conflict. The Islamic Republic of Iran Army and the
Peoples Liberation Army of China are examples of regular forces. The Regular Threat
Irregular threats are opponents employing unconventional, asymmetric methods and means to
counter U.S. advantages. A weaker enemy often uses unconventional methods to exhaust the U.S.
collective will through protracted conflict. Unconventional methods include such means as terrorism,
insurgency, and guerrilla warfare. Economic, political, informational, and cultural initiatives usually
accompany and may even be the chief means of irregular attacks on U.S. influence. The Revolutionary
Army Forces of Columbia-People’s Army and Al Qaeda are examples of irregular forces.
Hybrid threats are the diverse and dynamic combination of regular forces, irregular forces,
terrorist forces, and/or criminal elements unified to achieve mutually benefitting effects.
Composition
Composition is the identification of threat forces and their
affiliated organizations. In conventional operations, this
resembles line and block organizational charts and/or unit
equipment charts. In stability operations, this resembles
association charts and link diagrams and follows a “cell”
structure. Hybrid threat forces are comprised of two or
more of the following:
A nation state regular force.
A nation state irregular force.
Insurgent groups.
Guerilla units.
Criminal organizations.
Disposition
Disposition is where the threat is located Example Threat Organizational Chart Local Insurgent Organization
and how they are deployed,
or the formations they are
using. In conventional
operations, the tool used for
this is the threat template.
The analyst needs to know
where on the ground these
facilities are located, will be
located, or were located. In
stability operations, the tools
used are incident overlays,
time-event charts, pattern
analysis wheels, association Incident Overlay Time Event Chart Link Diagram
matrices, and link diagrams.
Strength
Strength describes a unit in terms of personnel, weapons, and equipment. Information concerning strength provides the commander with an indication of
enemy capabilities and helps determine the probable COAs or options open to threat commanders. A lack of strength or a preponderance of strength has the
effect of lowering or raising the estimate of the capabilities of an enemy force. Likewise, a marked concentration or build-up of units in an area gives the
commander certain indications of enemy objectives and probable COAs. During peacetime, changes in the strength of potential threat forces are important
factors which may indicate changes in the threat’s intention. Strength is determined by comparing how a threat organization is doctrinally staffed and
equipped with what the organization actually has on hand.
Strength for regular forces is described in terms of personnel, weapons, and equipment. The most important aspect of strength when evaluating a regular
force is to determine whether the force has the capability of conducting specific operations. For example, a unit may have adequate weapons systems to
conduct an operation, but may not have a sufficient number of trained personnel or crews to man the systems.
For irregular forces, strength is defined by the capability of direct action teams, political cadre or cells, and, most importantly, popular support. Popular
support can range from sympathizers to assistance in conducting operations, storage or moving, logistics, or just withholding information.
The strength of a hybrid threat is determined by understanding the synergy of regular and irregular forces. The hybrid threat understands that the
environment that would produce the most challenges to U.S. forces is one in which conventional military operations occur in concert with unconventional
warfare. The hybrid threat concept is not just one of making do with what is available, but is primarily one of deliberately created complexity.
Combat Effectiveness
Combat effectiveness describes the abilities and fighting quality of a unit. Numerous tangible and intangible factors affect it.
Determining combat effectiveness for regular threat forces is made by assessing the following factors:
Personnel strength.
Amount and condition of weapons and equipment.
Status of training.
Efficiency of leadership.
Quality of leadership.
Length of time a unit is committed in combat.
Traditions and past performance.
Personality traits of the unit commanders.
Geographical area in which committed.
Morale, spirit, health, nutrition, discipline, and political reliability (or belief in the cause for which they fight).
Status of technical and logistical support of the unit.
Adequacy of military schooling at all levels.
National characteristics of the people.
Combat effectiveness for irregular threat forces is measured differently than combat effectiveness for regular threat forces. The threat is motivated by many
factors, which can be, but are not limited to, a goal of independence, equality, religion or ideology, occupation of a foreign nation, or economical factors.
Combat effectiveness is determined by, but not limited to,:
External support.
Fear and intimidation.
Political change.
Popular support.
Determining the combat effectiveness for hybrid threat forces is made by considering the tangible and intangible factors associated with determining the
combat effectiveness for regular and irregular threat forces.
their operations. A good case in point is how Iraqi insurgents learned RCIED
Doctrine and tactics for regular threat refer to the TTPs that guide their operations. Understanding how the threat force prefers to operate aids the commander’s
understanding of potential threat COAs. TTPs for regular threat forces can generally be grouped into the following categories:
Offensive tasks. Defensive tasks.
Movement to contact. Area defense.
Attack. Mobile defense.
Exploitation. Retrograde.
Pursuit.
Tactics and operations for irregular forces include strategy, methods of procedure, and doctrine. Each refers to the threat force’s accepted principles of
organization and employment of forces. Tactics also involve political, military, psychological, and economic considerations. Irregular force tactics and
operations vary in sophistication according to the level of training the individual or organization has received. Irregular forces carefully plan and train for
individual and small-group operations.
Hybrid force doctrine is based on countering a threat’s capabilities. Hybrid forces often study U.S. and allied military forces and their operations and conduct
lessons learned based on their assessments and perceptions. These forces use the following principles for applying their various instruments of diplomatic
political, informational, economic, and military power:
Access limitation.
Control tempo.
Cause politically unacceptable casualties.
Neutralize technological overmatch.
Conduct information operations aimed at local population, international opinion, and their adversaries’ domestic population.
Change the nature of conflict.
Allow no sanctuary.
Employ operational exclusion.
Employ operational shielding.
Avoid defeat.
Support and Relationships
The threat force’s adoption of a COA generally depends on the ability of its support system to support that action. However, depending on the threat force’s
objectives, possible time constraints, and/or willingness to assume risk — especially as dictated by political leaders or dynamics of political-military
circumstances — this could substantially alter adoption of a COA. With knowledge of these factors, analysts can better evaluate the threat force capabilities,
strength, and combat effectiveness.
The effectiveness of irregular forces depend heavily on support and relationships. This dependency fluctuates horizontally and vertically between the various
groups and levels of operation. The intensity of support activity is based on operations. Critical components of support include, but are not limited to:
Financing.
Food.
Water.
Weapons and ammunition.
Bombmaking components.
MISO materials (paper, ink, printing press).
Medical.
Transportation.
Support of the population.
Hybrid forces will incor porate the types of suppor t ir regular forces use to sustain themselves with the traditional logistical suppor t associated with
conventional military operations.
Because a hybrid force is a composite of many different groups, these groups will often have no standard or readily identifiable organizational relationship.
What brings together the capabilities and intent of the components of the hybrid threat is a common purpose, typically opposition to U.S. goals. This unity of
purpose can even bring together groups that normally would be fighting among themselves.
Affiliated organizations are cooperating toward a common goal despite having no formal command or organizational relationship. Affiliated organizations are
typically nonmilitary or paramilitary groups, such as criminal cartels, insurgencies, terrorist cells, or mercenaries.
Affiliated forces are those irregular forces operating in a military unit’s A O that the unit may be able to sufficiently influence to act in concert with it
for a limited time. No “ command relationship” exists between an affiliated organization and the unit in whose AO it operates. In some cases, affiliated forces
may receive support from the military unit as part of the agreement under which they cooperate.
Electronic technical data derived from targeting and electronic warfare is required to conduct electronic warfare (EW).
For regular threat forces, this data also includes critical threat communications nodes such as CPs and
logistical control points. This information supports threat templating. With electronic technical data, a more
accurate evaluation of the enemy’s vulnerability to electronic countermeasures and deception is made;
signals intercept and direction finding for the production of signals intelligence is made easier; and support is
given to counter threat electronic warfare by assessing the threat’s electronic warfare capabilities.
When combating irregular threat forces, the lack of an obvious formal organizational structure or architecture
impedes development of an extensive threat communications network diagrams and electronic technical
database. The insurgent has communications equipment available ranging from the most modern to the most
primitive. Insurgent forces can use high frequency, short-wave, ham radio and Citizen band sets; cellular
phones, satellite phones, the Internet, mail, and couriers. While not playing a significant historical role, the
insurgent's potential use of radar cannot be ruled out.
Hybrid enemy for ces will employ a combination of the capabilities used by r egular and irr egular
forces, as well as available commercial-off-the-shelf (COTS) technology and existing civilian
communications networks.
Capabilities are the broad COAs and supporting operations that the enemy can take to achieve its goals and objectives. The following four tactical COAs are
generally open to military forces in conventional operations: attack, defend, reinforce, retrograde.
A regular threat force is designed to attack or defend as necessary to accomplish objectives. Determining capabilities and limitations for a regular threat force
requires an understanding of the art and science of war, as well as an understanding of the threat force itself.
A very challenging capability of an irregular threat is its ability to blend in with the population or to hide in complex terrain. This allows the threat to plan and
prepare for an operation and attack at a time and place of its own choosing without interference from friendly forces.
From a friendly perspective, the most challenging capabilities of a hybrid force are its ability to adapt and transition. The hybrid force emphasizes speed, agility,
versatility, and changeability as the keys to success in a fight against a larger, more powerful opponent.
Adaptation, br oadly defined, is the ability to adjust behaviors based on learning. Adaptation is closely linked to the OE and its variables. Thr eat forces
approach adaptation from two perspectives: natural and directed.
One of the most dangerous aspects of a hybrid force is the ability of its components to transition (change) in and out of various forms. Military forces, for
example, can remove uniforms and insignia and other indicators of status and blend in with the local population. Insurgent forces might abandon weapons and
protest innocence of wrongdoing. Criminals might impersonate local police forces in order to gain access to a key facility.
Current operations are those operations in which an enemy force is currently engaged. This includes operations against U.S. military forces or inter ests
or against the military forces or interests of other nation states. Analyzing current operations provides up-to-date information on all other threat characteristics.
The Army’s knowledge of regular threat forces is based on its understanding of these forces prior to 11 September 2001. These forces have evolved as the Army
has evolved. Intelligence staffs at all echelons continuously study these forces to gain a better understanding of them.
The Army gained valuable experience in combating irregular forces during Operation Iraqi Freedom and Operation Enduring Freedom. Thus, the Army has
learned how diverse and adaptive these threats can be. It is unlikely that the irregular threats will face in the future will mirror those it fought in Iraq and
Afghanistan. To gain the best understanding of the evolving nature of irregular threats throughout the world, intelligence staffs analyze these threats whenever
and wherever they appear.
Although the Army believes the primary threat it will face in the future will come from hybrid threat forces, little is known about what the character of these
threats will be. While the Army has developed a hybrid threat force model to use in training combined arms teams, this model provides only limited value in
preparing the intelligence staff in understanding this threat. This is because, like the previous contemporary operational environment (COE) threat model, it is a
generic construct that does not reflect the threat characteristics of any particular real-world threat. Because of this, it is incumbent upon intelligence staffs at all
levels to study these types of threats wherever they are operating in order to continually increase understanding of this threat category. The intelligence staff also
studies historical examples of hybrid threat operations. (NOTE: COE is no longer a valid acronym in the Army lexicon.)
Historical Data
Compiling the history of any threat organization involves conducting the research necessary to gather all relevant information regarding the threat and producing
the materials needed to communicate that information to the commander and staff. Information briefings and papers are the two most common methods used for
this purpose. Both of these methods can be used to support intelligence training, officer professional development, and noncommissioned officer professional
development. The history component of the threat data file includes the original sources of information used to compile information briefings and papers. These
sources form part of the professional reading required by all of the unit’s intelligence personnel.
Regular threat forces develop attributes based on how they have been employed over time and on how they conducted themselves during that employment.
While not definitive, understanding a unit’s lineage can provide insight into the extent a unit will go in order to accomplish its objectives. This also provides
insight into what the unit will not do to accomplish its objectives.
Irregular threat forces also develop attributes based on how they have been employed over time and on how they conducted themselves during that
employment.
The historical record of the operations and activities of hybrid threats will be one of the results of the analysis of current operations. However, history does
provide examples of threat forces using hybrid approaches against a superior force.
Miscellaneous Data
Intelligence staffs use supporting information to develop threat force characteristics and to construct comprehensive intelligence estimates. This information
includes biographic data, personalities, and biometric data, as well as other information important to mission accomplishment. Biographic data contains
information on characteristics and attributes of a threat force’s members. Knowledge of personalities is important in identifying units and, in some cases,
predicting a unit’s COA. Personality data is valuable because the tactics and combat efficiency of particular units are closely tied to the commander’s character,
schooling, and personality traits. In counterinsurgency (COIN) operations, supporting data may include tribal, clan, or ethnic group traits and their effects on the
combat capabilities, or limitations, of the threat force, as well as biometric data.
When evaluating regular forces, miscellaneous data includes biographic data on the commander’s and other key leaders in the organization. When combined
with the other threat characteristics, this information may provide insight on how an enemy commander may react in a particular situation or attempt to solve a
particular problem.
When evaluating irregular threat forces, miscellaneous data includes information on personalities, culture, and internal organizational processes.
The miscellaneous data associated with hybrid threat characteristics are a combination of that required for regular and irregular forces.
Getting Started
How well the friendly force understands the threat and how much information they have derived previously determines if they will be able to update existing
threat models or be forced to create new ones. Even if new threat models are required, they will always be initially based on threat doctrine previously
encountered. From this basic start, intelligence analysts must evaluate what they see on a day-to-day basis and refine their models, as required. The capability of
the threat in a stability environment to quickly change tactics and utilize different equipment may seem to indicate that they should always be treated as a new
threat, but analysts will quickly find that there are some recurring elements to their attacks, as well as their sustainment operations. These similarities are the
elements which must be exploited and used to update their models.
In DSCA operations, the threat differs in that it can include gangs, criminal organizations, and looters. Much creation of DSCA threat models require analysis of
previous, similar civil support activities to provide a baseline of information. Again, analysts must analyze information as it emerges and continue to refine their
models.
An area which has been previously occupied by friendly forces will already have, based again on historical information, threat templates that represent both
what the threat has done in the past, as well as what is predicted to happen in the future. These threat templates illustrate the disposition of the threat based on
their size and available assets and not constrained by the effects of weather, terrain, or civil considerations.
In conventional operations, the threat is examined in detail with doctrine being converted into templates. Due to the rapidly-changing nature of stability
operations, the operating patterns produced by examining historical data can be exploited during threat integration.
In order to update or create threat models in offensive or defensive operations, it is necessary to understand how the threat is organized, what equipment they
bring to the fight, and the tactics they employ. If updating the threat model, analysts may rely on historical data on how they have looked and acted in the past.
As the battle progresses, the threat model should be updated, as required.
If the analyst is forced to create a new threat model, or has little former knowledge of how the threat is organized or fights, he may review threat reports and
studies, current and historical intelligence studies, intelligence and other databases, and message traffic, to include current reports.
To convert threat models to graphics, the analyst must understand the architecture of the battlefield as it relates to the threat. Prior to the current OE, former
Soviet doctrine was generally used as the basis for the threat. With the advent of the contemporary operational environment COE (now changed to OE), analysts
had to redefine how they thought about the threat.
In order to develop products to depict the operational patterns of threat forces, EVALUATE THE THREAT- GRAPHICS
specific events must be identified and examined with respect to when they
occur, where they historically occur, and if the data is consistent, based on size Offensive / Defensive IPB Stability Operations IPB DSCA Operations IPB
of element or system capabilities. What might be observed in one area might
not be observed in a different area because the local support for the insurgent Threat Templates Threat Templates (select uses) Threat Templates (select uses)
may not be as strong. Finally, other effects, such as historical dates and Incident Overlays Criminal patterns
anniversaries, as well as significant effects of weather, must be considered. All Time event charts Gang boundaries
Pattern analysis plot charts Incident Overlays
these things combined create or refine the database used to depict threat
Matrices Time event charts
operational patterns. Once the database is constructed, it will, through analysis, Link diagrams Pattern analysis plot charts
confirm or deny the capabilities the threat has to mount certain operations and Matrices
will lead to construction of threat COAs. Link diagrams
3
example to the right depicts many 15
66
20
46
45
60
Wadi-Al-Tarif
incidents based on the legend at the Talatha (Hikadiyah)
Word Mil. Compound
79
76
54 8
17 23
Jetertown
4 4
bottom and even goes so far as to 68 45
34 44
35 7 24
1 30 162
break down the AO into three sections 13 50
31 42 35
Talatha (Salmatha) 36 2 71
12 14
1 17 53
53
time).
Total Incidents
18 Jun – 17 Jul
Incident Overlay
use the tool, use the index on the circles to identify the day
1500 and place the 9
8
symbol for the incident on or between the lines corresponding to the time it 10
11 18 Jun – 17 Jul
occurred. The tool to the right depicts an incident which occurred between 12 0900
The tool to the right depicts all activity in the AO. Incidents
1300
2400 18 Jun – 17 Jul1100
It is broken down into quadrants that indicate the 2300 0100
by Time 2200
1200
AO SPARTA
distribution of incidents based on the 24-hour
17
2100 55
16
15
14
13
56 0200
Pattern Analysis Wheel
cycle. In this example, 20 % of the incidents in this
12
13 11
10 20% 0300
10 9
52
54 8
7
15%
8 2
21 3 4
10
36
8 29%
(orange), and 15 % occurred between 1500 and
22 48
22 49
1700 16 13 23 11 5 38
4
1224 48 34
27
32 25 39 0700
2615 37 40 19 24 13
1400
14
15
18 78 22% 0901 - 1200
16
15% 1201 - 1500
with specific incidents are required for this
17
1000
1300
1200
1100 15% 1501 - 2100
assessment. 20% 2100 - 0600
will not risk emplacement nor detonation during 1800 17 16 15 14 131211 10 9 8 7 6 5 4 3 2 1 30 2928 2726252423 22 212019 18
6
25 43
64
15
19 46
20 10
ZONE
DISRUPTION ZONE
ZONE
Each of these possibilities begs additional questions and
will help determine how the threat will fight.
Battlefield Organization
The disruption zone (DZ) is used in offensive operations to destroy the SUPPORT BATTLE DISRUPTION
integrity and capabilities of friendly forces through the use of direct and ZONE ZONE ZONE
indirect fires without becoming decisively engaged. This zone is generally
found between the battle line and the limit of responsibility of the threat unit.
In defensive operations, the disruption zone is used to set the conditions for
the defeat of friendly forces in the battle zone. The threat will employ many
different forces to achieve this goal. The DZ is used as a focal point for Battlefield Organization (Enemy in Offense)
reconnaissance and long-range and joint fire strikes. It is in the DZ that the
threat hopes to defeat mobility assets without becoming decisively engaged. Understanding the importance of reconnaissance, the threat uses counter-
reconnaissance assets to defeat friendly reconnaissance in order to blind friendly forces. Finally, through the use of hit-and-run tactics, the threat endeavors to
stall the friendly plan to the point that it becomes desynchronized or a portion of the friendly force becomes so decimated that it can not continue and the
friendly commander must redirect other friendly forces, or the reserve, in order to continue the operation. The DZ is also the area of the battlefield for non-
conventional forces, such as special purpose and other affiliated forces, which could have been operating in enemy-held territory prior to the escalation of
hostilities. There could also be stay-behind forces in areas seized by the enemy. The DZ, in defensive operations, is found forward of the battle zone and can
easily run deep into the friendly rear area.
Battle Zone
The fixing force is a single unit or an amalgamation of units with the task to fix friendly forces
so they are not free to maneuver. This can be done through loss of effective communications
with HHQ, by increasing the friction on the battlefield so the friendly unit no longer has a clear
idea of the battlefield situation, by becoming decisively engaged with enemy forces, or through
loss of mobility due to complex terrain, obstacles, or chemical, biological, radiological, nuclear
or high-yield explosive (CBRNE) devices. By fixing a portion of the friendly force, the enemy
retains freedom of maneuver and uses fewer assets than are normally required to defeat friendly
forces.
The assault force creates the conditions that allow the exploitation force the freedom to operate.
This may be done through direct or indirect contact with friendly forces or through a Battle Zone Deployment (Enemy in the Defense)
demonstration or feint that makes contact with the friendly force, but does not force them to become
decisively engaged.
The exploitation force is assigned the task of achieving the objective. As the name implies, the exploitation force exploits a window of opportunity created by
the fixing and assault forces. This does not imply that the exploitation force requires a successful mission of either the fixing or assault force in order to be both
effective and ultimately successful. A mismatch in capabilities or in the friendly and enemy dispositions may cause the enemy force to achieve its objective. The
exploitation force might even be able to achieve its objective through the effective use of fires.
In threat defensive operations, the battle zone is the area in which the main defensive forces use fire and maneuver to exploit successful disruption zone
operations. It is here that enemy forces complete the destruction of friendly combat systems earlier decimated in the DZ. If the enemy is successful, friendly
forces will be forced to culminate or leave the battlefield entirely. The battle zone integrates the Obstacle Plan of the enemy with his Fires Plan to support all of
his available systems. By using complex terrain, friendly forces may easily enter zones, but their exit may become difficult or even impossible. By establishing
kill zones, the enemy commander integrates long-range fires with attack aviation and ground defensive forces. Long-range fires from the battle zone may also
reach kill zones within the DZ, where their actions can be integrated with those of the disruption forces.
Support Zone
The reason the enemy fights has a great impact on how he deploys his
forces and how he fights. In defensive operations, the enemy has
basically three options: (1) defend to destroy friendly forces, (2) defend Roadside IED is hidden at a choke point where target
to preserve key, held components from friendly destruction, or (3) defend vehicle is likely to be forced to stop. Lookout, or insurgent
to deny the friendly forces access to a geographic area or facility that who is to initiate the device placed in line of site of ambush
site. Initiation may be by command wire (more suited to
could enhance friendly operations or provide substantial value for rural areas), or by remote (previous IED’s have used mobile
information related operations. telephones).
I IED
In the offense, the threat also has basically three options: (1) attack to
destroy friendly forces, concentrating on key pieces of equipment or
formations, (2) attack to seize control of a key terrain feature or man-
made facility, or (3) attack to expel a friendly force either through loss of
combat power or loss of resolve (either at the tactical / operational levels
or at the operational / strategic levels). IED’s may be hidden by a variety of methods. Previous
incidents included boxes, bags, drink cans, dead animals,
MRE packs, hollowed out breeze blocks, and broken down
The same reasons, both offensively or defensively, are germane to vehicles.
stability operations when facing an enemy with the resolve to pursue his
goals through armed conflict.
Do not expect your HHQ to do you any favors. As they define the OE South Atropian (fictional) People’s Army TTP
and conduct their own IPB, it is focused on the information necessary to
complete their planning and mission. For this, they generally only depict
enemy forces two levels down. If there are key pieces of equipment or formations the commander is particularly interested in, they will be made
known to the staff during his initial guidance issued prior to Mission Analysis, and it is incumbent on the staff to identify these pieces of equipment or
formations, request information from HHQ or other sources, or dispatch internal collection assets to identify their location.
Rather than building a COA to describe the threat capability, capabilities are defined by statements. The following are examples of capability statements:
“The threat has the capability to attack with one division supported by eight sorties of fixed wing aircraft daily.”
“The criminal organization has the capability to pay off local radio stations to favorably portray their actions.”
“The threat has the capability to impact local computer networks by infecting them with viruses from outside the wire.”
“The threat has the capability to defend within four days and can be 100 % effectively dug in with wire and mine obstacles within eight days.”
“The insurgents have CBRNE capabilities other than IEDs.”
“Based on their numbers, insurgents can emplace up to four IEDs per day.”
“The threat has the capability to use remotely triggered IEDs against our convoys.”
Besides these specific capabilities, other, more generic, types of capabilities should be identified, such as those that could be used to support a chosen COA.
Examples of these type capabilities might include:
CBRNE operations.
Intelligence collection.
Electronic warfare (EW) operations.
Aviation capability (fixed- and rotary-wing).
Engineer capability (mobility and counter-mobility).
Air assault or airborne operations.
Amphibious operations.
Propaganda operations.
Deception operations.
Car bombings, bomb scares, and suicide bombers.
Carjacking or hijacking of vehicles to be used in other operations.
Theft and/or manufacturing of chemicals.
Not all threat capabilities are available to the threat all the time. It is incumbent upon the analyst to start with a laundry list of capabilities and weed out, based
on operation type, size of element, and terrain or weather restrictions, those capabilities that the threat could not realistically use. The threat strength, logistic
support, or level of training may further limit the capabilities the threat brings to the table.
While it is important to identify all threat capabilities in order to develop a complete set of threat COAs, it is important not to overstate their capabilities. They
must be realistic and analyzed based on factors of METT-TC to be useful. Take into account cultural awareness. This will help identify groups or individual
members who are either pro, neutral, or opposed to operations, which could further impact capabilities.
CAUTION Do not limit defining the capabilities to the threat’s conventional forces.
External influences could become a force the threat may use to influence
or affect operations. Civilians displaced by the threat could hinder friendly movement if
they move on critical roads or obstruct other infrastructure.
The threat model includes a description of the threat’s preferred tactics. A description is still needed even if the threat has preferred tactics which are depicted in
a graphic form. The description:
Lists the options available to the threat should the operation fail or succeed.
Prevents the threat model from becoming more than a “snapshot in time” of the operation being depicted.
Aids in mentally war-gaming the operation over its duration and during the development of threat COAs and situation templates.
Addresses typical timelines and phases of operation, points where units transition from one form of maneuver to the next, and how each WFF contributes to
the success of the operation.
The analyst describes the actions of the supporting WFF in enough detail to allow for identification and development of HVTs. The analyst also examines each
phase separately because target values may change from phase to phase.
The analyst describes and makes a determination of what goal or goals the threat is trying to achieve. Threat objectives are often, but not always, what the unit’s
mission is trying to prevent; they are often actions taken by the threat to prevent unit mission accomplishment. Threat objectives will be specific to the type of
threat, the AO, the unit’s composition and mission, and other factors. The analyst also describes the threat objective in terms of purpose and end state. A
number of different functions must be executed each time a threat force attempts to accomplish a mission.
The first line in the above paragraph states that the model includes a description of the “preferred” tactics of the threat. The analyst must also be aware of the
less than optimal tactics and capabilities the threat has and when, and if, he might use them. This becomes very important during the final step of IPB.
The threat always has what we will call the “Captain Kirk Self-Destruct Option” … that is, place his force in a position which will either achieve his end state
or destroy his entire force. Many variables factor into the threat commander’s decision to employ this type of decision. Generally not used by regular forces,
this is often seen with suicide missions or threat operations based on religious ideology.
Identify High-value Targets (HVTs) Threat in Offense Threat in Defense Threat in Insurgency Civil Support
Reconnaissance elements Reconnaissance elements IED production facilities Nuclear reactors
Counter-reconnaissance
High-value target – A target the enemy commander requires for the detachment Engineer assets (mobility) IED emplacement teams Sports venues
successful completion of the mission. The loss of high-value targets would Multiple rocket launcher
Systems (MLRS) Indirect fire assets Snipers Convention centers
be expected to seriously degrade important enemy functions throughout the
friendly commander’s area of interest. Also called HVT. (Joint Publication Indirect fire systems MRLS Cell phones Malls / shopping areas
(JP) 3-09) Resupply capabilities CBRNE Local populace Government buildings
Engineer assets (counter-
mobility) Communications systems Tribal leaders Toxic / chemical storage sites
High-payoff target – A target whose loss to the enemy will significantly CBRNE capabilities UAS Informal leaders Utilities
contribute to the success of the friendly course of action. High-payoff Communications systems Mosques Media centers
targets are those high-value targets that must be acquired and successfully Mines and obstacles Transportation centers
attacked for the success of the friendly commander’s mission. Also called Snipers Emergency centers
HPT. (JP 3-09) Unmanned Aerial Systems
(UAS) Hospitals
The concept of high-value and high-payoff targets can sometimes be Examples of HVTs Based on Threat Operations
perplexing. Some look at them as two sides of the same coin. If you have a
target that the enemy requires to be successful (HVT), then the loss of the same target must be favorable to the accomplishment of the friendly mission. While
this, in its simplest form, is true, the commander must understand his capabilities and how (or if) he can affect the target. The identification of HVTs is done as
a precursor to defining HPTs. HPTs are defined by their relationship to the friendly concept of the operation (FM 3-60) and will not be addr essed until COA
Development.
Once HVTs have been identified from existing intelligence studies, database evaluation, patrol debriefs, and Spot Reports which identify size, activity,
location, unit (unifor m), time, and equipment (SALUTE), they must be pr ior itized relative to their wor th to the enemy as par t of the thr eat model.
HVTs will appear over the course of the operation, and it is important to identify their value based on when and where they occur on the battlefield. There are
different methods to prioritize the importance of HVTs to the enemy: historical data, analysis of studies, and numerical methods such as the target analysis
process (special operations forces (SOF) method) of identifying the desirability of attacking a target based on its relative importance to the enemy. This
process, termed “CARVER,” stands for factors of criticality, accessibility, recuperability, vulnerability, effect, and recognizability.
The final sub-task in IPB is to determine the various threat COAs. Detailed analysis of the previous three steps of IPB will enable the staff to replicate all of the
COAs the threat is considering, identify the threat COAs that can influence the friendly COA, and identify those areas and activities whose activity or lack of
activity will indicate which COA the threat has chosen. Like everything else in IPB and the MDMP in general, time is a key consideration in determining how
many threat COAs the S-2 Section will be able to create and provide narrative for. Because of this, the S-2 must allocate the lion’s share of time during
Mission Analysis to building threat COAs and refining the threat COAs from the HHQ OPORD.
The staff will use the threat COAs along with facts and assumptions that were developed
during Mission Analysis to drive friendly COA Analysis and develop and refine a set of
friendly COAs to defeat the threat.
Like each of the previous steps, Sub-task 4 of IPB is broken down into sub-steps. In this
case, there are two sub-steps as indicated in the figure to the right:
Develop threat COAs.
Develop event template and matrix.
There are six sub-tasks which fall under Develop Threat COAs. They are:
Identify likely objectives and end state.
Identify full set of COAs.
Evaluate and prioritize each COA.
Develop each COA in the amount of detail time allows.
Identify HVTs for each COA.
Identify initial collection requirements for each COA.
As stated earlier in this publication, it is necessary to determine why the threat is fighting to determine what he is looking to accomplish (end state) and
what benchmarks (likely objectives) he will attempt to achieve. The S-2 depicts the threat based on commander’s guidance (for example echelon or cell).
When looking at a particular echelon, it is important to understand that the goal of a subordinate unit may not be the same as the parent unit. A unit may
have the task of fixing a particular unit in order for the parent unit to defeat a larger element and setting the conditions for an even larger element’s actions.
Generally, when depicting the threat, the unit should start one echelon above the friendly echelon and work downward at least two echelons. For example,
a battalion must understand the end state of the brigade tactical group (BTG), but depict company-level and, finally, platoon-level positions. Special
emphasis should be taken with key pieces of equipment or formations as directed by the commander or HHQ.
For regular forces, objectives can be either terrain or force oriented, and the end state is usually based on effect and time. For example, the objective of a
lead echelon infantry brigade performing an attack may be to neutralize defending forces. The brigade’s end state may be to prevent defending forces from
affecting the movement of second echelon forces. Additionally, the brigade’s operations are synchronized in time with HHQ operations to ensure combat
power is applied where and when needed to ensure success.
For irregular forces, while the end state remains based on effect, objectives are not always linear or time-based. Often, the objectives of irregular forces are
driven by events rather than time. For example, the objective of an extremist group may be to prevent U.S. forces from providing security to the general
population by increasing the amount of time spent on resources. The group’s end state may be to convince the population to rely on security provided by
the extremist group rather than U.S. forces. In this case, the group’s operations are synchronized with the operations of U.S. forces attacking patrols,
convoys, combat outposts, and security forces.
Sometimes it is difficult to understand the intentions of terrorists, criminal organizations, or certain actors inside the AO or involved with the action.
Utilize the tools available, including the MISO. They will help evaluate graffiti, gang symbols, and other propaganda to determine likely end states and/or
targets. Know how and why the threat conducted operations in the past. This can give good insight into possible objectives and end states.
Because the MDMP is a recurring process, and IPB is a continuous process, it is rare to be able to conduct either in a pristine environment with no outside
distracters. It is crucial that the S-2 Section is well trained to meet the contingency that the S-2 proper is forward with the commander executing another mission,
personnel are on pass or leave, or the section is otherwise short-staffed. Time sometimes is the major factor in determining how many threat COAs can be
prepared and how fully they can be flushed out.
The best method, to start, is to refine the HHQ assessment of the threat COAs. These will generally give you what they perceive as the most likely and the most
dangerous threat COAs. After that, there may be some significant capabilities that have been identified during Sub-task 3 of the IPB that may be included in
additional threat COAs.
To ensure the staff has developed the “complete” set of threat COAs, the following should be considered :
Are the threat COAs identified appropriate to the identification of the threat’s likely objectives and end states?
Are the threat COAs appropriate based on how the threat perceives the current situation?
How can the threat change his COAs to significantly influence friendly operations?
How regimented is the threat? What can it do to exploit capabilities outside of its normal doctrine and tactics?
What other actions can the threat initiate outside of what has been indicated by recent activities and events?
A regular force has two primary types of operations it can conduct: attack or defend. Based on its objectives, the enemy must select one of these options. Once
selected, the threat generally has multiple options to consider when developing its plan.
An irregular force can conduct an attack or defend on a small scale, for short periods, or in complex terrain, but it is difficult to sustain these types of operations
without degradation of their effectiveness and their operations. The primary types of operations irregular forces can conduct are activities associated with
insurgent or guerilla operations, raids, ambushes, sabotage, and acts of terror.
A hybrid force can combine the capabilities of regular and irregular forces to engage U.S. forces from all points in order to overwhelm U.S. capabilities.
Regardless of the type of force and the type of operation being conducted, enemy forces plan operations based on task, purpose, method, and end state.
Activities within its operations are planned to support that task and purpose. The staff identifies the tasks, purpose, and end state for each COA developed. By
identifying these for each COA, the intelligence staff will be better able to determine the chosen threat COA during the conduct of operations.
Regardless of the type of force, when developing a threat COA, the staff determines:
Current enemy situation.
Mission (includes task and purpose).
Threat objectives, methods, and end state.
Commander’s intent, purpose, and end state.
Task organization.
Capabilities.
Vulnerabilities.
HVTs.
Decision points (essential in determining branches and sequels).
Decisive point (source of strength, power, and resistance).
Failure options.
Branches and sequels.
Intent for:
Movement and maneuver.
Reconnaissance and surveillance.
Fire support.
Logistics.
Threat command and control.
Protection.
Information activities.
Denial and deception.
Once the staff has identified all valid threat COAs, it compares each COA to the others and prioritizes them by number. For example, if four COAs have been
developed, COA 1 is the enemy’s most likely COA and COA 4 is the least likely. Additionally, the staff determines which COA is the most dangerous to U.S.
forces. The most likely COA may also be the most dangerous. Additionally, a COA needs to answer six basic questions:
Who - the organizational structure of the threat organization, including external organizations providing support.
What - the type of operation: attack, defend, other.
When - the earliest time the action can begin.
Where - the battlefield geometry that frames the COA (boundaries, objectives, routes, other).
How - the threat will employ its assets to achieve its objectives.
Why - the threat’s objectives.
The commander approves a plan that is optimized to counter the most likely enemy COA, while allowing for contingency options should the threat choose
another COA. Therefore, the staff evaluates each enemy COA and prioritizes it according to how likely it is that the threat adopts that option. Generally, threat
forces are more likely to use a COA that offers the greatest advantage while minimizing risk. However, based on the situation and its objectives, the threat may
choose to accept risk to achieve a desired end state (as discussed previously). It is impossible to predict what COA the threat will choose. Therefore, the staff
develops and prioritizes as many valid threat COAs as time allows but at a minimum develops the most likely and most dangerous COAs.
ADRP 1-02 defines the SITTEMP as, “A depiction of assumed adversary dispositions, based on that
adversary's preferred method of operations and the impact of the operational environment if the
adversary should adopt a particular course of action.” In other words, the situation template is a
“snapshot in time” based on the threat’s chosen COA and taking into account the effects of the OE. As
stated earlier, SITTEMPs are logical deductions working inside the parameters directed by the HHQ
and taking into account what the threat has done in the past, the OE, and perceived end state. The
graphic to the right has been produced in many ways but always with the same elements. The threat’s
SOP (determined in Sub-task 3 of IPB) added to the environment (produced in Sub-task 1 and 2)
produces a threat COA. This does not mean it is the only COA based on the threat’s SOP and current
environment because there are many ways the threat has to conduct an operation. This is why there are
differences in threat COAs and why a method must be in place to determine which COA he will
choose.
As another example, take the MCOO to the right. This was developed using terrain from the NTC in Developing the SITTEMP
California, and includes relief, hydrology, and civilian infrastructure combining to produce
mobility corridors, avenues of approach, and key terrain. Legend
Restrictive terrain
Severely restrictive
Area
Built up area
Building this product provides a graphic representation of where there is maneuverable Mobility corridor
Platoon
terrain and what terrain contains obstacles to movement. We rarely place threat positions 50
Company
Battalion
50
50Ave of approach
60 70 80 90 MK NK 10 20 30 40 50 60 70 80
within non-maneuverable terrain but they must be considered because this terrain may help Airfield
K
Playa / sabkha
whoever owns it by canalizing forces (with the help of manmade obstacles) into areas where K AA1A
China Lake
40
K Key terrain 40
the threat wishes to defeat friendly forces. This terrain is also preferable for the emplacement AA1
of key weapon systems and observation posts. 30 30
K
Medina Wasl
10 10
Wadi Ra’id
MK
MJ
MK NK
MJ NJ K El Whaleo
Mezra’s Mazik Ahmar NK
NJ
AA2B
90 90
50 60 70 80 90 MJ NJ 10 20 30 40 50 60 70 80
if needed.
X
The support zone, with the indirect fire
assets and sustainment assets, is to the
rear of the AO.
20 -
necessary protective measures in place to 20
or enveloping attacks.
10 - Medina Wasl
- 10
Wadi Ra’id
Once the S-2 completes emplacing the enemy
equipment two levels down (with more Medina Irwin
Against conventional threats, evaluate time and space factors to develop time-
phase lines (TPLs). These TPLs link doctrinal rates of movement with the OE
and provide the basis of determining timing of threat operations based on
movement across high-speed vice sub-optimal AAs. Developing TPLs become
the starting block of timing threat operations and are found in SITTEMPs,
EVENTEMPs, and decision support templates (DST). While developing TPLs,
consider only the time required to adopt movement patterns, time for the
movement itself, and time for the trail elements to close after arriving at a
selected point. During war-gaming, TPLs are generally modified through the
addition of specific triggers which may be influenced by friendly actions. These Time Phase Lines
triggers become part of the threat DST, which may be included in IPB products
but are necessary in developing the synchronization matrix. These results are
also incorporated in the unit Information Collection Plan and are used to Decision Support Template Showing
determine specific times when collection assets are required to confirm or deny threat Time-Phase Lines
activity in named areas of interest (NAIs). In some instances (specifically when templating
against irregular or hybrid threats), the development of TPLs may be impractical and should instead be portrayed based on activities. These timelines, as
stated in Sub-task 3 of IPB, are derived through analysis of past activities.
When preparing SITTEMPs, use as many graphics as necessary to depict the threat COA in enough detail to support COA Analysis and collection planning.
Use the guidance set forth by the commander to tailor the SITTEMPs to the needs of the unit. Based on echelon, threat templates may focus on culmination
points and centers of gravity rather than specific threat COAs.
Threat COA statements provide a narrative to the SITTEMPs created. This can be done in many formats and should be done in as much detail as time allows.
The methods for capturing the descriptions of threat COAs range from simple narrative descriptions to detailed synchronization matrices depicting activities of
each unit, WFF, or other activity in detail. They should address time (specifically the earliest time) based on current situation, when the threat could commence
operations, as well as timelines, phasing, and threat commander’s decision points, if developed. The narrative portion of the SITTEMP will be used in COA
Analysis and forms the basis of the threat portion of the OPORD, the EVENTEMP, and the Intelligence Estimate (e.g., Annex B (Intelligence))of the OPORD.
The development of threat COA descriptions should be done in as much detail as time allows and the situation requires. There is no single set of doctrinal rules
required to design the description. Use whatever tools and format work for the commander and staff. The basics formats are generally time-event charts or
simple narrative descriptions. Regardless of which format is used, expect refinement to the threat COA statement to occur during COA Analysis.
After identifying the set of potential threat COAs, the next action is determining which one the threat will adopt. This revolves around predictive analysis about
specific activities and areas that, when observed, will reveal which COA the threat has chosen. These areas on the SITTEMP should be nominated as NAIs.
NAIs can depict locations, persons, or actions. The actions within each of these NAIs that reveal the intended COA are called indicators and are part of the
Information Collection Process.
The simple tool to the right serves as an example of what specific information
should be included in the threat COA statement.
In Sub-task 3, potential HVTs and HPTs were identified. These were generic and
not specific to a given threat COA. While providing a good start to the Targeting
Process, the initial list doesn’t provide the fidelity required to develop a
collection plan. The HVTs must be important to the threat commander based on
the COA he chooses. If an HVT designated in Sub-task 3 is a particular bridge, and Example Threat COA Statement Outline
during the development of the threat COA, the threat does not use the bridge, the
bridge is not an HVT for that particular threat COA.
As the SITTEMPs are mentally war-gamed, the following techniques will help in developing a list of HVTs to move forward into targeting and friendly COA
Development:
Note how and where each WFF provides support to the threat COA.
Begin with the list of HVTs from the threat model developed in IPB Sub-task 3, but don’t limit the input to those alone.
Determine the effect the loss of each HVT will have on the threat COA by destroying each one and attempting to determine what the threat response will
be; the value of each HVT may differ based on the COA being war-gamed.
Identify the times, phases, or locations on the battlefield where and when the loss of a specific asset will have the greatest effect on the threat COA.
Ensure the updated HVT list is transferred to, and included in, the threat COA with the SITTEMP and narrative; note on the threat overlay where specific
HVTs must be employed for the threat commander to be successful; this will become a good tool to focus COA Analysis; understanding where and when
the threat is expected to use his HVTs aids in the development of targeted areas of interest (TAI) and engagement areas (EA).
Ensure the remainder of the staff participates, as necessary, in the development of threat COAs, particularly where their subject matter expertise of specific
WFF questions would help to fully develop it.
The detailed analysis of HVTs based on threat COAs may lead to a reprioritization of them.
After identifying the full set of potential threat COAs, the staff develops the tools necessary to determine which COA the threat will implement. Because the
threat has not acted yet, this determination cannot be made during IPB. However, the staff can develop the information requirements and indicators necessary to
support the construction of an Information Collection Plan that can provide the information necessary to confirm or deny threat COAs and locate enemy targets.
Information requirements are those items of information that need to be collected and processed in order to meet the intelligence requirements of the
commander. An indicator is an item of information which reflects the intention or capability of a threat to adopt
or reject a COA. H+1 H+4 H+6 H+8
The two tools used to begin identifying which COA the threat will choose and that form the basis of the
Information Collection Plan are: NAI 3
The EVENTEMP.
The event matrix. NAI 4
NAI 2
While it is extremely important to identify all of the COAs the threat may adopt, the knowledge is Threat COA 1
useless unless it can be ascertained which one he will choose. This is the function of information
collection planning and execution. One of the tools used to identify which COA the threat will ECOA 1
choose is the EVENTEMP.
H+1 H+4 H+6 H+8
The EVENTEMP attempts to answer which COA the threat will choose based on the observation X
of specific areas of the battlefield and the identification of activity or lack of activity. This is done
by overlapping the threat COAs developed and determining where they are the same or different. NAI 3
An indicator present in all COAs can neither confirm nor deny the adoption of any COA by the
threat. Only where indicators differ between COAs, can an assessment be made. The graphics to
the right indicate the predicted locations of platoon battle positions in two threat COAs. NAI 6
NAI 5
Threat COA 2
ECOA 2
Threat COA 2
NAI 1
Event Template
The EVENTEMP
The unit Information Collection Plan serves many purposes. First and foremost, it helps the commander identify,
through the use of products discussed on the previous pages, which COA the threat has adopted. The Information
Collection Plan also serves as the “detect” portion of the 4-part Targeting Process, that is, Decide, Detect, Deliver, and
Assess (D3A). The Information Collection Plan synchronizes collection with the friendly Maneuver Plan and answers
questions for the commander and the staff. Information collection planning is much more complicated than a single
paragraph can define.
The Training Analysis Feedback Team (TAFT) developed the product shown to the right following the tenets
outlined in FM 3-55, Information Collection (May 2013), and ATTP 2-01, Planning Requirements and Assessing
Collection (April 2012). A revision is scheduled shortly that will update this product to guidance provided in ATP 2-
01, Plan Requirements and Assess Collection (August 2014).
Focusing IPB
"Go sir, gallop, and don't forget that the world was made in six days. You can ask me for anything you like, except time.”
Napoleon Bonaparte
In closing this publication, the question may still linger . . . “What if I don’t have enough time to do all four steps of IPB completely?” The time available for
completion of IPB may not permit the luxury of performing each step in detail. Overcoming time limitations requires a determination on which products need to
be developed, and to what degree of detail, in order to assist the commander and staff in planning, preparing for, and executing the mission.
There is always enough time to do IPB . . . it is a continuous process that permeates the MDMP. What is not addressed during Mission Analysis can be
readdressed during the COA Development Briefing, the COA Analysis Briefing, the COA Comparison Briefing, or in the OPORD. The key is understanding
not what can not be provided in entirety during Mission Analysis, but what must be provided in the greatest detail in order for the staff to continue planning.
The commander and XO must address the planning timeline at the onset of mission planning and determine, while conducting the initial assessment, how much
time can be allocated to Mission Analysis and, subsequently, IPB.
The commander focuses the Planning Process during the initial guidance provided during Receipt of Mission. This should include how the MDMP is to be
abbreviated, if necessary. If there is not enough specificity with regard to IPB, someone (either the S-2 or the Operations Officer (S-3)) needs to ask the
commander what the priority is for the production of IPB products. This may or may not be already addressed in the unit Plans / Tactical SOP.
A set of informal “rules” that can assist the staff may include:
Work ahead as much as possible.
Establish a set of base products.
Keep the products updated by periodic review instead of waiting for the next Receipt of Mission.
Keep threat databases up to date as changes occur.
Maintain good communications to ensure collaboration with higher, subordinate, and other staff elements.
Share products in a time-constrained environment and use the available technology.
TIP The commander and staff can look out of the window and see the rain and see the mountains. They
understand the effects of weather and terrain as they apply to their WFFs. Do not spend an inordinate
amount of time on environmental conditions (other than populations). Spend time on the threat . . . who they are,
how they work, and what they will do.
All-weather, loose Constructed of crushed rock, gravel, or smoothed earth with an oil
surface coating.
Graded and drained, but not waterproofed.
Can be considerably affected by rain, frost, or thaw.
May collapse completely under heavy use during adverse weather
conditions.
Fair-weather, loose- Constructed of natural or stabilized soil, sand clay, shell, cinders,
surface or disintegrated granite or rock.
Includes logging road, abandoned roads, and corduroy roads.
Can become quickly impassable in adverse weather.
Cart track Natural traveled ways including caravan routes and winter roads.
Too narrow to accommodate four-wheeled military vehicles.
T-72 Tank 125-mm smoothbore gun, 7.62-mm coaxial machinegun, 12.7-mm AA machinegun 460-700 kilometers
T-72B Tank 125-mm smoothbore gun, 7.62-mm coaxial machinegun, 12.7-mm AA machinegun 500-900 kilometers
T-80B Tank 125-mm smoothbore gun, 7.62-mm coaxial machinegun, 12.7-mm AA machinegun 370-500 kilometers
T-90A Tank 125-mm smoothbore gun, 7.62-mm coaxial machinegun, 12.7-mm AA machinegun 500-650 kilometers
Mechanized and Armored Vehicles from Worldwide Equipment Guide
APC — armored personnel carrier IFV — Infantry fighting vehicle ABN — airborne
AA — anti-aircraft ATGM — anti-tank guided missile mm — millimeter
BRM-1K Reconnaissance Command 73-millimeter gun, 7.62-millimeter coaxial machinegun 600 kilometers
BRM-3K Reconnaissance Command 30-millimeter auto gun, 7.62-millimeter coaxial machinegun 600 kilometers
PRP-3/4M Radar n/a 600 km Artillery Mobile Recon 20-kilometer detection range,
7-12-kilometer tracking range
IL-219 Radar n/a 500 km Artillery Locating Radar 8-35 kilometers based on type of
system fired
IL-220U Radar n/a Unknown Artillery Locating Radar 20-55 kilometers based on type
of system fired
D-30 Artillery 120-millimeter 21.9 kilometers Towed
D-20 Artillery 152-millimeter 24.4 kilometers Towed
G-5 Artillery 155-millimeter 39 kilometers Towed
2A36 Artillery 152-millimeter 30.5 kilometers Towed
2S1 Artillery 122-millimeter 21.9 kilometers Self-propelled
2S3M Artillery 152-millimeter 24.4 kilometers Self-propelled
2S5 Artillery 155-millimeter 30.5 kilometers Self-propelled
2S19 Artillery 152-millimeter 29 kilometers Self-propelled
G-6 Artillery 155-millimeter 39 kilometers Self-propelled
BM-21 Multiple Rocket Launcher 122-millimeter 32.7 kilometers Self-propelled
2S12 Mortar 120-millimeter 7 kilometers Self-propelled
2S9 Combination Gun 120 -millimeter 12.8 kilometers Self-propelled
Indirect Fire Systems from Worldwide Equipment Guide
CP command post A unit headquarters where the commander and staff perform their activities. (FM 6-0)
CTC combat training center The CTC Program provides realistic joint and combined arms training, according to Army and joint
doctrine, approximating actual combat. (AR 350-50)
DF direct fire Gunfire delivered on a target, using the target itself as a point of aim for either the gun or the
director.
DOD Department of Defense A department of the U.S. Government responsible for providing the military forces needed to deter
war and protect the security of our country. (Government Information Library)
DST decision support template A graphic record of war-gaming. The decision support template depicts decision points, timelines
associated with the movement of forces and the flow of the operation, and other key items of
information required to execute a specific friendly course of action. (ADRP 1-02)
DTED digital terrain elevation data A uniform matrix of terrain elevation values which provides basic quantitative data for systems and
applications that require terrain elevation, slope, and/or surface roughness information.
(NGA website - https://www1.nga.mil/ProductsServices/TopographicalTerrestrialDigitalTerrain
Elevation Data/Pages/default.aspx)
DZ disruption zone Location where the OPFOR sets the conditions for successful operations by beginning the attack on
the components of the friendly combat system. (FM 7-100.1)
FOB forward operating base A base, usually located in friendly territory or afloat, that is established to extend command and
control or communications or to provide support for training and tactical operations. (ADRP 1-02)
FSC forward support company An element of a combined arms battalion (CAB) with the mission to execute the sustainment plan in
accordance with the CAB commander’s guidance. (FM 30-90.5)
HF high frequency Radio frequencies between 3- and 30-megahertz. (ADRP 1-02)
HMMWV high-mobility, multi-wheeled vehicle Any of a series of military vehicles manufactured by the AM General company based on the M998
series vehicle. (ADRP 1-02)
HPT high-payoff target A target whose loss to the enemy will significantly contribute to the success of the friendly course of
action. High-payoff targets are those high-value targets that must be acquired and successfully
attacked for the success of the friendly commander’s mission. (ADRP 1-02)
HVT high-value target A target the enemy commander requires for the successful completion of the mission. The loss of
high-value targets would be expected to seriously degrade important enemy functions throughout the
friendly commander’s area of interest. (ADRP 1-02)
LTIOV latest time information is of value The time by which information must be delivered to the requestor in order to provide decision makers
with timely intelligence. (ADRP 1-02)
MCOO modified combined obstacle overlay A tool created through analysis of the combined obstacle overlay, which depicts the operational
environment’s effects on the operation. (ATP 2-01.3)
MDMP Military Decisionmaking Process The Military Decisionmaking Process is an iterative planning methodology that integrates the activities
of the commander, staff, subordinate headquarters, and other partners to understand the situation and
mission; develop and compare courses of action; decide on a course of action that best accomplishes
the mission; and produce an operation plan or order for execution. (FM 6-0)
METOC meteorological and oceanographic Of, or having to do with, weather and littoral conditions and their effects on military operations.
(ATP 2-01.3)
METT-TC mission, enemy, ter rain and weather , A memory aid used in two contexts: (1) in the context of information management, the major subject
tr oops and suppor t available, time categories into which relevant information is grouped for military operations: mission, enemy, terrain
available, and civil considerations and weather, troops and support available, time available, civil considerations, and (2) in the context of
tactics, the major factors considered during Mission Analysis. (ADRP 1-02)
MRE mission rehearsal exercise An equivalent to the field training exercise but is normally accomplished as part of a battalion's
train-up to the performance of a stability operation mission.
(http://www.globalsecurity.org/military/ops/mre.htm)
MSR main supply route The route or routes designated within an operational area upon which the bulk of traffic flows in
support of military operations. (ADRP 1-02)
NAI named area of interest The geographical area where information that will satisfy a specific information requirement can be
collected. Named areas of interest are usually selected to capture indications of adversary courses of
action, but also may be related to conditions of the operational area. (ADRP 1-02).
OB order of battle The identification, command structure, strength, and disposition of personnel, equipment, and units
of an armed force participating in field operations. (FM 6-0)
OE operational environment A composite of the conditions, circumstances, and influences that affect the employment of
capabilities and bear on the decisions of the commander. (ADP 3-0)
OPFOR opposing force A training tool that should allow the U.S. Army to train against a challenging and plausible sparring
partner that represents the wide range of possible opponents the Army could face in actual conflict.
(FM 7-100.1)
OPORD operation order A directive issued by a commander to subordinate commanders for the purpose of effecting the
coordinated execution of an operation. Also called the 5-paragraph field order. (ADRP 1-02)
PMESII-PT political, militar y, economic, social, Memory aid for operational variables. (ATP 2-01.3)
infr astr uctur e, infor mation - physical
environment, and time
plans standing operating procedures A procedure or set of procedures to perform a given operation or task. In this case, Plans SOP refers
to those tasks regarding planning. (ADRP 1-02)
SALUTE size, activity, location, unit (uniform), Memory aid used for SPOT Reports. (FM 6-99)
time, and equipment
SITTEMP situation template A depiction of assumed adversary dispositions, based on adversary doctrine and the effects of the
environment if the adversary should adopt a particular course of action. (ADRP 1-02)
SW short-wave The upper medium frequency (MF) and all of the high frequency (HF) portions of the radio
spectrum, between 1,800–30,000 kHz. (ADRP 1-02)
SWEAT- sewage, water , electricity, academics, A memory aid to describe infrastructure assessment and surveys with each letter describing a major
MSO tr ash - medical, safety, and other area within the assessment. (FM 3-34.170)
considerations
tactical standard operating procedures The Tactical SOP is essentially the "game-plan" that units follow when conducting tactical
operations. (AP 3-90.90)
TAI targeted area of interest The geographical area where high-value targets can be acquired and engaged by friendly forces.
(ADRP 1-02)
TPL time-phase line A doctrinal graphic relating time and space factors used to depict threat movement. (FM 2-01.3)
TRADOC U.S. Army Training and Doctrine An Army command of the U.S. Army headquartered at Fort Eustis, Virginia. It is charged with
Command overseeing training of Army Forces, the development of operational doctrine, and the development
and procurement of new weapons systems.